CORRELATION ANALYSIS OF ATTACK STRATEGIESAND ROBUSTNESS ANALYSIS ON THREE NETWORK MODELS

被引:0
|
作者
Guo, Xinling [1 ,2 ]
Zheng, Yangming [1 ,2 ]
Lu, Zhe-Ming [1 ,2 ]
Cui, Jialin [1 ,3 ]
Luo, Hao [1 ,2 ]
机构
[1] Huanjiang Lab, Ctr Gener Aerosp Technol, 7 Wen zhong Rd, Zhuji 311816, Peoples R China
[2] Zhejiang Univ, Sch Aeronaut & Astronaut, 38 Zheda Rd, Hangzhou 310027, Peoples R China
[3] Ningbo Tech Univ, Sch Informat Sci & Engn, 1 Qianhunan Rd, Ningbo 315100, Peoples R China
来源
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | 2024年 / 20卷 / 04期
关键词
Complex networks; Correlation analysis; Network models; Attack strate-gies; Granularity analysis; SCALE-FREE NETWORKS; VULNERABILITY ANALYSIS; CENTRALITY; TOLERANCE; RECOGNITION;
D O I
10.24507/ijicic.20.04.979
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network centrality metrics based on heuristics which work as a guideline onremoving vertices is a vital topic for the research of network robustness. In this paper,we analyze the correlation and difference between 12 popular centrality metrics amongthree distinct network models, including the correlation analysis and granularity anal-ysis. We also concern about the destructiveness of these centrality metrics when theyare used as attack strategies. The results show that most of the centrality metrics arehighly correlated with each other across three network models. The granularity analysison centrality metrics is also considered in this paper. The experiment results also ver-ify the previous conclusion that scale free networks are more vulnerable to intentionalattack than other networks. We observe that more correlated centrality metrics wouldcause more similar damage to network connectivity; at the meantime, we also find thatthe attack strategies based on few centrality metrics could destroy networks very quickly.All these results inspire us that there is a paradigm that could detect the attack strategywith strong destructiveness for distinct networks by combining the highly correlated andhighly destructive metrics
引用
收藏
页码:979 / 996
页数:18
相关论文
共 50 条
  • [1] Evaluating the Robustness of Correlation Network Analysis in the Aging Mouse Hypothalamus
    Cooper, Kathryn M.
    Bonasera, Stephen
    Ali, Hesham
    BIOMEDICAL ENGINEERING SYSTEMS AND TECHNOLOGIES, BIOSTEC 2015, 2015, 574 : 224 - 238
  • [2] Robustness Analysis of the Complex Network
    Liang, Mingxin
    Liu, Fanzhen
    Gao, Chao
    Zhang, Zili
    2017 6TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS (DDCLS), 2017, : 638 - 643
  • [3] Computationally efficient attack design for robustness analysis of air transportation networks
    Wandelt, Sebastian
    Sun, Xiaoqian
    Cao, Xianbin
    TRANSPORTMETRICA A-TRANSPORT SCIENCE, 2015, 11 (10) : 939 - 966
  • [4] A Comprehensive Analysis of Robustness in Interdependent Mechatronic Systems under Attack Strategies
    Xu, Gang
    Wang, Yanhui
    Hao, Yucheng
    Jia, Limin
    Yang, Zeyun
    He, Zhichao
    DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2021, 2021
  • [5] The effect of attack cost on network robustness
    Hong, Chen
    Cao, Xian-Bin
    Du, Wen-Bo
    Zhang, Jun
    PHYSICA SCRIPTA, 2013, 87 (05)
  • [6] Analysis of robustness of urban bus network
    Ren, Tao
    Wang, Yi-Fan
    Liu, Miao-Miao
    Xu, Yan-Jie
    CHINESE PHYSICS B, 2016, 25 (02)
  • [7] Research on network robustness based on different deliberate attack methods
    Yang, Guizhen
    Qi, Xiaogang
    Liu, Lifang
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 545 (545)
  • [8] Robustness paradox of attack behavior induced by cascading failures: The larger the attack, the more vulnerable the network?
    Wang, Jianwei
    Guo, Yuxin
    Kai, Wei
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2021, 32 (03):
  • [9] A New Complex Network Robustness Attack Algorithm
    Li, Xinyi
    Zhang, Zijian
    Liu, Jiamou
    Gai, Keke
    BSCI '19: PROCEEDINGS OF THE 2019 ACM INTERNATIONAL SYMPOSIUM ON BLOCKCHAIN AND SECURE CRITICAL INFRASTRUCTURE, 2019, : 13 - 17
  • [10] Evaluating network models: A likelihood analysis
    Wang, Wen-Qiang
    Zhang, Qian-Ming
    Zhou, Tao
    EPL, 2012, 98 (02)