Network resilience of non-hub nodes failure under memory and non-memory based attacks with limited information
- 1 June 2022
- journal article
- research article
- Published by AIP Publishing in Chaos: An Interdisciplinary Journal of Nonlinear Science
- Vol. 32 (6), 063110
- https://doi.org/10.1063/5.0092284
Abstract
Previous studies on network robustness mainly concentrated on hub node failures with fully known network structure information. However, hub nodes are often well protected and not accessible to damage or malfunction in a real-world networked system. In addition, one can only gain insight into limited network connectivity knowledge due to large-scale properties and dynamic changes of the network itself. In particular, two different aggression patterns are present in a network attack: memory based attack, in which failed nodes are not attacked again, or non-memory based attack; that is, nodes can be repeatedly attacked. Inspired by these motivations, we propose an attack pattern with and without memory based on randomly choosing non-hub nodes with known connectivity information. We use a network system with the Poisson and power-law degree distribution to study the network robustness after applying two failure strategies of non-hub nodes. Additionally, the critical threshold and the size of the giant component are determined for a network configuration model with an arbitrary degree distribution. The results indicate that the system undergoes a continuous second-order phase transition subject to the above attack strategies. We find that gradually tends to be stable after increasing rapidly with . Moreover, the failure of non-hub nodes with a higher degree is more destructive to the network system and makes it more vulnerable. Furthermore, from comparing the attack strategies with and without memory, the results highlight that the system shows better robustness under a non-memory based attack relative to memory based attacks for . Attacks with memory can block the system’s connectivity more efficiently, which has potential applications in real-world systems. Our model sheds light on network resilience under memory and non-memory based attacks with limited information attacks and provides valuable insights into designing robust real-world systems.
Keywords
Funding Information
- National Natural Science Foundation of China (61973143, 71690242, 71974080, and 11731014)
- Fundação de Amparo à Ciência e Tecnologia do Estado de Pernambuco (APQ- 0565-1.05/14, APQ-0707-1.05/14, CAPES and CNPq)
- Jiangsu Postgraduate Research and Innovation in 2021 (KYCX21_3371)
- Young backbone teachers of Jiangsu Province
This publication has 31 references indexed in Scilit:
- Equal Opportunity for Low-Degree Network Nodes: A PageRank-Based Method for Protein Target Identification in Metabolic GraphsPLOS ONE, 2013
- Molecular ecological network analysesBMC Bioinformatics, 2012
- FINANCIAL CONTAGION ON THE INTERNATIONAL TRADE NETWORKEconomic Inquiry, 2010
- Ecological network analysis: network constructionEcological Modelling, 2007
- Vulnerability of complex networks under intentional attack with incomplete informationJournal of Physics A: Mathematical and Theoretical, 2007
- Using Graph Models to Analyze the Vulnerability of Electric Power NetworksRisk Analysis, 2006
- Cascade-based attacks on complex networksPhysical Review E, 2002
- Spread of epidemic disease on networksPhysical Review E, 2002
- Breakdown of the Internet under Intentional AttackPhysical Review Letters, 2001
- Error and attack tolerance of complex networksNature, 2000