Abstract
Throughout the past decades, network dismantling gained an increasing interest by the research community, given tremendous importance of robust socio-technical systems. The problem of optimally dismantling a given network is provably NP-hard. Accordingly, existing studies on network dismantling resort to various heuristics, including the use of node centralities and finely tuned decycling and cutting techniques. However, it is known that these existing techniques largely lack the optimal baseline. Particularly, these techniques perform bad when compared to (expensive-to-compute) betweenness-based attacks. Therefore, there is a strong need for developing scalable, yet accurate attacking methods for being able to understand the robustness of large, real-world complex systems. In this study, we propose a novel network attack technique based on genetic algorithms. In order to develop a scalable framework, we first design an exact method for measuring the effectiveness of an attack, requiring O(|E|) time, where |E| is the number of edges in the network. Since this algorithm runs in linear time of the network size, it can scale up well for very large networks. Second, we develop and analyze a collection of genetic population constructors, which aim at providing a rich set of initial genetic material to the framework. Several genetic operators are proposed, which preferably select previously critical nodes to be attacked first. Finally, we evaluate our framework on a wide range of real-world networks. Results show that our novel technique significantly outperforms the state-of-the-art methods, providing an interesting sweet spot between attack quality and computational complexity. We believe that our work contributes toward the scalable robustness estimation of complex networks, and that the perspective of using non-deterministic methods will inspire future research in this domain.
Similar content being viewed by others
Availability of data and material
The data underlying this study are available from the corresponding author upon reasonable request.
References
Ahn CW, Ramakrishna RS (2003) Elitism-based compact genetic algorithms. IEEE Trans Evol Comput 7(4):367–385
Albert R, Albert I, Nakarado GL (2004) Structural vulnerability of the north american power grid. Phys Rev E 69(2):025103
Albert R, Barabási A-L (2002) Statistical mechanics of complex networks. Rev Mod Phys 74(1):47
Alsabti K, Ranka S, Singh V (1997) An efficient k-means clustering algorithm
Ash J, Newth D (2007) Optimizing complex networks for resilience against cascading failure. Physica A 380:673–683
Baker JE et al (1987) Reducing bias and inefficiency in the selection algorithm. In: Proceedings of the second international conference on genetic algorithms 206:14–21
Benavoli A, Corani G, Demšar J, Zaffalon M (2017) Time for a change: a tutorial for comparing multiple classifiers through bayesian analysis. J Mach Learn Res 18(1):2653–2688
Bonacich P (1972) Factoring and weighting approaches to status scores and clique identification. J Math Sociol 2(1):113–120
Brandes U (2001) A faster algorithm for betweenness centrality. J Math Sociol 25(2):163–177
Braunstein A, Dall’Asta L, Semerjian G, Zdeborová L (2016) Network dismantling. Proc Natl Acad Sci 113(44):12368–12373
Brooker P (2010) Fear in a handful of dust: aviation and the icelandic volcano. Significance 7(3):112–115
Cerqueti R, Clemente GP, Grassi R (2020) Influence measures in subnetworks using vertex centrality. Soft Comput 24:8569–8582
Clemente GP, Cornaro A (2020) A novel measure of edge and vertex centrality for assessing robustness in complex networks. Soft Comput 24:13687–13704
Colizza V, Barrat A, Barthélemy M, Vespignani A (2006) The role of the airline transportation network in the prediction and predictability of global epidemics. Proc Natl Acad Sci 103(7):2015–2020
Conchon, S., Filliâtre, J.-C.: A persistent union-find data structure. In Proceedings of the 2007 workshop on Workshop on ML, pages 37–46, (2007)
Corsi, S., Sabelli, C.: General blackout in italy sunday september 28, 2003, h. 03: 28: 00. In: IEEE Power Engineering Society General Meeting, 2004, pages 1691–1702. IEEE, (2004)
Cuadra L, Salcedo-Sanz S, Del Ser J, Jiménez-Fernández S, Geem ZW (2015) A critical review of robustness in power grids using complex networks concepts. Energies 8(9):9211–9265
Dahi ZA, Alba E (2020) The grid-to-neighbourhood relationship in cellular gas: from design to solving complex problems. Soft Comput 24:3569–3589
Demšar J (2006) Statistical comparisons of classifiers over multiple data sets. J Mach Learn Res 7:1–30
Duijn PA, Kashirin V, Sloot PM (2014) The relative ineffectiveness of criminal network disruption. Sci Rep 4:4238
Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry, pages 35–41
Friedkin NE (1991) Theoretical foundations for centrality measures. Am J Sociol 96(6):1478–1504
Gao J, Liu X, Li D, Havlin S (2015) Recent progress on the resilience of complex networks. Energies 8(10):12187–12210
Holme P, Kim BJ, Yoon CN, Han SK (2002) Attack vulnerability of complex networks. Phys Rev E 65(5):056109
Katz L (1953) A new status index derived from sociometric analysis. Psychometrika 18(1):39–43
Kitsak M, Ganin AA, Eisenberg DA, Krapivsky PL, Krioukov D, Alderson DL, Linkov I (2018) Stability of a giant connected component in a complex network. Phys Rev E 97(1):012309
Lerman K, Ghosh R (2010) Information contagion: An empirical study of the spread of news on digg and twitter social networks. arXiv preprint arXiv:1003.2664
Merico D, Gfeller D, Bader GD (2009) How to visually interpret biological data using networks. Nat Biotechnol 27(10):921–924
Morone F, Makse HA (2015) Influence maximization in complex networks through optimal percolation. Nature 524(7563):65–68
Morone F, Min B, Bo L, Mari R, Makse HA (2016) Collective influence algorithm to find influencers via optimal percolation in massively large social media. Sci Rep 6:30062
Page L, Brin S, Motwani R, Winograd T (1999) The pagerank citation ranking: Bringing order to the web. Technical report, Stanford InfoLab
Peters K, Buzna L, Helbing D (2008) Modelling of cascading effects and efficient response to disaster spreading in complex networks. Int J Crit Infrastruct 4(1–2):46–62
Ren X-L, Gleinig N, Helbing D, Antulov-Fantulin N (2019) Generalized network dismantling. Proc Natl Acad Sci 116(14):6554–6559
Rossi RA, Ahmed NK (2015) The network data repository with interactive graph analytics and visualization. In AAAI
Sabidussi G (1966) The centrality index of a graph. Psychometrika 31(4):581–603
Schneider CM, Moreira AA, Andrade JS, Havlin S, Herrmann HJ (2011) Mitigation of malicious attacks on networks. Proc Natl Acad Sci 108(10):3838–3841
Shi W, Long Xiaoqiu, Li Y, Deng D, Wei Y (2020) Research on the performance of multi-population genetic algorithms with different complex network structures. Soft Comput 24:13441–13459
Smith J, Fogarty TC (1996) Self adaptation of mutation rates in a steady state genetic algorithm. In Proceedings of IEEE international conference on evolutionary computation, pages 318–323. IEEE
Strogatz SH (2001) Exploring complex networks. Nature 410(6825):268–276
Sun X, Wandelt S, Linke F (2015) Temporal evolution analysis of the european air transportation system: air navigation route network and airport network. Transportmetrica B: Transport Dynamics 3(2):153–168
Tarjan RE, Vishkin U (1985) An efficient parallel biconnectivity algorithm. SIAM J Comput 14(4):862–874
Tian L, Bashan A, Shi D-N, Liu Y-Y (2017) Articulation points in complex networks. Nat Commun 8(1):1–9
Wandelt S, Shi X, Sun X (2021) Estimation and improvement of transportation network robustness by exploiting communities. Reliabil Eng Syst Safe 206:107307
Wandelt S, Sun X, Feng D, Zanin M, Havlin S (2018) A comparative analysis of approaches to network-dismantling. Sci Rep 8(1):1–15
Wandelt S, Sun X, Zanin M, Havlin S (2017) QRE: quick Robustness Estimation for large complex networks. Futur Gener Comput Syst 83:02
Whitley D (1994) A genetic algorithm tutorial. Stat Comput 4(2):65–85
Yook S-H, Jeong H, Barabási A-L (2002) Modeling the internets large-scale topology. Proc Natl Acad Sci 99(21):13382–13386
Zalik KR, Zalik B (2019) Node attraction-facilitated evolution algorithm for community detection in networks. Soft Comput 23:6135–6143
Zanin M, Lillo F (2013) Modelling the air transport with complex networks: a short review. Eur Physic J Special Topics 215(1):5–21
Funding
This study is supported by the National Natural Science Foundation of China (Grants No. 61861136005, No. 61851110763, No. 71731001).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Author Wei Lin declares that he has no conflict of interest. Author Sebastian Wandelt declares that he has no conflict of interest. Author Xiaoqian Sun declares that she has no conflict of interest.
Code availability
The code underlying this study are available from the corresponding author upon reasonable request.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Lin, W., Wandelt, S. & Sun, X. Efficient network dismantling through genetic algorithms. Soft Comput 26, 3107–3125 (2022). https://doi.org/10.1007/s00500-021-06475-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-021-06475-w