Exploiting the Robustness on Power-Law Networks

Many complex networks are discovered to follow the powerlaw distribution in degree sequence, ranging from the Internet, WWW to social networks. Unfortunately, there exist a great number of threats to these complex systems. In this context, it is crucial to understand the behaviors of power-law networks under various threats. Although power-law networks have been found robust under random failures but vulnerable to intentional attacks by experimental observations, it remains hard to theoretically assess their robustness so as to design a more stable complex network. In this paper, we assess the vulnerability of power-law networks with respect to their global pairwise connectivity, i.e. the number of connected node-pairs, where a pair of nodes are connected when there is a functional path between them. According to our in-depth probabilistic analysis under the theory of random power-law graph model, our results illustrate the best range of exponential factors in which the power-law networks are almost surely unaffected by any random failures and less likely to be destructed under adversarial attacks.

[1]  Cohen,et al.  Resilience of the internet to random breakdowns , 2000, Physical review letters.

[2]  F. Chung,et al.  Connected Components in Random Graphs with Given Expected Degree Sequences , 2002 .

[3]  Alan T. Murray,et al.  Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure , 2010, Comput. Oper. Res..

[4]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[5]  S. Redner How popular is your paper? An empirical study of the citation distribution , 1998, cond-mat/9804163.

[6]  Massimo Marchiori,et al.  Vulnerability and protection of infrastructure networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[7]  Alessandro Vespignani,et al.  Immunization of complex networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[8]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[9]  Réka Albert,et al.  Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[10]  Taylor Francis Online,et al.  Ultracold atomic gases in optical lattices: mimicking condensed matter physics and beyond , 2006, cond-mat/0606771.

[11]  Albert-László Barabási,et al.  Internet: Diameter of the World-Wide Web , 1999, Nature.

[12]  Marcus Kaiser,et al.  Edge vulnerability in neural and metabolic networks , 2004, Biological Cybernetics.

[13]  Bruce A. Reed,et al.  A Critical Point for Random Graphs with a Given Degree Sequence , 1995, Random Struct. Algorithms.

[14]  Michalis Faloutsos,et al.  On power-law relationships of the Internet topology , 1999, SIGCOMM '99.

[15]  Ernesto Estrada,et al.  A vibrational approach to node centrality and vulnerability in complex networks , 2009, 0912.4307.

[16]  Fan Chung Graham,et al.  A Random Graph Model for Power Law Graphs , 2001, Exp. Math..

[17]  Taieb Znati,et al.  On Approximation of New Optimization Methods for Assessing Network Vulnerability , 2010, 2010 Proceedings IEEE INFOCOM.