Identifying critical nodes' group in complex networks

被引:23
|
作者
Jiang, Zhong-Yuan [1 ,2 ]
Zeng, Yong [1 ,2 ]
Liu, Zhi-Hong [1 ,2 ]
Ma, Jian-Feng [1 ,2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Shaanxi Key Lab Network & Syst Secur, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Key node; Target attack; Network vulnerability; Complex network; CENTRALITY; ROBUSTNESS; FAILURES;
D O I
10.1016/j.physa.2018.09.069
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, network vulnerability or security has attracted much attention in various networked systems, and especially in security related attacks or protections, there are a set of influential nodes that can remarkably break the network connectivity. In this work, we firstly present eight attack mechanisms including target attack, random failure, betweenness based attack, closeness based attack, PageRank based attack, k-shell based attack, greedy algorithm, and low-degree attack. Secondly, inspired by the dynamic node removal process, we propose to recalculate the metrics for every node removal strategy, and evaluate the network robustness against all these heuristic attack strategies with and without recalculations in scale-free networks, random networks, and many real network models. The simulations indicate that most of the attack strategies with recalculations appear to imperil the network structure security more. Furthermore, considering that key node set mining is very critical for network structure protections, we employ minimum number of key nodes (MNKN) metric to further discuss the network vulnerability against all the attack strategies with or without recalculations. The results show that the critical nodes' group can be more efficiently found under the PageRank based attack with recalculations than under other attack disciplines with or without recalculations in most of the classic and real network models. This work investigates network structure vulnerability and security from a new perspective, and has potential applications into network structure protection or planning. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:121 / 132
页数:12
相关论文
共 50 条
  • [41] Identifying Key Nodes in Complex Networks Based on Global Structure
    Yang, Yuanzhi
    Wang, Xing
    Chen, You
    Hu, Min
    IEEE ACCESS, 2020, 8 : 32904 - 32913
  • [42] Identifying vital nodes in complex networks by adjacency information entropy
    Xu, Xiang
    Zhu, Cheng
    Wang, Qingyong
    Zhu, Xianqiang
    Zhou, Yun
    SCIENTIFIC REPORTS, 2020, 10 (01)
  • [43] Identifying source of an information in complex networks with limited observation nodes
    Lu, Xindai
    Yao, Yiyang
    Zhou, Yinzuo
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 1456 - 1461
  • [44] Identifying important nodes affecting network security in complex networks
    Liu, Yongshan
    Wang, Jianjun
    He, Haitao
    Huang, Guoyan
    Shi, Weibo
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (02)
  • [45] Identification of cascading dynamic critical nodes in complex networks
    Li, Zhen-Hua
    Duan, Dong-Li
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (02) : 226 - 233
  • [46] THE LANDSCAPE OF COMPLEX NETWORKS - CRITICAL NODES AND A HIERARCHICAL DECOMPOSITION
    Weinan, E.
    Lu, Jianfeng
    Yao, Yuan
    METHODS AND APPLICATIONS OF ANALYSIS, 2013, 20 (04) : 383 - 404
  • [47] Research on Critical Nodes Algorithm in Social Complex Networks
    Wang, Xue-Guang
    OPEN PHYSICS, 2017, 15 (01): : 68 - 73
  • [48] BGN: Identifying Influential Nodes in Complex Networks via Backward Generating Networks
    Lin, Zhiwei
    Ye, Fanghua
    Chen, Chuan
    Zheng, Zibin
    IEEE ACCESS, 2018, 6 : 59949 - 59962
  • [49] A supervised active learning method for identifying critical nodes in IoT networks
    Ojaghi, Behnam
    Dehshibi, Mohammad Mahdi
    Antonopoulos, Angelos
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (12): : 16775 - 16794
  • [50] A Novel Algorithm for Identifying Critical Nodes in Networks Based on Local Centrality
    Zheng W.
    Wu Z.
    Yang G.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (09): : 1872 - 1880