Evaluating Topological Vulnerability Based on Fuzzy Fractal Dimension

AbstractComplex networks have been widely applied in many complex systems existed in nature and society because of its rapid development. Many methods have been proposed to evaluate the vulnerability of the complex networks because of the high security requirements of the network. In this paper, a novel method is proposed to evaluate network’s vulnerability, which is based on fuzzy fractal dimension and average edge betweenness. Fuzzy fractal dimension can reflect the dynamic structure and topological structure of complex network, which is important to the vulnerability of complex network. So this proposed method can overcome the shortcomings of previous works by replacing the key coefficient p by fuzzy fractal dimension. In order to show this proposed method’s accuracy and effectiveness, six USAir networks in different years are applied in this paper. Three common methods are used to compare the results with this proposed method, and the RB attack strategy is used to analyze the vulnerability of dynamic characteristic. The fuzzy fractal dimension of randomly selecting largest connected subset which is close to the initial fuzzy fractal dimension shows the reliability and stability of this proposed method. The vulnerability order obtained by this proposed method is more realistic, because the Pearson correlation coefficient r about this method equals to 0.9805, which shows a extremely strong correlation with the reality.

[1]  Da-Wen Huang,et al.  Dynamic-Sensitive centrality of nodes in temporal networks , 2017, Scientific Reports.

[2]  Réka Albert,et al.  Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[3]  O. Shanker,et al.  DEFINING DIMENSION OF A COMPLEX NETWORK , 2007 .

[4]  Tharam S. Dillon,et al.  A Stepwise-Based Fuzzy Regression Procedure for Developing Customer Preference Models in New Product Development , 2015, IEEE Transactions on Fuzzy Systems.

[5]  Oscar Castillo,et al.  A new approach for dynamic fuzzy logic parameter tuning in Ant Colony Optimization and its application in fuzzy control of a mobile robot , 2015, Appl. Soft Comput..

[6]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[7]  Gong-Ru Lin,et al.  Tricolor R/G/B Laser Diode Based Eye-Safe White Lighting Communication Beyond 8 Gbit/s , 2017, Scientific Reports.

[8]  Jian-Wei Wang,et al.  Cascade-based attack vulnerability on the US power grid. , 2009 .

[9]  Dirk Helbing,et al.  A network framework of cultural history , 2014, Science.

[10]  Yong Deng,et al.  Dependence assessment in human reliability analysis based on evidence credibility decay model and IOWA operator , 2018 .

[11]  Hernán A. Makse,et al.  Influence maximization in complex networks through optimal percolation , 2015, Nature.

[12]  Mariano Sigman,et al.  A small world of weak ties provides optimal global integration of self-similar modules in functional brain networks , 2011, Proceedings of the National Academy of Sciences.

[13]  Tzung-Pei Hong,et al.  Fuzzy utility mining with upper-bound measure , 2015, Appl. Soft Comput..

[14]  Yong Deng,et al.  A novel method for forecasting time series based on fuzzy logic and visibility graph , 2017, Advances in Data Analysis and Classification.

[15]  H. Eugene Stanley,et al.  Exacerbated vulnerability of coupled socio-economic risk in complex networks , 2016 .

[16]  V. Latora,et al.  Multiscale vulnerability of complex networks. , 2007, Chaos.

[17]  Bingyi Kang,et al.  Stable strategies analysis based on the utility of Z-number in the evolutionary games , 2018, Appl. Math. Comput..

[18]  Tzung-Pei Hong,et al.  An effective parallel approach for genetic-fuzzy data mining , 2014, Expert Syst. Appl..

[19]  Jian-Wei Wang,et al.  Robustness of complex networks with the local protection strategy against cascading failures , 2013 .

[20]  Wenju Du,et al.  Outer Synchronization between Two Coupled Complex Networks and Its Application in Public Traffic Supernetwork , 2016 .

[21]  Wenju Du,et al.  Synchronization between Different Networks with Time-Varying Delay and Its Application in Bilayer Coupled Public Traffic Network , 2016 .

[22]  Igor Mishkovski,et al.  Vulnerability of complex networks , 2011 .

[23]  Albert-László Barabási,et al.  Statistical mechanics of complex networks , 2001, ArXiv.

[24]  Witold Pedrycz,et al.  From fuzzy data analysis and fuzzy regression to granular fuzzy data analysis , 2015, Fuzzy Sets Syst..

[25]  Yong Deng,et al.  Dependent Evidence Combination Based on Shearman Coefficient and Pearson Coefficient , 2018, IEEE Access.

[26]  Massimo Marchiori,et al.  Model for cascading failures in complex networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[27]  Klaus Hahn,et al.  A new method to measure complexity in binary or weighted networks and applications to functional connectivity in the human brain , 2016, BMC Bioinformatics.

[28]  Yong Deng,et al.  Evaluation method based on fuzzy relations between Dempster–Shafer belief structure , 2018, Int. J. Intell. Syst..

[29]  Albert-László Barabási,et al.  Universal resilience patterns in complex networks , 2016, Nature.

[30]  Mehmet Emin Aydin,et al.  A multi-agent based approach for change management in manufacturing enterprises , 2015, J. Intell. Manuf..

[31]  Xinyang Deng,et al.  D-AHP method with different credibility of information , 2017, Soft Computing.

[32]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[33]  Tzung-Pei Hong,et al.  Mining fuzzy temporal association rules by item lifespans , 2016, Appl. Soft Comput..

[34]  Camelia-Mihaela Pintea,et al.  Emergency management using geographic information systems: application to the first Romanian traveling salesman problem instance , 2016, Knowledge and Information Systems.

[35]  A. Shapiro,et al.  Glutathione Ethyl Ester Supplementation during Pancreatic Islet Isolation Improves Viability and Transplant Outcomes in a Murine Marginal Islet Mass Model , 2013, PloS one.

[36]  Witold Pedrycz,et al.  Design of Fuzzy Cognitive Maps for Modeling Time Series , 2016, IEEE Transactions on Fuzzy Systems.

[37]  María José del Jesús,et al.  Fuzzy rules for describing subgroups from Influenza A virus using a multi-objective evolutionary algorithm , 2013, Appl. Soft Comput..

[38]  Yong Deng,et al.  Measuring transferring similarity via local information , 2018 .

[39]  Nina H. Fefferman,et al.  Simple and efficient self-healing strategy for damaged complex networks , 2015, Physical review. E, Statistical, nonlinear, and soft matter physics.

[40]  S. Havlin,et al.  How to calculate the fractal dimension of a complex network: the box covering algorithm , 2007, cond-mat/0701216.

[41]  Xinyang Deng,et al.  Evidence Combination From an Evolutionary Game Theory Perspective , 2015, IEEE Transactions on Cybernetics.

[42]  Tim S. Evans,et al.  What is the dimension of citation space? , 2014, ArXiv.

[43]  Kit Yan Chan,et al.  Varying Spread Fuzzy Regression for Affective Quality Estimation , 2017, IEEE Transactions on Fuzzy Systems.

[44]  Huseyin Seker,et al.  Quantitative prediction of peptide binding affinity by using hybrid fuzzy support vector regression , 2016, Appl. Soft Comput..

[45]  José S. Andrade,et al.  IMDB Network Revisited: Unveiling Fractal and Modular Properties from a Typical Small-World Network , 2013, PloS one.

[46]  Oscar Castillo,et al.  Automated mathematical modelling, simulation and behavior identification of robotic dynamic systems using a new fuzzy-fractal-genetic approach , 1999, Robotics Auton. Syst..

[47]  Oscar Castillo,et al.  An intelligent hybrid approach for industrial quality control combining neural networks, fuzzy logic and fractal theory , 2004, Inf. Sci..

[48]  Zhen Wang,et al.  Impact of Social Punishment on Cooperative Behavior in Complex Networks , 2013, Scientific Reports.

[49]  Witold Pedrycz,et al.  From Fuzzy Models to Granular Fuzzy Models , 2011, WILF.

[50]  V. Anh,et al.  Protein folding kinetic order prediction from amino acid sequence based on horizontal visibility network , 2016 .

[51]  Shlomo Havlin,et al.  Origins of fractality in the growth of complex networks , 2005, cond-mat/0507216.

[52]  Oscar Castillo,et al.  New approach using ant colony optimization with ant set partition for fuzzy control design applied to the ball and beam system , 2015, Inf. Sci..

[53]  Yves Van de Peer,et al.  Diffany: an ontology-driven framework to infer, visualise and analyse differential molecular networks , 2016, BMC Bioinformatics.

[54]  Xinyang Deng,et al.  An Evidential Axiomatic Design Approach for Decision Making Using the Evaluation of Belief Structure Satisfaction to Uncertain Target Values , 2018, Int. J. Intell. Syst..

[55]  Yong Deng,et al.  Evidential Supplier Selection Based on DEMATEL and Game Theory , 2018, Int. J. Fuzzy Syst..

[56]  Oscar Castillo,et al.  Hybrid intelligent systems for time series prediction using neural networks, fuzzy logic, and fractal theory , 2002, IEEE Trans. Neural Networks.

[57]  Hak-Keung Lam,et al.  Classification of epilepsy seizure phase using interval type-2 fuzzy support vector machines , 2016, Neurocomputing.

[58]  Witold Pedrycz,et al.  Design of interval type-2 fuzzy models through optimal granularity allocation , 2011, Appl. Soft Comput..

[59]  Oscar Castillo,et al.  Optimization of type-2 fuzzy systems based on bio-inspired methods: A concise review , 2012, Inf. Sci..

[60]  Wen Jiang,et al.  Intuitionistic Fuzzy Power Aggregation Operator Based on Entropy and Its Application in Decision Making , 2018, Int. J. Intell. Syst..

[61]  Shuai Xu,et al.  A modified Physarum-inspired model for the user equilibrium traffic assignment problem , 2016, ArXiv.

[62]  Wen Jiang,et al.  Intuitionistic fuzzy evidential power aggregation operator and its application in multiple criteria decision-making , 2018, Int. J. Syst. Sci..

[63]  Wen Jiang,et al.  An Uncertainty Measure for Interval-valued Evidences , 2017, Int. J. Comput. Commun. Control.

[64]  Ake J Holmgren,et al.  Using Graph Models to Analyze the Vulnerability of Electric Power Networks , 2006, Risk analysis : an official publication of the Society for Risk Analysis.

[65]  Yong Deng,et al.  Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks , 2016, PloS one.

[66]  Andrzej Bargiela,et al.  Fuzzy fractal dimensions and fuzzy modeling , 2003, Inf. Sci..

[67]  G. Garlet,et al.  Analysis of Immune Response Markers in Jorge Lobo's Disease Lesions Suggests the Occurrence of Mixed T Helper Responses with the Dominance of Regulatory T Cell Activity , 2015, PloS one.

[68]  Chien-Chang Chou,et al.  A generalized similarity measure for fuzzy numbers , 2016, J. Intell. Fuzzy Syst..

[69]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[70]  F. Hausdorff Dimension und äußeres Maß , 1918 .

[71]  Petter Holme,et al.  The Effect of Disease-Induced Mortality on Structural Network Properties , 2013, PloS one.

[72]  Yong Deng,et al.  Failure mode and effects analysis based on D numbers and TOPSIS , 2016, Qual. Reliab. Eng. Int..