Cargando…

Examining indicators of complex network vulnerability across diverse attack scenarios

Complex networks capture the structure, dynamics, and relationships among entities in real-world networked systems, encompassing domains like communications, society, chemistry, biology, ecology, politics, etc. Analysis of complex networks lends insight into the critical nodes, key pathways, and pot...

Descripción completa

Detalles Bibliográficos
Autores principales: Al Musawi, Ahmad F., Roy, Satyaki, Ghosh, Preetam
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10598276/
https://www.ncbi.nlm.nih.gov/pubmed/37875564
http://dx.doi.org/10.1038/s41598-023-45218-9
_version_ 1785125519701835776
author Al Musawi, Ahmad F.
Roy, Satyaki
Ghosh, Preetam
author_facet Al Musawi, Ahmad F.
Roy, Satyaki
Ghosh, Preetam
author_sort Al Musawi, Ahmad F.
collection PubMed
description Complex networks capture the structure, dynamics, and relationships among entities in real-world networked systems, encompassing domains like communications, society, chemistry, biology, ecology, politics, etc. Analysis of complex networks lends insight into the critical nodes, key pathways, and potential points of failure that may impact the connectivity and operational integrity of the underlying system. In this work, we investigate the topological properties or indicators, such as shortest path length, modularity, efficiency, graph density, diameter, assortativity, and clustering coefficient, that determine the vulnerability to (or robustness against) diverse attack scenarios. Specifically, we examine how node- and link-based network growth or depletion based on specific attack criteria affect their robustness gauged in terms of the largest connected component (LCC) size and diameter. We employ partial least squares discriminant analysis to quantify the individual contribution of the indicators on LCC preservation while accounting for the collinearity stemming from the possible correlation between indicators. Our analysis of 14 complex network datasets and 5 attack models invariably reveals high modularity and disassortativity to be prime indicators of vulnerability, corroborating prior works that report disassortative modular networks to be particularly susceptible to targeted attacks. We conclude with a discussion as well as an illustrative example of the application of this work in fending off strategic attacks on critical infrastructures through models that adaptively and distributively achieve network robustness.
format Online
Article
Text
id pubmed-10598276
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-105982762023-10-26 Examining indicators of complex network vulnerability across diverse attack scenarios Al Musawi, Ahmad F. Roy, Satyaki Ghosh, Preetam Sci Rep Article Complex networks capture the structure, dynamics, and relationships among entities in real-world networked systems, encompassing domains like communications, society, chemistry, biology, ecology, politics, etc. Analysis of complex networks lends insight into the critical nodes, key pathways, and potential points of failure that may impact the connectivity and operational integrity of the underlying system. In this work, we investigate the topological properties or indicators, such as shortest path length, modularity, efficiency, graph density, diameter, assortativity, and clustering coefficient, that determine the vulnerability to (or robustness against) diverse attack scenarios. Specifically, we examine how node- and link-based network growth or depletion based on specific attack criteria affect their robustness gauged in terms of the largest connected component (LCC) size and diameter. We employ partial least squares discriminant analysis to quantify the individual contribution of the indicators on LCC preservation while accounting for the collinearity stemming from the possible correlation between indicators. Our analysis of 14 complex network datasets and 5 attack models invariably reveals high modularity and disassortativity to be prime indicators of vulnerability, corroborating prior works that report disassortative modular networks to be particularly susceptible to targeted attacks. We conclude with a discussion as well as an illustrative example of the application of this work in fending off strategic attacks on critical infrastructures through models that adaptively and distributively achieve network robustness. Nature Publishing Group UK 2023-10-24 /pmc/articles/PMC10598276/ /pubmed/37875564 http://dx.doi.org/10.1038/s41598-023-45218-9 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Al Musawi, Ahmad F.
Roy, Satyaki
Ghosh, Preetam
Examining indicators of complex network vulnerability across diverse attack scenarios
title Examining indicators of complex network vulnerability across diverse attack scenarios
title_full Examining indicators of complex network vulnerability across diverse attack scenarios
title_fullStr Examining indicators of complex network vulnerability across diverse attack scenarios
title_full_unstemmed Examining indicators of complex network vulnerability across diverse attack scenarios
title_short Examining indicators of complex network vulnerability across diverse attack scenarios
title_sort examining indicators of complex network vulnerability across diverse attack scenarios
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10598276/
https://www.ncbi.nlm.nih.gov/pubmed/37875564
http://dx.doi.org/10.1038/s41598-023-45218-9
work_keys_str_mv AT almusawiahmadf examiningindicatorsofcomplexnetworkvulnerabilityacrossdiverseattackscenarios
AT roysatyaki examiningindicatorsofcomplexnetworkvulnerabilityacrossdiverseattackscenarios
AT ghoshpreetam examiningindicatorsofcomplexnetworkvulnerabilityacrossdiverseattackscenarios