Combined Heuristic Attack Strategy on Complex Networks

Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabasi-Albert, scale-free with tunable power-law exponent, and Erdős-Renyi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

[1]  Michele Bellingeri,et al.  Efficiency of attack strategies on complex model and real-world networks , 2013, ArXiv.

[2]  Ryan A. Rossi,et al.  The Network Data Repository with Interactive Graph Analytics and Visualization , 2015, AAAI.

[3]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[4]  Romualdo Pastor-Satorras,et al.  Topological structure and the H index in complex networks. , 2017, Physical review. E.

[5]  Teng-Hung Chen,et al.  Graph theory and stability analysis of protein complex interaction networks. , 2016, IET systems biology.

[6]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[7]  Hans J. Herrmann,et al.  Onion-like network topology enhances robustness against malicious attacks , 2011 .

[8]  Hao Wang,et al.  Optimization of disintegration strategy for multi-edges complex networks , 2016, 2016 IEEE Congress on Evolutionary Computation (CEC).

[9]  T. Killingback,et al.  Attack Robustness and Centrality of Complex Networks , 2013, PloS one.

[10]  Francisco J. Rodríguez,et al.  Optimizing network attacks by artificial bee colony , 2017, Inf. Sci..

[11]  Derek Ruths,et al.  Robustness of Network Controllability to Degree-Based Edge Attacks , 2016, COMPLEX NETWORKS.

[12]  Kun Zhao,et al.  New attack strategies for complex networks , 2015 .

[13]  Frances M. T. Brazier,et al.  The Impact of the Topology on Cascading Failures in a Power Grid Model , 2014 .

[14]  B. Kahng,et al.  Percolation transitions in scale-free networks under the Achlioptas process. , 2009, Physical review letters.

[15]  P. Duijn,et al.  Social Network Analysis Applied to Criminal Networks: Recent Developments in Dutch Law Enforcement , 2014 .

[16]  U. Brandes A faster algorithm for betweenness centrality , 2001 .

[17]  Duanbing Chen,et al.  Vital nodes identification in complex networks , 2016, ArXiv.

[18]  Hsinchun Chen,et al.  The topology of dark networks , 2008, Commun. ACM.

[19]  Reuven Cohen,et al.  Attack Strategies on Complex Networks , 2006, International Conference on Computational Science.

[20]  Pasquale De Meo,et al.  Network Structure and Resilience of Mafia Syndicates , 2015, Inf. Sci..

[21]  Oriol Lordan,et al.  Robustness of the air transport network , 2014 .

[22]  Eduardo L. Pasiliao,et al.  Critical nodes for distance‐based connectivity and related problems in graphs , 2015, Networks.

[23]  Juan Carlos González-Avella,et al.  Fast Fragmentation of Networks Using Module-Based Attacks , 2015, PloS one.

[24]  Matjaz Perc,et al.  Statistical physics of crime: A review , 2014, Physics of life reviews.

[25]  Hernán A. Makse,et al.  Collective Influence Algorithm to find influencers via optimal percolation in massively large social media , 2016, Scientific Reports.

[26]  Jun Wu,et al.  Optimal attack strategy of complex networks based on tabu search , 2016 .

[27]  Alessandro Vespignani,et al.  Immunization of complex networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[28]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[29]  T. Tanizawa,et al.  Optimization of robustness of complex networks , 2005 .

[30]  P. Hui,et al.  Modeling Insurgent Dynamics Including Heterogeneity , 2013, Journal of Statistical Physics.

[31]  ArulselvanAshwin,et al.  Detecting critical nodes in sparse graphs , 2009 .

[32]  F. Chung,et al.  Connected Components in Random Graphs with Given Expected Degree Sequences , 2002 .

[33]  Roberto Aringhieri,et al.  Hybrid constructive heuristics for the critical node problem , 2016, Annals of Operations Research.

[34]  Tao Zhou,et al.  The H-index of a network node and its relation to degree and coreness , 2016, Nature Communications.

[35]  Lada A. Adamic,et al.  The political blogosphere and the 2004 U.S. election: divided they blog , 2005, LinkKDD '05.

[36]  Hernán A. Makse,et al.  Influence maximization in complex networks through optimal percolation , 2015, Nature.

[37]  V Latora,et al.  Efficient behavior of small-world networks. , 2001, Physical review letters.

[38]  Reuven Cohen,et al.  Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.

[39]  Jing Liu,et al.  A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks , 2014 .

[40]  Roberto Aringhieri,et al.  A general Evolutionary Framework for different classes of Critical Node Problems , 2016, Eng. Appl. Artif. Intell..

[41]  Hans J. Herrmann,et al.  Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.

[42]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[43]  Paul Erdös,et al.  On random graphs, I , 1959 .

[44]  Bruce A. Reed,et al.  A Critical Point for Random Graphs with a Given Degree Sequence , 1995, Random Struct. Algorithms.

[45]  P. Duijn,et al.  The Relative Ineffectiveness of Criminal Network Disruption , 2014, Scientific Reports.

[46]  Panos M. Pardalos,et al.  Detecting critical nodes in sparse graphs , 2009, Comput. Oper. Res..

[47]  Charles Z. Marshak,et al.  Growth and containment of a hierarchical criminal network. , 2015, Physical review. E.