Network robustness versus multi-strategy sequential attack

被引:34
|
作者
Ventresca, Mario [1 ]
Aleman, Dionne [2 ]
机构
[1] Purdue Univ, Sch Ind Engn, 315 N Grant St, W Lafayette, IN 47907 USA
[2] Univ Toronto, Dept Mech & Ind Engn, Toronto, ON M5S G38, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
network robustness; sequential attack; multistrategy; centrality;
D O I
10.1093/comnet/cnu010
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
We examine the robustness of networks under attack when the attacker sequentially selects from a number of different attack strategies, each of which removes one node from the network. Network robustness refers to the ability of a network to maintain functionality under attack, and the problem-dependent context implies a number of robustness measures exist. Thus, we analyse four measures: (1) entropy, (2) efficiency, (3) size of largest network component, and suggest to also utilize (4) pairwise connectivity. Six network centrality measures form the set of strategies at the disposal of the attacker. Our study examines the utility of greedy strategy selection versus random strategy selection for each attack, whereas previous studies focused on greedy selection but limited to only one attack strategy. Using a set of common complex network benchmarks in addition to real-world networks, we find that randomly selecting an attack strategy often performs well when the attack strategies are of high quality. We also examine defense against the attacks by adding k edges after each node attack and find that the greedy strategy is most useful in this context. We also observed that a betweenness-based attack often outperforms both random and greedy strategy selection.
引用
收藏
页码:126 / 146
页数:21
相关论文
共 50 条
  • [1] A Multi-strategy Region Proposal Network
    Chen, Yu-Peng
    Li, Ying
    Wang, Gang
    Xu, Qian
    EXPERT SYSTEMS WITH APPLICATIONS, 2018, 113 : 1 - 17
  • [2] Multi-Strategy Learning for Recognizing Network Symptoms
    Sobh T.S.
    Recent Advances in Computer Science and Communications, 2022, 15 (02) : 240 - 255
  • [3] MULTI-STRATEGY BUILDINGS
    WEEKS, J
    EKISTICS, 1971, 31 (186): : 367 - 371
  • [4] Multi-strategy Differential Evolution
    Yaman, Anil
    Iacca, Giovanni
    Coler, Matt
    Fletcher, George
    Pechenizkiy, Mykola
    APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2018, 2018, 10784 : 617 - 633
  • [5] Robustness of Dengue Complex Network under Targeted versus Random Attack
    Malik, Hafiz Abid Mahmood
    Abid, Faiza
    Wahiddin, Mohamed Ridza
    Bhatti, Zeeshan
    COMPLEXITY, 2017,
  • [6] Multi-strategy mutual learning network for deformable medical image registration
    Zheng, Zhiyuan
    Cao, Wenming
    Duan, Ye
    Cao, Guitao
    Lian, Deliang
    NEUROCOMPUTING, 2022, 501 : 102 - 112
  • [7] DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm
    Li, Chunhui
    Wang, Xiaoying
    Zhang, Qingjie
    Liang, Jiaye
    Zhang, Aijing
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (01): : 645 - 674
  • [8] The CLARION® Multi-Strategy™ Cochlear Implant
    Kessler, DK
    ANNALS OF OTOLOGY RHINOLOGY AND LARYNGOLOGY, 1999, 108 (04): : 8 - 16
  • [9] On a multi-strategy approach in evolutionary computation
    Dubois, L
    Fukuda, T
    1996 IEEE INTERNATIONAL CONFERENCE ON EVOLUTIONARY COMPUTATION (ICEC '96), PROCEEDINGS OF, 1996, : 576 - 580
  • [10] Multi-Strategy to Improve Reading Comprehension
    Du, Yongping
    He, Ming
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 86 - 89