Cargando…

Maximizing Network Resilience against Malicious Attacks

The threat of a malicious attack is one of the major security problems in complex networks. Resilience is the system-level self-adjusting ability of a complex network to retain its basic functionality and recover rapidly from major disruptions. Despite numerous heuristic enhancement methods, there i...

Descripción completa

Detalles Bibliográficos
Autores principales: Li, Wenguo, Li, Yong, Tan, Yi, Cao, Yijia, Chen, Chun, Cai, Ye, Lee, Kwang Y., Pecht, Michael
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6381220/
https://www.ncbi.nlm.nih.gov/pubmed/30783193
http://dx.doi.org/10.1038/s41598-019-38781-7
_version_ 1783396467806830592
author Li, Wenguo
Li, Yong
Tan, Yi
Cao, Yijia
Chen, Chun
Cai, Ye
Lee, Kwang Y.
Pecht, Michael
author_facet Li, Wenguo
Li, Yong
Tan, Yi
Cao, Yijia
Chen, Chun
Cai, Ye
Lee, Kwang Y.
Pecht, Michael
author_sort Li, Wenguo
collection PubMed
description The threat of a malicious attack is one of the major security problems in complex networks. Resilience is the system-level self-adjusting ability of a complex network to retain its basic functionality and recover rapidly from major disruptions. Despite numerous heuristic enhancement methods, there is a research gap in maximizing network resilience: current heuristic methods are designed to immunize vital nodes or modify a network to a specific onion-like structure and cannot maximize resilience theoretically via network structure. Here we map complex networks onto a physical elastic system to introduce indices of network resilience, and propose a unified theoretical framework and general approach, which can address the optimal problem of network resilience by slightly modifying network structures (i.e., by adding a set of structural edges). We demonstrate the high efficiency of this approach on three realistic networks as well as two artificial random networks. Case studies show that the proposed approach can maximize the resilience of complex networks while maintaining their topological functionality. This approach helps to unveil hitherto hidden functions of some inconspicuous components, which in turn, can be used to guide the design of resilient systems, offer an effective and efficient approach for mitigating malicious attacks, and furnish self-healing to reconstruct failed infrastructure systems.
format Online
Article
Text
id pubmed-6381220
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-63812202019-02-22 Maximizing Network Resilience against Malicious Attacks Li, Wenguo Li, Yong Tan, Yi Cao, Yijia Chen, Chun Cai, Ye Lee, Kwang Y. Pecht, Michael Sci Rep Article The threat of a malicious attack is one of the major security problems in complex networks. Resilience is the system-level self-adjusting ability of a complex network to retain its basic functionality and recover rapidly from major disruptions. Despite numerous heuristic enhancement methods, there is a research gap in maximizing network resilience: current heuristic methods are designed to immunize vital nodes or modify a network to a specific onion-like structure and cannot maximize resilience theoretically via network structure. Here we map complex networks onto a physical elastic system to introduce indices of network resilience, and propose a unified theoretical framework and general approach, which can address the optimal problem of network resilience by slightly modifying network structures (i.e., by adding a set of structural edges). We demonstrate the high efficiency of this approach on three realistic networks as well as two artificial random networks. Case studies show that the proposed approach can maximize the resilience of complex networks while maintaining their topological functionality. This approach helps to unveil hitherto hidden functions of some inconspicuous components, which in turn, can be used to guide the design of resilient systems, offer an effective and efficient approach for mitigating malicious attacks, and furnish self-healing to reconstruct failed infrastructure systems. Nature Publishing Group UK 2019-02-19 /pmc/articles/PMC6381220/ /pubmed/30783193 http://dx.doi.org/10.1038/s41598-019-38781-7 Text en © The Author(s) 2019 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
spellingShingle Article
Li, Wenguo
Li, Yong
Tan, Yi
Cao, Yijia
Chen, Chun
Cai, Ye
Lee, Kwang Y.
Pecht, Michael
Maximizing Network Resilience against Malicious Attacks
title Maximizing Network Resilience against Malicious Attacks
title_full Maximizing Network Resilience against Malicious Attacks
title_fullStr Maximizing Network Resilience against Malicious Attacks
title_full_unstemmed Maximizing Network Resilience against Malicious Attacks
title_short Maximizing Network Resilience against Malicious Attacks
title_sort maximizing network resilience against malicious attacks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6381220/
https://www.ncbi.nlm.nih.gov/pubmed/30783193
http://dx.doi.org/10.1038/s41598-019-38781-7
work_keys_str_mv AT liwenguo maximizingnetworkresilienceagainstmaliciousattacks
AT liyong maximizingnetworkresilienceagainstmaliciousattacks
AT tanyi maximizingnetworkresilienceagainstmaliciousattacks
AT caoyijia maximizingnetworkresilienceagainstmaliciousattacks
AT chenchun maximizingnetworkresilienceagainstmaliciousattacks
AT caiye maximizingnetworkresilienceagainstmaliciousattacks
AT leekwangy maximizingnetworkresilienceagainstmaliciousattacks
AT pechtmichael maximizingnetworkresilienceagainstmaliciousattacks