Attack Strategies on Complex Networks
نویسندگان
چکیده
In this work, we estimate the resilience of scale-free networks on a number of different attack methods. We study a number of different cases, where we assume that a small amount of knowledge on the network structure is available, or can be approximately estimated. We also present a class of real-life networks that prove to be very resilient on intentional attacks, or equivalently much more difficult to immunize completely than most model scale-free networks.
منابع مشابه
Network robustness versus multi-strategy sequential attack
We examine the robustness of networks under attack when the attacker sequentially selects from a number of different attack strategies, each of which removes one node from the network. Network robustness refers to the ability of a network to maintain functionality under attack, and the problem-dependent context implies a number of robustness measures exist. Thus, we analyse four measures: (1) e...
متن کاملThe Influences of Edge Asymmetry on Network Robustness
Asymmetry of in/out-degree distribution is a widespread phenomenon in real-world complex networks. This paper put forward the concept of Edge Asymmetry(EA) to quantify this feature. We designed an EA-based strategy to attack six kinds of real-world networks and found that it was able to achieve the effect as well as edge betweenness-based(EB) and better than edge degree-based(ED) and random att...
متن کاملPublic Transport Networks under Random Failure and Directed Attack
The behaviour of complex networks under failure or attack depends strongly on the specific scenario. Of special interest are scale-free networks, which are usually seen as robust under random failure but appear to be especially vulnerable to targeted attacks. In a recent study of public transport networks of 14 major cities of the world we have shown that these systems when represented by appro...
متن کاملPerformance of attack strategies on modular networks
Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional mal...
متن کاملEfficiency of attack strategies on complex model and real-world networks
13 We investigated the efficiency of attack strategies to network nodes when targeting several 14 complex model and real-world networks. We tested 5 attack strategies, 3 of which were 15 introduced in this work for the first time, to attack 3 model (Erdos and Renyi, Barabasi and 16 Albert preferential attachment network, and scale-free network configuration models) and 17 3 real networks (Gnute...
متن کاملThe effects of observation errors on the attack vulnerability of complex networks
Identifying the key nodes to target in a social network is an important problem in several application areas, including the disruption of terrorist networks and the crafting of effective immunization strategies. One important issue that has received limited attention is how such targeting strategies are affected by erroneous data about network structure, This paper describes simulation experime...
متن کامل