This study proposes a new node attack strategy of complex networks by analyzing the disadvantages of traditional strategies. The idea of the new strategy is to treat the construction problem of node attack sequence as an optimal problem rather than an evaluation problem. To achieve this strategy, the study designs a survivability index of complex networks to measure the attack effect created by a node attack sequence, then establishes a construction model of node attack sequence with the goal to maximize attack effect, and further brings forward an algorithm based on tabu search to solve the model. Experiment results from real networks and simulated networks show that the new strategy is more effective than others.
孙昱,姚佩阳,张杰勇,付凯. 基于优化理论的复杂网络节点攻击策略[J]. 电子与信息学报, 2017, 39(3): 518-524.
SUN Yu, YAO Peiyang, ZHANG Jieyong, FU Kai. Node Attack Strategy of Complex Networks Based on Optimization Theory. JEIT, 2017, 39(3): 518-524.
JIANG Y and WANG Y B. Analysis of attack and defense strategies on complex networks[C]. Proceedings of International Conference on Sensor Network Security Technology and Privacy Communication System, Harbin, China, 2013: 58-62.
[2]
ALBERT R, JEONG H, and BARABASI A L. Error and attack tolerance of complex networks[J]. Nature, 2000, 406: 378-382. doi: 10.1038/35019019.
[3]
HOLME P, KIM B J, YOON C N, et al. Attack vulnerability of complex networks[J]. Physical Review E, 2002, 65(5): 056109. doi: 10.1103/PhysRevE.65.056109.
[4]
BELLINGERI M, CASSI D, and VINCENZI S. Efficiency of attack strategies on complex model and real-world networks [J]. Physica A, 2014, 414: 174-180. doi: 10.1016/j.physa.2014. 06.079.
[5]
NIE T Y, GUO Z, ZHAO K, et al. New attack strategies for complex networks[J]. Physica A, 2015, 424: 248-253. doi: 10.1016/j.physa.2015.01.004.
NIE Tingyuan, GUO Zheng, and LI Kunlong. A study of attack strategies for complex networks[J]. Computer Simulation, 2015, 32(7): 286-289. doi: 10.3969/j.issn.1006- 9348.2015.07.063.
[7]
XIAO S and XIAO G. On intentional attacks and protections in complex communication networks[C]. Proceedings of IEEE Global Telecommunications Conference, San Francisco, CA, USA, 2006: 1-5.
LI Tao and PEI Wenjiang. Multi-targets attack strategy based on the overlapping community structure of complex networks[J]. Journal of Beijing University of Posts and Telecommunications, 2010, 33(3): 34-39. doi: 10.3969/j.issn. 1007-5321.2010.03.007.
[9]
WANG H, HUANG J Y, XU X M, et al. Damage attack on complex networks[J]. Physica A, 2014, 408: 134-148. doi: 10. 1016/j.physa.2014.04.001.
[10]
ANURAG S, RAHUL K, and YATINDRA N S. Impact of structural centrality based attacks in complex networks[J]. Acta Physica Polonica B, 2015, 46(2): 305-324. doi: 10.5506/ APhysPolB.46.305.
[11]
DENG Y, WU J, and TAN Y J. Optimal attack strategy of complex networks based on tabu search[J]. Physica A, 2016, 442: 74-81. doi: 10.1016/j.physa.2015.08.043.
[12]
HERRNANN H J, SCHNEIDER C M, MOREIRA A A, et al. Onion-like network topology enhances robustness against malicious attacks[J]. Journal of Statistical Mechanics: Theory and Experiment, 2011, 1: P01027. doi: 10.1088/1742-5468/ 2011/01/P01027.
[13]
SCHNEIDER C M, MOREIRA A A, ANDRADE J S, et al. Mitigation of malicious attacks on networks[J]. Proceedings of the National Academy of Sciences, of the United States of America 2011, 108(10): 3838-3841. doi: 10.1073/pnas. 1009440108.
[14]
LOUZADA V H P, DAOLIO F, HERRMANN H J, et al. Smart rewiring for network robustness[J]. Journal of Complex Networks, 2013, 1(2): 150-159. doi: 10.1093/comnet/xxx000.
[15]
BURKE E K and KENDALL G. Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques[M]. New York: Springer, 2005: 165.
[16]
LATORA V and MARCHIORI M. Efficient behavior of small-world networks[J]. Physical Review Letters, 2001, 87(19): 198701. doi: 10.1103/PhysRevLett.87.198701.
CHEN Yong, HU Aiqun, and HU Xiao. Evaluation method for node importance in communication networks[J]. Journal on Communications, 2004, 25(8): 129-135. doi: 10.3321/j.issn: 1000-436X.2004.08.018.
QIN Li, YANG Zilong, and HUANG Shuguang. Synthesis evaluation method for node importance in complex networks [J]. Computer Science, 2015, 42(2): 60-64. doi: 10.11896/ j.issn.1002-137X.2015.2.013.
[20]
PAGE L and PERRY J. Reliability polynomials and links importance in networks[J]. IEEE Transactions on Reliability, 1994, 43(1): 51-58. doi: QK.IEL.1994.0000024.0007056. 00285108.