Skip to main content
Log in

Robustness of power-law networks: its assessment and optimization

  • Published:
Journal of Combinatorial Optimization Aims and scope Submit manuscript

Abstract

Many practical complex networks, such as the Internet, WWW and social networks, are discovered to follow power-law distribution in their degree sequences, i.e., the number of nodes with degree \(i\) in these networks is proportional to \(i^{-\beta }\) for some exponential factor \(\beta > 0\). However, these networks also expose their vulnerabilities to a great number of threats such as adversarial attacks on the Internet, cyber-crimes on the WWW or malware propagations on social networks. Although power-law networks have been found robust under random attacks and vulnerable to intentional attacks via experimental observations, how to better understand their vulnerabilities from a theoretical point of view still remains open. In this paper, we study the vulnerability of power-law networks under random attacks and adversarial attacks using the in-depth probabilistic analysis on the theory of random power-law graph models. Our results indicate that power-law networks are able to tolerate random failures if their exponential factor \(\beta \) is \(<\)2.9, and they are more robust against intentional attacks if \(\beta \) is smaller. Furthermore, we reveal the best range \([1.8, 2.5]\) for the exponential factor \(\beta \) by optimizing the complex networks in terms of both their vulnerabilities and costs. When \(\beta < 1.8\), the network maintenance cost is very expensive, and when \(\beta > 2.5\) the network robustness is unpredictable since it depends on the specific attacking strategy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Aiello W, Chung F, Lu L (2000) A random graph model for massive graphs. In Proceedings of the thirty-second annual ACM symposium on Theory of computing, STOC ’00, pp 171–180, New York, NY, USA. ACM

  • Albert R, Albert I, Nakarado GL (2004) Structural vulnerability of the north american power grid. Phys Rev E 69(2):025103

    Article  Google Scholar 

  • Albert R, Jeong H, Barabasi A (2000) Error and attack tolerance of complex networks. Nature 406(6794):378–382

    Article  Google Scholar 

  • Alderson DL, Doyle JC (2010) Contrasting views of complexity and their implications for network-centric infrastructures. Trans Syst Man Cybern Part A 40(4):839–852

    Article  Google Scholar 

  • Barabasi AL, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509–512

    Article  MathSciNet  MATH  Google Scholar 

  • Bollobás B, Riordan O, Spencer J, Tusnády G (2001) The degree sequence of a scale-free random graph process. Random Struct Algorithms 18(3):279–290

    Article  MathSciNet  MATH  Google Scholar 

  • Chung F, Lu L (2002) Connected components in random graphs with given expected degree sequences. Ann Comb 6(2):125–145

    Article  MathSciNet  MATH  Google Scholar 

  • Chung F, Lu L (2006) Concentration inequalities and martingale inequalities: a survey. Internet Math 3(1):79–127

    Article  MathSciNet  MATH  Google Scholar 

  • Cohen R, Erez K, Ben-Avraham D, Havlin S (2000) Resilience of the internet to random breakdowns. Phys Rev Lett 85(21):4626

  • Dinh T, Thai M, Nguyen H (2014) Bound and exact methods for assessing link vulnerability in complex networks. J Comb Optim 28(1):3–24

    Article  MathSciNet  MATH  Google Scholar 

  • Dinh TN, Xuan Y, Thai MT, Pardalos PM, Znati T (2011) IEEE/ACM Transactions on On new approaches of assessing network vulnerability: Hardness and approximation. Networking, PP(99):1

  • Doyle JC, Alderson DL, Li L, Low S, Roughan M, Shalunov S, Tanaka R, Willinger W (2005) The “robust yet fragile” nature of the Internet. Proc Natl Acad Sci USA, 102

  • Faloutsos M, Faloutsos P, Faloutsos C (1999) On power-law relationships of the internet topology. In Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, SIGCOMM ’99, pp 251–262, New York, NY, USA. ACM

  • Gkantsidis C, Mihail M, Zegura E (2003) The markov chain simulation method for generating connected power law random graphs. In Proceedings of the 5th Workshop on Algorithm Engineering and Experiments (ALENEX). SIAM

  • Holme P, Kim BJ, Yoon CN, Han SK (2002) Attack vulnerability of complex networks. Phys Rev E 65(5):056109

    Article  Google Scholar 

  • Jamakovic A, Van Mieghem P (2008) On the robustness of complex networks by using the algebraic connectivity. In Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet, NETWORKING’08, pp 183–194, Berlin, Heidelberg. Springer-Verlag

  • Kaiser M, Hilgetag CC (2004) Edge vulnerability in neural and metabolic networks. Biol Cybern 90:311–317. doi:10.1007/s00422-004-0479-1

    Article  MATH  Google Scholar 

  • Kitsak M, Havlin S, Paul G, Riccaboni M, Pammolli F, Stanley HE (2007) Betweenness centrality of fractal and nonfractal scale-free model networks and tests on real networks. Phys Rev E (Statistical, Nonlinear, and Soft Matter Physics) 75(5):056115

  • Lakhina A, Papagiannaki K, Crovella M, Diot C, Kolaczyk ED, Taft N (2004) Structural analysis of network traffic flows. In Proceedings of the joint international conference on Measurement and modeling of computer systems, SIGMETRICS ’04/Performance ’04, pp 61–72, New York NY, USA. ACM

  • Luciano, Rodrigues F, Travieso G, Boas VPR (2007) Characterization of complex networks: a survey of measurements. Adv Phys 56(1):167–242

    Article  Google Scholar 

  • Marin-Perianu RS, Scholten J, Havinga PJM, Hartel PH (2008) Cluster-based service discovery for heterogeneous wireless sensor networks. Int J Parallel Emerg Distrib Syst 23(4):325–346

    Article  MathSciNet  MATH  Google Scholar 

  • Matisziw TC, Murray AT (2009) Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure. Comput Oper Res 36(1):16–26 Part Special Issue: Operations Research Approaches for Disaster Recovery Planning

    Article  MATH  Google Scholar 

  • Mayo M, Abdelzaher A, Ghosh P (2015) Long-range degree correlations in complex networks. Comput Soc Netw 2(1):1–13

    Article  Google Scholar 

  • Molloy M, Reed B (1995) A critical point for random graphs with a given degree sequence. Random Struct Algorithms 6:161–179

    Article  MathSciNet  MATH  Google Scholar 

  • Molloy M, Reed B (1998) The size of the giant component of a random graph with a given degree sequence. Comb Probab Comput 7(3):295–305

    Article  MathSciNet  MATH  Google Scholar 

  • Satorras RP, Vespignani A (2002) Immunization of complex networks. Phys Rev E 65(3):036104

    Article  Google Scholar 

  • Smirnov M, Biersack EW, Blondia C, Bonaventure O, Casals O, Karlsson G, Pavlou G, Quoitin B, Roberts J, Stavrakakis I, Stiller B, Trimintzios P, Mieghem PV, editors (2003) Quality of Future Internet Services, COST Action 263 Final Report, volume 2856 of Lecture Notes in Computer Science. Springer

  • Ventresca M, Aleman D (2015) Efficiently identifying critical nodes in large complex networks. Comput Soc Netw 2(1):1–16

    Article  MathSciNet  Google Scholar 

  • Yan G, Chen G, Eidenbenz S, Li N (2011) Malware propagation in online social networks: Nature, dynamics, and defense implications. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (AsiaCCS’11), Hongkong, China

Download references

Acknowledgments

This work is partially supported by NSF Career Award CNS-0953284 and NSF CCF-1422116.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to My T. Thai.

Additional information

Huiling Zhang and Yilin Shen are co-first authors.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, H., Shen, Y. & Thai, M.T. Robustness of power-law networks: its assessment and optimization. J Comb Optim 32, 696–720 (2016). https://doi.org/10.1007/s10878-015-9893-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10878-015-9893-7

Keywords

Navigation