Next Article in Journal
Non-Equilibrium Enhancement of Classical Information Transmission
Previous Article in Journal
Social Network Forensics Analysis Model Based on Network Representation Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Critical Candidate Node-Based Attack Model of Network Controllability

1
School of Computer Science, Sichuan Normal University, Chengdu 610101, China
2
Visual Computing and Virtual Reality Key Laboratory of Sichuan, Sichuan Normal University, Chengdu 610068, China
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(7), 580; https://doi.org/10.3390/e26070580
Submission received: 19 May 2024 / Revised: 27 June 2024 / Accepted: 6 July 2024 / Published: 8 July 2024
(This article belongs to the Section Complexity)

Abstract

:
The controllability of complex networks is a core issue in network research. Assessing the controllability robustness of networks under destructive attacks holds significant practical importance. This paper studies the controllability of networks from the perspective of malicious attacks. A novel attack model is proposed to evaluate and challenge network controllability. This method disrupts network controllability with high precision by identifying and targeting critical candidate nodes. The model is compared with traditional attack methods, including degree-based, betweenness-based, closeness-based, pagerank-based, and hierarchical attacks. Results show that the model outperforms these methods in both disruption effectiveness and computational efficiency. Extensive experiments on both synthetic and real-world networks validate the superior performance of this approach. This study provides valuable insights for identifying key nodes crucial for maintaining network controllability. It also offers a solid framework for enhancing network resilience against malicious attacks.

1. Introduction

In the past two decades, complex networks have gained wide popularity and rapid development, forming an independent discipline that encompasses multiple fields, such as network science, systems engineering, statistical physics, applied mathematics, and social sciences [1,2]. Complex network modeling is an effective method for studying complex real-world network systems. This approach not only allows for the analysis of the complex structures of these network systems but also enables the exploration of how to control and utilize them [3].
In the process of pursuing control over complex systems, controllability has gradually become a research hot spot in recent years. The controllability of complex networks is a fundamental issue in complex network systems. Controllability refers to the ability of a network system to be driven from any initial state to any desired target state within a finite time frame, given an acceptable control input [4,5]. Currently, numerous researchers are focused on network controllability, including the study of the controllability of first-order linear and nonlinear systems, traction control, adaptive control, synchronization control, and delayed synchronization in network systems [6,7,8,9,10]. These methods have been applied in research on network controllability.
The controllability robustness [11] of a network refers to the network’s ability to maintain its controllability under random failures and malicious attacks. Both theoretical and empirical evidence suggest that many complex natural and engineered systems are fragile. In the real world, network systems are increasingly and inevitably subjected to various disruptions. Malicious attacks on nodes or changes in network topology can significantly reduce network controllability. For example, in power grids, connection failures or attacks between substations can severely impact network performance. Similarly, in transportation networks, attacks targeting nodes with high betweenness centrality can disrupt normal operations [12]. To enhance network robustness or design more robust networks, it is crucial to analyze and identify key components affecting controllability through node- and edge-removal attacks [12,13,14,15].
Attacks on networks can be categorized into random attacks and intentional attacks. Node-removal attacks are divided into random attacks and malicious attacks. Random attacks involve the random selection of targets, while malicious attacks select the most critical nodes based on network characteristics (such as degree, betweenness centrality, regional centrality [16], k-core [17], and structural holes [18]). These analyses can inform strategies to strengthen networks against malicious attacks or random failures. Therefore, studying the changes in controllability robustness of network systems under attack is crucial for improving system security and enhancing network stability.
Research has shown that among various attack strategies, those based on network characteristics are generally more effective than those based on random attacks. Recent studies have explored and designed many effective attack algorithms. For example, methods for assessing network centrality emphasize the importance of protecting critical nodes to enhance robustness [19]. Node-based attack strategies typically cause more damage to network controllability than edge-based strategies. Nodes are classified into multiple categories based on their impact on control [20]. Studies also indicate that certain topological structures, such as multi-chain and multi-ring configurations, can improve robustness [21]. Furthermore, removing cut vertices can cause more damage than standard malicious attacks, especially in networks with a high average degree [22]. The impact of node classification and failure on network controllability was studied in [23]; the nodes in the network were classified into nine types based on the directions of edges and matching relationships, and the impact of different types of node failures on network controllability was analyzed. Therefore, identifying target nodes for each attack to maximize the disruption of network controllability is a core challenge.
Based on this, an efficient node-removal attack model is proposed in this paper to study the controllability of directed networks. This model aims to minimize network controllability through strategic node removal. The concept of critical candidate nodes is introduced, and their impact on network controllability is examined by developing an attack model based on critical candidate nodes (CCA). Comparative experiments conducted on synthetic and real-world networks validate the effectiveness and efficiency of the proposed model, demonstrating that the CCA model achieves state-of-the-art performance in terms of attack effectiveness and time consumption.
The rest of this paper is organized as follows. Section 2 introduces the preliminary concepts of controllability and controllability robustness. Section 3 presents a detailed illustration of the proposed attack model, CCA. Section 4 demonstrates the experimental results on synthetic and real-world networks. Section 5 concludes this paper.

2. Network Controllability and Controllability Robustness

A complex system can be modeled as a directed complex network, which consists of many nodes and edges between pairs of nodes, where a node represents a functional component of the system and an edge represents a link between components. The network can be represented by G = ( V , E ) , where V denotes the set of nodes and E denotes the set of edges.
For a linear, time-invariant (LTI) networked system ( x ˙ = A x + B u , where A and B are constant matrices of compatible dimensions, x is the state vector, and u is the control input), [ B A B A 2 B A N 1 B ] is the controllability matrix of the LTI system, where N is the dimension of A and also the network size. A state-controllable system must have a full row rank of its controllability matrix. The concept of structural controllability is a slight generalization of state controllability to deal with two parameterized matrices (A and B) in which the parameters characterize the structure of the underlying system in the sense that if specific parameter values are ensuring the system to be state controllability then the system is structural controllability. If there is no control input ( u ) or B 0 , the networked system is uncontrollable; for a network of one-dimensional (scalar) nodes, the control of some nodes ensures the controllability of the network. Network controllability is measured by the minimum number of nodes with control inputs, called drive nodes (DNs). When the network is put into the above LTI system formulation, all the drive nodes can be described by the matrix (B).
Network controllability can be measured by the ratio of the minimum number of drive nodes to the total number of nodes as follows:
n D = N D N
where N D is the minimum number of drive nodes needed to retain network controllability, N is the total number of nodes, and a lower n D denotes the network has better controllability. The maximum matching of a directed network can determine the driver nodes and their minimum number, which quantifies the structural controllability of the network. Specifically, when finding the maximum matching, N D is determined by the number of mismatched nodes, and N D can be calculated in two ways; for structural controllability, it is expressed as follows:
N D = max { 1 , N E * } ,
and for exact (state) controllability, N D is calculated as follows:
N D = max { 1 , N r a n k ( A ) }
where E * is the number of nodes in the maximum matching ( E * ).
The controllability robustness of a network can be evaluated by recording the current controllability under a series of node-removal or edge-removal attacks; the recorded controllability sequence can be regarded as a controllability curve, which reflects how robust a networked system is against destructive attacks. The robustness curve under node-removal attacks is calculated as follows:
n D ( i ) = N D ( i ) N i , i = 0 , 1 , , N 1 ,
where i indicates the number of rounds of attack, N D ( i ) is the number of driver nodes needed to retain the current network controllability, and N is the total number of nodes in the original unattacked network. To measure the overall controllability robustness of a network, the controllability curves are averaged as follows:
R = 1 N 1 i = 1 N 1 n D ( i ) ,
where a lower R represents better overall controllability against node-removal attacks for a network.

3. Critical Candidate Node-Based Attack Model

The control of the entire network can be achieved with the minimum drive node set (MDS), and the number of elements in the MDS is also the minimum number of driver nodes; there may be multiple equivalent MDSs for a network derived from different control configurations. The possibility of a node ( V i ) being a driver node can be quantified based on the node control capacity, denoted by φ ( V i ) [24], i.e., how often the node appears in the MDS. According to the node control capacity, nodes can be classified into three categories, namely critical nodes, intermittent nodes, and redundant nodes. Their definitions are as follows:
(1)
Critical node: φ ( V i ) = 1 , meaning the node is a driver node in all MDSs. These nodes are essential for maintaining network controllability, and their removal significantly impairs control.
(2)
Intermittent node: 0 < φ ( V i ) < 1 , indicating that the node acts as a driver node in some but not all control configurations. These nodes have a variable role in control and can be crucial under certain conditions.
(3)
Redundant node: φ ( V i ) = 0 , showing the node is not a driver node in any MDSs. These nodes do not significantly impact the network’s overall control capacity, and their removal does not affect the network’s ability to maintain control.
All possible MDSs are illustrated in Figure 1a, with blue nodes corresponding to driver nodes and red arrows indicating the matching relationships. These matching relationships denote the control connections that enable driver nodes to influence other nodes in the network. Figure 1b–d show the three types of nodes in the network.
According to Equation (1), to minimize the controllability of a network, the proportion of driver nodes in the network needs to be increased, corresponding to an increase in the size of the MDS as much as possible; a larger MDS means the worse network controllability. An MDS consists of two parts, namely critical nodes and intermittent nodes, so network controllability can be disrupted in the following two ways:
(1)
Attacking the nodes in the network makes the intermittent nodes become critical nodes.
(2)
Attacking the nodes in the network makes the redundant nodes become intermittent or critical nodes in the MDS.
The roles of critical nodes and redundant nodes for the control of a network were investigated in [24,25], and it was shown that a sufficient condition for a node to be a critical node is that the in-degree of the node be 0. Therefore, whether a node is a critical node or not is closely related to the in-degree. If the predecessor node of some nodes in the network is removed, then the in-degree of these nodes can be changed to 0, thus making them become critical nodes. In other words, the in-degree of the successor node can be used as an important reference for node-removal attacks.

3.1. First-Order Critical Candidate Nodes

3.1.1. First-Order Critical Candidate Nodes (FCCNs)

If a node in the network has a successor node with an in-degree equal to 1, the node is called a first-order critical candidate node.
If a first-order critical candidate node ( V i ) is removed, it makes its successor node with an in-degree of 1 become a critical node. As seen in Figure 2a, at least three nodes are required to control the entire network; here, nodes 1, 2, and 7 are used as driver nodes. Nodes 1, 2, and 5 all contain successor nodes with an in-degree of 1, so these three nodes are all first-order critical candidates. After removing node 5, node 6 needs to be added as an additional driver node, while the number of driver nodes in the current network is increased by 1, i.e., a minimum of four nodes (1, 2, 6, and 7) is required to control the entire network, as shown in Figure 2b. Different first-order critical candidate nodes may have different numbers of nodes with an in-degree of 1 among their successor nodes, and removing them produces different numbers of critical nodes.

3.1.2. First-Order Candidate Degree (FCD)

First-order candidate degree is the number of nodes with an in-degree of 1 among the successor nodes of a first-order critical candidate node.
As shown in Figure 2a, the first-order candidate degrees of nodes 1 and 2 are both 1, while that of node 5 is 2, so node 5 should be attacked in priority; during the node-removal attack, it will produce more critical nodes if the first-order critical candidate node with the larger first-order candidate degree is removed.
In addition, the first-order critical candidate nodes in the network may disappear during attacks, or for some networks with a high average degree, there may be no first-order critical candidate nodes in the network. Therefore, it is also necessary to pay attention to other nodes that can disrupt network controllability.

3.2. Second-Order Critical Candidate Nodes

When there is no first-order critical candidate node in the network, if there is a node with an in-degree of 2, removing one of its predecessor nodes makes the in-degree of this node decrease to 1 so that another predecessor node of this node becomes a first-order critical candidate node.

3.2.1. Second-Order Critical Candidate Nodes (SCCNs)

If a node in the network has a successor node with an in-degree equal to 2, the node is called a second-order critical candidate node.
Similarly, the greater the number of nodes with in-degree of 2 among the successor nodes of a second-order critical candidate node, the more first-order critical candidate nodes produced after removing this node.

3.2.2. Second-Order Candidate Degree (SCD)

Second-order candidate degree is the number of nodes with an in-degree of 2 among the successor nodes of a second-order critical candidate node.

3.3. Critical Candidate Node-Based Attack Strategy

First of all, for some critical nodes, there are nodes with in-degrees of 1 or 2 among their successor nodes, so they are also first- or second-order critical candidate nodes. The size of an MDS does not increase when attacking this type of node, which is called the taboo node, and it should be avoided as much as possible during attacks. In Figure 2a, first-order critical candidate nodes 1 and 2 are also critical (driver) nodes. The remaining network after removing node 1 is shown in Figure 2c; the number of driver nodes does not increase, so both nodes 1 and 2 are taboo nodes. Therefore, before the node-removal attack, all nodes in the original network should be traversed to obtain all the taboo nodes and place them into the taboo list; then, the first- and second-order candidate degrees of nodes in the taboo list should be set to 0 to avoid selecting them as target nodes.
In summary, the priority attack orders in the proposed critical candidate node-based attack model are as follows: (1) the first-order critical candidate nodes of non-taboo nodes in the current network; (2) the second-order critical candidate nodes of non-taboo nodes; (3) if there is no first- or second-order critical candidate node in the current network, the node with the maximum degree (the maximum out-degree for directed networks) is attacked until the first- or second-order critical candidate node appears or until the end of the attack process. The specific program steps are shown in Algorithm 1. We also provide a mathematical proof detailing why attacking non-taboo successor nodes is effective and leads to an increase in the number of driver nodes.
Algorithm 1 Critical Candidate Node-based Attack
Input: a network G 0 with N nodes.
Output: index t of the node to be attacked.
  1: t a b o o _ l i s t A r r a y ( 0 )
  2: F C D A r r a y ( N )
  3: S C D A r r a y ( N )
  4: o u t _ d e g r e e s A r r a y ( N )
  5: for i = 1 to N do
  6:     if  g e t _ i n d e g r e e ( V i ) = = 0  then
  7:          t a b o o _ l i s t . i n s e r t ( i )
  8:     end if
  9: end for
10: for j = 1 to N do
11:     if j in t a b o o _ l i s t  then
12:          F C D [ j ] 0
13:          S C D [ j ] 0
14:     else
15:          F C D [ j ] c a l c u l a t e _ F C D ( V j )
16:          S C D [ j ] c a l c u l a t e _ S C D ( V j )
17:     end if
18:      o u t _ d e g r e e s [ j ] g e t _ o u t d e g r e e ( V j )
19: end for
20: if m a x ( F C D ) ! = 0 then
21:      t a r g m a x ( F C D )
22: else if  m a x ( S C D ) ! = 0 then
23:      t a r g m a x ( S C D )
24: else
25:      t a r g m a x ( o u t _ d e g r e e s )
26: end if
27: return t
Theorem 1.
After attacking the successor nodes that are non-taboo nodes, the number of driver nodes in the network increases, and the size of the minimum drive node set (MDS) increases; a larger MDS means worse network controllability. Conversely, attacking the successor nodes of taboo nodes, the number of driver nodes remains unchanged.
Proof. 
Let A N be the adjacency matrix of a directed graph with N nodes. If there exists a node ( v i ) with an out-degree 1 and its successor node is v j , then the adjacency matrix is represented as shown in Equation (6), where D N 2 is an ( N 2 ) × ( N 2 ) square matrix, a and c are ( N 2 ) -dimensional column vectors, b is an ( N 2 ) -dimensional row vector, 0 denotes an ( N 2 ) -dimensional zero vector, and d is either 1 or 0.
A N =     v 1 v 2     v j v i v 1 v 2     v j v i                                 D N 2     a c                                 b     0 d     0     1 0
After elementary transformations, Equation (6) is transformed into Equation (7). At this point, the rank of A N can be calculated using Equation (8).
A N =                                 D N 2     c a                                 b     d 0     0     0 1
Rank ( A N ) = 1 + Rank     D N 2 c     b d
Let N D represent the number of driver nodes. The formula for calculating the number of driver nodes is given by Equation (9).
N D = N Rank ( A N ) = ( N 1 ) Rank     D N 2 c     b d
Let the adjacency matrix of the network formed after attacking node v j be denoted as A N 1 , as shown in Equation (10). At this point, the count of driver nodes in the network is ( N 1 ) D , with the specific calculation given by Equation (11).
A N 1 =     v 1 v 2     v i v 1 v 2     v i                             D N 2     c                             0     0
( N 1 ) D = ( N 1 ) Rank ( A N 1 ) = ( N 1 ) Rank     D N 2 c     0 0
Due to the validity of Equation (12), we obtain Equation (13).
Rank     D N 2 c     b d Rank     D N 2 c     0 0
( N 1 ) D N D
x ·     D N 2 c     = b d
When Equation (14) has a solution, Equation (13) takes the ‘=’ sign, meaning that attacking the successor nodes of taboo nodes keeps the number of driver nodes unchanged. When Equation (14) has no solution, Equation (13) takes the ‘>’ sign, meaning that attacking the successor nodes of non-taboo nodes increases the number of driver nodes. Therefore, the theorem is proven. □

4. Numerical Experimental Studies

To verify the effectiveness of the proposed attack model, it is compared with node centrality-based attack models, which namely degree-, betweenness-, closeness, and pagerank-based attack strategies. It is also compared with hierarchical attack (HA) [20], which contributes state-of-the-art disruptive performance to network controllability. In the process of HA, all nodes are divided into four categories, namely critical nodes, subcritical nodes, normal nodes, and redundant nodes. The nodes in the first category are attacked in priority; if the first category is empty, then the nodes in the second category are attacked, and so on. Since HA requires calculating the impact of each node on the network after removal, it is time-consuming and difficult to apply to large-scale networks.
Six representative synthetic network models are used for attack simulation, including Erdös-Rényi (ER) random graph [26], Newman–Watts small-world (SW) [27], generic scale-free (SF) [28], q-snapback (QS) [29], random triangle (RT), and random rectangle (RR) [30]. Two real-world networks are also tested, namely Roget and inf-euroroad [31]. The controllability robustness (R) calculated by Equation (5) is used to evaluate the performance of all compared attack models. A higher value of R means worse overall controllability robustness under an attack model; it also indicates that the attack model is more destructive.
To eliminate the effect of randomness, each experimental case is run independently and repeated 30 times. The averaged results are reported, and all experiments are performed on a PC with Intel(R) Core i7-6700 CPU, which has 8 GB memory running a Windows10 Operating System.

4.1. Attack Simulation on Synthetic Networks of Different Sizes

In general, large-scale networks are relatively more complex and sufficient in terms of structure, and the network size usually affects the network controllability robustness, i.e., more driver nodes are usually required for a larger network when the average degree ( k ) is the same. Also, for node-removal attacks, computation on large-scale networks is more time-consuming.
In this experiment, three different sizes of networks are tested, namely 500, 1000, and 1500. There are a total of 3 × 6 = 18 instances, namely three network sizes and six synthetic network models; each instance keeps the same average degree of k = 5 .
Figure 3 illustrates the change in controllability ( n D ) calculated by Equation (1) and the minimum number of drive nodes ( N D ) calculated by Equation (2) during node-removal attacks. n D depends on the minimum number of drive nodes ( N D ) and the network size (N); N decreases during attacks. Therefore, n D is equal to 1 at some point, which means that all nodes of the current network are driver nodes, i.e., all nodes are isolated. The rising curve of n D proves that the attacks are effective. For N D , the curve starts to decrease with network size when all nodes are isolated (driver nodes).
Table 1 lists the overall controllability robustness (R) calculated by Equation (5) for all cases. For all 18 comparison cases, CCA obtains a total of 11 best performances, while HA obtains 7 and the others obtain 0. Averaging the results across the six types of networks, CCA achieves the best performance at all three network sizes, and HA performs worse than CCA but better than the other methods.
Table 2 shows the time consumption of all methods on three different network sizes. It is clear that degree-, pagerank-, and closeness-based attacks cost very little time, while betweenness-based attacks and HA cost relatively more time and CCA takes less time than both HA and betweenness-based attacks. According to Table 1, for the other methods, performance and time consumption are often proportional, but the proposed CCA achieves the best performance while greatly reducing time complexity.

4.2. Attack Simulation on Synthetic Networks of Different Average Degrees

It is pointed out that sparse and heterogeneous networks are harder to control and less robust in network controllability, while dense and homogeneous networks are easy to control and have better robustness in network controllability [4]. So a network with a large average degree k always has good controllability robustness, and it is correspondingly difficult to disrupt the network controllability by malicious attacks.
In this experiment, all networks keep the same size N = 1000 , while consisting of 4 groups, in each group, the average degrees are 3, 5, 7, and 10 respectively. So, there are a total of 4 × 6 = 24 instances, namely 4 average degrees and 6 synthetic network models, and each instance keeps the same network size N = 1000 .
As shown in Table 3, for any type of attack, the controllability robustness R decreases continuously as the average degree of the networks grows, which also indicates that the network becomes more resistant to attacks and more robust. Nevertheless, the CCA model is highly adaptive and can still disrupt the network controllability for different average degrees efficiently, and the larger the average degree the more obvious the effectiveness of CCA. Specifically, for the overall ranking, the attack effectiveness of CCA is slightly inferior to that of HA for an average degree of k = 3 , while better in all other cases.

4.3. Attack Simulation on Real-World Networks

In this experiment, two real-world networks are used to test the attack models, namely Roget (1022 nodes and 5075 edges) and inf-euroroad (1175 nodes and 1417 edges).
As shown in Table 4, CCA achieves the best performance on both real-world networks when considering both effectiveness and time complexity. Specifically, for the attack model HA, which has similar effectiveness with CCA but takes about 453 and 447 times longer; for the other models, the time consumptions are similar, but the attack effectiveness is far less than that of CCA.

4.4. Visualization of Target Node Selection during Attack Simulation

In this experiment, two ER networks with average degrees of k = 5 and k = 10 are attacked by CCA; both networks consist of N = 500 nodes. The selected target node in each step during attacks is recorded, and whether it is a first-order critical candidate node, second-order critical candidate node, or a node with a maximum degree is visualized.
The complete attack process is visualized in Figure 4, where 1, 2, and 3 in the vertical coordinates represent the attack on the first-order critical candidate nodes, second-order critical candidate nodes, and nodes with maximum degree, respectively. As shown in Figure 4a, there are initially 10 first-order critical candidate nodes. After removing all first-order critical candidate nodes, the second-order critical candidate nodes start to be attacked, and after that, the first-order critical candidate nodes can be produced, so first- and second-order critical candidate nodes are alternately attacked until there are no second-order critical candidate nodes. Finally, as before, the first- and second-order critical candidate nodes are also produced when the node with the maximum degree is attacked, so the first- and second-order critical candidate nodes, was well as nodes with the maximum degree are alternately attacked until all nodes are isolated.
As shown in Figure 4b, for a network with a high average degree, there are rarely critical candidate nodes, so a degree-based attack is used preferentially to produce a large number of first- or second-order critical candidate nodes until all nodes in the network are isolated.

5. Conclusions

Assessing and disrupting network controllability is crucial for understanding and enhancing network resilience against malicious attacks. In this paper, a novel attack model based on critical candidate nodes is proposed. By categorizing nodes into first-order and second-order critical candidate nodes according to the in-degrees of their successor nodes, this approach identifies and targets nodes pivotal for maintaining network controllability. This method not only improves the efficiency of node-removal attacks by minimizing computation time but also ensures maximal disruption compared to traditional methods.
Extensive simulations on both synthetic and real-world networks demonstrate the superiority of the proposed model in effectively reducing network controllability. The findings highlight the significant impact of critical candidate nodes in maintaining network robustness, providing a new perspective for understanding and enhancing network resilience against malicious attacks.
However, this study also has certain limitations. The current model primarily focuses on directed networks, and its applicability to undirected or weighted networks requires further investigation. Future work could explore adaptive attack strategies that account for dynamic network changes and the development of defense mechanisms to counteract such targeted attacks.

Author Contributions

Conceptualization, software, investigation, methodology, writing—original draft preparation, W.H.; formal analysis, visualization, L.C.; investigation, project ad ministration and supervision, J.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported in part by the National Natural Science Foundation of China (number 62002249) and in part by the Open Project Program of the State Key Lab of CADCG (A2112), Zhejiang University.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Barabási, A. Network Science; Cambridge University Press: Cambridge, MA, USA, 2016. [Google Scholar]
  2. Newman, M.E. Networks, 2nd ed.; Oxford University Press: Oxford, UK, 2018. [Google Scholar]
  3. Chen, G.; Wang, X.; Li, X. Fundamentals of Complex Networks: Models, Structures and Dynamics, 2nd ed.; John Wiley & Sons: Hoboken, NJ, USA, 2014. [Google Scholar]
  4. Liu, Y.; Slotine, J.J.; Barabási, A. Controllability of Complex Networks. Nature 2011, 473, 167–173. [Google Scholar] [CrossRef] [PubMed]
  5. Yuan, Z.; Zhao, C.; Di, Z.; Wang, W.; Lai, Y. Exact Controllability of Complex Networks. Nat. Commun. 2013, 4, 2447. [Google Scholar] [CrossRef] [PubMed]
  6. Lou, Y.; Li, J.; Li, S.; Deng, H. Recent progress in controllability robustness of complex networks. Acta Autom. Sin. 2022, 48, 2374–2391. [Google Scholar] [CrossRef]
  7. Duan, G. High-order System Approaches: II. Controllability and Full-actuation. Acta Autom. Sin. 2020, 46, 1571–1581. [Google Scholar]
  8. Xing, W.; Shi, P.; Agarwal, R.K.; Zhao, Y. A survey on global pinning synchronization of complex networks. J. Frankl. Inst. 2019, 356, 3590–3611. [Google Scholar] [CrossRef]
  9. Wang, X.; Chen, G. Pinning control of scale-free dynamical networks. Phys. A Stat. Mech. Appl. 2002, 310, 521–531. [Google Scholar] [CrossRef]
  10. Shi, Y.; Li, Q. Adaptive finite-time synchronization of complex dynamical networks. Control Theoty Appl. 2020, 37, 147–154. [Google Scholar] [CrossRef]
  11. Lou, Y.; Wang, L.; Chen, G. Structural Robustness of Complex Networks: A Survey of a posteriori Measures. IEEE Circuits Syst. Mag. 2023, 23, 12–35. [Google Scholar] [CrossRef]
  12. Lou, Y.; He, Y.; Wang, L.; Tsang, K.F.; Chen, G. Knowledge-Based Prediction of Network Controllability Robustness. IEEE Trans. Neural Netw. Learn. Syst. 2021, 33, 5739–5750. [Google Scholar] [CrossRef]
  13. Li, S.; Liu, W.; Wu, R.; Li, J. An adaptive attack model to network controllability. Reliab. Eng. Syst. Saf. 2023, 235, 109252. [Google Scholar] [CrossRef]
  14. Lou, Y.; He, Y.; Wang, L.; Chen, G. Predicting Network Controllability Robustness: A Convolutional Neural Network Approach. IEEE Trans. Cybern. 2022, 52, 4052–4063. [Google Scholar] [CrossRef] [PubMed]
  15. Lou, Y.; Wu, R.; Li, J.; Wang, L.; Li, X.; Chen, G. A Learning Convolutional Neural Network Approach for Network Robustness Prediction. IEEE Trans. Cybern. 2022, 53, 4531–4544. [Google Scholar] [CrossRef]
  16. Wang, Z.; Deng, Y.; Wang, Z.; Wu, J. Disintegrating spatial networks based on region centrality. Chaos Interdiscip. J. Nonlinear Sci. 2021, 31, 061101. [Google Scholar] [CrossRef] [PubMed]
  17. Shang, Y. Generalized k-core percolation on correlated and uncorrelated multiplex networks. Phys. Rev. E 2020, 101, 042306. [Google Scholar] [CrossRef]
  18. Yang, H.; An, S. Critical Nodes Identification in Complex Networks. Symmetry 2020, 12, 123. [Google Scholar] [CrossRef]
  19. Lu, Z.; Li, X. Attack Vulnerability of Network Controllability. PLoS ONE 2016, 11, e0162289. [Google Scholar] [CrossRef]
  20. Lou, Y.; Wang, L.; Chen, G. A Framework of Hierarchical Attacks to Network Controllability. Commun. Nonlinear Sci. Numer. Simul. 2021, 98, 105780. [Google Scholar] [CrossRef]
  21. Chen, G.; Lou, Y.; Wang, L. A Comparative Study on Controllability Robustness of Complex Networks. IEEE Trans. Circuits Syst. II Express Briefs 2019, 66, 828–832. [Google Scholar] [CrossRef]
  22. Wang, L.; Zhao, Y.; Duan, L.; Yu, M. Effect of cut vertexes-removal on controllability of complex networks. Control Decis. 2019, 34, 2310–2316. [Google Scholar] [CrossRef]
  23. Kong, Z.; Yuan, H.; Wang, L.; Guo, G. Node classification and the influence of node failure on network controllability. Acta Autom. Sin. 2022, 48, 1048–1059. [Google Scholar]
  24. Jia, T.; Barabási, A. Control Capacity and A Random Sampling Method in Exploring Controllability of Complex Networks. Sci. Rep. 2013, 3, 2354. [Google Scholar] [CrossRef] [PubMed]
  25. Jia, T.; Liu, Y.; Csóka, E.; Pósfai, M.; Slotine, J.J.; Barabási, A. Emergence of bimodality in controlling complex networks. Nat. Commun. 2013, 4, 2002. [Google Scholar] [CrossRef] [PubMed]
  26. Erdös, P.; Rényi, A. On the Strength of Connectedness of a Random Graph. Acta Math. Hung. 1964, 12, 261–267. [Google Scholar] [CrossRef]
  27. Newman, M.E.; Watts, D.J. Renormalization Group Analysis of the Small-world Network Model. Phys. Lett. A 1999, 263, 341–346. [Google Scholar] [CrossRef]
  28. Goh, K.I.; Kahng, B.; Kim, D. Universal Behavior of Load Distribution in Scale-free Networks. Phys. Rev. Lett. 2001, 87, 278701. [Google Scholar] [CrossRef] [PubMed]
  29. Lou, Y.; Wang, L.; Chen, G. Toward Stronger Robustness of Network Controllability: A Snapback Network Model. IEEE Trans. Circuits Syst. I Regul. Pap. 2018, 65, 2983–2991. [Google Scholar] [CrossRef]
  30. Lou, Y.; Yang, D.; Wang, L.; Tang, C.B.; Chen, G. Controllability Robustness of Henneberg-Growth Complex Networks. IEEE Access 2022, 10, 5103–5114. [Google Scholar] [CrossRef]
  31. Rossi, R.; Ahmed, N. The Network Data Repository with Interactive Graph Analytics and Visualization. In Proceedings of the AAAI Conference on Artificial Intelligence. Association for the Advancement of Artificial Intelligence (AAAI), Austin, TX, USA, 25–30 January 2015; Volume 29. [Google Scholar] [CrossRef]
Figure 1. The figure distinguishes essential driver nodes and their relationships (upper part) and details different node types’ roles and importance in network controllability (lower part). The gray nodes in the Figure 1 are ordinary nodes in the network.
Figure 1. The figure distinguishes essential driver nodes and their relationships (upper part) and details different node types’ roles and importance in network controllability (lower part). The gray nodes in the Figure 1 are ordinary nodes in the network.
Entropy 26 00580 g001
Figure 2. (b,c) show changes in network driver nodes after attacking critical candidate nodes in (a). Attacking non-taboo nodes increases driver nodes (b), while attacking taboo nodes shows no change (c).
Figure 2. (b,c) show changes in network driver nodes after attacking critical candidate nodes in (a). Attacking non-taboo nodes increases driver nodes (b), while attacking taboo nodes shows no change (c).
Entropy 26 00580 g002
Figure 3. Results of attack simulation on networks with N = 1000 and k = 5 , n D is calculated by Equation (1) and N D is calculated by Equation (2), P is the proportion of removed nodes.
Figure 3. Results of attack simulation on networks with N = 1000 and k = 5 , n D is calculated by Equation (1) and N D is calculated by Equation (2), P is the proportion of removed nodes.
Entropy 26 00580 g003
Figure 4. Visualization of the CCA process.
Figure 4. Visualization of the CCA process.
Entropy 26 00580 g004
Table 1. Results of attack simulation on networks of different sizes with k = 5 .
Table 1. Results of attack simulation on networks of different sizes with k = 5 .
NetworkAttack N = 500 N = 1000 N = 1500
RRankRRankRRank
ERBetweenness0.456530.453530.45443
Degree0.427740.426640.42644
Pagerank0.426950.42350.4255
Closeness0.386660.383160.38326
HA0.526520.525720.52442
CCA0.540610.540810.54121
SFBetweenness0.809360.826760.83796
Degree0.852630.873530.88433
Pagerank0.843440.866940.87824
Closeness0.839550.862450.87485
HA0.877110.895610.90471
CCA0.870520.890220.89962
SWBetweenness0.415930.41730.41483
Degree0.380650.385140.38584
Pagerank0.381240.380750.38155
Closeness0.332260.335960.33626
HA0.474220.480420.47532
CCA0.507210.510510.51211
QSBetweenness0.462720.461630.45993
Degree0.414130.412340.41374
Pagerank0.339440.345350.34715
Closeness0.33250.330160.32816
HA0.33250.54710.54831
CCA0.528910.529520.53062
RTBetweenness0.494630.497140.49765
Degree0.490240.49750.49774
Pagerank0.5220.523430.52323
Closeness0.471150.47660.47526
HA0.471150.58810.58651
CCA0.580810.582920.58222
RRBetweenness0.466220.466630.46463
Degree0.458330.460140.45974
Pagerank0.446440.447850.45055
Closeness0.411550.413560.41446
HA0.411550.542520.54332
CCA0.559810.559610.56181
Avg.Betweenness0.51820.5230.5223
Degree0.50440.50940.5114
Pagerank0.49350.49850.5015
Closeness0.46260.46760.4696
HA0.51530.59720.5972
CCA0.59810.60210.6051
Table 2. Run time of attack simulations on networks of different sizes with k = 5 .
Table 2. Run time of attack simulations on networks of different sizes with k = 5 .
Attack N = 500 N = 1000 N = 1500
Betweenness4.23 (s)33.72 (s)114.78 (s)
Degree0.15 (s)1.21 (s)4.06 (s)
Pagerank0.49 (s)2.37 (s)6.32 (s)
Closeness0.62 (s)3.94 (s)10.69 (s)
HA50.49 (s)720.22 (s)7389.36 (s)
CCA1.62 (s)5.59 (s)14.30 (s)
Table 3. Results of attack simulation on networks of different average degree k .
Table 3. Results of attack simulation on networks of different average degree k .
NetworkAttack k = 3 k = 5 k = 7 k = 10
RRankRRankRRankRRank
ERBetweenness0.588930.453530.372330.29443
Degree0.580840.426640.332350.25845
Pagerank0.558850.42350.34940.28074
Closeness0.537760.383160.295560.22736
HA0.679810.525720.427620.33222
CCA0.665920.540810.450510.35571
SFBetweenness0.875160.826760.781360.72166
Degree0.925630.873530.823630.7553
Pagerank0.921840.866940.813140.74294
Closeness0.919350.862450.809550.7365
HA0.938910.895610.852610.79411
CCA0.935520.890220.845420.78372
SWBetweenness0.509630.41730.351330.28633
Degree0.487340.385140.31650.24855
Pagerank0.439850.380750.327640.26864
Closeness0.415960.335960.27660.21526
HA0.595320.480420.393520.32162
CCA0.614510.510510.428710.34271
QSBetweenness0.541630.461630.407430.34583
Degree0.506940.412340.352740.28884
Pagerank0.419560.345350.280950.21446
Closeness0.421350.330160.27160.21925
HA0.631610.54710.479310.40381
CCA0.618320.529520.457120.37722
RTBetweenness0.626660.497140.413740.33074
Degree0.64840.49750.398750.30615
Pagerank0.679130.523430.425530.33743
Closeness0.638250.47660.37660.28416
HA0.719710.58810.487420.37992
CCA0.697220.582920.499810.40671
RRBetweenness0.58330.466630.38830.31283
Degree0.578740.460140.374550.2955
Pagerank0.554650.447850.376140.30394
Closeness0.533960.413560.333160.25876
HA0.657710.542520.452520.35892
CCA0.654220.559610.479510.38581
Avg.Betweenness0.62130.5230.45230.3823
Degree0.62130.50940.43340.3594
Pagerank0.59650.49850.42950.3585
Closeness0.57860.46760.39460.3236
HA0.70410.59720.51520.4322
CCA0.69820.60210.52710.4421
Table 4. Results of attack simulation on real-world networks.
Table 4. Results of attack simulation on real-world networks.
Roget ( N = 1022 , k = 4.97 )
AttackRRankTime
Betweenness0.4998640.65 (s)
Degree0.56542.12(s)
Pagerank0.617234.83 (s)
Closeness0.51553.35 (s)
HA0.643522737.55 (s)
CCA0.646516.04 (s)
inf-euroroad ( N = 1175 , k = 1.2 )
AttackRRankTime
Betweenness0.7181441.89 (s)
Degree0.751132.12 (s)
Pagerank0.649863.47 (s)
Closeness0.700554.89 (s)
HA0.810412745.19 (s)
CCA0.794526.14 (s)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Huang, W.; Chen, L.; Li, J. A Critical Candidate Node-Based Attack Model of Network Controllability. Entropy 2024, 26, 580. https://doi.org/10.3390/e26070580

AMA Style

Huang W, Chen L, Li J. A Critical Candidate Node-Based Attack Model of Network Controllability. Entropy. 2024; 26(7):580. https://doi.org/10.3390/e26070580

Chicago/Turabian Style

Huang, Wenli, Liang Chen, and Junli Li. 2024. "A Critical Candidate Node-Based Attack Model of Network Controllability" Entropy 26, no. 7: 580. https://doi.org/10.3390/e26070580

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop