Next Article in Journal
Topological Data Analysis for Multivariate Time Series Data
Previous Article in Journal
Growth Quakes and Stasis Using Iterations of Inflating Complex Random Matrices
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analyzing the Robustness of Complex Networks with Attack Success Rate

State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550025, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(11), 1508; https://doi.org/10.3390/e25111508
Submission received: 26 September 2023 / Revised: 27 October 2023 / Accepted: 30 October 2023 / Published: 31 October 2023
(This article belongs to the Section Complexity)

Abstract

:
Analyzing the robustness of networks against random failures or malicious attacks is a critical research issue in network science, as it contributes to enhancing the robustness of beneficial networks and effectively dismantling harmful ones. Most studies commonly neglect the impact of the attack success rate (ASR) and assume that attacks on the network will always be successful. However, in real-world scenarios, attacks may not always succeed. This paper proposes a novel robustness measure called Robustness-ASR (RASR), which utilizes mathematical expectations to assess network robustness when considering the ASR of each node. To efficiently compute the RASR for large-scale networks, a parallel algorithm named PRQMC is presented, which leverages randomized quasi-Monte Carlo integration to approximate the RASR with a faster convergence rate. Additionally, a new attack strategy named HBnnsAGP is introduced to better assess the lower bound of network RASR. Finally, the experimental results on six representative real-world complex networks demonstrate the effectiveness of the proposed methods compared with the state-of-the-art baselines.

1. Introduction

Complex networks are powerful representations of various real-world systems, including the Internet, social networks, and power grids. Most networks provide benefits and yield positive effects. However, some networks can also produce negative effects, with the most important examples being terrorism [1] and disease transmission networks [2]. Whether beneficial or harmful, these networks substantially influence the functioning and development of our society. In recent decades, the study of diverse complex networks has gained significant attention from researchers across various fields, such as computer science, statistical physics, systems engineering, and applied mathematics [3,4,5,6,7]. One hot topic in these studies is the error and attack tolerance of complex networks [8,9,10,11,12,13,14,15], a concept referred to as robustness within the context of this paper.
The robustness of a network refers to its ability to keep functioning when some of its components, such as nodes or edges, malfunction due to random failures or malicious attacks [12,16,17]. The study of network robustness is valuable from two primary perspectives. Firstly, the failure of components can lead to the breakdown of beneficial networks and result in significant economic losses. A typical example is the Northeast blackout of 2003 [18,19]. Analyzing network robustness aids in developing methods to enhance it. On the other hand, for harmful networks, such as terrorist networks [1] or COVID-19 transmission networks [20], analyzing their robustness assists in developing effective attack strategies to dismantle them. Therefore, analyzing network robustness is of great importance.
To assess the robustness of the network, it is crucial to select an appropriate metric. Since almost all network applications are typically designed to operate in a connected environment [21], network connectivity is selected as the primary indicator to assess network robustness in this study.
The robustness of a network depends not only on its structural features but also on the mechanisms of random failures or malicious attacks. In random failures, nodes or edges are attacked with equal probability. In contrast, malicious attacks carefully select nodes or edges in the network for removal in order to maximally disrupt network functionality. Typically, random failures are less severe than malicious attacks [22]. Therefore, this paper primarily focuses on the latter. Evaluating the impacts of node or edge removal using various malicious attack strategies is a crucial approach to analyzing network robustness. Determining the lower bound of network robustness is critical, as it allows for analysis of network robustness under worst-case scenarios, identification of the most vulnerable components, and development of robustness improvement methods. An effective approach to addressing this issue involves identifying an optimal attack strategy that inflicts maximum damage on the network [23].
Extensive research has been conducted on the robustness of complex networks. Albert et al. [8] studied the robustness of scale-free networks and found that, while these networks are robust to random failures, they are extremely vulnerable to malicious attacks. Iyer et al. [9] conducted a systematic examination of the robustness of complex networks by employing simultaneous and sequential targeted attacks based on various centrality measures such as degree, betweenness, closeness, and eigenvector centrality. Fan et al. [10] proposed a deep reinforcement learning algorithm, FINDER, to effectively identify critical network nodes. Wang et al. [11] introduced region centrality and proposed an efficient network disintegration strategy based on this concept, which combines topological properties and geographic structure in complex networks. Ma et al. [12] conducted a study on the robustness of complex networks against incomplete information. They employed link prediction methods to restore missing network topology information and identify critical nodes. Lou et al. [14] introduced LFR-CNN, a CNN-based approach that utilizes learning feature representation for predicting network robustness, which exhibits excellent predictive performance, including notably smaller prediction errors.
However, the aforementioned research generally assumes that attacks on the network will always be successful, neglecting the important factor of attack success rate (ASR). In fact, attacks may not succeed in real-world scenarios. For example, even if enemy forces launch an attack on a target within a military communication network, there is no guarantee of successfully destroying it. Figure 1 illustrates the main process of network disintegration under varying ASRs. Moreover, selecting an optimum attack strategy that can lead to maximal destructiveness to the network is challenging due to the NP-hard nature of this problem [10]. Existing methods often encounter difficulties in achieving a desirable balance between effectiveness and computational efficiency.
Therefore, the purpose of this paper is to analyze network robustness when considering ASR under an optimal attack strategy. To achieve this purpose, a novel robustness measure called Robustness-ASR (RASR) is introduced, which utilizes mathematical expectations to evaluate network robustness when considering ASR. In addition, an efficient algorithm called PRQMC is proposed to calculate the RASR for large-scale networks. Furthermore, to assess the lower bound of network RASR, a new attack strategy called HBnnsAGP is proposed. The main contributions of this study are as follows:
  • We introduce and define a novel robustness measure called RASR, which utilizes mathematical expectations to assess network robustness when considering the ASR of each node.
  • To efficiently calculate the RASR for large-scale networks, we propose the PRQMC algorithm. PRQMC leverages randomized quasi-Monte Carlo (QMC) integration to approximate the RASR with a faster convergence rate and utilizes parallelization to speed up the calculation.
  • To assess the lower bound of network RASR, we present a new attack strategy called HBnnsAGP. In HBnnsAGP, a novel centrality measure called BCnns is proposed to quantify the importance of a node.
  • The experimental results for six representative real-world networks demonstrate the effectiveness of the proposed methods compared with the baselines.
The rest of this paper is organized as follows. Section 2 provides an introduction to the preliminaries, including classical centrality measures, traditional network robustness measures, and the principles of Monte Carlo (MC) and QMC integration. Section 3 presents the proposed methods for analyzing network robustness when considering ASR, including the RASR, the PRQMC algorithm, and the HBnnsAGP attack strategy. The experiments and results are demonstrated in Section 4. Finally, Section 5 concludes the paper.

2. Preliminaries

A complex network can be modeled as an unweighted, undirected graph G = ( V , E ) , where V ( V = N ) and E ( E = M ) represent the set of nodes and the set of edges in network G, respectively. Network G can be also represented as adjacency matrix A = ( a i j ) N × N ; if node i and node j are connected, a i j = 1 , otherwise a i j = 0 .

2.1. Centrality Measures

The concept of a centrality measure attempts to quantify how important a node is [24]. Here we introduce two classical centrality measures: degree centrality and betweenness centrality.

2.1.1. Degree Centrality (DC)

DC is the simplest measure of centrality. The DC of a node is defined by its degree, that is, its number of edges. The DC is formally defined as follows.
Definition 1.
Given a network G = ( V , E ) , A = ( a i j ) N × N is the adjacency matrix of the network G. The DC of node i is defined as:
D C ( i ) = j V a i j .
The DC is frequently a reliable and effective measure of a node’s importance. A higher DC value typically signifies a more critical node.

2.1.2. Betweenness Centrality (BC)

BC quantifies the number of shortest paths passing through a particular node in a network [25]. BC characterizes the extent to which a node acts as a mediator among all other nodes in a network. Nodes that lie on numerous shortest paths are likely to play a crucial role in information transmission, exhibiting higher BC values. The BC is defined as follows.
Definition 2.
Given a network G = ( V , E ) , the BC of node v in G is defined as:
B C ( v ) = s , t V σ ( s , t v ) σ ( s , t ) ,
where v V , σ ( s , t ) is the total number of shortest paths from node s to node t, and σ ( s , t v ) is the number of those paths that pass through node v. σ ( s , t ) = 1 if s = t . σ ( s , t v ) = 0 if v s , t .

2.2. Accumulated Normalized Connectivity

Traditionally, network robustness has been evaluated by calculating the size of the giant connected component (GCC) after the network has endured attacks. The accumulated normalized connectivity (ANC), also known as R, is a well-known measure of network robustness for node attacks [10,16,26]. The ANC is defined as follows.
Definition 3.
For a network G = ( V , E ) , V = N . Given an attack sequence of nodes ( v 1 , v 2 , , v N ) , where v i V indicates the ith node to be attacked, the ANC of G under this attack sequence is defined as:
A N C ( v 1 , v 2 , , v N ) = 1 N k = 1 N σ g c c ( G \ { v 1 , v 2 , , v k } ) σ g c c ( G ) ,
where σ g c c ( G \ { v 1 , v 2 , , v k } ) is the size of the GCC of the residual network after the sequential removal of nodes from the set { v 1 , v 2 , , v k } in G, and σ g c c ( G ) is the initial size of the GCC of G before any nodes are removed. The normalization factor 1 N ensures that the robustness of networks with different sizes can be compared.
A larger ANC value indicates a higher level of network robustness against attacks. Additionally, the ANC can be used to assess the destructiveness of attacks, as lower ANC values correspond to more destructive attack strategies. The ANC value can be viewed as an estimate of the area beneath the ANC curve, which is plotted with the horizontal axis as k / N and the vertical axis as σ g c c ( G \ { v 1 , v 2 , , v k } ) / σ g c c ( G ) .

2.3. Monte Carlo Integration

Monte Carlo (MC) integration is a numerical technique that is particularly useful for higher-dimensional integrals [27]. Caflisch [28] provides a comprehensive review of this method. The integral of a Lebesgue integrable function f ( X )  can be expressed as the average or expectation of the function evaluated at random locations. Considering X as a random variable uniformly distributed on the one-dimensional unit interval [ 0 , 1 ] , the integration of f ( X ) over this interval can be represented as follows:
I [ f ] = E [ f ( X ) ] = [ 0 , 1 ] f ( X ) d P ( X ) ,
in which P ( X ) is the probability measure of X on the interval [ 0 , 1 ] , then
d P ( X ) = d X ,
therefore
I [ f ] = E [ f ( X ) ] = [ 0 , 1 ] f ( X ) d X .
Similarly, for an integral on the unit hypercube [ 0 , 1 ] N in N dimensions,
I [ f ] = E [ f ( X ) ] = [ 0 , 1 ] N f ( X ) d X ,
in which X = ( x 1 , x 2 , , x N ) is a uniformly distributed vector in [ 0 , 1 ] N , where x i [ 0 , 1 ] , i { 1 , 2 , , N } . Given that the hyper-volume of [ 0 , 1 ] N is equal to 1, [ 0 , 1 ] N can be viewed as the total probability space.
The MC integration method approximates definite integrals utilizing random sampling. It draws K uniform samples from [ 0 , 1 ] N , in turn generating point set { X 1 , X 2 , , X K } . The empirical approximation of the integral I [ f ] is then procured by computing the mean of the K sample outcomes f ( X i ) , which can be expressed as follows:
I [ f ] I K [ f ] = 1 K i = 1 K f ( X i ) .
According to the Strong Law of Large Numbers [29], this approximation is convergent with probability 1; that is,
lim K P I K [ f ] I [ f ] = 0 = 1 .
Figure 2 illustrates the application of the MC integration method in approximating definite integrals over a one-dimensional unit interval. As shown in Figure 2a, MC integration approximates the area under the curve of the integral by summing the areas of the bars corresponding to the sampled points. The bars are rearranged sequentially to avoid overlap on the X -axis, as shown in Figure 2b.
The error of MC integration is:
ε K = I K [ f ] I [ f ] .
By the Central Limit Theorem [29], for any a , b where a < b , we have:
lim K P ( a < ε K σ / K < b ) = a b 1 2 π e t 2 / 2 d t = P ( a < v < b ) ,
where v is a standard normal random variable, and σ is the square root of the variance of f, given by
σ = ( [ 0 , 1 ] N ( f ( X ) I [ f ] ) 2 d X ) 1 / 2 .
When K is sufficiently large, we have:
ε K σ K 1 / 2 v .
This implies that the order of error convergence rate of the MC integration is O ( K 1 / 2 ) [30], which means that the accuracy of the integral error decreases at a rate proportional to the total number of samples as K increases. That is, “an additional factor of 4 increase in computational effort only provides an additional factor of 2 improvements in accuracy” [28].
In practical applications, the MC integration method draws K uniform samples from an N-dimensional pseudo-random sequence (PRS) generated by a computer to obtain the point set { X 1 , X 2 , , X K } .

2.4. Quasi-Monte Carlo Integration

The quasi-Monte Carlo (QMC) integration is a method of numerical integration that operates in the same way as MC integration, but instead uses a deterministic low-discrepancy sequence (LDS) [31] to approximate the integral. The advantage of using LDS is a faster rate of convergence. QMC integration has a rate of convergence close to O ( K 1 ) , which is much faster than the rate for the MC integration, O ( K 1 / 2 ) [32].
Using the QMC integration method for approximating definite integrals is similar to the MC integration method. This can be expressed as:
I [ f ] = [ 0 , 1 ] N f ( X ) d X 1 K i = 1 K f ( Y i ) ,
where { Y 1 , Y 2 , , Y K } is a point set obtained by combining the first K points from an N-dimensional LDS. Each Y i is an N-dimensional point, with Y i = ( y 1 { i } , y 2 { i } , , y N { i } ) for i { 1 , 2 , , K } , and y j { i } [ 0 , 1 ] for j { 1 , 2 , , N } .
The error order of the QMC integration can be determined by the Koksma–Hlawka inequality [33,34]; that is,
ε K = [ 0 , 1 ] N f ( X ) d X 1 K i = 1 K f ( Y i ) < V ( f ) D K * ,
where V ( f ) is the Hardy–Krause variation of the function f, and D K * is the star discrepancy of { Y 1 , Y 2 , , Y K } , defined as:
D K * = sup Q [ 0 , 1 ] N M ( Y 1 , Y 2 , , Y K ) K λ N ( Q ) ,
where M ( Y 1 , Y 2 , , Y K ) is the number of points in { Y 1 , Y 2 , , Y K } inside the region Q, and λ N ( Q ) is the Lebesgue measure of region Q in the unit hypercube [ 0 , 1 ] N . For more detailed information, please refer to [28].
For an N-dimensional LDS comprising K points, the star discrepancy of the sequence is O ( K 1 ( log K ) N ) . Consequently, for a function F with V ( F ) < , a QMC approximation based on this sequence yields a worst-case error bound in (28) converging at a rate of O ( K 1 ( log K ) N ) [35]. Since log K K , the QMC integration convergence rate approaches O ( K 1 ) for low-dimensional cases [30], which is asymptotically superior to MC.
Figure 3 illustrates the clear differences between MC and QMC integration methods. The subfigures provide a visual representation of their respective point distributions and demonstrate their application for approximating definite integrals over a one-dimensional unit interval. The points generated from an LDS exhibit greater uniformity than the points generated by a PRS. Consequently, with the same number of sampling points, LDS has the ability to uniformly fill the integration space, resulting in a faster convergence rate.

3. Methods

In this section, we first introduce the major problem we focus on in this paper. Then, we give the details of the proposed methods for analyzing network robustness when considering ASR, including the RASR, the PRQMC algorithm, and the HBnnsAGP attack strategy.

3.1. Problem Formalization

Typically, it is assumed that removing a node will also remove all of its connected edges. Therefore, in this paper, we only consider node attack strategies.
For a network G = ( V , E ) , V = N . A node attack strategy can be represented as a sequence S e q = ( v 1 , v 2 , , v N ) , where v i V indicates the ith node to be attacked. Given a predefined metric Φ ( S e q ) to measure network robustness against attacks, the primary goal is to evaluate the lower bound of network robustness. Therefore, the objective is to minimize Φ ( S e q ) , as presented below:
M i n i m i z e Φ ( S e q ) .
To achieve this objective, it is crucial to determine the optimal node attack strategy that will minimize the Φ ( S e q ) .

3.2. The Proposed Robustness Measure RASR

The ANC, as defined in Definition 3, does not consider the ASR, or it is a special case where the ASR of each node is 100%. To this end, the proposed robustness measure RASR utilizes mathematical expectations to assess network robustness when considering ASR. Before introducing the RASR, we first present a weighted ANC (called ANCw), which takes into account both the state of the attack sequence and the associated attack cost.
For a network G = ( V , E ) with N nodes, S e q = ( v 1 , v 2 , , v N ) is an attack sequence, where v i V . The state of S e q is denoted as a random variable S = ( s v 1 , s v 2 , , s v N ) , where
s v i = T , if the attack on v i succeeded F , otherwise .
Then, the ANCw is defined as follows.
Definition 4.
The ANCw of G under an attack sequence S e q is defined as:
A N C w ( S e q , S ) = 1 N + 1 k = 0 N σ g c c ( G \ { v i | s v i = T , i = 1 , 2 , , k } ) σ g c c ( G ) φ ( v k ) ,
where σ g c c is the same as defined in Definition 3. When k = 0, it indicates that no nodes have been attacked. φ ( v k ) is a weighted function; that is,
φ ( v k ) = 0 , if v k is an isolated node 1 , otherwise .
There are two main reasons for using the weighted function φ ( v k ) . Firstly, it is important for an attacker to choose an optimal attack strategy at a minimum attack cost to efficiently disintegrate the network [11,23]. Secondly, as illustrated in Figure 1, with an increased number of nodes removed, the network will eventually fragment into isolated nodes, thereby losing its functionality as a network. Therefore, this paper sets the attack cost of an isolated node to 0.
Let P v = ( p v 1 , p v 2 , , p v N ) represent the ASR of each node corresponding to S e q , where p v i represents the ASR of node v i . Assuming that attacks on different nodes are independent, then the probability of S is
p ( S ) = i = 1 N p ( s v i ) ,
where
p ( s v i ) = p v i , if s v i = T 1 p v i , otherwise .
Based on the above formulas, the proposed RASR can be defined as follows.
Definition 5.
Considering the ASR of each node, the robustness of a network G against an attack sequence S e q can be quantified by the RASR, which is defined as:
R A S R = E ( A N C w ( S e q , S ) ) = S Ω A N C w ( S e q , S ) p ( S ) ,
where S is a random variable representing the state of S e q , Ω is the sample space of S , and E ( A N C w ( S e q , S ) ) is the expectation of the ANCw.
In theory, the value of RASR can be calculated using (23) once all the samples of S are obtained in the sample space Ω . However, it confronts “the curse of dimensionality” [36] when applied to networks with a large number of nodes. In such cases, the size of Ω grows exponentially to 2 N . As a result, the analytical approach becomes infeasible when N is significantly large.

3.3. The Proposed PRQMC Algorithm

To efficiently calculate the RASR for large-scale networks, the PRQMC algorithm is proposed, which leverages randomized QMC integration to approximate the RASR with a faster convergence rate and utilizes parallelization techniques to speed up the calculation. In the following, we first introduce the RASR calculation model based on QMC integration and then give the PRQMC algorithm.

3.3.1. RASR Calculation Model Based on QMC Integration

The RASR of a network G, as defined in Definition 5, can be expressed using Lebesgue integration based on the principle of MC integration (see Section 2); that is,
R A S R = E ( A N C w ( S e q , S ) ) = Ω A N C w ( S e q , S ) d P ( S ) ,
where S = ( s v 1 , s v 2 , , s v N ) denotes a random variable representing the state of an attacking sequence S e q , Ω is the sample space of S , and P ( S ) is the probability measure of  S .
Let P v = ( p v 1 , p v 2 , , p v N ) represent the ASR of each node corresponding to S e q , and let X = ( x 1 , x 2 , x N ) be a uniformly distributed vector in [ 0 , 1 ] N , where x i [ 0 , 1 ] , i { 1 , 2 , , N } . Then, S = ( s v 1 , s v 2 , , s v N ) can be represented as follows:
S = G ( X ) ,
where
s v i = G i ( x i ) = T , if x i p v i F , otherwise , i { 1 , 2 , , N } .
When the S e q is determined, then A N C w ( S e q , S ) can be represented as a function of X ; that is,
F ( X ) = A N C w ( S e q , G ( X ) ) = A N C w ( S e q , S ) .
By substituting (27) into (24) and transforming the integral space from Ω to [ 0 , 1 ] N , we obtain the following expression for RASR:
R A S R = E [ F ( X ) ] = [ 0 , 1 ] N F ( X ) d P ( S ) .
This equation represents the integration of F ( X ) with respect to the probability measure P ( S ) over the N-dimensional unit hypercube [ 0 , 1 ] N .
For the given network G, the sample space Ω has a size of 2 N . Let the state of S e q be S i , where i { 1 , 2 , 3 , , 2 N } . Based on P v , the unit hypercube [ 0 , 1 ] N can be divided into 2 N regions denoted by Q i , where region Q i corresponds to state S i , i { 1 , 2 , 2 N } . Figure 4 illustrates this process for the case when N = 2 . Then, the integral in (28) can be transformed into:
[ 0 , 1 ] N F ( X ) d P ( S ) = i = 1 2 N Q i F ( X i ) d P ( S i ) ,
where X { i } is a vector uniformly distributed within region Q i .
The Lebesgue measure of region Q i in [ 0 , 1 ] N , denoted by λ N ( Q i ) , is equivalent to the probability measure of S i , denoted as P ( S i ) . Based on the principle of MC integration, we have:
i = 1 2 N Q i F ( X { i } ) d P ( S i ) = i = 1 2 N Q i F ( X { i } ) d X { i } = [ 0 , 1 ] N F ( X ) d X .
Combining (28), (29), and (30), we obtain:
R A S R = E [ F ( X ) ] = [ 0 , 1 ] N F ( X ) d X .
By referencing (14) and (31), the RASR of a network can be approximated using the QMC integration method. The approximation of RASR, denoted by R ^ , is defined as follows.
Definition 6.
Consider a network G = ( V , E ) with N nodes. Suppose a sequence of nodes S e q = ( v 1 , v 2 , , v N ) is targeted for attack, and P v = ( p v 1 , p v 2 , , p v N ) signifies the ASR of each node. The RASR of the network G can be approximated by R ^ , which is defined as:
R ^ = 1 K i = 1 K F ( Y i ) R A S R .
Here, { Y 1 , Y 2 , , Y K } , as specified in (14), represents a set of points obtained from an N-dimensional LDS. K is the total number of samples. The function F ( X ) is defined in (27).
The error bound of the QMC integral is determined by the star discrepancy of the chosen LDS, making the selection of LDS important for improving the accuracy of approximations. Two frequently used LDSs are the Halton sequence and the Sobol sequence [37]. In this research, the Sobol sequence is adopted, as it demonstrates better performance in higher dimensions compared to the Halton sequence [38].

3.3.2. Parallel Randomized QMC (PRQMC) Algorithm

Despite the faster convergence rate of the QMC integration method compared to MC integration, it still necessitates a large number of samples to calculate the average value. Furthermore, the calculation of function A N C w ( S e q , S ) , typically done through attack simulations, demands considerable computational resources, especially for large-scale networks [39]. Consequently, the computational process of obtaining R ^ for large-scale networks remains time-consuming. Additionally, due to the deterministic nature of the LDS, the QMC integration method can be seen as a deterministic algorithm, thus presenting challenges in assessing the reliability of numerical integration results and potentially leading to being stuck in local optima. In light of these issues, the PRQMC algorithm capitalizes on the benefits of the Randomized QMC method and parallelization.
The PRQMC algorithm improves computational efficiency through parallelization. This is because the computational cost of sampling the attack sequence’s state S is significantly lower than that of computing the function A N C w ( S e q , S ) . Therefore, by initially sampling the attack sequence’s state S and obtaining a sufficient number of samples, it is possible to calculate the R ^ by parallelizing the computation of the function A N C w ( S e q , S ) with various samples. This approach effectively accelerates the calculation process by distributing the task across multiple processors or computing nodes.
Additionally, the PRQMC algorithm enhances randomness by randomly sampling points from the LDS, providing unbiased estimation and improved variance reduction capabilities. This is particularly advantageous in high-dimensional problems, where RQMC often outperforms QMC in terms of accuracy and efficiency [40].
The procedure of the PRQMC algorithm is presented in Algorithm 1, which consists of two main steps: “sampling stage” and “paralleling stage”. In the sampling stage, we first randomly sample K points { Y 1 , Y 2 , , Y K } from an N-dimensional Sobol sequence, then determine K states of the attack sequence, { S 1 , S 2 , , S K } , by comparing the values of each dimension of the sampled points with the ASR of each node. In the paralleling stage, we parallelize the computation of the function A N C w ( S e q , S i ) , then obtain R ^ by calculating the average value of A N C w ( S e q , S i ) .
Algorithm 1  PRQMC( G , S e q , P , K )
Input:  G = ( V , E ) : a network with N nodes,
            S e q = ( v 1 , v 2 , , v N ) : an attacking sequence of G,
            P = ( p v 1 , p v 2 , , p v N ) : ASR of each node in S e q ,
           K: the total number of samples.
Output:   R ^ : the approximate value of the RASR of G.
     Step 1: Sampling stage.
   1:
sampling K points { Y 1 , Y 2 , , Y K } randomly from an N-dimensional Sobol sequence, where Y i = ( y 1 { i } , y 2 { i } , , y N { i } ) for i { 1 , 2 , , K } ;
   2:
let S t a t e = { S 1 , S 2 , , S K } , where S i = ( s v 1 { i } , s v 2 { i } , , s v N { i } ) for i { 1 , 2 , , K } ;
   3:
for  i = 1 to K do
   4:
     s v j { i } = T , y j { i } p v j F , y j { i } > p v j , j { 1 , 2 , , N } ;
   5:
end for
Step 2: Paralleling stage.
   6:
let R e s = { R ^ 1 , R ^ 2 , , R ^ K } ;
   7:
parallel for all  S i S t a t e  do
   8:
     R ^ i = A N C w ( S e q , S i ) ;
   9:
end for 
 10:
R ^ = 1 K i = 1 K R ^ i ;
 11:
return  R ^ .

3.4. The Proposed HBnnsAGP Attack Strategy

To assess the lower bound of network RASR, a new attack strategy called High BCnns Adaptive GCC-Priority (HBnnsAGP) is presented. In HBnnsAGP, a novel centrality measure called BCnns is proposed to quantify the significance of a node, and the GCC-priority attack strategy is utilized to improve attack effectiveness. Algorithm 2 describes the procedure of HBnnsAGP, which contains two steps: “obtaining the first part of S e q ” and “obtaining the second part of S e q ”. In the first step, the algorithm obtains the first part of the attack sequence by iteratively removing the node with the highest BCnns in GCC and recalculating BCnns for the remaining nodes until only isolated nodes remain in the residual network. In the second step, the algorithm arranges these isolated nodes in descending order according to their DC values in the initial network to obtain the second part of the attack sequence. This procedure is aimed at improving the effectiveness of attacks when the ASR is below 100%. It is important to note that isolated nodes when the ASR is 100% may no longer remain isolated, as shown in Figure 1. Additionally, previous research has shown that there is minimal difference in destructiveness between simultaneous attacks and sequential attacks based on DC [9]. Therefore, by sorting these isolated nodes in descending order based on their DC values from the initial network (similar to the approach used in simultaneous attacks), the second step further improves the effectiveness of attacks when the ASR is less than 100%.
Algorithm 2 HBnnsAGP( G , N 1 , N 2 )
Input: 
G = ( V , E ) : a network with N nodes,
N 1 and N 2 : sampling numbers.
Output: 
S e q : an attacking sequence of G.
   1:
let S e q be an empty list;
   2:
G 0 = ( V 0 , E 0 ) G ;
Step 1: Obtaining the first part of S e q .
   3:
while  E  do
   4:
     G c = ( V c , E c ) get the G C C of G;
   5:
     S , T Select S T ( G c , N 1 , N 2 )
   6:
    for all  v V c  do
   7:
           B C nns ( v ) = s S , t T σ ( s , t v ) σ ( s , t ) ;
   8:
    end for
   9:
     a t t a c k _ n o d e arg max v V c ( B C nns ( v ) ) ;
 10:
    append a t t a c k _ n o d e to the end of S e q ;
 11:
     G G \ { a t t a c k _ n o d e } ;
 12:
end while
Step 2: Obtaining the second part of S e q .
 13:
V r ( V 0 \ S e q ) ;
 14:
sort the nodes of V r decreasing by D C values from G 0 ;
 15:
S e q S e q + V r ;
 16:
return  S e q .
In the following, we first introduce the BCnns and then give the GCC-priority attack strategy.

3.4.1. Non-Central Node Sampling Betweenness Centrality (BCnns)

Contrasted with BC (see Definition 2), which evaluates a node’s role as a mediator in the network based on the count of shortest paths it traverses for all node pairs, BCnns quantifies the importance of nodes acting as bridge nodes between different network communities by counting the number of shortest paths that pass through a node for specific pairs of non-central nodes (nodes located on the periphery of the network and with less importance). These bridge nodes typically serve as mediators for non-central nodes across different communities. The BCnns is defined as follows.
Definition 7.
For a network G = ( V , E ) with N nodes, the BCnns of node v in network G is:
B C nns ( v ) = s S , t T σ ( s , t v ) σ ( s , t ) ,
where S , T V n n s , V n n s is the set of non-central nodes sampled from V, V n n s V , and S T = . The σ ( s , t ) and σ ( s , t v ) have the same meaning as in Definition 2.
By selecting the appropriate pairs of non-central nodes, BCnns can more effectively measure the significance of nodes as bridges between different communities in a network. While these bridge nodes may not have the highest BC value, they are crucial for maintaining overall network connectivity and could potentially have the highest BCnns value.
The definition of BCnns highlights the importance of selecting suitable nodes for sets S and T. Thus, we proposed an algorithm called Selection S T for node selection. Algorithm 3 describes the procedure of Selection S T . Initially, the nodes are sorted in ascending order based on their DC values, and the first N 1 nodes with lower DC values are selected to create the non-central node set V n n s . This is because nodes with lower DC values typically have lower centrality and are considered non-central nodes. Next, in order to achieve a more balanced sampling, V n n s is divided into two subsets: V n n s o d d , containing nodes at odd indices, and V n n s e v e n , containing nodes at even indices. Lastly, N 2 nodes are randomly sampled from V n n s o d d to create set S, and N 2 nodes are similarly sampled from V n n s e v e n to form set T.
Algorithm 3 Selection S T ( G c , N 1 , N 2 )
Input:  G c = ( V c , E c ) : the G C C of network G,
            N 1 and N 2 : sampling numbers.
Output:  S and T: the sets of sampling nodes.
   1:
if  V c < = N 1 then
   2:
     N 1 0.85 V c ;
   3:
end if
   4:
sort the nodes of V c increasing by D C values;
   5:
V n n s choose first N 1 nodes of V c ;
   6:
V n n s o d d choose nodes at odd indices of V n n s ;
   7:
V n n s e v e n choose nodes at even indices of V n n s ;
   8:
N 2 Min( V n n s o d d , V n n s e v e n , N 2 )
   9:
S choose N 2 nodes of V n n s o d d randomly;
 10:
T choose N 2 nodes of V n n s e v e n randomly;
 11:
return  S , T .
The N 1 and N 2 are chosen based on the size of the network and the node degree distribution. Typically, both N 1 and N 2 are much smaller compared to the total number of nodes N. Therefore, BCnns have higher computational efficiency compared to BC, especially for large-scale networks.
Figure 5 demonstrates the differences between BC and BCnns. Specifically, Figure 5a identifies the non-central nodes in red, Figure 5b showcases node sizes based on BC values, and Figure 5c adjusts node sizes based on their BCnns values. Notably, node 14 plays a critical bridging role between two communities, a role that BCnns captures more accurately than BC.

3.4.2. GCC-Priority Attack Strategy

As the attack progresses, the network fragments into connected components of varying sizes. The importance of these components varies within the residual network. The GCC refers to the largest connected component containing the most nodes. The destruction of the GCC accelerates the collapse of the network. The GCC-priority attack strategy enhances the attack’s effectiveness by targeting nodes within the GCC at each stage of the attack process.

4. Experimental Studies

In this section, we present a series of experiments to verify the effectiveness of our proposed methods. Firstly, we introduce the experimental settings, including network datasets and baselines. Next, we compare the proposed PRQMC method with the baselines. Additionally, we demonstrate the effectiveness of the proposed HBnnsAGP attack strategy. Finally, we present further discussions of network robustness when considering the ASR.

4.1. Experimental Settings

4.1.1. Datasets

In our experiments, we selected six real-world classic complex networks of different scales, including Karate [41], Krebs [10], Airport [42], Crime [42], Power [42], and Oregon1 [43].
  • Karate: This is a network depicting relationships in a karate club recorded by Zachary. Nodes represent club members, and each edge connects two members of the club.
  • Krebs: The network is associated with the 9/11 attack. The nodes represent the terrorists involved in the network, while the edges depict their communication patterns.
  • Airport: This is a network consisting of direct air routes between American airports in 1997. Each node represents an airport, and the edges represent connections between airports.
  • Crime: This network represents a criminal network that is derived from a bipartite network of individuals and criminal activities. In this network, each node represents an individual, and an edge connects two individuals involved in the same criminal activity.
  • Power: This network represents the high-voltage power grid in the western United States. The nodes represent transformers, substations, and generators, while the edges represent high-voltage transmission lines.
  • Oregon1: This network showcases peering information of Autonomous Systems (AS) inferred from Oregon route-views. Each AS is represented by a node, and the edges depict the relationships between the AS.
Table 1 provides a detailed summary of these networks, with N and M representing the number of nodes and edges, respectively; <k> and M a x D e g denote the network’s average degree and maximal degree, respectively; and C denotes the average clustering coefficient.
The topologies of these networks are shown in Figure 6.

4.1.2. Comparison Methods

To show the effectiveness of the proposed PRQMC algorithm, we compare it with MC and QMC methods.
  • MC: This calculates the estimated value of R ^ using original MC integration and generates a set of points from a PRS.
  • QMC: This calculates the estimated value of R ^ using original QMC integration and generates a set of points from an LDS.
To show the effectiveness of the proposed HBnnsAGP attack strategy, we compare it with random failures and three representative baseline attack strategies, including HDA [10], HBA [25], and FINDER [10].
  • Random Failures (RF): Nodes are removed from the network in a random order.
  • High Degree Adaptive (HDA): HDA is an adaptive version of the high degree method that ranks nodes based on their DC and sequentially removes the node with the highest DC. HDA recomputes the DC of the remaining nodes after each node removal and is recognized for its superior computational efficiency.
  • High Betweenness Adaptive (HBA): HBA is an adaptive version of the high betweenness method. It operates by iteratively removing the node with the highest BC and recomputing BC for the remaining nodes. HBA has long been considered the most effective strategy for the network dismantling problem in the node-unweighted scenario [44]. However, the high computing cost prohibits its use in medium- and large-scale networks.
  • FINDER: FINDER is notable as an algorithm based on deep reinforcement learning, which achieves superior performances in terms of both effectiveness and efficiency.
We implemented the proposed algorithm and baselines using the Python programming language. All experiments were performed on a server AMD EPYC 7742 64-Core Processor @ 2.25 GHz, with memory (RAM) 1024 GB, running the Linux Ubuntu 11.10 Operating System.

4.2. Comparison of the PRQMC with Baselines

This subsection presents the comparison results to demonstrate the effectiveness of the proposed algorithm, PRQMC, on six real-world complex networks. Specifically, we compare PRQMC with two baselines: MC and QMC. All experiments use the same attack strategy, and the ASR of each node is randomly generated.
We first compare PRQMC with the baselines on two small-scale networks (Karate and Krebs). This is because precise values of RASR can be calculated analytically for small-scale networks. Then, for large-scale networks (Airport, Crime, Power, and Oregon1), we utilize the standard deviation curve as the convergence criterion, as the analytical method is not applicable to large-scale networks. Figure 7 and Figure 8 present the comparison of the convergence and error between PRQMC and baselines. The figure clearly illustrates that PRQMC achieves faster convergence and better accuracy with fewer samples compared to the baselines.
Additionally, Table 2 presents a comparison of the computational efficiency of PRQMC and the baselines, each with 5000 sampling iterations. In the PRQMC method, the number of parallel computing processes is set based on the network size, assigning 25 processes to Karate and Krebs, and 100 processes to the other networks. The results in Table 2 indicate that the PRQMC method outperforms in terms of computational efficiency. Specifically, the PRQMC method operates nearly 50 times faster than the QMC and MC methods on Oregon1.

4.3. Comparison of the HBnnsAGP with Baselines

In this subsection, we demonstrate the effectiveness and efficiency of the proposed HBnnsAGP attack strategy. Specifically, we compare HBnnsAGP with HDA, HBA, FINDER, and RF for six real-world complex networks, while considering different ASR conditions. Initially, we employ various strategies to generate corresponding attack sequences. Subsequently, we utilize the PRQMC method to calculate the R ^ value under the following ASR distribution scenarios.
  • ASR = 100%: The ASR of each node is set to 100%.
  • ASR = 90%: The ASR of each node is set to 90%.
  • ASR = 80%: The ASR of each node is set to 80%.
  • ASR = 70%: The ASR of each node is set to 70%.
  • ASR = 60%: The ASR of each node is set to 60%.
  • ASR = 50%: The ASR of each node is set to 50%.
  • ASR = 50% for the first 30% of nodes: In the attack sequence generated by different attack strategies, the ASR of the first 30% of nodes is set to 50%.
  • Random ASR: The ASR of each node is randomly set between 50% and 100%. To obtain more reliable results, the average of 10 experimental outcomes is taken.
The sample numbers ( N 1 and N 2 ) for different networks used in HBnnsAGP are presented in Table 3. Table 4 presents the R ^ values of networks in the four specified scenarios. The data demonstrate that HBnnsAGP outperforms other attack strategies in terms of destructiveness in the majority of cases. The destructiveness of HBnnsAGP, on average, has increased by 7.01%, 4.05%, 7.62%, and 40.51% compared to FINDER, HBA, HDA, and RF, respectively.
Table 5 presents a comparison of computation times for HBnnsAGP and the baselines. As the network size increases, the computation time for the HBA method becomes excessively long. In contrast, the HBnnsAGP method maintains commendable computational efficiency even for larger-scale networks. For the Oregon1 network, HBnnsAGP is approximately 28 times faster than HBA. While the computational efficiency of HBnnsAGP slightly lags behind that of FINDER and HDA for larger-scale networks, it surpasses them in terms of attack destructiveness.
Figure 9 represents the ANCw curves of the networks under various attack strategies when the ASR of each node is set to 100%. In this scenario, the state of the attack sequence is unique. The figure shows that HBnnsAGP excels at identifying critical nodes in the network, leading to the effective disruption of the network structure compared to other methods. Hence, the effectiveness of the proposed HBnnsAGP attack strategy is verified.

4.4. Further Discussions about Network Robustness Considering ASR

The role of ASR in determining network robustness is a complex yet critical aspect to consider when assessing the effectiveness of an attack strategy. A higher ASR implies a more successful attack, leading to a greater extent of network disruption. Conversely, a lower ASR indicates a more robust network that can resist the attack without significant damage.
Our analysis, as evidenced by the data presented in Table 4, clearly indicates that a decrease in ASR corresponds to an increase in network robustness. This is due to the fact that nodes with lower ASR are less susceptible to destruction, thereby enhancing the network’s resilience. This trend is consistent across all strategies, including HBnnsAGP, FINDER, HBA, HDA, and RF. Specifically, for every 10% decrease in ASR, the average R ^ value for the HBnnsAGP strategy increases by approximately 7–8, indicating a significant improvement in network robustness. This suggests that enhancing node protection to reduce ASR can effectively bolster the robustness of the network. This insight is crucial for designing more robust networks.
Interestingly, we found that enhancing the protection of a small subset of critical nodes, resulting in reduced ASR, can effectively enhance network robustness. This is demonstrated in Scenarios 6 and 7 in Table 4, where merely reducing the ASR of the initial 30% of nodes in the attack sequence (Scenario 7) significantly enhances network robustness. This improvement is approximately 78.25% of that observed in Scenario 6. This highlights the importance of identifying and protecting key nodes within a network. By allocating resources to enhance the protection of these crucial nodes, the robustness of the network can be significantly improved. This strategy is particularly beneficial in scenarios where resources for network protection are limited, thus necessitating prioritized allocation.
However, while ASR is a valuable metric for evaluating network robustness, it is essential to recognize that factors can vary significantly depending on the specific domain. It should be incorporated alongside other network characteristics to achieve a comprehensive evaluation of network robustness. For example, in a power grid network, the failure of a single power station can lead to load redistribution, which can cause overloads and subsequent failures in other parts of the system. This cascading failure can lead to widespread power outages. Thus, improving the protection of individual power stations without considering the overall system dynamics may not substantially enhance the system’s robustness.
Therefore, future research could focus on developing more sophisticated metrics that consider the complexity and specific characteristics of different domains, thus achieving a more accurate and detailed evaluation of network robustness. Furthermore, it would be interesting to explore how to optimally allocate resources to enhance the resilience of critical nodes when resources for network protection are limited.

5. Conclusions

In this paper, we conducted a study to analyze the robustness of networks when considering ASR. Firstly, we introduce a novel metric called RASR to assess network robustness in this scenario. Then, we propose the PRQMC algorithm to efficiently calculate the RASR for large-scale networks. PRQMC utilizes RQMC integration to approximate the RASR with a faster convergence rate and employs parallelization to speed up the calculation. Next, we propose a new attack strategy called HBnnsAGP to evaluate the lower bound of network RASR. In HBnnsAGP, we quantify the significance of a node using BCnns and enhance the destructiveness of the attack using the GCC-priority attack strategy. Experimental results on six representative real-world networks demonstrate the effectiveness of the proposed methods. Furthermore, our work demonstrates that reinforcing the protection of a small subset of critical nodes significantly improves network robustness. These findings offer valuable insights for devising more robust networks, especially in scenarios where resources for network protection are limited. The efficiency of the proposed methods can be further enhanced, particularly when analyzing ultra-large-scale networks. In future research, we aim to explore efficient algorithms to enhance the network RASR and devise promising methods for analyzing ultra-large-scale networks.

Author Contributions

Conceptualization, F.Y.; Methodology, F.Y. and Y.W.; Software, F.Y.; Validation, F.Y.; Formal analysis, F.Y.; Data curation, F.Y.; Writing—original draft, F.Y.; Writing–review & editing, F.Y.; Supervision, Y.W.; Funding acquisition, Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work is partially supported by NSFC under grants 61976065 and 62376066, and Guizhou Science Support Project (2022-259).

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Eiselt, H. Destabilization of terrorist networks. Chaos Solitons Fractals 2018, 108, 111–118. [Google Scholar] [CrossRef]
  2. Pastor-Satorras, R.; Castellano, C.; Van Mieghem, P.; Vespignani, A. Epidemic processes in complex networks. Rev. Mod. Phys. 2015, 87, 925. [Google Scholar] [CrossRef]
  3. Barabási, A.L. Network science. Philos. Trans. R. Soc. A Math. Phys. Eng. Sci. 2013, 371, 20120375. [Google Scholar] [CrossRef]
  4. Newman, M. Networks; Oxford University Press: Oxford, UK, 2018. [Google Scholar]
  5. Albert, R.; Barabási, A.L. Statistical mechanics of complex networks. Rev. Mod. Phys. 2002, 74, 47. [Google Scholar] [CrossRef]
  6. Berahmand, K.; Haghani, S.; Rostami, M.; Li, Y. A new attributed graph clustering by using label propagation in complex networks. J. King Saud-Univ. Comput. Inf. Sci. 2022, 34, 1869–1883. [Google Scholar] [CrossRef]
  7. Li, Z.; Ma, W.; Ma, N. Partial topology identification of tempered fractional-order complex networks via synchronization method. Math. Methods Appl. Sci. 2023, 46, 3066–3079. [Google Scholar] [CrossRef]
  8. Albert, R.; Jeong, H.; Barabási, A.L. Error and attack tolerance of complex networks. Nature 2000, 406, 378–382. [Google Scholar] [CrossRef]
  9. Iyer, S.; Killingback, T.; Sundaram, B.; Wang, Z. Attack robustness and centrality of complex networks. PLoS ONE 2013, 8, e59613. [Google Scholar] [CrossRef]
  10. Fan, C.; Zeng, L.; Sun, Y.; Liu, Y.Y. Finding key players in complex networks through deep reinforcement learning. Nat. Mach. Intell. 2020, 2, 317–324. [Google Scholar] [CrossRef]
  11. Wang, Z.G.; Deng, Y.; Wang, Z.; Wu, J. Disintegrating spatial networks based on region centrality. Chaos An Interdiscip. J. Nonlinear Sci. 2021, 31, 061101. [Google Scholar] [CrossRef]
  12. Ma, W.; Fang, J.; Wu, J. Analyzing robustness of complex networks against incomplete information. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 2523–2527. [Google Scholar] [CrossRef]
  13. Ma, L.; Zhang, X.; Li, J.; Lin, Q.; Gong, M.; Coello, C.A.C.; Nandi, A.K. Enhancing Robustness and Resilience of Multiplex Networks Against Node-Community Cascading Failures. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 3808–3821. [Google Scholar] [CrossRef]
  14. Lou, Y.; Wu, R.; Li, J.; Wang, L.; Li, X.; Chen, G. A Learning Convolutional Neural Network Approach for Network Robustness Prediction. IEEE Trans. Cybern. 2023, 53, 4531–4544. [Google Scholar] [CrossRef]
  15. Sun, G. Robustness Analysis of an Urban Public Traffic Network Based on a Multi-Subnet Composite Complex Network Model. Entropy 2023, 25, 1377. [Google Scholar] [CrossRef]
  16. Zhou, M.; Liu, J. A two-phase multiobjective evolutionary algorithm for enhancing the robustness of scale-free networks against multiple malicious attacks. IEEE Trans. Cybern. 2016, 47, 539–552. [Google Scholar] [CrossRef]
  17. Tian, M.; Dong, Z.; Wang, X. Reinforcement learning approach for robustness analysis of complex networks with incomplete information. Chaos Solitons Fractals 2021, 144, 110643. [Google Scholar] [CrossRef]
  18. Boccaletti, S.; Latora, V.; Moreno, Y.; Chavez, M.; Hwang, D.U. Complex networks: Structure and dynamics. Phys. Rep. 2006, 424, 175–308. [Google Scholar] [CrossRef]
  19. Barrat, A.; Barthelemy, M.; Vespignani, A. Dynamical Processes on Complex Networks; Cambridge University Press: Cambridge, UK, 2008. [Google Scholar]
  20. Oka, T.; Wei, W.; Zhu, D. The effect of human mobility restrictions on the COVID-19 transmission network in China. PLoS ONE 2021, 16, e0254403. [Google Scholar] [CrossRef]
  21. Lalou, M.; Tahraoui, M.A.; Kheddouci, H. The Critical Node Detection Problem in networks: A survey. Comput. Sci. Rev. 2018, 28, 92–117. [Google Scholar] [CrossRef]
  22. Freitas, S.; Yang, D.; Kumar, S.; Tong, H.; Chau, D.H. Evaluating Graph Vulnerability and Robustness Using TIGER. In Proceedings of the 30th ACM International Conference on Information &Knowledge Management, Queensland, Australia, 1–5 November 2021; pp. 4495–4503. [Google Scholar] [CrossRef]
  23. Zhang, L.; Xia, J.; Cheng, F.; Qiu, J.; Zhang, X. Multi-objective optimization of critical node detection based on cascade model in complex networks. IEEE Trans. Netw. Sci. Eng. 2020, 7, 2052–2066. [Google Scholar] [CrossRef]
  24. Manoj, B.; Chakraborty, A.; Singh, R. Complex Networks: A Networking and Signal Processing Perspective; Prentice Hall Communications Engineering and Emerging Technologies; Pearson: London, UK, 2018. [Google Scholar]
  25. Freeman, L.C. A set of measures of centrality based on betweenness. Sociometry 1977, 40, 35–41. [Google Scholar] [CrossRef]
  26. Schneider, C.M.; Moreira, A.A.; Andrade, J.S., Jr.; Havlin, S.; Herrmann, H.J. Mitigation of malicious attacks on networks. Proc. Natl. Acad. Sci. USA 2011, 108, 3838–3841. [Google Scholar] [CrossRef]
  27. Press, W.H.; Farrar, G.R. Recursive stratified sampling for multidimensional Monte Carlo integration. Comput. Phys. 1990, 4, 190–195. [Google Scholar] [CrossRef]
  28. Caflisch, R.E. Monte carlo and quasi-monte carlo methods. Acta Numer. 1998, 7, 1–49. [Google Scholar] [CrossRef]
  29. Feller, W. An Introduction to Probability Theory and Its Applications, Volume 2; John Wiley & Sons: Hoboken, NJ, USA, 1991; Volume 81. [Google Scholar]
  30. Liu, X.; Zheng, S.; Wu, X.; Chen, D.; He, J. Research on a seismic connectivity reliability model of power systems based on the quasi-Monte Carlo method. Reliab. Eng. Syst. Saf. 2021, 215, 107888. [Google Scholar] [CrossRef]
  31. Hou, T.; Nuyens, D.; Roels, S.; Janssen, H. Quasi-Monte Carlo based uncertainty analysis: Sampling efficiency and error estimation in engineering applications. Reliab. Eng. Syst. Saf. 2019, 191, 106549. [Google Scholar] [CrossRef]
  32. Asmussen, S.; Glynn, P.W. Stochastic Simulation: Algorithms and Analysis; Springer: Berlin/Heidelberg, Germany, 2007; Volume 57, pp. 487–488. [Google Scholar]
  33. Koksma, J. Een algemeene stelling uit de theorie der gelijkmatige verdeeling modulo 1. Math. B Zutphen 1942, 11, 43. [Google Scholar]
  34. Hlawka, E. Discrepancy and Riemann integration. Stud. Pure Math. 1971, 3, 121–129. [Google Scholar]
  35. L’Ecuyer, P. Quasi-Monte Carlo methods with applications in finance. Financ. Stoch. 2009, 13, 307–349. [Google Scholar] [CrossRef]
  36. Bellman, R. Dynamic programming. Science 1966, 153, 34–37. [Google Scholar] [CrossRef] [PubMed]
  37. Kocis, L.; Whiten, W.J. Computational investigations of low-discrepancy sequences. ACM Trans. Math. Softw. TOMS 1997, 23, 266–294. [Google Scholar] [CrossRef]
  38. Morokoff, W.J.; Caflisch, R.E. Quasi-monte carlo integration. J. Comput. Phys. 1995, 122, 218–230. [Google Scholar] [CrossRef]
  39. Lou, Y.; Wu, R.; Li, J.; Wang, L.; Chen, G. A convolutional neural network approach to predicting network connectedness robustness. IEEE Trans. Netw. Sci. Eng. 2021, 8, 3209–3219. [Google Scholar] [CrossRef]
  40. L’Ecuyer, P. Random number generation and quasi-Monte Carlo. In Wiley StatsRef: Statistics Reference Online; Wiley: Hoboken, NJ, USA, 2014; pp. 1–12. [Google Scholar]
  41. Zachary, W.W. An information flow model for conflict and fission in small groups. J. Anthropol. Res. 1977, 33, 452–473. [Google Scholar] [CrossRef]
  42. Rossi, R.A.; Ahmed, N.K. The Network Data Repository with Interactive Graph Analytics and Visualization. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, Austin, TX, USA, 25–30 January 2015; AAAI’15. AAAI Press: Washington, DC, USA, 2015; pp. 4292–4293. [Google Scholar]
  43. Leskovec, J.; Kleinberg, J.; Faloutsos, C. Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data TKDD 2007, 1, 2–es. [Google Scholar] [CrossRef]
  44. Holme, P.; Kim, B.J.; Yoon, C.N.; Han, S.K. Attack vulnerability of complex networks. Phys. Rev. E 2002, 65, 056109. [Google Scholar] [CrossRef] [PubMed]
Figure 1. An example of network disintegration processes under different ASR. Gray nodes indicate successful attacks, green nodes represent unsuccessful attacks, and blue nodes denote unattacked nodes. (af) represent scenarios where 5.9%, 20.6%, and 35.3% of network nodes are attacked, with ASR of 100% and 60% respectively.
Figure 1. An example of network disintegration processes under different ASR. Gray nodes indicate successful attacks, green nodes represent unsuccessful attacks, and blue nodes denote unattacked nodes. (af) represent scenarios where 5.9%, 20.6%, and 35.3% of network nodes are attacked, with ASR of 100% and 60% respectively.
Entropy 25 01508 g001
Figure 2. An example of the MC integration method for approximating a definite integral over a one-dimensional unit interval. (a) illustrates the approximation of the integral by summing the areas of bars that correspond to the sampled points. Each bar’s height represents the value of f ( X ) at X i , and its width is 1 / K , where K denotes the total number of samples. (b) demonstrates the sequential rearrangement of the bars to prevent overlapping on the X -axis, ensuring a clear visualization of the areas.
Figure 2. An example of the MC integration method for approximating a definite integral over a one-dimensional unit interval. (a) illustrates the approximation of the integral by summing the areas of bars that correspond to the sampled points. Each bar’s height represents the value of f ( X ) at X i , and its width is 1 / K , where K denotes the total number of samples. (b) demonstrates the sequential rearrangement of the bars to prevent overlapping on the X -axis, ensuring a clear visualization of the areas.
Entropy 25 01508 g002
Figure 3. A comparison of MC and QMC integration methods. (a,d) show the two-dimensional projections of a PRS and an LDS (a Sobol sequence), respectively. (b,c) depict the MC integration for approximating a definite integral over a one-dimensional unit interval, while (e,f) present the QMC integration for approximating a definite integral over a one-dimensional unit interval.
Figure 3. A comparison of MC and QMC integration methods. (a,d) show the two-dimensional projections of a PRS and an LDS (a Sobol sequence), respectively. (b,c) depict the MC integration for approximating a definite integral over a one-dimensional unit interval, while (e,f) present the QMC integration for approximating a definite integral over a one-dimensional unit interval.
Entropy 25 01508 g003
Figure 4. An example to illustrate the division of the unit hypercube, where N = 2 and P v = ( p v 1 , p v 2 ) . The unit hypercube [ 0 , 1 ] 2 is divided into 4 regions, namely Q 1 , Q 2 , Q 3 , Q 4 , where each region corresponds to a state of S e q , denoted by S 1 , S 2 , S 3 , S 4 .
Figure 4. An example to illustrate the division of the unit hypercube, where N = 2 and P v = ( p v 1 , p v 2 ) . The unit hypercube [ 0 , 1 ] 2 is divided into 4 regions, namely Q 1 , Q 2 , Q 3 , Q 4 , where each region corresponds to a state of S e q , denoted by S 1 , S 2 , S 3 , S 4 .
Entropy 25 01508 g004
Figure 5. An illustrative example of non-central nodes and comparison of BC and BCnns. In this figure, (a) highlights non-central nodes in red, (b) showcases node sizes based on BC, and (c) showcases node sizes based on BCnns.
Figure 5. An illustrative example of non-central nodes and comparison of BC and BCnns. In this figure, (a) highlights non-central nodes in red, (b) showcases node sizes based on BC, and (c) showcases node sizes based on BCnns.
Entropy 25 01508 g005
Figure 6. The topologies of six real-world networks. The size of each node is proportional to its degree. (a) Karate, (b) Krebs, (c) Airport, (d) Crime, (e) Power, (f) Oregon1.
Figure 6. The topologies of six real-world networks. The size of each node is proportional to its degree. (a) Karate, (b) Krebs, (c) Airport, (d) Crime, (e) Power, (f) Oregon1.
Entropy 25 01508 g006
Figure 7. Comparison of the convergence and error of the PRQMC, QMC, and MC methods in assessing robustness for two smaller-scale networks. Convergence and error curves of Karate (a,b), Krebs (c,d).
Figure 7. Comparison of the convergence and error of the PRQMC, QMC, and MC methods in assessing robustness for two smaller-scale networks. Convergence and error curves of Karate (a,b), Krebs (c,d).
Entropy 25 01508 g007
Figure 8. Comparison of the convergence and standard deviation of the PRQMC, QMC, and MC methods in assessing robustness for four larger-scale networks. Convergence and standard deviation curves of Airport (a,e), Crime (b,f), Power (c,g), Oregon1 (d,h).
Figure 8. Comparison of the convergence and standard deviation of the PRQMC, QMC, and MC methods in assessing robustness for four larger-scale networks. Convergence and standard deviation curves of Airport (a,e), Crime (b,f), Power (c,g), Oregon1 (d,h).
Entropy 25 01508 g008
Figure 9. The ANCw curves of networks under different attack strategies: (a) Karate, (b) Krebs, (c) Airport, (d) Crime, (e) Power, (f) Oregon1.
Figure 9. The ANCw curves of networks under different attack strategies: (a) Karate, (b) Krebs, (c) Airport, (d) Crime, (e) Power, (f) Oregon1.
Entropy 25 01508 g009
Table 1. Basic information for six real-world networks. N and M represent the number of nodes and edges, respectively; <k> and M a x D e g denote the network’s average degree and maximal degree, respectively; and C is the average clustering coefficient.
Table 1. Basic information for six real-world networks. N and M represent the number of nodes and edges, respectively; <k> and M a x D e g denote the network’s average degree and maximal degree, respectively; and C is the average clustering coefficient.
NetworkNM<k> MaxDeg C
Karate [41]34784.59170.571
Krebs [10]621595.13220.591
Airport [42]332212612.811390.625
Crime [42]82914733.55250.008
Power [42]494165942.67190.107
Oregon1 [43]10,67022,0024.1223120.456
Table 2. Computational time comparison of PRQMC, QMC, and MC methods (s). Smaller values are better (best in bold).
Table 2. Computational time comparison of PRQMC, QMC, and MC methods (s). Smaller values are better (best in bold).
NetworkMCQMCPRQMC
Karate1.81.70.4
Krebs4.54.30.6
Airport106.7104.93.0
Crime518.2520.67.4
Power20,525.720,529.1343.7
Oregon1213,748.2213,758.14262.4
Table 3. The sample numbers ( N 1 and N 2 ) for different networks used in HBnnsAGP.
Table 3. The sample numbers ( N 1 and N 2 ) for different networks used in HBnnsAGP.
Network N 1 N 2
Karate168
Krebs3016
Airport10060
Crime12080
Power130080
Oregon1230080
Table 4. The robustness of networks under different ASR. All R ^ values are multiplied by 100. Smaller values represent better attack destructiveness for attack strategies (best in bold).
Table 4. The robustness of networks under different ASR. All R ^ values are multiplied by 100. Smaller values represent better attack destructiveness for attack strategies (best in bold).
ScenarioNetworkHBnnsAGPFINDERHBAHDARF
1. ASR = 100%Karate12.7714.1215.0415.0442.86
Krebs12.2616.2614.2117.2342.96
Airport7.5310.257.9311.1043.19
Crime9.9011.0410.1411.5439.57
Power0.915.021.015.2320.29
Oregon10.681.060.731.0136.47
Avg score7.349.638.1810.1937.56
2. ASR = 90%Karate22.2623.9223.7924.8147.25
Krebs20.7023.5921.4924.4047.09
Airport20.9423.3522.2323.7447.74
Crime16.4417.0617.2316.9543.52
Power2.416.062.376.3922.51
Oregon17.309.018.188.7640.89
Avg score15.0117.1715.8817.5141.50
3. ASR = 80%Karate31.5233.0032.9334.0952.25
Krebs28.7530.8229.1231.3751.82
Airport31.8733.8633.5934.1752.77
Crime23.8126.0025.7225.4348.37
Power4.097.444.047.7725.44
Oregon116.7119.2618.4118.9146.12
Avg score22.7925.0623.9725.2946.13
4. ASR = 70%Karate40.8942.142.2943.357.75
Krebs37.739.237.839.4457.13
Airport41.6543.2543.2343.5158.10
Crime34.137.7637.1137.354.47
Power6.559.656.579.9529.24
Oregon127.3730.0229.3629.6851.95
Avg score31.3833.6632.7333.8651.44
5. ASR = 60%Karate50.3951.3351.7052.4263.70
Krebs47.3948.4947.5248.6462.99
Airport50.7351.9852.0352.2363.66
Crime46.4849.3349.0848.9161.13
Power10.3313.3510.5813.6134.34
Oregon138.5040.8740.4140.5658.25
Avg score40.6442.5641.8942.7357.35
6. ASR = 50%Karate59.9060.5560.8861.4169.90
Krebs57.6158.3857.7458.3362.99
Airport59.4560.3260.3960.5263.66
Crime57.5959.5059.5059.0861.13
Power16.5419.7317.3119.9334.34
Oregon149.6851.5851.2851.3358.25
Avg score50.1351.6951.1851.7757.35
7. ASR = 50% for the first 30% of nodesKarate48.6150.3849.7650.5750.79
Krebs45.5147.1645.7847.3853.00
Airport48.7850.6851.0050.4749.76
Crime41.8448.1746.9047.1250.06
Power14.8717.7916.3217.8627.04
Oregon141.2642.9142.8343.1448.92
Avg score40.1542.9142.1042.7646.60
8. Random ASRKarate35.1236.2936.5037.5754.11
Krebs30.3932.9931.0233.3653.91
Airport36.9538.5838.6738.9955.24
Crime27.9030.9630.4830.4251.06
Power5.178.465.188.8027.40
Oregon121.6124.2323.5223.8648.79
Avg score26.1928.5627.5528.7948.42
Table 5. The computation time of different attack strategies (ms). Smaller values are better (best in bold).
Table 5. The computation time of different attack strategies (ms). Smaller values are better (best in bold).
NetworkHBnnsAGPFINDERHBAHDA
Karate1.616.31.90.5
Krebs3.636.64.62.3
Airport82.3218.3211.011.1
Crime552.1369.34434.649.1
Power6760.71397.978,119.91796.8
Oregon115,799.18641.5477,802.82065.9
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yang, F.; Wang, Y. Analyzing the Robustness of Complex Networks with Attack Success Rate. Entropy 2023, 25, 1508. https://doi.org/10.3390/e25111508

AMA Style

Yang F, Wang Y. Analyzing the Robustness of Complex Networks with Attack Success Rate. Entropy. 2023; 25(11):1508. https://doi.org/10.3390/e25111508

Chicago/Turabian Style

Yang, Fangqun, and Yisong Wang. 2023. "Analyzing the Robustness of Complex Networks with Attack Success Rate" Entropy 25, no. 11: 1508. https://doi.org/10.3390/e25111508

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop