Advertisement

Network Strengthening Against Malicious Attacks

  • Qingnan Rong
  • Jun Zhang
  • Xiaoqian SunEmail author
  • Sebastian Wandelt
Conference paper
Part of the Studies in Computational Intelligence book series (SCI, volume 881)

Abstract

Robustness measures the toleration of complex networks against random failures and malicious attacks. A malicious attack removes the most important node iteratively and destroys the network quickly. It is crucial to strengthen the network robustness against malicious attacks. In this paper, we propose an algorithm to strengthen the robustness with reduced change of network structure compared to state-of-the-art algorithms. The algorithm is called targeted variable neighborhood search (TVNS) algorithm. Experiments on real-world and random networks show that TVNS is efficient on strengthening the robustness against malicious attacks. The strengthened network against high degree adaptive attack shows an onion-like structure where nodes prefer to connect with similar degree nodes; while for the strengthened network against high betweenness adaptive attack, nodes prefer to connect with similar betweenness nodes.

Keywords

Network robustness Malicious attacks TVNS algorithm 

Notes

Acknowledgements

This study is supported by the National Natural Science Foundation of China (Grants No. 61861136005 and No. 61851110763).

References

  1. 1.
    Galvão, V., Miranda, J.G., Andrade, R.F., Andrade, J.S., Gallos, L.K., Makse, H.A.: Modularity map of the network of human cell differentiation. Proc. Natl. Acad. Sci. 107(13), 5750–5755 (2010)CrossRefGoogle Scholar
  2. 2.
    Marcoux, M., Lusseau, D.: The influence of repressive legislation on the structure of a social media network. EPL (Europhys. Lett.) 104(5), 58004 (2014)CrossRefGoogle Scholar
  3. 3.
    Wandelt, S., Sun, X., Cao, X.: Computationally efficient attack design for robustness analysis of air transportation networks. Transportmetrica A: Transp. Sci. 11(10), 939–966 (2015)CrossRefGoogle Scholar
  4. 4.
    Souto, P.C., Teixeira, A.S., Francisco, A.P., Santos, F.C.: Capturing financial volatility through simple network measures. In: International Conference on Complex Networks and their Applications, pp. 534–546. Springer (2018)Google Scholar
  5. 5.
    Sarker, B., Rtichie, D.W., Aridhi, S.: Exploiting complex protein domain networks for protein function annotation. In: International Conference on Complex Networks and their Applications, pp. 598–610. Springer (2018)Google Scholar
  6. 6.
    Albert, R., Barabási, A.-L.: Statistical mechanics of complex networks. Rev. Mod. Phys. 74(1), 47 (2002)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Watts, D.J., Strogatz, S.H.: Collective dynamics of ‘small-world’ networks. Nature 393(6684), 440 (1998)CrossRefGoogle Scholar
  8. 8.
    Albert, R., Jeong, H., Barabási, A.L.: Error and attack tolerance of complex networks. Nature 406(6794), 378 (2000)CrossRefGoogle Scholar
  9. 9.
    Shao, S., Huang, X., Stanley, H.E., Havlin, S.: Percolation of localized attack on complex networks. New J. Phys. 17(2), 023049 (2015)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Berezin, Y., Bashan, A., Danziger, M.M., Li, D., Havlin, S.: Localized attacks on spatially embedded networks with dependencies. Sci. Rep. 5, 8934 (2015)CrossRefGoogle Scholar
  11. 11.
    Sun, X., Wandelt, S., Cao, X.: On node criticality in air transportation networks. Netw. Spat. Econ. 17(3), 737–761 (2017)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Pizzuti, C., Socievole, A.: A genetic algorithm for enhancing the robustness of complex networks through link protection. In: International Conference on Complex Networks and their Applications, pp. 807–819. Springer (2018)Google Scholar
  13. 13.
    Schneider, C.M., Moreira, A.A., Andrade, J.S., Havlin, S., Herrmann, H.J.: Mitigation of malicious attacks on networks. Proc. Natl. Acad. Sci. 108(10), 3838–3841 (2011)CrossRefGoogle Scholar
  14. 14.
    Louzada, V.H.P., Daolio, F., Herrmann, H.J., Tomassini, M.: Generating robust and efficient networks under targeted attacks. In: Propagation Phenomena in Real World Networks, pp. 215–224. Springer (2015)Google Scholar
  15. 15.
    Sun, S., Ma, Y., Li, R., Wang, L., Xia, C.: Tabu search enhances network robustness under targeted attacks. Phys. A: Stat. Mech. Appli. 446, 82–91 (2016)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Zhou, M., Liu, J.: A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks. Phys. A: Stat. Mech. Appli. 410, 131–143 (2014)CrossRefGoogle Scholar
  17. 17.
    Wandelt, S., Sun, X., Zanin, M., Havlin, S.: QRE: Quick Robustness Estimation for large complex networks. Future Gener. Comput. Syst. 83, 413–424 (2018)CrossRefGoogle Scholar
  18. 18.
    Louzada, V.H.P., Daolio, F., Herrmann, H.J., Tomassini, M.: Smart rewiring for network robustness. J. Complex Netw. 1(2), 150–159 (2013)CrossRefGoogle Scholar
  19. 19.
    Wandelt, S., Sun, X., Feng, D., Zanin, M., Havlin, S.: A comparative analysis of approaches to network-dismantling. Sci. Rep. 8(1), 13513 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Qingnan Rong
    • 1
    • 2
  • Jun Zhang
    • 1
    • 2
  • Xiaoqian Sun
    • 1
    • 2
    Email author
  • Sebastian Wandelt
    • 1
    • 2
  1. 1.National Key Laboratory of CNS/ATM, School of Electronic and Information EngineeringBeihang UniversityBeijingChina
  2. 2.National Engineering Laboratory of Multi-Modal Transportation Big DataBeijingChina

Personalised recommendations