skip to main content
research-article

Measuring the Network Vulnerability Based on Markov Criticality

Published: 21 July 2021 Publication History

Abstract

Vulnerability assessment—a critical issue for networks—attempts to foresee unexpected destructive events or hostile attacks in the whole system. In this article, we consider a new Markov global connectivity metric—Kemeny constant, and take its derivative called Markov criticality to identify critical links. Markov criticality allows us to find links that are most influential on the derivative of Kemeny constant. Thus, we can utilize it to identity a critical link (i, j) from node i to node j, such that removing it leads to a minimization of networks’ global connectivity, i.e., the Kemeny constant. Furthermore, we also define a novel vulnerability index to measure the average speed by which we can disconnect a specified ratio of links with network decomposition. Our method is of high efficiency, which can be easily employed to calculate the Markov criticality in real-life networks. Comprehensive experiments on several synthetic and real-life networks have demonstrated our method’s better performance by comparing it with state-of-the-art baseline approaches.

References

[1]
M. E. Newman. 2003. The structure and function of complex networks. SIAM Review 45, 2 (2003), 167–256.
[2]
L. Lü, T. Zhou, Q. M. Zhang, and H. E. Stanley. 2016. The h-index of a network node and its relation to degree and coreness. Nature Communications 7, 1 (2016), 10168.
[3]
Z. Bu, H. J. Li, Z. Wang, G. Gao, and J. Cao. 2019. Dynamic cluster formation game for attributed graph clustering. IEEE Transactions on Cybernetics 49, 1 (2019), 328–341.
[4]
C. Liu, K. Li, J. Liang, and K. Li. 2019. Service reliability in an HC: Considering from the perspective of scheduling with load-dependent machine reliability. IEEE Transactions on Reliability 68, 2 (2019), 476–495.
[5]
S. Sun, X. Liu, L. Wang, and C. Xia. 2020. New link attack strategies of complex networks based on k-core decomposition. IEEE Transactions on Circuits and Systems II: Express Briefs 67, 12 (2020), 3157–3161.
[6]
Z. Wang, C. Xia, Z. Chen, and G. Chen. 2021. Epidemic propagation with positive and negative preventive information in multiplex networks. IEEE Transactions on Cybernetics 51, 3 (2021), 454–1462.
[7]
J. Wang, C. Li, and C. Xia. 2018. Improved centrality indicators to characterize the nodal spreading capability in complex networks. Applied Mathematics and Computation 334, 10 (2018), 388–400.
[8]
C. Huang, J. Lu, G. Zhai, J. Cao, G. Lu, and M. Perc. 2021. Stability and stabilization in probability of probabilistic Boolean networks. IEEETransactions on Neural Networks and Learning Systems 32, 1 (2021), 241–251.
[9]
M. Gosak, R. Markovic, J. Dolensek, M. S. Rupnik, M. Marhl, A. Stozer, and M. Perc. 2018. Network science of biological systems at different scales: A. review. Physics of Life Reviews 24, 11 (2018), 118–135.
[10]
H. J. Li, L. Wang, Y. Zhang, and M. Perc. 2020. Optimization of identifiability for efficient community detection. New Journal of Physics 22, 6 (2020), 063035.
[11]
Y. Shen, N. P. Nguyen, Y. Xuan, and M. T. Thai. 2012. On the discovery of critical links and nodes for assessing network vulnerability. IEEE/ACM Transactions on Networking 21, 3 (2012), 963–973.
[12]
R. Albert, H. Jeong, and A. Barabasi. 2000. Error and attack tolerance of complex networks. Nature 406, 6794 (2000), 378–382.
[13]
R. Albert, I. Albert, and G. L. Nakarado. 2004. Structural vulnerability of the north american power grid. Physical Review E 69, 2 (2004).
[14]
L. D. F. Luciano, F. Rodrigues, G. Travieso, and V. P. R. Boas. 2007. Characterization of complex networks: A survey of measurements. Advances in Physics 56, 1 (2007), 167–242.
[15]
T. C. Matisziw and A. T. Murray. 2009. Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure. Computers and Operations Research, Part Special Issue: Operations Research Approaches for Disaster Recovery Planning 36, 1 (2009), 16–26.
[16]
T. Dinh, Y. Xuan, M. Thai, P. Pardalos, and T. Znati. 2012. On new approaches of assessing network vulnerability: Hardness and approximation. IEEE/ACM Transactions on Networking 20, 2 (2012), 609–619.
[17]
J. Berkhout and B. F. Heidergott. 2019. Analysis of Markov influence graphs. Operations Research 67, 3 (2019), 892–904.
[18]
J. G. Kemeny and J. L. Snell. 1976. Finite Markov chains: With a new appendix. Generalization of a Fundamental Matrix. Springer, New York.
[19]
S. P. Borgatti and M. G. Everett. 2006. A graph-theoretic perspective on centrality. Social Networks 28, 4 (2006), 466–484.
[20]
F. Sun and M. A. Shayman. 2007. On pairwise connectivity of wireless multi-hop networks. International Journal of Security and Networks 2, 1/2 (2007), 37–49.
[21]
A. Arulselvan, C. W. Commander, L. Elefteriadou, and P. M. Pardalos. 2009. Detecting critical nodes in sparse graphs. Computers and Operations Research 36, 7 (2009), 2193–2200.
[22]
M. D. Summa, A. Grosso, and M. Locatelli. 2011. Complexity of the critical node problem over trees. Computers and Operations Research 38, 12 (2011), 1766–1774.
[23]
C. D. Meyer. 1989. Stochastic complementation, uncoupling Markov chains, and the theory of nearly reducible systems. SIAM Review 31, 2 (1989), 240–272.
[24]
M. Rosvall and C. T. Bergstrom. 2008. Maps of random walks on complex networks reveal community structure. In Proceedings of the National Academy of Sciences. 105, 4 (2008), 1118–1123.
[25]
S. Kirkland. 2010. Fastest expected time to mixing for a Markov chain on a directed graph. Linear Algebra and Its Applications 433, 11–12 (2010), 1988–1996.
[26]
R. Albert and A.-L. Barabasi. 2002. Statistical mechanics of complex networks. Reviews of Modern Physics 74, 1 (2002), 47.
[27]
R. Albert, H. Jeong, and A.-L. Barabasi. 1999. Diameter of the world wide web. Nature 401, 9 (1999), 130–131.
[28]
D. J. Watts and S. H. Strogatz. 1998. Collective dynamics of ‘small-world’ networks. Nature 393, 6684 (1998), 440.
[29]
A.-L. Barabasi and R. Albert. 1999. Emergence of scaling in random networks. Science 286, 5439 (1999), 509–512.
[30]
L. Hamerset al.1989. Similarity measures in scientometric research: The jaccard index versus salton’s cosine formula. Information Processing and Management 25, 3 (1989), 315–318.
[31]
X. Q. Cheng, F.-X. Ren, H.-W. Shen, Z.-K. Zhang, and T. Zhou. 2010. Bridgeness: A local index on edge significance in maintaining global connectivity. Journal of Statistical Mechanics: Theory and Experiment 2010, 10 (2010), P10011.
[32]
M. Girvan and M. E. Newman. 2002. Community structure in social and biological networks. In Proceedings of the National Academy of Sciences. (2002), 7821–7826.
[33]
K. Saito, M. Kimura, K. Ohara, and H. Motoda. 2016. Detecting critical links in complex network to maintain information flow/reachability. In Proceeding of the Pacific Rim International Conference on Artificial Intelligence. Springer, 419–432.
[34]
Chicago network dataset—KONECT, October, 2016.
[35]
S. Dereichet al.2013. Random networks with sublinear preferential attachment: The giant component. The Annals of Probability 41, 1 (2013), 329–384.

Cited By

View all
  • (2025)Dual Event-Triggered Synchronization of Two-Time-Scale Jumping Neural Networks and Its Application in Image Encryption and DecryptionIEEE Transactions on Network Science and Engineering10.1109/TNSE.2024.352142912:2(943-954)Online publication date: Mar-2025
  • (2024)Co-occurrence Order-preserving Pattern Mining with Keypoint Alignment for Time SeriesACM Transactions on Management Information Systems10.1145/365845015:2(1-27)Online publication date: 12-Jun-2024
  • (2024)Position Matters: Play a Sequential Game to Detect Significant CommunitiesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.332356736:7(3402-3416)Online publication date: Jul-2024
  • Show More Cited By

Index Terms

  1. Measuring the Network Vulnerability Based on Markov Criticality

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Knowledge Discovery from Data
    ACM Transactions on Knowledge Discovery from Data  Volume 16, Issue 2
    April 2022
    514 pages
    ISSN:1556-4681
    EISSN:1556-472X
    DOI:10.1145/3476120
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 July 2021
    Accepted: 01 May 2021
    Revised: 01 April 2021
    Received: 01 January 2021
    Published in TKDD Volume 16, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Complex networks
    2. vulnerability assessment
    3. Markov chain
    4. Kemeny constant
    5. edge centrality

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • Fundamental Research Funds for the Central Universities of China
    • National Natural Science Foundation of China
    • Beijing Natural Science Foundation
    • Beijing Natural Science Foundation

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)70
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Dual Event-Triggered Synchronization of Two-Time-Scale Jumping Neural Networks and Its Application in Image Encryption and DecryptionIEEE Transactions on Network Science and Engineering10.1109/TNSE.2024.352142912:2(943-954)Online publication date: Mar-2025
    • (2024)Co-occurrence Order-preserving Pattern Mining with Keypoint Alignment for Time SeriesACM Transactions on Management Information Systems10.1145/365845015:2(1-27)Online publication date: 12-Jun-2024
    • (2024)Position Matters: Play a Sequential Game to Detect Significant CommunitiesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.332356736:7(3402-3416)Online publication date: Jul-2024
    • (2024)Concept Stability Entropy: A Novel Group Cohesion Measure in Social NetworksIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2023.331533512:3(715-726)Online publication date: Jul-2024
    • (2024)Evolution of Credit Scores of Enterprises in a Social Network: A Perspective Based on Opinion DynamicsIEEE Transactions on Computational Social Systems10.1109/TCSS.2023.332455811:3(3637-3651)Online publication date: Jun-2024
    • (2024)SCOREH+: A High-Order Node Proximity Spectral Clustering on Ratios-of-Eigenvectors Algorithm for Community DetectionIEEE Transactions on Big Data10.1109/TBDATA.2023.334671510:3(301-312)Online publication date: Jun-2024
    • (2023)The core of board networks and firm valueFrontiers in Physics10.3389/fphy.2023.109987011Online publication date: 3-Feb-2023
    • (2023)Analysis of network information security issues under the background of big dataApplied Mathematics and Nonlinear Sciences10.2478/amns.2023.1.000048:1(2835-2848)Online publication date: 10-Mar-2023
    • (2023)Adaptive Graph Convolution Methods for Attributed Graph ClusteringIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.327872135:12(12384-12399)Online publication date: 22-May-2023
    • (2023)Geometric Affinity Propagation for Clustering With Network KnowledgeIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.323763035:11(11419-11436)Online publication date: 17-Jan-2023
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media