Skip to main content

Network Strengthening Against Malicious Attacks

  • Conference paper
  • First Online:
  • 3146 Accesses

Part of the book series: Studies in Computational Intelligence ((SCI,volume 881))

Abstract

Robustness measures the toleration of complex networks against random failures and malicious attacks. A malicious attack removes the most important node iteratively and destroys the network quickly. It is crucial to strengthen the network robustness against malicious attacks. In this paper, we propose an algorithm to strengthen the robustness with reduced change of network structure compared to state-of-the-art algorithms. The algorithm is called targeted variable neighborhood search (TVNS) algorithm. Experiments on real-world and random networks show that TVNS is efficient on strengthening the robustness against malicious attacks. The strengthened network against high degree adaptive attack shows an onion-like structure where nodes prefer to connect with similar degree nodes; while for the strengthened network against high betweenness adaptive attack, nodes prefer to connect with similar betweenness nodes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Galvão, V., Miranda, J.G., Andrade, R.F., Andrade, J.S., Gallos, L.K., Makse, H.A.: Modularity map of the network of human cell differentiation. Proc. Natl. Acad. Sci. 107(13), 5750–5755 (2010)

    Article  Google Scholar 

  2. Marcoux, M., Lusseau, D.: The influence of repressive legislation on the structure of a social media network. EPL (Europhys. Lett.) 104(5), 58004 (2014)

    Article  Google Scholar 

  3. Wandelt, S., Sun, X., Cao, X.: Computationally efficient attack design for robustness analysis of air transportation networks. Transportmetrica A: Transp. Sci. 11(10), 939–966 (2015)

    Article  Google Scholar 

  4. Souto, P.C., Teixeira, A.S., Francisco, A.P., Santos, F.C.: Capturing financial volatility through simple network measures. In: International Conference on Complex Networks and their Applications, pp. 534–546. Springer (2018)

    Google Scholar 

  5. Sarker, B., Rtichie, D.W., Aridhi, S.: Exploiting complex protein domain networks for protein function annotation. In: International Conference on Complex Networks and their Applications, pp. 598–610. Springer (2018)

    Google Scholar 

  6. Albert, R., Barabási, A.-L.: Statistical mechanics of complex networks. Rev. Mod. Phys. 74(1), 47 (2002)

    Article  MathSciNet  Google Scholar 

  7. Watts, D.J., Strogatz, S.H.: Collective dynamics of ‘small-world’ networks. Nature 393(6684), 440 (1998)

    Article  Google Scholar 

  8. Albert, R., Jeong, H., Barabási, A.L.: Error and attack tolerance of complex networks. Nature 406(6794), 378 (2000)

    Article  Google Scholar 

  9. Shao, S., Huang, X., Stanley, H.E., Havlin, S.: Percolation of localized attack on complex networks. New J. Phys. 17(2), 023049 (2015)

    Article  MathSciNet  Google Scholar 

  10. Berezin, Y., Bashan, A., Danziger, M.M., Li, D., Havlin, S.: Localized attacks on spatially embedded networks with dependencies. Sci. Rep. 5, 8934 (2015)

    Article  Google Scholar 

  11. Sun, X., Wandelt, S., Cao, X.: On node criticality in air transportation networks. Netw. Spat. Econ. 17(3), 737–761 (2017)

    Article  MathSciNet  Google Scholar 

  12. Pizzuti, C., Socievole, A.: A genetic algorithm for enhancing the robustness of complex networks through link protection. In: International Conference on Complex Networks and their Applications, pp. 807–819. Springer (2018)

    Google Scholar 

  13. Schneider, C.M., Moreira, A.A., Andrade, J.S., Havlin, S., Herrmann, H.J.: Mitigation of malicious attacks on networks. Proc. Natl. Acad. Sci. 108(10), 3838–3841 (2011)

    Article  Google Scholar 

  14. Louzada, V.H.P., Daolio, F., Herrmann, H.J., Tomassini, M.: Generating robust and efficient networks under targeted attacks. In: Propagation Phenomena in Real World Networks, pp. 215–224. Springer (2015)

    Google Scholar 

  15. Sun, S., Ma, Y., Li, R., Wang, L., Xia, C.: Tabu search enhances network robustness under targeted attacks. Phys. A: Stat. Mech. Appli. 446, 82–91 (2016)

    Article  MathSciNet  Google Scholar 

  16. Zhou, M., Liu, J.: A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks. Phys. A: Stat. Mech. Appli. 410, 131–143 (2014)

    Article  Google Scholar 

  17. Wandelt, S., Sun, X., Zanin, M., Havlin, S.: QRE: Quick Robustness Estimation for large complex networks. Future Gener. Comput. Syst. 83, 413–424 (2018)

    Article  Google Scholar 

  18. Louzada, V.H.P., Daolio, F., Herrmann, H.J., Tomassini, M.: Smart rewiring for network robustness. J. Complex Netw. 1(2), 150–159 (2013)

    Article  Google Scholar 

  19. Wandelt, S., Sun, X., Feng, D., Zanin, M., Havlin, S.: A comparative analysis of approaches to network-dismantling. Sci. Rep. 8(1), 13513 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

This study is supported by the National Natural Science Foundation of China (Grants No. 61861136005 and No. 61851110763).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoqian Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rong, Q., Zhang, J., Sun, X., Wandelt, S. (2020). Network Strengthening Against Malicious Attacks. In: Cherifi, H., Gaito, S., Mendes, J., Moro, E., Rocha, L. (eds) Complex Networks and Their Applications VIII. COMPLEX NETWORKS 2019. Studies in Computational Intelligence, vol 881. Springer, Cham. https://doi.org/10.1007/978-3-030-36687-2_63

Download citation

Publish with us

Policies and ethics