Skip to main content

Network Robustness Analytics with Optimization

  • Chapter
  • First Online:
Computational Intelligence for Network Structure Analytics
  • 631 Accesses

Abstract

The community structure and the robustness are two important properties of networks for analyzing the functionality of complex systems. The community structure is crucial to understand the potential functionality of complex systems, while the robustness is indispensable to protect the functionality of complex systems from malicious attacks. When a network suffers from an unpredictable attack, its structural integrity would be damaged. It is essential to enhance community integrity of networks against multilevel targeted attacks. Coupled networks are extremely fragile because a node failure of a network would trigger a cascade of failures on the entire system. In reality, it is necessary to recover the damaged networks, and there are cascading failures in recovery processes. This chapter first introduces a greedy algorithm to enhance community integrity of networks against multilevel targeted attacks and then introduces a technique aiming at protecting several influential nodes for enhancing robustness of coupled networks under the recoveries.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akkaya, K., Senel, F., Thimmapuram, A., Uludag, S.: Distributed recovery from network partitioning in movable sensor/actor networks via controlled mobility. IEEE Trans. Comput. 59(2), 258–271 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  2. Albert, R., Albert, I., Nakarado, G.L.: Structural vulnerability of the North American power grid. Phys. Rev. E 69(2), 025,103 (2004)

    Google Scholar 

  3. Ammann, P., Jajodia, S., Liu, P.: Recovery from malicious transactions. IEEE Trans. Knowl. Data Eng. 14(5), 1167–1185 (2002)

    Article  Google Scholar 

  4. Babaei, M., Ghassemieh, H., Jalili, M.: Cascading failure tolerance of modular small-world networks. IEEE Trans. Circuits Syst. II: Express Briefs 58(8), 527–531 (2011)

    Article  Google Scholar 

  5. Barabási, A.L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509–512 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  6. Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech.: Theor. Exp. 2008(10), P10,008 (2008)

    Google Scholar 

  7. Brandes, U., Erlebach, T.: Network analysis: methodological foundations, vol. 3418. Springer Science & Business Media (2005)

    Google Scholar 

  8. Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. Comput. Netw. ISDN Syst. 30(1), 107–117 (1998)

    Article  Google Scholar 

  9. Buldyrev, S.V., Parshani, R., Paul, G., Stanley, H.E., Havlin, S.: Catastrophic cascade of failures in interdependent networks. Nature 464(7291), 1025–1028 (2010)

    Article  Google Scholar 

  10. Chen, D., Lü, L., Shang, M.S., Zhang, Y.C., Zhou, T.: Identifying influential nodes in complex networks. Phys. A: Stat. Mech. Appl. 391(4), 1777–1787 (2012)

    Article  Google Scholar 

  11. Cohen, R., Havlin, S., Ben-Avraham, D.: Efficient immunization strategies for computer networks and populations. Phys. Rev. Lett. 91(24), 247,901 (2003)

    Google Scholar 

  12. Erdos, P., Rényi, A.: On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci 5(1), 17–60 (1960)

    MathSciNet  MATH  Google Scholar 

  13. Freeman, L.C.: Centrality in social networks conceptual clarification. Soc. Netw. 1(3), 215–239 (1978)

    Article  Google Scholar 

  14. Gao, J., Buldyrev, S.V., Stanley, H.E., Havlin, S.: Networks formed from interdependent networks. Nat. Phys. 8(1), 40–48 (2012)

    Article  Google Scholar 

  15. Girvan, M., Newman, M.E.: Community structure in social and biological networks. Proc. Nat. Acad Sci. 99(12), 7821–7826 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  16. Gong, M., Cai, Q., Chen, X., Ma, L.: Complex network clustering by multiobjective discrete particle swarm optimization based on decomposition. IEEE Trans. Evol. Comput. 18(1), 82–97 (2014)

    Article  Google Scholar 

  17. Herrmann, H.J., Schneider, C.M., Moreira, A.A., Andrade Jr, J.S., Havlin, S.: Onion-like network topology enhances robustness against malicious attacks. J. Stat. Mech.: Theor. Exp. 2011(01), P01,027 (2011)

    Google Scholar 

  18. Holme, P., Kim, B.J., Yoon, C.N., Han, S.K.: Attack vulnerability of complex networks. Phys. Rev. E 65(5), 056,109 (2002)

    Google Scholar 

  19. Hoory, S., Linial, N., Wigderson, A.: Expander graphs and their applications. Bull. Am. Math. Soc. 43(4), 439–561 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  20. Jiang, L.L., Perc, M.: Spreading of cooperative behaviour across interdependent groups. arXiv preprint arXiv:1310.4166 (2013)

  21. Kvalbein, A., Hansen, A.F., Čičic, T., Gjessing, S., Lysne, O.: Multiple routing configurations for fast ip network recovery. IEEE/ACM Trans. Netw. (TON) 17(2), 473–486 (2009)

    Article  Google Scholar 

  22. Liu, Y.Y., Slotine, J.J., Barabási, A.L.: Controllability of complex networks. Nature 473(7346), 167–173 (2011)

    Article  Google Scholar 

  23. Lü, L., Zhang, Y.C., Yeung, C.H., Zhou, T.: Leaders in social networks, the delicious case. PloS one 6(6), e21,202 (2011)

    Google Scholar 

  24. Ma, L., Gong, M., Cai, Q., Jiao, L.: Enhancing community integrity of networks against multilevel targeted attacks. Phys. Rev. E 88(2), 022,810 (2013)

    Google Scholar 

  25. Ma, L., Gong, M., Liu, J., Cai, Q., Jiao, L.: Multi-level learning based memetic algorithm for community detection. Appl. Soft Comput. 19, 121–133 (2014)

    Article  Google Scholar 

  26. Majdandzic, A., Podobnik, B., Buldyrev, S.V., Kenett, D.Y., Havlin, S., Stanley, H.E.: Spontaneous recovery in dynamical networks. Nat. Phys. 10(1), 34–38 (2014)

    Article  Google Scholar 

  27. Milo, R., Itzkovitz, S., Kashtan, N., Levitt, R., Shen-Orr, S., Ayzenshtat, I., Sheffer, M., Alon, U.: Superfamilies of evolved and designed networks. Science 303(5663), 1538–1542 (2004)

    Article  Google Scholar 

  28. Newman, A.: Introduction. Camden Third Series 94, vii–xiv (1963)

    Google Scholar 

  29. Nguyen, D.T., Shen, Y., Thai, M.T.: Detecting critical nodes in interdependent power networks for vulnerability assessment. IEEE Trans. Smart Grid 4(1), 151–159 (2013)

    Article  Google Scholar 

  30. Parshani, R., Buldyrev, S.V., Havlin, S.: Interdependent networks: reducing the coupling strength leads to a change from a first to second order percolation transition. Phys. Rev. Lett. 105(4), 048,701 (2010)

    Google Scholar 

  31. Pei, S., Makse, H.A.: Spreading dynamics in complex networks. J. Stat. Mech.: Theor. Exp. 2013(12), P12,002 (2013)

    Google Scholar 

  32. Scheffer, M., van Nes, E.H.: Self-organized similarity, the evolutionary emergence of groups of similar species. Proc. Nat. Acad Sci. 103(16), 6230–6235 (2006)

    Article  Google Scholar 

  33. Schneider, C.M., Moreira, A.A., Andrade, J.S., Havlin, S., Herrmann, H.J.: Mitigation of malicious attacks on networks. Proc. Nat. Acad Sci. 108(10), 3838–3841 (2011)

    Article  Google Scholar 

  34. Šubelj, L., Bajec, M.: Robust network community detection using balanced propagation. Eur. Phys. J. B-Condens. Matter Complex Syst. 81(3), 353–362 (2011)

    Article  Google Scholar 

  35. Um, J., Minnhagen, P., Kim, B.J.: Synchronization in interdependent networks. Chaos: Interdisc. J. Nonlinear Sci. 21(2), 025,106 (2011)

    Google Scholar 

  36. Wang, J.: Robustness of complex networks with the local protection strategy against cascading failures. Saf. Sci. 53, 219–225 (2013)

    Article  Google Scholar 

  37. Watts, D.J., Strogatz, S.H.: Collective dynamics of small-world-networks. Nature 393(6684), 440–442 (1998)

    Google Scholar 

  38. Wu, Z.X., Holme, P.: Onion structure and network robustness. Phys. Rev. E 84(2), 026,106 (2011)

    Google Scholar 

  39. Zeng, A., Liu, W.: Enhancing network robustness against malicious attacks. Phys. Rev. E 85(6), 066,130 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maoguo Gong .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this chapter

Cite this chapter

Gong, M., Cai, Q., Ma, L., Wang, S., Lei, Y. (2017). Network Robustness Analytics with Optimization. In: Computational Intelligence for Network Structure Analytics. Springer, Singapore. https://doi.org/10.1007/978-981-10-4558-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4558-5_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4557-8

  • Online ISBN: 978-981-10-4558-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics