Network vulnerability assessment under cascading failures

The assessment of network vulnerability is of great importance in the presence of unexpected disruptive events or adversarial attacks, which will lead to a much more devastating consequence especially when failures can be cascaded. In this context, we study the Cascading Vulnerability Node Detection (CVND) optimization problem to identify the most vulnerable nodes in a network whose removals maximally destroy the network's functions after cascading failures, based on the recently proposed effective metric, total pairwise connectivity. Besides its NP-hardness on various graphs, we further show that the CVND problem is NP-hard to be approximated within Ω ((1+(d/n1-∈-1)2(n-k)/n∈)) equation with n vertices and k vulnerable nodes after d-hop failure cascades. Despite the intractability of this problem, we propose TRGA, a novel iterative two-phase algorithm, for efficiently solving the CVND problem in a timely manner. We also formulate the integer linear programming for obtaining the optimal solution. The effectiveness of our solutions is validated on various synthetic and real-world networks.

[1]  Massimo Marchiori,et al.  Model for cascading failures in complex networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[2]  G. Nemhauser,et al.  Integer Programming , 2020 .

[3]  Nam P. Nguyen,et al.  On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability , 2013, IEEE/ACM Transactions on Networking.

[4]  Nam P. Nguyen,et al.  Exploiting the Robustness on Power-Law Networks , 2011, COCOON.

[5]  Gábor Csárdi,et al.  The igraph software package for complex network research , 2006 .

[6]  Johan Håstad,et al.  Clique is hard to approximate within n/sup 1-/spl epsiv// , 1996, Proceedings of 37th Conference on Foundations of Computer Science.

[7]  Panos M. Pardalos,et al.  Detecting critical nodes in sparse graphs , 2009, Comput. Oper. Res..

[8]  U. Brandes A faster algorithm for betweenness centrality , 2001 .

[9]  My T. Thai,et al.  Precise structural vulnerability assessment via mathematical programming , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[10]  Jonas Holmerin,et al.  Clique Is Hard to Approximate within n1-o(1) , 2000, ICALP.

[11]  Benjamin A Carreras,et al.  Complex systems analysis of series of blackouts: cascading failure, critical points, and self-organization. , 2007, Chaos.

[12]  M. Newman,et al.  Renormalization Group Analysis of the Small-World Network Model , 1999, cond-mat/9903357.

[13]  M. Keeling,et al.  The effects of local spatial structure on epidemiological invasions , 1999, Proceedings of the Royal Society of London. Series B: Biological Sciences.

[14]  Baharan Mirzasoleiman,et al.  Cascaded failures in weighted networks. , 2011, Physical review. E, Statistical, nonlinear, and soft matter physics.

[15]  Guanrong Chen,et al.  Complex networks: small-world, scale-free and beyond , 2003 .

[16]  My T. Thai,et al.  Adaptive algorithms for detecting critical links and nodes in dynamic networks , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[17]  Martin G. Everett,et al.  A Graph-theoretic perspective on centrality , 2006, Soc. Networks.

[18]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[19]  M. L. Sachtjen,et al.  Disturbances in a power transmission system , 2000, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[20]  Taieb Znati,et al.  On Approximation of New Optimization Methods for Assessing Network Vulnerability , 2010, 2010 Proceedings IEEE INFOCOM.

[21]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[22]  Duncan J Watts,et al.  A simple model of global cascades on random networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[23]  Panos M. Pardalos,et al.  On New Approaches of Assessing Network Vulnerability: Hardness and Approximation , 2012, IEEE/ACM Transactions on Networking.

[24]  My T. Thai,et al.  An efficient spectral bound for link vulnerability assessment in large-scale networks , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[25]  Frederick S. Hillier,et al.  Introduction of Operations Research , 1967 .