2014
DOI: 10.1016/j.physa.2014.06.079
|View full text |Cite
|
Sign up to set email alerts
|

Efficiency of attack strategies on complex model and real-world networks

Abstract: We investigated the efficiency of attack strategies to network nodes when targeting several complex model and real-world networks. We tested 5 attack strategies, 3 of which were introduced in this work for the first time, to attack 3 model networks (Erdos and Renyi, Barabasi and Albert preferential attachment network, and scale-free network configuration models) and 3 real networks (Gnutella peer-to-peer network, email network of the University of Rovira i Virgili, and immunoglobulin interaction network). Node… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

4
117
1
2

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 100 publications
(124 citation statements)
references
References 29 publications
4
117
1
2
Order By: Relevance
“…(ii) Attacks are more efficient with recalculated strategies than with initial strategies. The result matches the findings of other works [10,16,21]. (iii) The betweenness centrality based attack is more efficient than degree centrality based attack in degrading networks, which is consistent with previous works.…”
Section: Comparison Of the Relative Size Of Giant Componentsupporting
confidence: 92%
See 1 more Smart Citation
“…(ii) Attacks are more efficient with recalculated strategies than with initial strategies. The result matches the findings of other works [10,16,21]. (iii) The betweenness centrality based attack is more efficient than degree centrality based attack in degrading networks, which is consistent with previous works.…”
Section: Comparison Of the Relative Size Of Giant Componentsupporting
confidence: 92%
“…The attack strategies to complex networks were proposed based on network information such as degree centrality [9][10][11]13,16], betweenness centrality [12,17,16], eigenvector [18,16], closeness centrality [16,19], entropy [20], seconddegree neighbors [21], and so on. In them, Holme et al studied the behavior of complex networks subject to attacks on nodes and edges.…”
Section: Introductionmentioning
confidence: 99%
“…Under such term, terrorist networks, fake-news spreading networks, malnets or botnets used in DDoS attacks, or for spreading worms and viruses, dark networks involved in various criminal activities like illegal arm selling or child pornography, and so forth can be understood [14][15][16][17][18][19][20]. Attack strategies on such harmful complex networks (i.e., node deletion and occasionally also edge deletion) are studied in [21][22][23]. For example, in terrorist networks, a sequence of individuals should be identified, whose arrest will result in the maximum breakdown of communication between remaining individuals in the network.…”
Section: Introductionmentioning
confidence: 99%
“…In recent decades, many researchers proposed many attack strategies and analyzed vulnerability of various complex network models and real world networks [1][2][3][4], ranging from biology to Internet [5,6], power to transportation [7][8][9].…”
Section: Introductionmentioning
confidence: 99%