Skip to main content

Network Strengthening Against Malicious Attacks

  • Conference paper
  • First Online:
Complex Networks and Their Applications VIII (COMPLEX NETWORKS 2019)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 881))

Included in the following conference series:

  • 3347 Accesses

Abstract

Robustness measures the toleration of complex networks against random failures and malicious attacks. A malicious attack removes the most important node iteratively and destroys the network quickly. It is crucial to strengthen the network robustness against malicious attacks. In this paper, we propose an algorithm to strengthen the robustness with reduced change of network structure compared to state-of-the-art algorithms. The algorithm is called targeted variable neighborhood search (TVNS) algorithm. Experiments on real-world and random networks show that TVNS is efficient on strengthening the robustness against malicious attacks. The strengthened network against high degree adaptive attack shows an onion-like structure where nodes prefer to connect with similar degree nodes; while for the strengthened network against high betweenness adaptive attack, nodes prefer to connect with similar betweenness nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Galvão, V., Miranda, J.G., Andrade, R.F., Andrade, J.S., Gallos, L.K., Makse, H.A.: Modularity map of the network of human cell differentiation. Proc. Natl. Acad. Sci. 107(13), 5750–5755 (2010)

    Article  Google Scholar 

  2. Marcoux, M., Lusseau, D.: The influence of repressive legislation on the structure of a social media network. EPL (Europhys. Lett.) 104(5), 58004 (2014)

    Article  Google Scholar 

  3. Wandelt, S., Sun, X., Cao, X.: Computationally efficient attack design for robustness analysis of air transportation networks. Transportmetrica A: Transp. Sci. 11(10), 939–966 (2015)

    Article  Google Scholar 

  4. Souto, P.C., Teixeira, A.S., Francisco, A.P., Santos, F.C.: Capturing financial volatility through simple network measures. In: International Conference on Complex Networks and their Applications, pp. 534–546. Springer (2018)

    Google Scholar 

  5. Sarker, B., Rtichie, D.W., Aridhi, S.: Exploiting complex protein domain networks for protein function annotation. In: International Conference on Complex Networks and their Applications, pp. 598–610. Springer (2018)

    Google Scholar 

  6. Albert, R., Barabási, A.-L.: Statistical mechanics of complex networks. Rev. Mod. Phys. 74(1), 47 (2002)

    Article  MathSciNet  Google Scholar 

  7. Watts, D.J., Strogatz, S.H.: Collective dynamics of ‘small-world’ networks. Nature 393(6684), 440 (1998)

    Article  Google Scholar 

  8. Albert, R., Jeong, H., Barabási, A.L.: Error and attack tolerance of complex networks. Nature 406(6794), 378 (2000)

    Article  Google Scholar 

  9. Shao, S., Huang, X., Stanley, H.E., Havlin, S.: Percolation of localized attack on complex networks. New J. Phys. 17(2), 023049 (2015)

    Article  MathSciNet  Google Scholar 

  10. Berezin, Y., Bashan, A., Danziger, M.M., Li, D., Havlin, S.: Localized attacks on spatially embedded networks with dependencies. Sci. Rep. 5, 8934 (2015)

    Article  Google Scholar 

  11. Sun, X., Wandelt, S., Cao, X.: On node criticality in air transportation networks. Netw. Spat. Econ. 17(3), 737–761 (2017)

    Article  MathSciNet  Google Scholar 

  12. Pizzuti, C., Socievole, A.: A genetic algorithm for enhancing the robustness of complex networks through link protection. In: International Conference on Complex Networks and their Applications, pp. 807–819. Springer (2018)

    Google Scholar 

  13. Schneider, C.M., Moreira, A.A., Andrade, J.S., Havlin, S., Herrmann, H.J.: Mitigation of malicious attacks on networks. Proc. Natl. Acad. Sci. 108(10), 3838–3841 (2011)

    Article  Google Scholar 

  14. Louzada, V.H.P., Daolio, F., Herrmann, H.J., Tomassini, M.: Generating robust and efficient networks under targeted attacks. In: Propagation Phenomena in Real World Networks, pp. 215–224. Springer (2015)

    Google Scholar 

  15. Sun, S., Ma, Y., Li, R., Wang, L., Xia, C.: Tabu search enhances network robustness under targeted attacks. Phys. A: Stat. Mech. Appli. 446, 82–91 (2016)

    Article  MathSciNet  Google Scholar 

  16. Zhou, M., Liu, J.: A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks. Phys. A: Stat. Mech. Appli. 410, 131–143 (2014)

    Article  Google Scholar 

  17. Wandelt, S., Sun, X., Zanin, M., Havlin, S.: QRE: Quick Robustness Estimation for large complex networks. Future Gener. Comput. Syst. 83, 413–424 (2018)

    Article  Google Scholar 

  18. Louzada, V.H.P., Daolio, F., Herrmann, H.J., Tomassini, M.: Smart rewiring for network robustness. J. Complex Netw. 1(2), 150–159 (2013)

    Article  Google Scholar 

  19. Wandelt, S., Sun, X., Feng, D., Zanin, M., Havlin, S.: A comparative analysis of approaches to network-dismantling. Sci. Rep. 8(1), 13513 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

This study is supported by the National Natural Science Foundation of China (Grants No. 61861136005 and No. 61851110763).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoqian Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rong, Q., Zhang, J., Sun, X., Wandelt, S. (2020). Network Strengthening Against Malicious Attacks. In: Cherifi, H., Gaito, S., Mendes, J., Moro, E., Rocha, L. (eds) Complex Networks and Their Applications VIII. COMPLEX NETWORKS 2019. Studies in Computational Intelligence, vol 881. Springer, Cham. https://doi.org/10.1007/978-3-030-36687-2_63

Download citation

Publish with us

Policies and ethics