CORRELATION ANALYSIS OF ATTACK STRATEGIESAND ROBUSTNESS ANALYSIS ON THREE NETWORK MODELS

被引:0
|
作者
Guo, Xinling [1 ,2 ]
Zheng, Yangming [1 ,2 ]
Lu, Zhe-Ming [1 ,2 ]
Cui, Jialin [1 ,3 ]
Luo, Hao [1 ,2 ]
机构
[1] Huanjiang Lab, Ctr Gener Aerosp Technol, 7 Wen zhong Rd, Zhuji 311816, Peoples R China
[2] Zhejiang Univ, Sch Aeronaut & Astronaut, 38 Zheda Rd, Hangzhou 310027, Peoples R China
[3] Ningbo Tech Univ, Sch Informat Sci & Engn, 1 Qianhunan Rd, Ningbo 315100, Peoples R China
来源
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | 2024年 / 20卷 / 04期
关键词
Complex networks; Correlation analysis; Network models; Attack strate-gies; Granularity analysis; SCALE-FREE NETWORKS; VULNERABILITY ANALYSIS; CENTRALITY; TOLERANCE; RECOGNITION;
D O I
10.24507/ijicic.20.04.979
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network centrality metrics based on heuristics which work as a guideline onremoving vertices is a vital topic for the research of network robustness. In this paper,we analyze the correlation and difference between 12 popular centrality metrics amongthree distinct network models, including the correlation analysis and granularity anal-ysis. We also concern about the destructiveness of these centrality metrics when theyare used as attack strategies. The results show that most of the centrality metrics arehighly correlated with each other across three network models. The granularity analysison centrality metrics is also considered in this paper. The experiment results also ver-ify the previous conclusion that scale free networks are more vulnerable to intentionalattack than other networks. We observe that more correlated centrality metrics wouldcause more similar damage to network connectivity; at the meantime, we also find thatthe attack strategies based on few centrality metrics could destroy networks very quickly.All these results inspire us that there is a paradigm that could detect the attack strategywith strong destructiveness for distinct networks by combining the highly correlated andhighly destructive metrics
引用
收藏
页码:979 / 996
页数:18
相关论文
共 50 条
  • [21] Robustness Analysis of Air Route Network Based on Topology Potential and Relative Entropy Methods
    Ren, Guangjian
    JOURNAL OF ADVANCED TRANSPORTATION, 2021, 2021
  • [22] A spatiotemporal analysis of the robustness of high -speed rail network in China
    Jiao, Jingjuan
    Zhang, Fangni
    Liu, Jian
    TRANSPORTATION RESEARCH PART D-TRANSPORT AND ENVIRONMENT, 2020, 89
  • [23] Integrated Avionics System Network Function Robustness Analysis based on Complex Network
    Ji, Qiang
    Yang, Qiming
    Zhang, Jiandong
    Shi, Guoqing
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON ELECTRONIC INDUSTRY AND AUTOMATION (EIA 2017), 2017, 145 : 181 - 185
  • [24] A comparative analysis of network robustness against different link attacks
    Duan, Boping
    Liu, Jing
    Zhou, Mingxing
    Ma, Liangliang
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2016, 448 : 144 - 153
  • [25] The dynamic correlation between degree and betweenness of complex network under attack
    Nie, Tingyuan
    Guo, Zheng
    Zhao, Kun
    Lu, Zhe-Ming
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2016, 457 : 129 - 137
  • [26] Robustness analysis of edge-coupled interdependent networks under different attack strategies
    Zhou, Lili
    Yin, Jun
    Tan, Fei
    Liao, Haibin
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2023, 632
  • [27] The Construction of an Aircraft Control Multilayer Network and Its Robustness Analysis
    Ren, Guangjian
    Zhang, Ming
    Guo, Yushuai
    JOURNAL OF ADVANCED TRANSPORTATION, 2022, 2022
  • [28] Robustness of network attack strategies against node sampling and link errors
    Otsuka, Momoko
    Tsugawa, Sho
    PLOS ONE, 2019, 14 (09):
  • [29] Robustness of Dengue Complex Network under Targeted versus Random Attack
    Malik, Hafiz Abid Mahmood
    Abid, Faiza
    Wahiddin, Mohamed Ridza
    Bhatti, Zeeshan
    COMPLEXITY, 2017,
  • [30] Covert Network Analysis to Detect Key Players using Correlation and Social Network Analysis
    Farooq, Ejaz
    Khan, Shoab A.
    Butt, Wasi Haider
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,