skip to main content
10.1145/2740908.2743055acmotherconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article

Correlation of Node Importance Measures: An Empirical Study through Graph Robustness

Published: 18 May 2015 Publication History

Abstract

Graph robustness is a measure of resilience to failures and targeted attacks. A large body of research on robustness focuses on how to attack a given network by deleting a few nodes so as to maximally disrupt its connectedness. As a result, literature contains a myriad of attack strategies that rank nodes by their relative importance for this task. How different are these strategies? Do they pick similar sets of target nodes, or do they differ significantly in their choices? In this paper, we perform the first large scale empirical correlation analysis of attack strategies, i.e., the node importance measures that they employ, for graph robustness. We approach this task in three ways; by analyzing similarities based on (i) their overall ranking of the nodes, (ii) the characteristics of top nodes that they pick, and (iii) the dynamics of disruption that they cause on the network. Our study of 15 different (randomized, local, distance-based, and spectral) strategies on 68 real-world networks reveals surprisingly high correlations among node-attack strategies, consistent across all three types of analysis, and identifies groups of comparable strategies. These findings suggest that some computationally complex strategies can be closely approximated by simpler ones, and a few strategies can be used as a close proxy of the consensus among all of them.

References

[1]
B. D. Abrahao, S. Soundarajan, J. E. Hopcroft, and R. Kleinberg. On the separability of structural classes of communities. In KDD, pages 624--632, 2012.
[2]
R. Albert, H. Jeong, and A.-L. Barabási. Error and attack tolerance of complex networks. Nature, 406(6794), 2000.
[3]
A. Beygelzimer, G. Grinstein, R. Linsker, and I. Rish. Improving network robustness by edge modification. Physica A: Stat. Mech. and its Appl., 357(3--4):593--612, 2005.
[4]
J. M. Bolland. Sorting out centrality: An analysis of the performance of four centrality models in real and simulated networks. Social Net., 10(3):233--253, 1988.
[5]
U. Brandes. A faster algorithm for betweenness centrality. Journal of Mathematical Sociology, 25(2):163--177, 2001.
[6]
H. Chan, L. Akoglu, and H. Tong. Make it or break it: Manipulating robustness in large networks. In SDM, 2014.
[7]
R. Cohen, K. Erez, D. B. Avraham, and S. Havlin. Breakdown of the Internet under Intentional Attack. Physical Review Letters, 86(16):3682--3685, 2001.
[8]
P. Crucitti, V. Latora, M. Marchiori, and A. Rapisarda. Error and attack tolerance of complex networks. Physica A: Stat. Mech. and its Appl., (1--3):388--394, 2004.
[9]
E. Estrada. Network robustness to targeted attacks. the interplay of expansibility and degree distribution. Phys. J. B - Complex Systems, 52(4):563--574, 2006.
[10]
E. Estrada, N. Hatano, and M. Benzi. The physics of communicability in complex networks. Physics Reports, 514(3):89--119, 2012.
[11]
K. Faust. Centrality in affiliation networks. Social Networks, 19(2):157--191, 1997.
[12]
A. Fronczak, J. A. Hołyst, M. Jedynak, and J. Sienkiewicz. Higher order clustering coefficients in Barabási--Albert networks. Physica A: Statistical Mechanics and its Applications, 316(1):688--694, 2002.
[13]
P. Hage and F. Harary. Eccentricity and centrality in networks. Social networks, 17(1):57--63, 1995.
[14]
K. Henderson, B. Gallagher, L. Li, L. Akoglu, T. Eliassi-Rad, H. Tong, and C. Faloutsos. It's who you know: Graph mining using recursive structural features. In KDD, 2011.
[15]
P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han. Attack vulnerability of complex networks. Phy. Rev. E, 65(5), 2002.
[16]
U. Kang, M. McGlohon, L. Akoglu, and C. Faloutsos. Patterns on the connected components of terabyte-scale graphs. In ICDM, pages 875--880. IEEE Computer Society, 2010.
[17]
L. Katz. A new status index derived from sociometric analysis. Psychometrika, 18(1):39--43, 1953.
[18]
J. G. Kemeny. Mathematics without numbers. Daedalus, 88(4):577--591, 1959.
[19]
M. G. Kendall. A new measure of rank correlation. Biometrika, pages 81--93, 1938.
[20]
G. N. Lance and W. T. Williams. A general theory of classificatory sorting strategies ii. clustering systems. The computer journal, 10(3):271--277, 1967.
[21]
J. Leskovec, J. Kleinberg, and C. Faloutsos. Graphs over time: Densification laws, shrinking diameters and possible explanations. In KDD, 2005.
[22]
J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney. Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Int. Math., 6(1):29--123, 2009.
[23]
R.-H. Li, J. X. Yu, X. Huang, H. Cheng, and Z. Shang. Measuring robustness of complex networks under mvc attack. In CIKM, 2012.
[24]
V. H. Louzada, F. Daolio, H. J. Herrmann, and M. Tomassini. Smart rewiring for network robustness. Journal of Complex Networks, 1(2):150--159, 2013.
[25]
M. McGlohon, L. Akoglu, and C. Faloutsos. Weighted graphs and disconnected components: patterns and a generator. In KDD, pages 524--532. ACM, 2008.
[26]
T. Opsahl, F. Agneessens, and J. Skvoretz. Node centrality in weighted networks: Generalizing degree and shortest paths. Social Net., 32(3):245--251, 2010.
[27]
L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. Stanford InfoLab, 1999.
[28]
R. B. Rothenberg, J. J. Potterat, D. E. Woodhouse, W. W. Darrow, S. Q. Muth, and A. S. Klovdahl. Choosing a centrality measure: Epidemiologic correlates in the Colorado Springs study of social networks. Social Networks, 17(3--4):273--297, 1995.
[29]
S. Soundarajan, T. Eliassi-Rad, and B. Gallagher. A guide to selecting a network similarity method. In SDM, 2014.
[30]
A. Sydney, C. M. Scoglio, and D. Gruenbacher. Optimizing algebraic connectivity by edge rewiring. Applied Mathematics and Computation, 219(10):5465--5479, 2013.
[31]
H. Tong, B. A. Prakash, T. Eliassi-Rad, M. Faloutsos, and C. Faloutsos. Gelling, and melting, large graphs by edge manipulation. In CIKM, pages 245--254, 2012.
[32]
H. Tong, B. A. Prakash, C. E. Tsourakakis, T. Eliassi-Rad, C. Faloutsos, and D. H. Chau. On the vulnerability of large graphs. In ICDM, 2010.
[33]
T. W. Valente, K. Coronges, C. Lakon, and E. Costenbader. How Correlated Are Network Centrality Measures? Connections (Toronto, Ont.), 28(1):16--26, Jan. 2008.
[34]
P. Van Mieghem, D. Stevanović, F. Kuipers, C. Li, R. Van De Bovenkamp, D. Liu, and H. Wang. Decreasing the spectral radius of a graph by link removals. Phy. Rev. E, 2011.
[35]
V. Vapnik. Statistical Learning Theory. Wiley NY, 1998.
[36]
S. Vigna. A weighted correlation index for rankings with ties. CoRR, abs/1404.3325, 2014.
[37]
H. Wang and P. Van Mieghem. Algebraic connectivity optimization via link addition. In Bionetics, 2008.
[38]
D. J. Watts and S. H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393(6684):440--442, 1998.
[39]
J. Wu, H. Z. Deng, Y. J. Tan, and D. Z. Zhu. Vulnerability of complex networks under intentional attack with incomplete information. Journal of Physics A, 40(11), 2007.

Cited By

View all
  • (2022)Graph Vulnerability and Robustness: A SurveyIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2022.3163672(1-1)Online publication date: 2022
  • (2022)On the Robustness of Diffusion in a Network Under Node AttacksIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2021.307108134:12(5884-5895)Online publication date: 1-Dec-2022
  • (2022)Cyber Network Resilience Against Self-Propagating Malware AttacksComputer Security – ESORICS 202210.1007/978-3-031-17140-6_26(531-550)Online publication date: 25-Sep-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
WWW '15 Companion: Proceedings of the 24th International Conference on World Wide Web
May 2015
1602 pages
ISBN:9781450334730
DOI:10.1145/2740908

Sponsors

  • IW3C2: International World Wide Web Conference Committee

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 May 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. centrality
  2. correlation analysis
  3. graph mining
  4. node importance measures

Qualifiers

  • Research-article

Funding Sources

  • Army Research Office
  • National Science Foundation

Conference

WWW '15
Sponsor:
  • IW3C2

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)1
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Graph Vulnerability and Robustness: A SurveyIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2022.3163672(1-1)Online publication date: 2022
  • (2022)On the Robustness of Diffusion in a Network Under Node AttacksIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2021.307108134:12(5884-5895)Online publication date: 1-Dec-2022
  • (2022)Cyber Network Resilience Against Self-Propagating Malware AttacksComputer Security – ESORICS 202210.1007/978-3-031-17140-6_26(531-550)Online publication date: 25-Sep-2022
  • (2020)On the Robustness of Cascade Diffusion under Node AttacksProceedings of The Web Conference 202010.1145/3366423.3380028(2711-2717)Online publication date: 20-Apr-2020
  • (2018)Link Prediction on Directed Networks Based on AUC OptimizationIEEE Access10.1109/ACCESS.2018.28382596(28122-28136)Online publication date: 2018
  • (2016)An Analysis of Centrality Measures for Complex and Social Networks2016 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOCOM.2016.7841580(1-6)Online publication date: Dec-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media