skip to main content
10.1145/3583133.3590538acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
poster

A Simple and Efficient Heuristic for Reducing Vulnerability of Complex Networks to Malicious Link Attacks

Published:24 July 2023Publication History

ABSTRACT

We investigate targeted attacks to important links in scale-free networks and propose simple and efficient heuristics strategies to mitigate the damage. In order to reduce the computational burden, we focus on heuristics that make use of local information for the most part. Using model scale-free networks and under the constraint of an invariant degree distribution, we show by numerical simulation that our approach allows to enhance the network robustness notably, as measured by the integrity of the largest connected component. We also show that the approach is effective on a couple of larger real-world networks.

References

  1. R. Albert, H. Jeong, and A.-L. Barabási. 2000. Error and attack tolerance of complex networks. Nature 406 (2000), 378--382.Google ScholarGoogle Scholar
  2. A.-L. Barabási and R. Albert. 1999. Emergence of scaling in random networks. Science 286, 5439 (1999), 509--512.Google ScholarGoogle ScholarCross RefCross Ref
  3. A. Beygelzimer, G. Grinstein, R. Linsker, and I. Rish. 2005. Improving network robustness by edge modification. Physica A: Statistical Mechanics and its Applications 357, 3--4 (2005), 593--612.Google ScholarGoogle ScholarCross RefCross Ref
  4. H. Chan and L. Akoglu. 2016. Optimizing network robustness by edge rewiring: a general framework. Data Mining and Knowledge Discovery 30, 5 (2016), 1395--1425.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Y.-J. Deng, Y.-Q. Li, R.-R. Yin, H.-Y. Zhao, and B. Liu. 2020. Efficient measurement model for critical nodes based on edge clustering coefficients and edge betweenness. Wireless Networks 26, 4 (2020), 2785--2795.Google ScholarGoogle ScholarCross RefCross Ref
  6. P. Holme, B. J. Kin, C. N. Yoon, and S. K. Han. 2002. Attack vulnerability of complex networks. Phys. Rev. E 65 (2002), 056109.Google ScholarGoogle ScholarCross RefCross Ref
  7. J. Kunegis. 2013. KONECT - The Koblenz Network Collection. In Proc. Int. Conf. on World Wide Web Companion. 1343--1350. http://http://konect.cc/networks/Google ScholarGoogle Scholar
  8. V. Latora and M. Marchiori. 2001. Efficient behavior of small-world networks. Phys. Rev. Lett. 87 (2001), 198701.Google ScholarGoogle ScholarCross RefCross Ref
  9. J. Liu, M. Zhou, S. Wang, and P. Liu. 2017. A comparative study of network robustness measures. Frontiers of Computer Science 11, 4 (2017), 568--584.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. E. J. Newman. 2018. Networks: An Introduction. Oxford University Press, Oxford, UK. second edition.Google ScholarGoogle ScholarCross RefCross Ref
  11. C. Pizzuti, A. Socievole, and P. Van Mieghem. 2019. Comparative network robustness evaluation of link attacks. In International Conference on Complex Networks and Their Applications. Springer, 735--746.Google ScholarGoogle Scholar
  12. C. M. Schneider, A. A. Moreira, J. S. Andrade Jr, S. Havlin, and H. J. Herrmann. 2011. Mitigation of malicious attacks on networks. Proceedings of the National Academy of Sciences 108, 10 (2011), 3838--3841.Google ScholarGoogle ScholarCross RefCross Ref
  13. A. Zeng and W. Liu. 2012. Enhancing network robustness against malicious attacks. Physical Review E 85, 6 (2012), 066130.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    GECCO '23 Companion: Proceedings of the Companion Conference on Genetic and Evolutionary Computation
    July 2023
    2519 pages
    ISBN:9798400701207
    DOI:10.1145/3583133

    Copyright © 2023 Owner/Author(s)

    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s).

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 24 July 2023

    Check for updates

    Qualifiers

    • poster

    Acceptance Rates

    Overall Acceptance Rate1,669of4,410submissions,38%

    Upcoming Conference

    GECCO '24
    Genetic and Evolutionary Computation Conference
    July 14 - 18, 2024
    Melbourne , VIC , Australia
  • Article Metrics

    • Downloads (Last 12 months)23
    • Downloads (Last 6 weeks)2

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader