Vulnerability of complex networks under three-level-tree attacks

被引:16
作者
Hao, Yao-hui [1 ]
Han, Ji-hong [1 ]
Lin, Yi [1 ]
Liu, Lin [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability; Complex networks; Tree-attack; Degree; INTERNET; STRATEGIES; MODEL;
D O I
10.1016/j.physa.2016.06.130
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We investigate vulnerability of complex networks including model networks and real world networks subject to three-level-tree attack. Specifically, we remove three different three-level-tree structures: RRN (Random Root Node), MaxDRN (Max Degree Root Node) and MinDRN (Min Degree Root Node) from a network iteratively until there is no three level -tree left. Results demonstrate that random network is more robust than scale-free network against three tree attacks, and the robustness of random network decreases as the (k) increases. And scale-free network shows different characteristics in different tree attack modes. The robustness of scale-free is not affected by the (k) parameters for RRN, but increases as the (k) increases for MinDRN. The important thing is that MaxDRN is the most effective in the three tree attack modes, especially for scale-free network. These findings supplement and extend the previous attack results on nodes and edges, and can thus help us better explain the vulnerability of different networks, and provide an insight into more tolerant real complex systems design. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:674 / 683
页数:10
相关论文
共 35 条
[1]  
Adamic LA, 2005, P 3 INT WORKSH LINK, P36
[2]   Internet -: Diameter of the World-Wide Web [J].
Albert, R ;
Jeong, H ;
Barabási, AL .
NATURE, 1999, 401 (6749) :130-131
[3]   Error and attack tolerance of complex networks [J].
Albert, R ;
Jeong, H ;
Barabási, AL .
NATURE, 2000, 406 (6794) :378-382
[4]  
[Anonymous], 2012, Sci. J
[5]   Emergence of scaling in random networks [J].
Barabási, AL ;
Albert, R .
SCIENCE, 1999, 286 (5439) :509-512
[6]   Optimization strategies with resource scarcity: From immunization of networks to the traveling salesman problem [J].
Bellingeri, Michele ;
Agliari, Elena ;
Cassi, Davide .
MODERN PHYSICS LETTERS B, 2015, 29 (29)
[7]   Efficiency of attack strategies on complex model and real-world networks [J].
Bellingeri, Michele ;
Cassi, Davide ;
Vincenzi, Simone .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2014, 414 :174-180
[8]  
BUTT MIA, 2014, C INF ASS CYB SEC, V2014, P47
[9]   Information Fusion to Defend Intentional Attack in Internet of Things [J].
Chen, Pin-Yu ;
Cheng, Shin-Ming ;
Chen, Kwang-Cheng .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (04) :337-348
[10]  
Chen PY, 2014, INT CONF ACOUST SPEE, DOI 10.1109/ICASSP.2014.6853771