Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2023 Oct 24;13(1):18208.
doi: 10.1038/s41598-023-45218-9.

Examining indicators of complex network vulnerability across diverse attack scenarios

Affiliations

Examining indicators of complex network vulnerability across diverse attack scenarios

Ahmad F Al Musawi et al. Sci Rep. .

Abstract

Complex networks capture the structure, dynamics, and relationships among entities in real-world networked systems, encompassing domains like communications, society, chemistry, biology, ecology, politics, etc. Analysis of complex networks lends insight into the critical nodes, key pathways, and potential points of failure that may impact the connectivity and operational integrity of the underlying system. In this work, we investigate the topological properties or indicators, such as shortest path length, modularity, efficiency, graph density, diameter, assortativity, and clustering coefficient, that determine the vulnerability to (or robustness against) diverse attack scenarios. Specifically, we examine how node- and link-based network growth or depletion based on specific attack criteria affect their robustness gauged in terms of the largest connected component (LCC) size and diameter. We employ partial least squares discriminant analysis to quantify the individual contribution of the indicators on LCC preservation while accounting for the collinearity stemming from the possible correlation between indicators. Our analysis of 14 complex network datasets and 5 attack models invariably reveals high modularity and disassortativity to be prime indicators of vulnerability, corroborating prior works that report disassortative modular networks to be particularly susceptible to targeted attacks. We conclude with a discussion as well as an illustrative example of the application of this work in fending off strategic attacks on critical infrastructures through models that adaptively and distributively achieve network robustness.

PubMed Disclaimer

Conflict of interest statement

The authors declare no competing interests.

Figures

Figure 1
Figure 1
A schematic representation of the approach adopted in this study, where the goal is to pinpoint the topological properties or indicators that explain the robustness or vulnerability of complex networks to diverse network attack models.
Figure 2
Figure 2
Partial least squares discriminant analysis (DA) coefficients calculated from the features consisting of all network indicators and labels gauging the number of link removals to make the largest connected component half its original size.
Figure 3
Figure 3
Measuring the percolation of the network using different growing models. Edges are weighted and added based on RND, PA, BPA, CPA, CcPA, and iPA models.
Figure 4
Figure 4
Node and edge robustness (Rn,Re) of two sample networks (facebook 0 and arenas-email). Each network is attacked by removing (10%, 20%, 30%, 40%, and 50%) of the nodes, using high (1- degree, 2- betweenness, 3- closeness, and 4- clustering coefficient) values.
Figure 5
Figure 5
Example of network attack and reconstruction on a complete 30-node network: assortativity-based reconstruction after (a) link removal to make the number of largest connected component (LCC) exceed 1 (b) link removal to make the size of LCC half with respect to original networks; combined reconstruction based on assortativity and modularity (c) link removal to make the number of LCC exceed 1 and (d) link removal to make the size of LCC half with respect to original networks.

References

    1. Boccaletti S, Latora V, Moreno Y, Chavez M, Hwang D-U. Complex networks: Structure and dynamics. Phys. Rep. 2006;424:175–308.
    1. Albert R, Barabási A-L. Statistical mechanics of complex networks. Rev. Modern Phys. 2002;74:47.
    1. Zio E, Sansavini G. Vulnerability of smart grids with variable generation and consumption: A system of systems perspective. IEEE Trans. Syst. Man Cybern. Syst. 2013;43:477–487.
    1. Nalluri J, Barh D, Azevedo V, Ghosh P. mirsig: a consensus-based network inference methodology to identify pan-cancer mirna-mirna interaction signatures. Sci. Rep. 2017;7:1–14. - PMC - PubMed
    1. Albert R, Jeong H, Barabási A-L. Error and attack tolerance of complex networks. Nature. 2000;406:378–382. - PubMed