Efficacy of local attack strategies on the Beijing road complex weighted network

Abstract Understanding the complex network response to nodes failure is important to protect them and guarantee their functioning. Most existing studies considered binary networks where the intensity (weight) of the links is not accounted for. However, in real world networks the intensity of the links widely differ so that a realistic description of complex networks is only possible if the heterogeneity present in edge weights is taken into account. Further, the vast majority of the existing studies investigates the efficacy of the attack strategies when all the nodes are removed. Despite it is important to study the network behavior in such a circumstance, real-world networks are more likely to experience local failures involving a small amount of nodes with a decrease in the system functioning not causing an overall collapse. This is the case of crossroad closing in complex road networks. For this reason it is interesting to investigate the networks response focusing to small node removals. In this paper we analyze the response of the real-world road networks of Beijing, the capital of China, to the removal of 1 and 2 nodes and accounting the weighted structure of the network. We use both classic binary node properties and network functioning measurement, introduced a weighted rank for node importance (node strength or page rank), and used a measurement for network functioning that accounts for the weight of the links (weighted efficiency). We find that the weighted node attack strategy Str (i.e. strength attack), which removes nodes according to their strength, is the most efficient to blemish the system when evaluating the damage with a weighted efficiency. Differently, betweenness attack strategy Bet, which removes nodes according to their centrality is the most efficient when using the binary efficiency to compute the network damage. These results indicate that adopting weighted or binary efficiency to measure networks functioning changed the efficacy of the attack strategies to damage the system. Last, we found a non-negligible fraction of random removals to be more efficient than the attack strategies; given that the main goal of the attack strategies is to individuate important nodes in the system, i.e. nodes which removal triggers highest damage, our results would indicate how in order to find the most important nodes may be more efficient to simulate an higher number of random nodes removal.

[1]  S. Havlin,et al.  Breakdown of the internet under intentional attack. , 2000, Physical review letters.

[2]  A. Vespignani,et al.  The architecture of complex weighted networks. , 2003, Proceedings of the National Academy of Sciences of the United States of America.

[3]  Elena Agliari,et al.  Optimization strategies with resource scarcity: From immunization of networks to the traveling salesman problem , 2015 .

[4]  Guanrong Chen,et al.  Universal robustness characteristic of weighted networks against cascading failure. , 2008, Physical review. E, Statistical, nonlinear, and soft matter physics.

[5]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[6]  D S Callaway,et al.  Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.

[7]  V Latora,et al.  Efficient behavior of small-world networks. , 2001, Physical review letters.

[8]  R. Albert,et al.  The large-scale organization of metabolic networks , 2000, Nature.

[9]  Stefano Allesina,et al.  Using food web dominator trees to catch secondary extinctions in action , 2009, Philosophical Transactions of the Royal Society B: Biological Sciences.

[10]  Yi Lin,et al.  Vulnerability of complex networks under three-level-tree attacks , 2016 .

[11]  T. Killingback,et al.  Attack Robustness and Centrality of Complex Networks , 2013, PloS one.

[12]  Kun Zhao,et al.  New attack strategies for complex networks , 2015 .

[13]  D. Garlaschelli The weighted random graph model , 2009, 0902.0897.

[14]  Antoine Allard,et al.  The geometric nature of weights in real complex networks , 2016, Nature Communications.

[15]  M. Costantini,et al.  Effect of multiple disturbances on food web vulnerability to biodiversity loss in detritus-based systems , 2015 .

[16]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[17]  M. Barthelemy Betweenness centrality in large complex networks , 2003, cond-mat/0309436.

[18]  Zhe-Ming Lu,et al.  Urban Road Network and Taxi Network Modeling Based on Complex Network Theory , 2016, J. Inf. Hiding Multim. Signal Process..

[19]  D. West Introduction to Graph Theory , 1995 .

[20]  Ricard V. Solé,et al.  Complexity and fragility in ecological networks , 2000, Proceedings of the Royal Society of London. Series B: Biological Sciences.

[21]  Michele Bellingeri,et al.  Increasing the extinction risk of highly connected species causes a sharp robust-to-fragile transition in empirical food webs , 2013 .

[22]  Alessandro Vespignani,et al.  Vulnerability of weighted networks , 2006, physics/0603163.

[23]  Alessandro Vespignani,et al.  Characterization and modeling of weighted networks , 2005 .

[24]  Albert-László Barabási,et al.  Statistical mechanics of complex networks , 2001, ArXiv.

[25]  Michele Bellingeri,et al.  Robustness of weighted networks , 2018 .

[26]  Michele Bellingeri,et al.  Threshold extinction in food webs , 2011, Theoretical Ecology.

[27]  Francesco Scotognella,et al.  Analyses of the response of a complex weighted network to nodes removal strategies considering links weight: The case of the Beijing urban road system , 2018 .

[28]  A. Barra,et al.  A Hebbian approach to complex-network generation , 2010, 1009.1343.

[29]  Alessandro Vespignani,et al.  Immunization of complex networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[30]  Michele Bellingeri,et al.  Robustness of empirical food webs with varying consumer's sensitivities to loss of resources. , 2013, Journal of theoretical biology.

[31]  Michele Bellingeri,et al.  Efficiency of attack strategies on complex model and real-world networks , 2013, ArXiv.