Advanced Search
Volume 39 Issue 3
Mar.  2017
Turn off MathJax
Article Contents
SUN Yu, YAO Peiyang, ZHANG Jieyong, FU Kai. Node Attack Strategy of Complex Networks Based on Optimization Theory[J]. Journal of Electronics & Information Technology, 2017, 39(3): 518-524. doi: 10.11999/JEIT160396
Citation: SUN Yu, YAO Peiyang, ZHANG Jieyong, FU Kai. Node Attack Strategy of Complex Networks Based on Optimization Theory[J]. Journal of Electronics & Information Technology, 2017, 39(3): 518-524. doi: 10.11999/JEIT160396

Node Attack Strategy of Complex Networks Based on Optimization Theory

doi: 10.11999/JEIT160396
Funds:

The National Natural Science Foundation of China (61573017)

  • Received Date: 2016-04-22
  • Rev Recd Date: 2016-10-31
  • Publish Date: 2017-03-19
  • This study proposes a new node attack strategy of complex networks by analyzing the disadvantages of traditional strategies. The idea of the new strategy is to treat the construction problem of node attack sequence as an optimal problem rather than an evaluation problem. To achieve this strategy, the study designs a survivability index of complex networks to measure the attack effect created by a node attack sequence, then establishes a construction model of node attack sequence with the goal to maximize attack effect, and further brings forward an algorithm based on tabu search to solve the model. Experiment results from real networks and simulated networks show that the new strategy is more effective than others.
  • JIANG Y and WANG Y B. Analysis of attack and defense strategies on complex networks[C]. Proceedings of International Conference on Sensor Network Security Technology and Privacy Communication System, Harbin, China, 2013: 58-62.
    ALBERT R, JEONG H, and BARABASI A L. Error and attack tolerance of complex networks[J]. Nature, 2000, 406: 378-382. doi: 10.1038/35019019.
    HOLME P, KIM B J, YOON C N, et al. Attack vulnerability of complex networks[J]. Physical Review E, 2002, 65(5): 056109. doi: 10.1103/PhysRevE.65.056109.
    BELLINGERI M, CASSI D, and VINCENZI S. Efficiency of attack strategies on complex model and real-world networks [J]. Physica A, 2014, 414: 174-180. doi: 10.1016/j.physa.2014. 06.079.
    NIE T Y, GUO Z, ZHAO K, et al. New attack strategies for complex networks[J]. Physica A, 2015, 424: 248-253. doi: 10.1016/j.physa.2015.01.004.
    聂廷远, 郭征, 李坤龙. 复杂网络的攻击策略研究[J]. 计算机仿真, 2015, 32(7): 286-289. doi: 10.3969/j.issn.1006-9348. 2015.07.063.
    NIE Tingyuan, GUO Zheng, and LI Kunlong. A study of attack strategies for complex networks[J]. Computer Simulation, 2015, 32(7): 286-289. doi: 10.3969/j.issn.1006- 9348.2015.07.063.
    XIAO S and XIAO G. On intentional attacks and protections in complex communication networks[C]. Proceedings of IEEE Global Telecommunications Conference, San Francisco, CA, USA, 2006: 1-5.
    李涛, 裴文江. 针对重叠社团结构的复杂网络多靶向攻击策略[J]. 北京邮电大学学报, 2010, 33(3): 34-39. doi: 10.3969/ j.issn.1007-5321.2010.03.007.
    LI Tao and PEI Wenjiang. Multi-targets attack strategy based on the overlapping community structure of complex networks[J]. Journal of Beijing University of Posts and Telecommunications, 2010, 33(3): 34-39. doi: 10.3969/j.issn. 1007-5321.2010.03.007.
    WANG H, HUANG J Y, XU X M, et al. Damage attack on complex networks[J]. Physica A, 2014, 408: 134-148. doi: 10. 1016/j.physa.2014.04.001.
    ANURAG S, RAHUL K, and YATINDRA N S. Impact of structural centrality based attacks in complex networks[J]. Acta Physica Polonica B, 2015, 46(2): 305-324. doi: 10.5506/ APhysPolB.46.305.
    DENG Y, WU J, and TAN Y J. Optimal attack strategy of complex networks based on tabu search[J]. Physica A, 2016, 442: 74-81. doi: 10.1016/j.physa.2015.08.043.
    HERRNANN H J, SCHNEIDER C M, MOREIRA A A, et al. Onion-like network topology enhances robustness against malicious attacks[J]. Journal of Statistical Mechanics: Theory and Experiment, 2011, 1: P01027. doi: 10.1088/1742-5468/ 2011/01/P01027.
    SCHNEIDER C M, MOREIRA A A, ANDRADE J S, et al. Mitigation of malicious attacks on networks[J]. Proceedings of the National Academy of Sciences, of the United States of America 2011, 108(10): 3838-3841. doi: 10.1073/pnas. 1009440108.
    LOUZADA V H P, DAOLIO F, HERRMANN H J, et al. Smart rewiring for network robustness[J]. Journal of Complex Networks, 2013, 1(2): 150-159. doi: 10.1093/comnet/xxx000.
    BURKE E K and KENDALL G. Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques[M]. New York: Springer, 2005: 165.
    LATORA V and MARCHIORI M. Efficient behavior of small-world networks[J]. Physical Review Letters, 2001, 87(19): 198701. doi: 10.1103/PhysRevLett.87.198701.
    陈勇, 胡爱群, 胡啸. 通信网中节点重要性的评价方法[J].通信学报, 2004, 25(8): 129-135. doi: 10.3321/ j.issn:1000-436X. 2004.08.018.
    CHEN Yong, HU Aiqun, and HU Xiao. Evaluation method for node importance in communication networks[J]. Journal on Communications, 2004, 25(8): 129-135. doi: 10.3321/j.issn: 1000-436X.2004.08.018.
    于会, 刘尊, 李勇军. 基于多属性决策的复杂网络节点重要性综合评价方法[J]. 物理学报, 2013, 62(2): 1-9. doi: 10.7498/ aps.62.020204.
    YU Hui, LIU Zun, and LI Yongjun. Key nodes in complex networks identified by multi-attribute decision-making method[J]. Acta Physica Sinica, 2013, 62(2): 1-9. doi: 10.7498 /aps.62.020204.
    秦李, 杨子龙, 黄曙光. 复杂网络的节点重要性综合评价[J]. 计算机科学, 2015, 42(2): 60-64. doi: 10. 11896/j.issn.1002- 137X.2015.2.013.
    QIN Li, YANG Zilong, and HUANG Shuguang. Synthesis evaluation method for node importance in complex networks [J]. Computer Science, 2015, 42(2): 60-64. doi: 10.11896/ j.issn.1002-137X.2015.2.013.
    PAGE L and PERRY J. Reliability polynomials and links importance in networks[J]. IEEE Transactions on Reliability, 1994, 43(1): 51-58. doi: QK.IEL.1994.0000024.0007056. 00285108.
  • Cited by

    Periodical cited type(17)

    1. YANG Kewei,LI Jichao,LIU Maidi,LEI Tianyang,XU Xueming,WU Hongqian,CAO Jiaping,QI Gaoxin. Complex systems and network science: a survey. Journal of Systems Engineering and Electronics. 2023(03): 543-573 .
    2. 邓浩,武瑞梓,于卓然,李均利. 复杂网络能控性鲁棒性最优攻击序列研究. 小型微型计算机系统. 2023(08): 1842-1849 .
    3. 郑治华,徐冰茹,罗蓉娟,张安祥. 考虑重连机制的电力物资供应链网络鲁棒性研究. 供应链管理. 2023(10): 62-71 .
    4. 牛志强,焦雯雯. 突发事件下中蒙跨境物流网络风险评估. 综合运输. 2023(10): 139-143+181 .
    5. 郭晶,王勇. 信息系统可靠性保障能力提升研究. 电力安全技术. 2022(07): 34-38 .
    6. 楼洋,李均利,李升,邓浩. 复杂网络能控性鲁棒性研究进展. 自动化学报. 2022(10): 2374-2391 .
    7. 吴嫣媛,刘向军. 考虑级联失效影响的复杂网络关键节点识别. 计算机工程与设计. 2021(04): 920-926 .
    8. 崔慧霞,邱建龙,郭明,张润发. 有向加权供应链网络级联失效的抗毁性研究. 控制理论与应用. 2021(11): 1828-1834 .
    9. 王丹丹. 网络级联抗毁攻击信息层次化分类仿真研究. 计算机仿真. 2020(02): 329-333 .
    10. 冯小伟,胡聪,许畅,吴斌,倪平波,刘向军. 基于网络效率最优的关键节点识别方法. 计算机工程与设计. 2019(02): 328-335 .
    11. 陶汝虚,吴光凤. 移动自组织网络攻击信息支援效能评估仿真. 计算机仿真. 2019(02): 263-266+446 .
    12. 周家丞. 无线移动网络抗毁性测度指标优化修正仿真. 计算机仿真. 2019(02): 283-286+413 .
    13. 王硕锋. 复杂条件下隐写信息网络抗毁性能检测仿真. 计算机仿真. 2019(10): 434-438 .
    14. 王尔申,李宇,宏晨,孙庆华,刘畅. Linux软件网络的结构属性及静态稳健性. 电信科学. 2019(11): 9-18 .
    15. 韦小铃,阳建中. 节点失效模式下复杂网络结构抗毁性优化仿真. 计算机仿真. 2018(05): 249-253 .
    16. 吴丹,赵江. 基于复杂网络视角的网络图书广告鲁棒性分析. 浙江理工大学学报(社会科学版). 2018(02): 119-124 .
    17. 龚小刚,叶卫,方舟,王云烨. 模拟复杂网络下子网络节点抗攻击设计. 计算机测量与控制. 2017(12): 263-266 .

    Other cited types(21)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1949) PDF downloads(580) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return