Skip to main content

Advertisement

Log in

Efficient network dismantling through genetic algorithms

  • Application of soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Throughout the past decades, network dismantling gained an increasing interest by the research community, given tremendous importance of robust socio-technical systems. The problem of optimally dismantling a given network is provably NP-hard. Accordingly, existing studies on network dismantling resort to various heuristics, including the use of node centralities and finely tuned decycling and cutting techniques. However, it is known that these existing techniques largely lack the optimal baseline. Particularly, these techniques perform bad when compared to (expensive-to-compute) betweenness-based attacks. Therefore, there is a strong need for developing scalable, yet accurate attacking methods for being able to understand the robustness of large, real-world complex systems. In this study, we propose a novel network attack technique based on genetic algorithms. In order to develop a scalable framework, we first design an exact method for measuring the effectiveness of an attack, requiring O(|E|) time, where |E| is the number of edges in the network. Since this algorithm runs in linear time of the network size, it can scale up well for very large networks. Second, we develop and analyze a collection of genetic population constructors, which aim at providing a rich set of initial genetic material to the framework. Several genetic operators are proposed, which preferably select previously critical nodes to be attacked first. Finally, we evaluate our framework on a wide range of real-world networks. Results show that our novel technique significantly outperforms the state-of-the-art methods, providing an interesting sweet spot between attack quality and computational complexity. We believe that our work contributes toward the scalable robustness estimation of complex networks, and that the perspective of using non-deterministic methods will inspire future research in this domain.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Availability of data and material

The data underlying this study are available from the corresponding author upon reasonable request.

References

  • Ahn CW, Ramakrishna RS (2003) Elitism-based compact genetic algorithms. IEEE Trans Evol Comput 7(4):367–385

    Article  Google Scholar 

  • Albert R, Albert I, Nakarado GL (2004) Structural vulnerability of the north american power grid. Phys Rev E 69(2):025103

    Article  Google Scholar 

  • Albert R, Barabási A-L (2002) Statistical mechanics of complex networks. Rev Mod Phys 74(1):47

    Article  MathSciNet  Google Scholar 

  • Alsabti K, Ranka S, Singh V (1997) An efficient k-means clustering algorithm

  • Ash J, Newth D (2007) Optimizing complex networks for resilience against cascading failure. Physica A 380:673–683

    Article  Google Scholar 

  • Baker JE et al (1987) Reducing bias and inefficiency in the selection algorithm. In: Proceedings of the second international conference on genetic algorithms 206:14–21

  • Benavoli A, Corani G, Demšar J, Zaffalon M (2017) Time for a change: a tutorial for comparing multiple classifiers through bayesian analysis. J Mach Learn Res 18(1):2653–2688

    MathSciNet  MATH  Google Scholar 

  • Bonacich P (1972) Factoring and weighting approaches to status scores and clique identification. J Math Sociol 2(1):113–120

    Article  Google Scholar 

  • Brandes U (2001) A faster algorithm for betweenness centrality. J Math Sociol 25(2):163–177

    Article  Google Scholar 

  • Braunstein A, Dall’Asta L, Semerjian G, Zdeborová L (2016) Network dismantling. Proc Natl Acad Sci 113(44):12368–12373

  • Brooker P (2010) Fear in a handful of dust: aviation and the icelandic volcano. Significance 7(3):112–115

    Article  MathSciNet  Google Scholar 

  • Cerqueti R, Clemente GP, Grassi R (2020) Influence measures in subnetworks using vertex centrality. Soft Comput 24:8569–8582

    Article  Google Scholar 

  • Clemente GP, Cornaro A (2020) A novel measure of edge and vertex centrality for assessing robustness in complex networks. Soft Comput 24:13687–13704

    Article  Google Scholar 

  • Colizza V, Barrat A, Barthélemy M, Vespignani A (2006) The role of the airline transportation network in the prediction and predictability of global epidemics. Proc Natl Acad Sci 103(7):2015–2020

    Article  Google Scholar 

  • Conchon, S., Filliâtre, J.-C.: A persistent union-find data structure. In Proceedings of the 2007 workshop on Workshop on ML, pages 37–46, (2007)

  • Corsi, S., Sabelli, C.: General blackout in italy sunday september 28, 2003, h. 03: 28: 00. In: IEEE Power Engineering Society General Meeting, 2004, pages 1691–1702. IEEE, (2004)

  • Cuadra L, Salcedo-Sanz S, Del Ser J, Jiménez-Fernández S, Geem ZW (2015) A critical review of robustness in power grids using complex networks concepts. Energies 8(9):9211–9265

    Article  Google Scholar 

  • Dahi ZA, Alba E (2020) The grid-to-neighbourhood relationship in cellular gas: from design to solving complex problems. Soft Comput 24:3569–3589

    Article  Google Scholar 

  • Demšar J (2006) Statistical comparisons of classifiers over multiple data sets. J Mach Learn Res 7:1–30

    MathSciNet  MATH  Google Scholar 

  • Duijn PA, Kashirin V, Sloot PM (2014) The relative ineffectiveness of criminal network disruption. Sci Rep 4:4238

    Article  Google Scholar 

  • Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry, pages 35–41

  • Friedkin NE (1991) Theoretical foundations for centrality measures. Am J Sociol 96(6):1478–1504

    Article  Google Scholar 

  • Gao J, Liu X, Li D, Havlin S (2015) Recent progress on the resilience of complex networks. Energies 8(10):12187–12210

    Article  Google Scholar 

  • Holme P, Kim BJ, Yoon CN, Han SK (2002) Attack vulnerability of complex networks. Phys Rev E 65(5):056109

    Article  Google Scholar 

  • Katz L (1953) A new status index derived from sociometric analysis. Psychometrika 18(1):39–43

    Article  Google Scholar 

  • Kitsak M, Ganin AA, Eisenberg DA, Krapivsky PL, Krioukov D, Alderson DL, Linkov I (2018) Stability of a giant connected component in a complex network. Phys Rev E 97(1):012309

    Article  Google Scholar 

  • Lerman K, Ghosh R (2010) Information contagion: An empirical study of the spread of news on digg and twitter social networks. arXiv preprint arXiv:1003.2664

  • Merico D, Gfeller D, Bader GD (2009) How to visually interpret biological data using networks. Nat Biotechnol 27(10):921–924

    Article  Google Scholar 

  • Morone F, Makse HA (2015) Influence maximization in complex networks through optimal percolation. Nature 524(7563):65–68

    Article  Google Scholar 

  • Morone F, Min B, Bo L, Mari R, Makse HA (2016) Collective influence algorithm to find influencers via optimal percolation in massively large social media. Sci Rep 6:30062

    Article  Google Scholar 

  • Page L, Brin S, Motwani R, Winograd T (1999) The pagerank citation ranking: Bringing order to the web. Technical report, Stanford InfoLab

  • Peters K, Buzna L, Helbing D (2008) Modelling of cascading effects and efficient response to disaster spreading in complex networks. Int J Crit Infrastruct 4(1–2):46–62

    Article  Google Scholar 

  • Ren X-L, Gleinig N, Helbing D, Antulov-Fantulin N (2019) Generalized network dismantling. Proc Natl Acad Sci 116(14):6554–6559

    Article  MathSciNet  Google Scholar 

  • Rossi RA, Ahmed NK (2015) The network data repository with interactive graph analytics and visualization. In AAAI

  • Sabidussi G (1966) The centrality index of a graph. Psychometrika 31(4):581–603

    Article  MathSciNet  Google Scholar 

  • Schneider CM, Moreira AA, Andrade JS, Havlin S, Herrmann HJ (2011) Mitigation of malicious attacks on networks. Proc Natl Acad Sci 108(10):3838–3841

    Article  Google Scholar 

  • Shi W, Long Xiaoqiu, Li Y, Deng D, Wei Y (2020) Research on the performance of multi-population genetic algorithms with different complex network structures. Soft Comput 24:13441–13459

    Article  Google Scholar 

  • Smith J, Fogarty TC (1996) Self adaptation of mutation rates in a steady state genetic algorithm. In Proceedings of IEEE international conference on evolutionary computation, pages 318–323. IEEE

  • Strogatz SH (2001) Exploring complex networks. Nature 410(6825):268–276

    Article  Google Scholar 

  • Sun X, Wandelt S, Linke F (2015) Temporal evolution analysis of the european air transportation system: air navigation route network and airport network. Transportmetrica B: Transport Dynamics 3(2):153–168

    Google Scholar 

  • Tarjan RE, Vishkin U (1985) An efficient parallel biconnectivity algorithm. SIAM J Comput 14(4):862–874

  • Tian L, Bashan A, Shi D-N, Liu Y-Y (2017) Articulation points in complex networks. Nat Commun 8(1):1–9

    Article  Google Scholar 

  • Wandelt S, Shi X, Sun X (2021) Estimation and improvement of transportation network robustness by exploiting communities. Reliabil Eng Syst Safe 206:107307

    Article  Google Scholar 

  • Wandelt S, Sun X, Feng D, Zanin M, Havlin S (2018) A comparative analysis of approaches to network-dismantling. Sci Rep 8(1):1–15

    Article  Google Scholar 

  • Wandelt S, Sun X, Zanin M, Havlin S (2017) QRE: quick Robustness Estimation for large complex networks. Futur Gener Comput Syst 83:02

    Google Scholar 

  • Whitley D (1994) A genetic algorithm tutorial. Stat Comput 4(2):65–85

    Article  Google Scholar 

  • Yook S-H, Jeong H, Barabási A-L (2002) Modeling the internets large-scale topology. Proc Natl Acad Sci 99(21):13382–13386

  • Zalik KR, Zalik B (2019) Node attraction-facilitated evolution algorithm for community detection in networks. Soft Comput 23:6135–6143

    Article  Google Scholar 

  • Zanin M, Lillo F (2013) Modelling the air transport with complex networks: a short review. Eur Physic J Special Topics 215(1):5–21

    Article  Google Scholar 

Download references

Funding

This study is supported by the National Natural Science Foundation of China (Grants No. 61861136005, No. 61851110763, No. 71731001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoqian Sun.

Ethics declarations

Conflict of interest

Author Wei Lin declares that he has no conflict of interest. Author Sebastian Wandelt declares that he has no conflict of interest. Author Xiaoqian Sun declares that she has no conflict of interest.

Code availability

The code underlying this study are available from the corresponding author upon reasonable request.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, W., Wandelt, S. & Sun, X. Efficient network dismantling through genetic algorithms. Soft Comput 26, 3107–3125 (2022). https://doi.org/10.1007/s00500-021-06475-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-021-06475-w

Keywords

Navigation