Identifying critical nodes' group in complex networks

被引:23
作者
Jiang, Zhong-Yuan [1 ,2 ]
Zeng, Yong [1 ,2 ]
Liu, Zhi-Hong [1 ,2 ]
Ma, Jian-Feng [1 ,2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Shaanxi Key Lab Network & Syst Secur, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Key node; Target attack; Network vulnerability; Complex network; CENTRALITY; ROBUSTNESS; FAILURES;
D O I
10.1016/j.physa.2018.09.069
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, network vulnerability or security has attracted much attention in various networked systems, and especially in security related attacks or protections, there are a set of influential nodes that can remarkably break the network connectivity. In this work, we firstly present eight attack mechanisms including target attack, random failure, betweenness based attack, closeness based attack, PageRank based attack, k-shell based attack, greedy algorithm, and low-degree attack. Secondly, inspired by the dynamic node removal process, we propose to recalculate the metrics for every node removal strategy, and evaluate the network robustness against all these heuristic attack strategies with and without recalculations in scale-free networks, random networks, and many real network models. The simulations indicate that most of the attack strategies with recalculations appear to imperil the network structure security more. Furthermore, considering that key node set mining is very critical for network structure protections, we employ minimum number of key nodes (MNKN) metric to further discuss the network vulnerability against all the attack strategies with or without recalculations. The results show that the critical nodes' group can be more efficiently found under the PageRank based attack with recalculations than under other attack disciplines with or without recalculations in most of the classic and real network models. This work investigates network structure vulnerability and security from a new perspective, and has potential applications into network structure protection or planning. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:121 / 132
页数:12
相关论文
共 39 条
  • [1] Statistical mechanics of complex networks
    Albert, R
    Barabási, AL
    [J]. REVIEWS OF MODERN PHYSICS, 2002, 74 (01) : 47 - 97
  • [2] Error and attack tolerance of complex networks
    Albert, R
    Jeong, H
    Barabási, AL
    [J]. NATURE, 2000, 406 (6794) : 378 - 382
  • [3] ANDERSON R M, 1991
  • [4] Synchronization in complex networks
    Arenas, Alex
    Diaz-Guilera, Albert
    Kurths, Jurgen
    Moreno, Yamir
    Zhou, Changsong
    [J]. PHYSICS REPORTS-REVIEW SECTION OF PHYSICS LETTERS, 2008, 469 (03): : 93 - 153
  • [5] Emergence of scaling in random networks
    Barabási, AL
    Albert, R
    [J]. SCIENCE, 1999, 286 (5439) : 509 - 512
  • [6] The anatomy of a large-scale hypertextual Web search engine
    Brin, S
    Page, L
    [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1998, 30 (1-7): : 107 - 117
  • [7] Catastrophic cascade of failures in interdependent networks
    Buldyrev, Sergey V.
    Parshani, Roni
    Paul, Gerald
    Stanley, H. Eugene
    Havlin, Shlomo
    [J]. NATURE, 2010, 464 (7291) : 1025 - 1028
  • [8] Improving the network robustness against cascading failures by adding links
    Cao, Xian-Bin
    Hong, Chen
    Du, Wen-Bo
    Zhang, Jun
    [J]. CHAOS SOLITONS & FRACTALS, 2013, 57 : 35 - 40
  • [9] A model of Internet topology using k-shell decomposition
    Carmi, Shai
    Havlin, Shlomo
    Kirkpatrick, Scott
    Shavitt, Yuval
    Shir, Eran
    [J]. PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2007, 104 (27) : 11150 - 11154
  • [10] Identifying influential nodes in complex networks
    Chen, Duanbing
    Lu, Linyuan
    Shang, Ming-Sheng
    Zhang, Yi-Cheng
    Zhou, Tao
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2012, 391 (04) : 1777 - 1787