4.6 Article

Empirical determination of the optimal attack for fragmentation of modular networks

Journal

Publisher

ELSEVIER
DOI: 10.1016/j.physa.2020.125486

Keywords

-

Funding

  1. Coordenacao de Aperfeicoamento de Pessoal de Nivel Superior (CAPES) [1]
  2. Conselho Nacional de Desenvolvimento Cientifico e Tecnologico (CNPq)
  3. CAPES [003/2019 -PROPG -PRINT/UFRGS]

Ask authors/readers for more resources

This study conducts attack experiments on networks with different levels of modularity, showing an inverse relationship between network resilience and modularity. High modularity increases the risk of targeted attacks on the network, while under low modularity, various heuristic strategies perform similarly to random attacks.
We perform all possible removals of n nodes from networks of size N, then we identify and measure the largest connected component left in every case. The smallest of these components represents the maximum possible damage (on a network of N vertices), limited to the removal of n nodes, and the set that produces such damage is called the optimal set of size n. We apply the procedure in a series of networks with controlled and varied modularity. Then, we compare the resulting statistics with the effect of removing the same amount of vertices according to state of the art methods of network fragmentation, i.e., High Betweenness Adaptive attack, Collective Influence, and Module-Based Attack. For practical matters we performed mainly attacks of size n = 5 on networks of size N = 100, because the number of all possible sets (approximate to 10(8)) is at the verge of the computational capability of standard desktops. The results show, in general, that the resilience of networks to attacks has an inverse relationship with modularity, with Q(c) approximate to 0.73 being the critical value, from which the damage of the optimal attack increases rapidly. Networks are highly vulnerable to targeted attacks when the modularity is greater than the critical value of each heuristic method. On the other hand, for modularities lower than Q(c), all the heuristic strategies studied have a similar performance to a random attack. (C) 2020 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available