Structure Entropy and Resistor Graphs

We propose the notion of {\it resistance of a graph} as an accompanying notion of the structure entropy to measure the force of the graph to resist cascading failure of strategic virus attacks. We show that for any connected network $G$, the resistance of $G$ is $\mathcal{R}(G)=\mathcal{H}^1(G)-\mathcal{H}^2(G)$, where $\mathcal{H}^1(G)$ and $\mathcal{H}^2(G)$ are the one- and two-dimensional structure entropy of $G$, respectively. According to this, we define the notion of {\it security index of a graph} to be the normalized resistance, that is, $\theta (G)=\frac{\mathcal{R}(G)}{\mathcal{H}^1(H)}$. We say that a connected graph is an $(n,\theta)$-{\it resistor graph}, if $G$ has $n$ vertices and has security index $\theta (G)\geq\theta$. We show that trees and grid graphs are $(n,\theta)$-resistor graphs for large constant $\theta$, that the graphs with bounded degree $d$ and $n$ vertices, are $(n,\frac{2}{d}-o(1))$-resistor graphs, and that for a graph $G$ generated by the security model \cite{LLPZ2015, LP2016}, with high probability, $G$ is an $(n,\theta)$-resistor graph, for a constant $\theta$ arbitrarily close to $1$, provided that $n$ is sufficiently large. To the opposite side, we show that expander graphs are not good resistor graphs, in the sense that, there is a global constant $\theta_0<1$ such that expander graphs cannot be $(n,\theta)$-resistor graph for any $\theta\geq\theta_0$. In particular, for the complete graph $G$, the resistance of $G$ is a constant $O(1)$, and hence the security index of $G$ is $\theta (G)=o(1)$. Finally, we show that for any simple and connected graph $G$, if $G$ is an $(n, 1-o(1))$-resistor graph, then there is a large $k$ such that the $k$-th largest eigenvalue of the Laplacian of $G$ is $o(1)$, giving rise to an algebraic characterization for the graphs that are secure against intentional virus attack.

[1]  F. Chung,et al.  Complex Graphs and Networks , 2006 .

[2]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[3]  Hans J. Herrmann,et al.  Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.

[4]  H. Chernoff A Note on an Inequality Involving the Normal Distribution , 1981 .

[5]  Duncan J Watts,et al.  A simple model of global cascades on random networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[6]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.

[7]  C. Causer The Art of War , 2011, IEEE Potentials.

[8]  Luca Trevisan,et al.  Multi-way spectral partitioning and higher-order cheeger inequalities , 2011, STOC '12.

[9]  Angsheng Li,et al.  Structural Information and Dynamical Complexity of Networks , 2016, IEEE Transactions on Information Theory.

[10]  Paulo Shakarian,et al.  Finding Near-Optimal Groups of Epidemic Spreaders in a Complex Network , 2014, PloS one.

[11]  Adilson E Motter Cascade control and defense in complex networks. , 2004, Physical review letters.

[12]  Alessandro Vespignani,et al.  Epidemic spreading in scale-free networks. , 2000, Physical review letters.

[13]  P. Kaye Infectious diseases of humans: Dynamics and control , 1993 .

[14]  Abhijit Sarkar,et al.  Two-peak and three-peak optimal complex networks. , 2004, Physical review letters.

[15]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[16]  Albert-László Barabási,et al.  Scale-Free Networks: A Decade and Beyond , 2009, Science.

[17]  Wei Zhang,et al.  Strategies for network security , 2014, Science China Information Sciences.

[18]  Claude E. Shannon,et al.  The lattice theory of information , 1953, Trans. IRE Prof. Group Inf. Theory.

[19]  S. Havlin,et al.  Optimization of network robustness to waves of targeted and random attacks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[20]  P. Erdos,et al.  On the evolution of random graphs , 1984 .

[21]  Angsheng Li,et al.  Resistance and Security Index of Networks: Structural Information Perspective of Network Security , 2016, Scientific Reports.

[22]  Angsheng Li,et al.  Discovering natural communities in networks , 2015 .

[23]  Frederick P. Brooks,et al.  Three great challenges for half-century-old computer science , 2003, JACM.

[24]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[25]  Angsheng Li,et al.  Resistance maximization principle for defending networks against virus attack , 2017 .

[26]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[27]  David D. Jensen,et al.  Navigating networks by using homophily and degree , 2008, Proceedings of the National Academy of Sciences.

[28]  Éva Tardos,et al.  Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.

[29]  Angsheng Li,et al.  A Theory of Network Security: Principles of Natural Selection and Combinatorics , 2016, Internet Math..

[30]  Reuven Cohen,et al.  Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.