Cargando…
Maximizing Network Resilience against Malicious Attacks
The threat of a malicious attack is one of the major security problems in complex networks. Resilience is the system-level self-adjusting ability of a complex network to retain its basic functionality and recover rapidly from major disruptions. Despite numerous heuristic enhancement methods, there i...
Autores principales: | , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6381220/ https://www.ncbi.nlm.nih.gov/pubmed/30783193 http://dx.doi.org/10.1038/s41598-019-38781-7 |
_version_ | 1783396467806830592 |
---|---|
author | Li, Wenguo Li, Yong Tan, Yi Cao, Yijia Chen, Chun Cai, Ye Lee, Kwang Y. Pecht, Michael |
author_facet | Li, Wenguo Li, Yong Tan, Yi Cao, Yijia Chen, Chun Cai, Ye Lee, Kwang Y. Pecht, Michael |
author_sort | Li, Wenguo |
collection | PubMed |
description | The threat of a malicious attack is one of the major security problems in complex networks. Resilience is the system-level self-adjusting ability of a complex network to retain its basic functionality and recover rapidly from major disruptions. Despite numerous heuristic enhancement methods, there is a research gap in maximizing network resilience: current heuristic methods are designed to immunize vital nodes or modify a network to a specific onion-like structure and cannot maximize resilience theoretically via network structure. Here we map complex networks onto a physical elastic system to introduce indices of network resilience, and propose a unified theoretical framework and general approach, which can address the optimal problem of network resilience by slightly modifying network structures (i.e., by adding a set of structural edges). We demonstrate the high efficiency of this approach on three realistic networks as well as two artificial random networks. Case studies show that the proposed approach can maximize the resilience of complex networks while maintaining their topological functionality. This approach helps to unveil hitherto hidden functions of some inconspicuous components, which in turn, can be used to guide the design of resilient systems, offer an effective and efficient approach for mitigating malicious attacks, and furnish self-healing to reconstruct failed infrastructure systems. |
format | Online Article Text |
id | pubmed-6381220 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-63812202019-02-22 Maximizing Network Resilience against Malicious Attacks Li, Wenguo Li, Yong Tan, Yi Cao, Yijia Chen, Chun Cai, Ye Lee, Kwang Y. Pecht, Michael Sci Rep Article The threat of a malicious attack is one of the major security problems in complex networks. Resilience is the system-level self-adjusting ability of a complex network to retain its basic functionality and recover rapidly from major disruptions. Despite numerous heuristic enhancement methods, there is a research gap in maximizing network resilience: current heuristic methods are designed to immunize vital nodes or modify a network to a specific onion-like structure and cannot maximize resilience theoretically via network structure. Here we map complex networks onto a physical elastic system to introduce indices of network resilience, and propose a unified theoretical framework and general approach, which can address the optimal problem of network resilience by slightly modifying network structures (i.e., by adding a set of structural edges). We demonstrate the high efficiency of this approach on three realistic networks as well as two artificial random networks. Case studies show that the proposed approach can maximize the resilience of complex networks while maintaining their topological functionality. This approach helps to unveil hitherto hidden functions of some inconspicuous components, which in turn, can be used to guide the design of resilient systems, offer an effective and efficient approach for mitigating malicious attacks, and furnish self-healing to reconstruct failed infrastructure systems. Nature Publishing Group UK 2019-02-19 /pmc/articles/PMC6381220/ /pubmed/30783193 http://dx.doi.org/10.1038/s41598-019-38781-7 Text en © The Author(s) 2019 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Article Li, Wenguo Li, Yong Tan, Yi Cao, Yijia Chen, Chun Cai, Ye Lee, Kwang Y. Pecht, Michael Maximizing Network Resilience against Malicious Attacks |
title | Maximizing Network Resilience against Malicious Attacks |
title_full | Maximizing Network Resilience against Malicious Attacks |
title_fullStr | Maximizing Network Resilience against Malicious Attacks |
title_full_unstemmed | Maximizing Network Resilience against Malicious Attacks |
title_short | Maximizing Network Resilience against Malicious Attacks |
title_sort | maximizing network resilience against malicious attacks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6381220/ https://www.ncbi.nlm.nih.gov/pubmed/30783193 http://dx.doi.org/10.1038/s41598-019-38781-7 |
work_keys_str_mv | AT liwenguo maximizingnetworkresilienceagainstmaliciousattacks AT liyong maximizingnetworkresilienceagainstmaliciousattacks AT tanyi maximizingnetworkresilienceagainstmaliciousattacks AT caoyijia maximizingnetworkresilienceagainstmaliciousattacks AT chenchun maximizingnetworkresilienceagainstmaliciousattacks AT caiye maximizingnetworkresilienceagainstmaliciousattacks AT leekwangy maximizingnetworkresilienceagainstmaliciousattacks AT pechtmichael maximizingnetworkresilienceagainstmaliciousattacks |