Attack vulnerability of complex networks
2002 (English)In: Physical Review E. Statistical, Nonlinear, and Soft Matter Physics, ISSN 1063-651X, E-ISSN 1095-3787, Vol. 65, no 5, 056109- p.Article in journal (Refereed) Published
We study the response of complex networks subject to attacks on vertices and edges. Several existing complex network models as well as real-world networks of scientific collaborations and Internet traffic are numerically investigated, and the network performance is quantitatively measured by the average inverse geodesic length and the size of the largest connected subgraph. For each case of attacks on vertices and edges, four different attacking strategies are used: removals by the descending order of the degree and the betweenness centrality, calculated for either the initial network or the current network during the removal procedure. It is found that the removals by the recalculated degrees and betweenness centralities are often more harmful than the attack strategies based on the initial network, suggesting that the network structure changes as important vertices or edges are removed. Furthermore, the correlation between the betweenness centrality and the degree in complex networks is studied.
Place, publisher, year, edition, pages
2002. Vol. 65, no 5, 056109- p.
Algorithms, Computer software, Information analysis, Internet, Mathematical models, Probability, Random processes, Statistical methods
IdentifiersURN: urn:nbn:se:kth:diva-25024DOI: 10.1103/PhysRevE.65.056109ISI: 000176552500025OAI: oai:DiVA.org:kth-25024DiVA: diva2:355057
QC 201010052010-10-052010-10-052011-04-12Bibliographically approved