Vulnerability of complex networks under path-based attacks

被引:32
|
作者
Pu, Cun-Lai [1 ]
Cui, Wei [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Jiangsu, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
Vulnerability; Path; Complex networks; ROBUSTNESS; TOLERANCE; FAILURES; ERROR;
D O I
10.1016/j.physa.2014.10.038
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We investigate vulnerability of complex networks including model networks and real-world networks subject to path-based attacks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:622 / 629
页数:8
相关论文
共 50 条
  • [21] Continuous Path-based Range Keyword Queries on Road Networks
    Chen, Fangshu
    Zhang, Pengfei
    Lin, Huaizhong
    Tang, Shan
    2019 10TH IEEE INTERNATIONAL CONFERENCE ON BIG KNOWLEDGE (ICBK 2019), 2019, : 42 - 49
  • [22] Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks
    Bai Li
    Batten, Lynn
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (02) : 377 - 387
  • [23] Path-Based QoS Provisioning for Optical Burst Switching Networks
    Belbekkouche, Abdeltouab
    Hafid, Abdelhakim
    Gendreau, Michel
    Tagmouti, Mariam
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2011, 29 (13) : 2048 - 2063
  • [24] Path-based multi-sources localization in multiplex networks
    Cheng, Le
    Li, Xianghua
    Han, Zhen
    Luo, Tengyun
    Ma, Lianbo
    Zhu, Peican
    CHAOS SOLITONS & FRACTALS, 2022, 159
  • [25] A path-based relation networks model for knowledge graph completion
    Lee, Wan-Kon
    Shin, Won-Chul
    Jagvaral, Batselem
    Roh, Jae-Seung
    Kim, Min-Sung
    Lee, Min-Ho
    Park, Hyun-Kyu
    Park, Young-Tack
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 182
  • [26] Critical Path-Based Backdoor Detection for Deep Neural Networks
    Jiang, Wei
    Wen, Xiangyu
    Zhan, Jinyu
    Wang, Xupeng
    Song, Ziwei
    Bian, Chen
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (03) : 4032 - 4046
  • [27] Accurate Path-based Methods for Influence Maximization in Social Networks
    Ko, Yun-Yong
    Chae, Dong-Kyu
    Kim, Sang-Wook
    PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16 COMPANION), 2016, : 59 - 60
  • [28] Path-Based Differential in Multi-Modal Brain Networks
    Falakshahi, Haleh
    Rokham, Hooman
    Calhoun, Vince
    BIOLOGICAL PSYCHIATRY, 2022, 91 (09) : S329 - S329
  • [29] An efficient path-based approach for influence maximization in social networks
    Kianian, Sahar
    Rostamnia, Mehran
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 167
  • [30] Interdependency and Vulnerability of Multipartite Networks under Target Node Attacks
    Cai, Qing
    Pratama, Mahardhika
    Alam, Sameer
    COMPLEXITY, 2019, 2019