Cargando…
Examining indicators of complex network vulnerability across diverse attack scenarios
Complex networks capture the structure, dynamics, and relationships among entities in real-world networked systems, encompassing domains like communications, society, chemistry, biology, ecology, politics, etc. Analysis of complex networks lends insight into the critical nodes, key pathways, and pot...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10598276/ https://www.ncbi.nlm.nih.gov/pubmed/37875564 http://dx.doi.org/10.1038/s41598-023-45218-9 |
_version_ | 1785125519701835776 |
---|---|
author | Al Musawi, Ahmad F. Roy, Satyaki Ghosh, Preetam |
author_facet | Al Musawi, Ahmad F. Roy, Satyaki Ghosh, Preetam |
author_sort | Al Musawi, Ahmad F. |
collection | PubMed |
description | Complex networks capture the structure, dynamics, and relationships among entities in real-world networked systems, encompassing domains like communications, society, chemistry, biology, ecology, politics, etc. Analysis of complex networks lends insight into the critical nodes, key pathways, and potential points of failure that may impact the connectivity and operational integrity of the underlying system. In this work, we investigate the topological properties or indicators, such as shortest path length, modularity, efficiency, graph density, diameter, assortativity, and clustering coefficient, that determine the vulnerability to (or robustness against) diverse attack scenarios. Specifically, we examine how node- and link-based network growth or depletion based on specific attack criteria affect their robustness gauged in terms of the largest connected component (LCC) size and diameter. We employ partial least squares discriminant analysis to quantify the individual contribution of the indicators on LCC preservation while accounting for the collinearity stemming from the possible correlation between indicators. Our analysis of 14 complex network datasets and 5 attack models invariably reveals high modularity and disassortativity to be prime indicators of vulnerability, corroborating prior works that report disassortative modular networks to be particularly susceptible to targeted attacks. We conclude with a discussion as well as an illustrative example of the application of this work in fending off strategic attacks on critical infrastructures through models that adaptively and distributively achieve network robustness. |
format | Online Article Text |
id | pubmed-10598276 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-105982762023-10-26 Examining indicators of complex network vulnerability across diverse attack scenarios Al Musawi, Ahmad F. Roy, Satyaki Ghosh, Preetam Sci Rep Article Complex networks capture the structure, dynamics, and relationships among entities in real-world networked systems, encompassing domains like communications, society, chemistry, biology, ecology, politics, etc. Analysis of complex networks lends insight into the critical nodes, key pathways, and potential points of failure that may impact the connectivity and operational integrity of the underlying system. In this work, we investigate the topological properties or indicators, such as shortest path length, modularity, efficiency, graph density, diameter, assortativity, and clustering coefficient, that determine the vulnerability to (or robustness against) diverse attack scenarios. Specifically, we examine how node- and link-based network growth or depletion based on specific attack criteria affect their robustness gauged in terms of the largest connected component (LCC) size and diameter. We employ partial least squares discriminant analysis to quantify the individual contribution of the indicators on LCC preservation while accounting for the collinearity stemming from the possible correlation between indicators. Our analysis of 14 complex network datasets and 5 attack models invariably reveals high modularity and disassortativity to be prime indicators of vulnerability, corroborating prior works that report disassortative modular networks to be particularly susceptible to targeted attacks. We conclude with a discussion as well as an illustrative example of the application of this work in fending off strategic attacks on critical infrastructures through models that adaptively and distributively achieve network robustness. Nature Publishing Group UK 2023-10-24 /pmc/articles/PMC10598276/ /pubmed/37875564 http://dx.doi.org/10.1038/s41598-023-45218-9 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Al Musawi, Ahmad F. Roy, Satyaki Ghosh, Preetam Examining indicators of complex network vulnerability across diverse attack scenarios |
title | Examining indicators of complex network vulnerability across diverse attack scenarios |
title_full | Examining indicators of complex network vulnerability across diverse attack scenarios |
title_fullStr | Examining indicators of complex network vulnerability across diverse attack scenarios |
title_full_unstemmed | Examining indicators of complex network vulnerability across diverse attack scenarios |
title_short | Examining indicators of complex network vulnerability across diverse attack scenarios |
title_sort | examining indicators of complex network vulnerability across diverse attack scenarios |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10598276/ https://www.ncbi.nlm.nih.gov/pubmed/37875564 http://dx.doi.org/10.1038/s41598-023-45218-9 |
work_keys_str_mv | AT almusawiahmadf examiningindicatorsofcomplexnetworkvulnerabilityacrossdiverseattackscenarios AT roysatyaki examiningindicatorsofcomplexnetworkvulnerabilityacrossdiverseattackscenarios AT ghoshpreetam examiningindicatorsofcomplexnetworkvulnerabilityacrossdiverseattackscenarios |