A Fast Greedy Algorithm for the Critical Node Detection Problem

The critical node detection problem (CNDP) aims to fragment a graph \(G=(V,E)\) by removing a set of vertices \(R\) with cardinality \(|R|\le K\) such that the residual graph has minimum pairwise connectivity. Algorithms that are capable of finding \(R\) in graphs with many thousands or millions of vertices are needed since existing approaches require significant computational cost and subsequently are useful for only very small network instances. An efficient method for evaluating the impact of removing any \(v \in V\) on the CNDP objective function within reasonable time and space complexity is then necessary. In this paper we propose a depth-first search solution to this problem that requires \(\mathcal {O}(|V|+|E|)\) complexity, and employ the method in a greedy algorithm for quickly identifying \(R\) in large networks. We evaluate the results using six real-world benchmark problems. The proposed algorithm can be easily extended to vertex and edge-weighted variants of the critical vertex detection problem.

[1]  Mario Ventresca,et al.  A randomized algorithm with local search for containment of pandemic disease spread , 2014, Comput. Oper. Res..

[2]  Jure Leskovec,et al.  Learning to Discover Social Circles in Ego Networks , 2012, NIPS.

[3]  Christos Faloutsos,et al.  Graph evolution: Densification and shrinking diameters , 2006, TKDD.

[4]  Po-An Chen,et al.  Better vaccination strategies for better people , 2010, EC '10.

[5]  Marco Di Summa,et al.  Branch and cut algorithms for detecting critical nodes in undirected graphs , 2012, Computational Optimization and Applications.

[6]  Paul J. Laurienti,et al.  A New Measure of Centrality for Brain Networks , 2010, PloS one.

[7]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[8]  Mario Ventresca,et al.  A derandomized approximation algorithm for the critical node detection problem , 2014, Comput. Oper. Res..

[9]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[10]  Panos M. Pardalos,et al.  On New Approaches of Assessing Network Vulnerability: Hardness and Approximation , 2012, IEEE/ACM Transactions on Networking.

[11]  Eduardo L. Pasiliao,et al.  An integer programming framework for critical elements detection in graphs , 2014, J. Comb. Optim..

[12]  Tore Opsahl,et al.  Clustering in weighted networks , 2009, Soc. Networks.

[13]  Jon Kleinberg,et al.  Authoritative sources in a hyperlinked environment , 1999, SODA '98.

[14]  Eduardo L. Pasiliao,et al.  Exact identification of critical nodes in sparse networks via new compact formulations , 2014, Optim. Lett..

[15]  Marco Di Summa,et al.  Complexity of the critical node problem over trees , 2011, Comput. Oper. Res..

[16]  Rajmohan Rajaraman,et al.  Existence Theorems and Approximation Algorithms for Generalized Network Security Games , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[17]  O. Sporns Networks of the Brain , 2010 .

[18]  My T. Thai,et al.  Bound and exact methods for assessing link vulnerability in complex networks , 2014, J. Comb. Optim..

[19]  Mario Ventresca,et al.  Evaluation of strategies to mitigate contagion spread using social network characteristics , 2013, Soc. Networks.

[20]  Robert E. Tarjan,et al.  Depth-First Search and Linear Graph Algorithms , 1972, SIAM J. Comput..

[21]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.

[22]  Ehsan Masood,et al.  UK seeks physicists for environmental research , 1998, Nature.

[23]  Mario Ventresca,et al.  Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem , 2012, Comput. Oper. Res..

[24]  Marco Di Summa,et al.  Identifying critical nodes in undirected graphs: Complexity results and polynomial algorithms for the case of bounded treewidth , 2013, Discret. Appl. Math..

[25]  Clayton W. Commander,et al.  Identifying Critical Nodes in Protein-Protein Interaction Networks , 2009 .

[26]  James Aspnes,et al.  Inoculation strategies for victims of viruses and the sum-of-squares partition problem , 2005, SODA '05.

[27]  Mario Ventresca,et al.  Network robustness versus multi-strategy sequential attack , 2015, J. Complex Networks.

[28]  Panos M. Pardalos,et al.  Detecting critical nodes in sparse graphs , 2009, Comput. Oper. Res..

[29]  My T. Thai,et al.  Detecting Critical Nodes in Interdependent Power Networks for Vulnerability Assessment , 2013, IEEE Transactions on Smart Grid.