Efficient disintegration strategies with cost constraint in complex networks: The crucial role of nodes near average degree.

The study of network disintegration, including controlling disease spread and destroying terrorist organizations, has wide application scenarios and attracts many researchers. In this paper, we concentrate on the network disintegration problem with heterogeneous disintegration cost, where the disintegration cost to eliminate each node might be non-identical. We first put forward a disintegration cost model and an optimization model for disintegration strategy. Then, we analyze the hub strategy, leaf strategy, and the average degree strategy to investigate the nodes tendency of the optimal disintegration strategy. Numerical experiments in three synthetic networks and real-world networks indicate that the disintegration effect of hub strategy drops gradually when the disintegration cost changes from homogeneity to heterogeneity. For the situation of strong heterogeneity of disintegration cost of each node, average degree strategy achieves the maximum disintegration effect gradually. Also, taking another perspective, average degree strategy might enlighten efficient solutions to protect critical infrastructure through strengthening the nodes which are chosen by the average degree strategy.

[1]  Asim S. Siddiqui,et al.  Preferential network perturbation , 2006 .

[2]  Michele Bellingeri,et al.  Efficiency of attack strategies on complex model and real-world networks , 2013, ArXiv.

[3]  Shlomo Havlin,et al.  Finding a better immunization strategy. , 2008, Physical review letters.

[4]  J. A. Rodríguez-Velázquez,et al.  Subgraph centrality in complex networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[5]  Guanrong Chen,et al.  Complex networks: small-world, scale-free and beyond , 2003 .

[6]  Teruyoshi Kobayashi,et al.  Efficient immunization strategies to prevent financial contagion , 2013, Scientific Reports.

[7]  Hsinchun Chen,et al.  Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network , 2005, ISI.

[8]  Ellis L. Johnson,et al.  Solving Large-Scale Zero-One Linear Programming Problems , 1983, Oper. Res..

[9]  Wu Jun,et al.  Natural Connectivity of Complex Networks , 2010 .

[10]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[11]  J. A. Rodríguez-Velázquez,et al.  Spectral measures of bipartivity in complex networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[12]  Mauricio Barahona,et al.  Spectral Measure of Structural Robustness in Complex Networks , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[13]  Yicheng Zhang,et al.  Identifying influential nodes in complex networks , 2012 .

[14]  Lada A. Adamic,et al.  The political blogosphere and the 2004 U.S. election: divided they blog , 2005, LinkKDD '05.

[15]  Jun Wu,et al.  Optimal attack strategy of complex networks based on tabu search , 2016 .

[16]  Lev Muchnik,et al.  Identifying influential spreaders in complex networks , 2010, 1001.5285.

[17]  Behrouz Shafei,et al.  Seismic Resilience of Transportation Networks with Deteriorating Components , 2016 .

[18]  Xin Lu,et al.  Efficient network disintegration under incomplete information: the comic effect of link prediction , 2016, Scientific reports.

[19]  Jun Zhuang,et al.  Modeling a Multitarget Attacker-Defender Game with Budget Constraints , 2017, Decis. Anal..

[20]  Wu Jun,et al.  Optimal Attack Strategy in Random Scale-Free Networks Based on Incomplete Information , 2011 .

[21]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[22]  Rae Zimmerman,et al.  Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[23]  Mauricio Barahona,et al.  Robustness of random graphs based on graph spectra. , 2012, Chaos.

[24]  Yijia Cao,et al.  Cascading Failure Analysis Considering Interaction Between Power Grids and Communication Networks , 2016, IEEE Transactions on Smart Grid.

[25]  Desmond Curran,et al.  Budget constraint and vaccine dosing: a mathematical modelling exercise , 2014, Cost Effectiveness and Resource Allocation.

[26]  Francesco Bullo,et al.  Voltage collapse in complex power grids , 2016, Nature Communications.

[27]  Cohen,et al.  Resilience of the internet to random breakdowns , 2000, Physical review letters.

[28]  M. Newman,et al.  Renormalization Group Analysis of the Small-World Network Model , 1999, cond-mat/9903357.

[29]  Jun Zhuang,et al.  Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[30]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[31]  John A. Major Advanced Techniques for Modeling Terrorism Risk , 2002 .