Skip to main content

Research on Cascading Failures in Complex Network

  • Conference paper
  • First Online:
  • 1499 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11068))

Abstract

The study on the cascading failure of complex network is an important branch in the complex network researches. In this paper, the attack strategies used in the researches on the cascading failure of complex network at home and abroad have been summarized. At the same time, the different characteristics of the new attack strategies and the traditional attack strategies have been analyzed. The modeling principles and the methods of the cascading failure model of complex network have been proposed. Furthermore, the research progress of the cascading failure in the complex network is reviewed. The existing problems as well as the future development trends have been pointed out.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Apicella, C.L., Marlowe, F.W., Fowler, J.H., et al.: Social networks and cooperation in huntergatherers. Nature 481(7382), 497–501 (2011)

    Article  Google Scholar 

  2. Albert, R., Jeong, H., Barabási, A.L.: Internet: diameter of the world-wide web. Nature 401(6749), 130–131 (1999)

    Article  Google Scholar 

  3. Krebs, V.E.: Mapping networks of terrorist ce11s. Connections 24(3), 43–52 (2001)

    Google Scholar 

  4. Hossain, M.M., Alam, S.: A complex network approach towards modeling and analysis of the Australian airport network. J. Air Transp. Manag. 60, 1–9 (2017)

    Article  Google Scholar 

  5. Newman, M.E.: The structure of scientific collaboration networks. Proc. Natl. Acad. Sci. U.S.A. 98(2), 404–409 (2000)

    Article  MathSciNet  Google Scholar 

  6. Hu, J., Yu, J., Cao, J., et al.: Topological interactive analysis of power system and its communication module: a complex network approach. Physica A 416, 99–111 (2014)

    Article  Google Scholar 

  7. Zhou, Y., Wang, S.: Generic model of reverse logistics network design. J. Transp. Syst. Eng. Inf. Technol. 8(3), 71–78 (2008)

    Google Scholar 

  8. Stam, C.J.: Modern network science of neurological disorders. Nat. Rev. Neurosci. 15(10), 683 (2014)

    Article  Google Scholar 

  9. Bjornson, E., Matthaiou, M., Debbah, M.: Massive MIMO with non-ideal arbitrary arrays: hardware scaling laws and circuit-aware design. IEEE Trans. Wirel. Commun. 14(8), 4353–4368 (2015)

    Article  Google Scholar 

  10. Albert, R., Jeony, H., Barabasi, A.L.: Attack and error tolerance in complex networks. Nature 406(6794), 387–482 (2000)

    Article  Google Scholar 

  11. Holme, P., Kim, B.J., Yoon, C.N., et al.: Attack vulnerability of complex networks. Phys. Rev. E 65(5 Pt 2), 056109 (2002)

    Article  Google Scholar 

  12. Guillaume, J.-L., Latapy, M., Magnien, C.: Comparison of failures and attacks on random and scale-free networks. In: Higashino, T. (ed.) OPODIS 2004. LNCS, vol. 3544, pp. 186–196. Springer, Heidelberg (2005). https://doi.org/10.1007/11516798_14

    Chapter  MATH  Google Scholar 

  13. Nie, T., Guo, Z., Zhao, K., et al.: New attack strategies for complex networks. Physica A 424, 248–253 (2015)

    Article  Google Scholar 

  14. Pu, C.L., Cui, W.: Vulnerability of complex networks under path-based attacks. Physica A 419, 622–629 (2015)

    Article  Google Scholar 

  15. Pu, C., Li, S., Michaelson, A., et al.: Iterative path attacks on networks. Phys. Lett. A 379(28–29), 1633–1638 (2015)

    Article  Google Scholar 

  16. Shao, S., Huang, X., Stanley, H.E., et al.: Percolation of localized attack on complex networks. New J. Phys. 17(2), 1–11 (2015)

    Article  MathSciNet  Google Scholar 

  17. Yuan, X., Shao, S., Stanley, H.E., et al.: How breadth of degree distribution influences network robustness: comparing localized and random attacks. Phys. Rev. E 92(3), 032122 (2015)

    Article  Google Scholar 

  18. Dong, G., Hao, H., Du, R., et al.: Localized attack on clustering networks, p. 14 (2016). arXiv:1610.04759

  19. Dong, G., Du, R., Hao, H., et al.: Modified localized attack on complex network. EPL 113(2), 28002 (2016)

    Article  Google Scholar 

  20. Sood, A.K., Enbody, R.J.: Targeted cyberattacks: a superset of advanced persistent threats. IEEE Secur. Priv. 11(1), 54–61 (2013)

    Google Scholar 

  21. Xenakis, C., Ntantogian, C.: An advanced persistent threat in 3G networks: attacking the home network from roaming networks. Comput. Secur. 40(2), 84–94 (2014)

    Article  Google Scholar 

  22. Marchetti, M., Pierazzi, F., Colajanni, M., et al.: Analysis of high volumes of network traffic for advanced persistent threat detection. Comput. Netw. 109, 127–141 (2016)

    Article  Google Scholar 

  23. Motter, A.E., Lai, Y.C.: Cascade-based attacks on complex networks. Phys. Rev. E 66(6), 065102 (2002)

    Article  Google Scholar 

  24. Moreno, Y., Gomez, J.B., Pacheco, A.F.: Instability of scale-free networks under node-breaking avalanches. EPL 58(4), 630–636 (2002)

    Article  Google Scholar 

  25. Moreno, Y., Pastor Satorras, R., Vazquez, A.: Critical load and congestion instabilities in scalefree networks. Europhys. Lett. 62, 292–298 (2003)

    Article  Google Scholar 

  26. Kim, B.J.: Phase transition in the modified fiber bundle model. EPL 66(6), 819–825 (2004)

    Article  Google Scholar 

  27. Kim, D.H., Kim, B.J., Jeong, H.: Universality class of the fiber bundle model on complex networks. Phys. Rev. Lett. 94, 025501 (2005)

    Article  Google Scholar 

  28. Bonabeau, E.: Sandpile dynamics on random graphs. J. Phys. Soc. Jpn. 64, 327–328 (1995)

    Article  Google Scholar 

  29. Goh, K.I., Lee, D.S., Kahng, B., et al.: Sandpile on scale-free neworks. Phys. Rev. Lett. 91, 148701 (2003)

    Article  Google Scholar 

  30. Lee, D.S., Goh, K.I., Kahng, B., Kim, D.: Sandpile avalanche dynamics on scale-free networks. Physica A 338, 84–91 (2004)

    Article  Google Scholar 

  31. Huang, L., Yang, L., Yang, K.Q.: Geographical effects on cascading breakdowns of scale-free networks. Phys. Rev. E 73, 036102 (2006)

    Article  Google Scholar 

  32. Holme, P., Kim, B.J.: Vertex overload breakdown in evolving networks. Phys. Rev. E 65(6), 066l09 (2002)

    Article  Google Scholar 

  33. Holme, P.: Edge overload breakdown in evolving networks. Phy. Rev. E 66(3), 036119 (2002)

    Article  Google Scholar 

  34. Dobson, I., Carreras, B.A., Lynch, V.E., et al.: An initial model for complex dynamics in electric power system bIackouts. In: 34th HICSS (2001)

    Google Scholar 

  35. Dobson, I., Carreras, B.A., Newman, D.E.: A probabilistic loading-dependent model of cascading failure and possible implications for blackouts. In: 36th HICSS (2003)

    Google Scholar 

  36. Sun, Q., Shi, L., Ni., Y., et al.: An enhanced cascading failure model integrating data mining technique (2017)

    Google Scholar 

  37. Yan, J., He, H., Sun, Y.: Integrated security analysis on cascading failure in complex networks. IEEE Trans. Inf. Forensics Secur. 9(3), 451–463 (2016)

    Article  Google Scholar 

  38. Fang, X., Yang, Q., Yan, W.: Modeling and analysis of cascading failure in directed complex networks. Saf. Sci. 65(3), 1–9 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu Nan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nan, Y., Hao, Y., Zhang, F., Zhou, G. (2018). Research on Cascading Failures in Complex Network. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11068. Springer, Cham. https://doi.org/10.1007/978-3-030-00021-9_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00021-9_57

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00020-2

  • Online ISBN: 978-3-030-00021-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics