Measuring robustness of complex networks under MVC attack

Measuring robustness of complex networks is a fundamental task for analyzing the structure and function of complex networks. In this paper, we study the network robustness under the maximal vertex coverage (MVC) attack, where the attacker aims to delete as many edges of the network as possible by attacking a small fraction of nodes. First, we present two robustness metrics of complex networks based on MVC attack. We then propose an efficient randomized greedy algorithm with near-optimal performance guarantee for computing the proposed metrics. Finally, we conduct extensive experiments on 20 real datasets. The results show that P2P and co-authorship networks are extremely robust under the MVC attack while both the online social networks and the Email communication networks exhibit vulnerability under the MVC attack. In addition, the results demonstrate the efficiency and effectiveness of our proposed algorithms for computing the corresponding robustness metrics.

[1]  S. Havlin,et al.  Breakdown of the internet under intentional attack. , 2000, Physical review letters.

[2]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[3]  Jiawei Zhang,et al.  On approximation of max-vertex-cover , 2002, Eur. J. Oper. Res..

[4]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[5]  Hans J. Herrmann,et al.  Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.

[6]  Cohen,et al.  Resilience of the internet to random breakdowns , 2000, Physical review letters.

[7]  M. Fiedler Algebraic connectivity of graphs , 1973 .

[8]  Andreas S. Schulz,et al.  Revisiting the Greedy Approach to Submodular Set Function Maximization , 2007 .

[9]  Andreas Krause,et al.  Cost-effective outbreak detection in networks , 2007, KDD '07.

[10]  S. Low,et al.  The "robust yet fragile" nature of the Internet. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[11]  Laurence A. Wolsey,et al.  Worst-Case and Probabilistic Analysis of Algorithms for a Location Problem , 1980, Oper. Res..

[12]  Christos Faloutsos,et al.  ANF: a fast and scalable tool for data mining in massive graphs , 2002, KDD.

[13]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[14]  D S Callaway,et al.  Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.

[15]  Mauricio Barahona,et al.  Spectral Measure of Structural Robustness in Complex Networks , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[16]  Bojan Mohar,et al.  Isoperimetric numbers of graphs , 1989, J. Comb. Theory, Ser. B.

[17]  M. L. Fisher,et al.  An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..

[18]  Frank Harary,et al.  Conditional connectivity , 1983, Networks.

[19]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[20]  Philippe Flajolet,et al.  Probabilistic Counting Algorithms for Data Base Applications , 1985, J. Comput. Syst. Sci..