Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks

With an increasing emphasis on network security, much more attentions have been attracted to the vulnerability of complex networks. In this paper, the fractal dimension, which can reflect space-filling capacity of networks, is redefined as the origin moment of the edge betweenness to obtain a more reasonable evaluation of vulnerability. The proposed model combining multiple evaluation indexes not only overcomes the shortage of average edge betweenness’s failing to evaluate vulnerability of some special networks, but also characterizes the topological structure and highlights the space-filling capacity of networks. The applications to six US airline networks illustrate the practicality and effectiveness of our proposed method, and the comparisons with three other commonly used methods further validate the superiority of our proposed method.

[1]  Mahdi Jalili,et al.  Topology and vulnerability of the Iranian power grid , 2014 .

[2]  Jianbo Wang,et al.  COMPLEX NETWORK-BASED ANALYSIS OF AIR TEMPERATURE DATA IN CHINA , 2009 .

[3]  Xinyang Deng,et al.  Supplier selection using AHP methodology extended by D numbers , 2014, Expert Syst. Appl..

[4]  B. Mandelbrot How Long Is the Coast of Britain? Statistical Self-Similarity and Fractional Dimension , 1967, Science.

[5]  Yu Luo,et al.  Determining Basic Probability Assignment Based on the Improved Similarity Measures of Generalized Fuzzy Numbers , 2015, Int. J. Comput. Commun. Control.

[6]  Kaiquan Cai,et al.  Effective usage of shortest paths promotes transportation efficiency on scale-free networks , 2013 .

[7]  V. Latora,et al.  Multiscale vulnerability of complex networks. , 2007, Chaos.

[8]  Lin Wang,et al.  Degree mixing in multilayer networks impedes the evolution of cooperation , 2014, Physical review. E, Statistical, nonlinear, and soft matter physics.

[9]  O. Shanker ALGORITHMS FOR FRACTAL DIMENSION CALCULATION , 2008 .

[10]  Jian-Wei Wang,et al.  Robustness of the western United States power grid under edge attack strategies due to cascading failures , 2011 .

[11]  Ake J Holmgren,et al.  Using Graph Models to Analyze the Vulnerability of Electric Power Networks , 2006, Risk analysis : an official publication of the Society for Risk Analysis.

[12]  Réka Albert,et al.  Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[13]  Yong Deng A Threat Assessment Model under Uncertain Environment , 2015 .

[14]  S. Mahadevan,et al.  Dependence Assessment in Human Reliability Analysis Using Evidence Theory and AHP , 2015, Risk analysis : an official publication of the Society for Risk Analysis.

[15]  S. Havlin,et al.  How to calculate the fractal dimension of a complex network: the box covering algorithm , 2007, cond-mat/0701216.

[16]  Sankaran Mahadevan,et al.  Box-covering algorithm for fractal dimension of weighted networks , 2013, Scientific Reports.

[17]  Massimo Marchiori,et al.  Model for cascading failures in complex networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[18]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[19]  Benoit B. Mandelbrot,et al.  Fractal Geometry of Nature , 1984 .

[20]  B. Bollobás The evolution of random graphs , 1984 .

[21]  Igor Mishkovski,et al.  Vulnerability of complex networks , 2011 .

[22]  Yu Luo,et al.  An improved method to rank generalized fuzzy numbers with different left heights and right heights , 2015, J. Intell. Fuzzy Syst..

[23]  O. Shanker,et al.  Graph zeta function and dimension of complex network , 2007 .

[24]  Jian-Wei Wang,et al.  Cascade-based attack vulnerability on the US power grid. , 2009 .

[25]  Jian-Wei Wang,et al.  Robustness of complex networks with the local protection strategy against cascading failures , 2013 .

[26]  Yong Deng,et al.  Modeling contaminant intrusion in water distribution networks: A new similarity-based DST method , 2011, Expert Syst. Appl..

[27]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[28]  K-I Goh,et al.  Skeleton and fractal scaling in complex networks. , 2006, Physical review letters.

[29]  Zhen Wang,et al.  Cooperation and age structure in spatial games. , 2012, Physical review. E, Statistical, nonlinear, and soft matter physics.

[30]  S. Havlin,et al.  Dimension of spatially embedded networks , 2011 .

[31]  Jian-Wei Wang,et al.  VULNERABILITY OF EFFECTIVE ATTACK ON EDGES IN SCALE-FREE NETWORKS DUE TO CASCADING FAILURES , 2009 .

[32]  Wen-Bo Du,et al.  Particle Swarm Optimization with Scale-Free Interactions , 2014, PloS one.

[33]  Albert-László Barabási,et al.  Statistical mechanics of complex networks , 2001, ArXiv.

[34]  Min Ouyang,et al.  Vulnerability analysis of interdependent infrastructure systems under edge attack strategies , 2013 .

[35]  Yong Hu,et al.  A new information dimension of complex networks , 2013, ArXiv.

[36]  Yang Liu,et al.  An Improved Genetic Algorithm with Initial Population Strategy for Symmetric TSP , 2015 .

[37]  Ji Qi,et al.  Efficiency Dynamics on Scale-Free Networks with Communities , 2010 .

[38]  Shuliang Wang,et al.  Attack vulnerability of self-organizing networks , 2012 .

[39]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[40]  S. Havlin,et al.  Self-similarity of complex networks , 2005, Nature.

[41]  Yang Gao,et al.  Selectively-informed particle swarm optimization , 2015, Scientific Reports.

[42]  James M. Kang,et al.  Space-Filling Curves , 2017, Encyclopedia of GIS.

[43]  Sankaran Mahadevan,et al.  Vulnerability Assessment of Physical Protection Systems: A Bio-Inspired Approach , 2015, Int. J. Unconv. Comput..

[44]  Tiesong Hu,et al.  DETECTING CHAOS TIME SERIES VIA COMPLEX NETWORK FEATURE , 2011 .

[45]  Yong Deng,et al.  Generalized evidence theory , 2014, Applied Intelligence.

[46]  Adilson E Motter,et al.  Cascade-based attacks on complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[47]  Z. Wang,et al.  The structure and dynamics of multilayer networks , 2014, Physics Reports.

[48]  Min Ouyang,et al.  Correlation analysis of different vulnerability metrics on power grids. , 2014 .

[49]  Jianwei Wang,et al.  Improving Robustness Of Coupled Networks Against Cascading Failures , 2013 .