Identifying critical nodes' group in complex networks

被引:23
|
作者
Jiang, Zhong-Yuan [1 ,2 ]
Zeng, Yong [1 ,2 ]
Liu, Zhi-Hong [1 ,2 ]
Ma, Jian-Feng [1 ,2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Shaanxi Key Lab Network & Syst Secur, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Key node; Target attack; Network vulnerability; Complex network; CENTRALITY; ROBUSTNESS; FAILURES;
D O I
10.1016/j.physa.2018.09.069
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, network vulnerability or security has attracted much attention in various networked systems, and especially in security related attacks or protections, there are a set of influential nodes that can remarkably break the network connectivity. In this work, we firstly present eight attack mechanisms including target attack, random failure, betweenness based attack, closeness based attack, PageRank based attack, k-shell based attack, greedy algorithm, and low-degree attack. Secondly, inspired by the dynamic node removal process, we propose to recalculate the metrics for every node removal strategy, and evaluate the network robustness against all these heuristic attack strategies with and without recalculations in scale-free networks, random networks, and many real network models. The simulations indicate that most of the attack strategies with recalculations appear to imperil the network structure security more. Furthermore, considering that key node set mining is very critical for network structure protections, we employ minimum number of key nodes (MNKN) metric to further discuss the network vulnerability against all the attack strategies with or without recalculations. The results show that the critical nodes' group can be more efficiently found under the PageRank based attack with recalculations than under other attack disciplines with or without recalculations in most of the classic and real network models. This work investigates network structure vulnerability and security from a new perspective, and has potential applications into network structure protection or planning. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:121 / 132
页数:12
相关论文
共 50 条
  • [11] Critical Nodes Identification in Complex Networks
    Yang, Haihua
    An, Shi
    SYMMETRY-BASEL, 2020, 12 (01):
  • [12] Identifying critical nodes in temporal networks by network embedding
    Yu, En-Yu
    Fu, Yan
    Chen, Xiao
    Xie, Mei
    Chen, Duan-Bing
    SCIENTIFIC REPORTS, 2020, 10 (01)
  • [13] Computational methods for identifying the critical nodes in biological networks
    Liu, Xiangrong
    Hong, Zengyan
    Liu, Juan
    Lin, Yuan
    Rodriguez-Paton, Alfonso
    Zou, Quan
    Zeng, Xiangxiang
    BRIEFINGS IN BIOINFORMATICS, 2020, 21 (02) : 486 - 497
  • [14] Identifying critical nodes in temporal networks by network embedding
    En-Yu Yu
    Yan Fu
    Xiao Chen
    Mei Xie
    Duan-Bing Chen
    Scientific Reports, 10
  • [15] DelayFlow Centrality for Identifying Critical Nodes in Transportation Networks
    Cheng, Yew-Yih
    Lee, Roy Ka-Wei
    Lim, Ee-Peng
    Zhu, Feida
    2013 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2013, : 1462 - 1463
  • [16] Identifying critical edges in complex networks
    En-Yu Yu
    Duan-Bing Chen
    Jun-Yan Zhao
    Scientific Reports, 8
  • [17] Identifying critical edges in complex networks
    Yu, En-Yu
    Chen, Duan-Bing
    Zhao, Jun-Yan
    SCIENTIFIC REPORTS, 2018, 8
  • [18] A "C3-TOPSIS-Pareto" Based Model for Identifying Critical Nodes in Complex Networks
    Zeng, Ziqiang
    Zhang, Weiye
    Jin, Hongling
    SYSTEMS, 2025, 13 (02):
  • [19] Identifying Super-Spreader Nodes in Complex Networks
    Fu, Yu-Hsiang
    Huang, Chung-Yuan
    Sun, Chuen-Tsai
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [20] Identifying hidden target nodes for spreading in complex networks
    Yin, Haofei
    Zhang, Aobo
    Zeng, An
    CHAOS SOLITONS & FRACTALS, 2023, 168