Structural Vulnerability Analysis of Overlapping Communities in Complex Networks

Many complex networks commonly exhibit community structure in their underlying organizations, i.e., They contain multiple groups of nodes having more connections inside a group and less interactions among groups. This special structure not only offers key insights into understanding the network organization principles but also plays a vital role in maintaining the normal function of the whole system. As a result, any significant change to the network communities, due to element-wise failures, can potentially redefine their organizational structures and consequently lead to the malfunction or undesirable corruption of the entire system. Therefore, identifying network elements that are essential to its community structure is a fundamental and important problem. However, to the best of our knowledge, this research direction has not received much been attention in the literature. In this paper, we study the structural vulnerability of overlapping complex network communities to identify nodes that are important in maintaining the complex structure organization. Specifically, given a network and a budget of k nodes, we want to identify k critical nodes whose their exclusions transforms the current network community structure. To effectively analyze this vulnerability on overlapping communities, we propose the concept of generating edges and provide an optimal algorithm for detecting the Minimal Generating Edge Set (MGES) in a network community. We suggest genEdge, an effective solution based on this MGES. Empirical results on both synthesized networks with known community structures, and real data including Reality cellular data, Foursquare and Facebook social traces confirm the efficacy of our approach.

[1]  Alan T. Murray,et al.  Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure , 2010, Comput. Oper. Res..

[2]  Nam P. Nguyen,et al.  A novel method for worm containment on dynamic social networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[3]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[4]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.

[5]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[6]  Ying Fan,et al.  Identifying and Characterizing Nodes Important to Community Structure Using the Spectrum of the Graph , 2011, PloS one.

[7]  Alan T. Murray,et al.  Comparative Approaches for Assessing Network Vulnerability , 2008 .

[8]  Santo Fortunato,et al.  Community detection in graphs , 2009, ArXiv.

[9]  P. Tan,et al.  Node roles and community structure in networks , 2007, WebKDD/SNA-KDD '07.

[10]  Santo Fortunato,et al.  Finding Statistically Significant Communities in Networks , 2010, PloS one.

[11]  Panos M. Pardalos,et al.  On New Approaches of Assessing Network Vulnerability: Hardness and Approximation , 2012, IEEE/ACM Transactions on Networking.

[12]  Nam P. Nguyen,et al.  Overlapping communities in dynamic networks: their detection and mobile applications , 2011, MobiCom.

[13]  Robin Palotai,et al.  Community Landscapes: An Integrative Approach to Determine Overlapping Network Module Hierarchy, Identify Key Nodes and Predict Network Dynamics , 2009, PloS one.

[14]  Leon Danon,et al.  Comparing community structure identification , 2005, cond-mat/0505245.

[15]  Jean-Loup Guillaume,et al.  Fast unfolding of communities in large networks , 2008, 0803.0476.

[16]  Nam P. Nguyen,et al.  Assessing network vulnerability in a community structure point of view , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[17]  Andrea Lancichinetti,et al.  Community detection algorithms: a comparative analysis: invited presentation, extended abstract , 2009, VALUETOOLS.

[18]  PentlandAlex,et al.  Reality mining: sensing complex social systems , 2006 .

[19]  Lubos Buzna,et al.  Modelling of cascading effects and efficient response to disaster spreading in complex networks , 2008, Int. J. Crit. Infrastructures.

[20]  Krishna P. Gummadi,et al.  On the evolution of user interaction in Facebook , 2009, WOSN '09.

[21]  Sencun Zhu,et al.  A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.

[22]  R. Guimerà,et al.  Functional cartography of complex metabolic networks , 2005, Nature.