Optimal Network Destruction Strategy with Heterogeneous Cost under Cascading Failure Model

By studying an attacker’s strategy, defenders can better understand their own weaknesses and prepare a response to potential threats in advance. Recent studies on complex networks using the cascading failure model have revealed that removing critical nodes in the network will seriously threaten network security due to the cascading effect.)e conventional strategy is to maximize the declining network performance by removing as few nodes as possible, but this ignores the difference in node removal costs and the impact of the removal order on network performance. Having considered all factors, including the cost heterogeneity and removal order of nodes, this paper proposes a destruction strategy that maximizes the declining network performance under a constraint based on the removal costs. First, we propose a heterogeneous cost model to describe the removal cost of each node. A hybrid directed simulated annealing and tabu search algorithm is then devised to determine the optimal sequence of nodes for removal. To speed up the search efficiency of the simulated annealing algorithm, this paper proposes an innovative directed disturbance strategy based on the average cost. After each annealing iteration, the tabu search algorithm is used to adjust the order of node removal. Finally, the effectiveness and convergence of the proposed algorithm are evaluated through extensive experiments on simulated and real networks. As the cost heterogeneity increases, we find that the impact of low-cost nodes on network security becomes larger.


Introduction
Complex networks can be used to describe a variety of interactive systems in social and natural environments, such as the Internet, power grids, transportation networks, and terrorist networks, [1][2][3][4][5].
rough detailed research into complex networks, Albert et al. [6] found that the removal of critical nodes will greatly affect the network performance. Motter and Lai [7] pointed out that because the network has a cascading failure phenomenon, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. As physical control systems are increasingly controlled by network-enabled devices, cyberattacks will have an important impact on the real world [8]. For example, the load frequency of the equipment in the power system is maliciously changed by remote programming, which further leads to the failure of the power system cascade [9,10]; in 2012, part of the line in the Indian power system jumped, leading to the collapse of the northern power system [11], and network fluctuations at the autonomous system level have caused the Internet to collapse [12]. us, due to the redistribution of loads among nodes, component failure can lead to a cascade of overload failures, which can in turn cause all, or a substantial part, of the network to collapse.
Existing research has analyzed network vulnerability through the cascade model by removing critical nodes. Different node removal strategies will have completely different effects on network performance. For instance, Di Summa et al. [13] proposed an integer linear programming model with nonpolynomial constraints, which was linearly relaxed to solve the critical node selection problem in polynomial time, and an iterative two-phase algorithm has been developed to solve the cascading vulnerability node detection problem efficiently [14]. Seo et al. [15] proposed evaluation indicators for the cascading failure phenomenon in a power system with the aim of minimizing the number of removed nodes while maximizing the declining network performance. ese strategies are intended to minimize network performance by removing as few nodes as possible. In the aforementioned studies, the performance of the network can be described in terms of the pairwise connectivity (PWC) [13,14] or the number of failed nodes [15].
However, existing research [13][14][15] does not consider the difference in node removal costs. Generally, more critical nodes will be protected more carefully and be more difficult to remove. For example, interdomain routing is protected by firewalls and intrusion detection systems that are difficult to permeate [16]-an analogy is that the cost of killing a core member of a terrorist network will be greater than that of killing other members [5]. is phenomenon of different node removal costs in the network is called cost heterogeneity. Simultaneously, the attackers are trapped by their own capabilities and are likely to have a limited attack budget. e attack budget is the maximum cost that an attacker can provide. As the cascading of the network is a load spreading process, different node removal sequences may interrupt this load spreading and have different effects on network performance (see Section 3.4).
erefore, our problem is that of optimizing the network destruction strategy so as to maximize the declining network performance based on the cascade model when considering both the attacker's budget and the heterogeneous cost of node removal. First, as each node has a different removal cost, this paper proposes a heterogeneous cost model to describe the node removal cost. Generally, highly connected nodes play an essential role in real networks and are usually protected more carefully, so the cost of their removal is relatively high. erefore, the heterogeneous cost model assumes that the node removal cost and degree are exponentially correlated and uses a cost-sensitive parameter c for adjustment. Second, this article describes a hybrid directed simulated annealing and tabu search (DSA-TS) algorithm to search for the optimal node removal sequence. In each annealing iteration, the tabu search algorithm is used to adjust the order of node removal. Furthermore, in directed simulated annealing, an initial solution generation strategy and directional disturbance strategy are introduced to accelerate the convergence. Finally, this article uses network connectivity to evaluate the network performance. As the cost heterogeneity increases, low-cost nodes gradually threaten the security of networks. In summary, the main contributions of this work are as follows: (i) e cascading failure and heterogeneous cost of nodes are modeled, and the node removal cost is found to be exponentially related to the node degree. Additionally, the difference in node removal order affects the spread of network cascading failures.
(ii) A hybrid DSA-TS heuristic algorithm is designed to find the optimal node removal sequence under a restricted attack budget. Extensive simulations and real network experiments indicate that DSA-TS is better than the baseline algorithm and achieves good convergence. (iii) As the cost heterogeneity increases, more low-cost nodes begin to pose a serious threat to network security. us, the attack budget required to destroy the network entirely first increases and then decreases. From the perspective of the defender, this phenomenon shows that the defense strength should be appropriate for the importance of the nodes. e remainder of this paper is organized as follows. Some related work is discussed in Section 2. In Section 3, a network model, cascading failure model, and heterogeneous cost model are proposed, and the problem of network destruction is defined. Section 4 describes the hybrid DSA-TS algorithm in detail. Section 5 analyzes the effectiveness and convergence of the algorithm through experiments on real and simulated networks. Section 6 determines the cascading characteristics and critical node characteristics of networks by analyzing the experimental phenomena. Finally, the conclusions to this study and ideas for future research are summarized in Section 7.

Related Work
Currently, the network destruction strategy is the classic problem of removing nodes in the network to maximize the declining network performance. e destruction of critical nodes will seriously threaten the security of the network in multiple fields, such as blockchain [17], big data [18], critical infrastructures [19], and IoT systems [20]. Due to the complexity of the network, a variety of efficient graph-based algorithms have been proposed [21][22][23]. In this section, we first survey the destruction strategy in a static network. en, according the cascading failure characteristics of the network, the destruction strategy based on the cascading failure model is investigated.
Many destruction strategies have been proposed for static networks. e node sorting method sorts the nodes according to some evaluation index, typically based on structural characteristics of the network, such as the degree centrality [24], PageRank [25], or betweenness [26]. Nodes are removed according to on the sorting results, and indicators such as the number of remaining nodes in the network, largest component size [27], and network connectivity [28] are used to evaluate the network performance. is approach can be combined with specific application scenarios to evaluate the role of nodes. Liu et al. [29] combined complex network centrality theory and power system characteristics to give the electrical centrality, which can identify critical nodes in a power system. Another method is the node search strategy. By trying different node combinations, the nodes with the greatest impact on the network are selected. Because the solution space of this problem is huge, heuristic algorithms are often used to find a solution. Aringhieri et al. [30] proposed a local search metaheuristic algorithm that uses an iterative local search and a variable neighborhood search framework to disrupt the network by deleting k nodes. Zhou et al. [31] used a variable population memetic search to solve the problem of selecting critical nodes in complex networks.
However, the aforementioned algorithms are only applicable in static network analysis. In the real world, the failure of one component in the network may cause other components to fail, such as in the power grid or in transportation and communication networks [11,32,33]. Zhao et al. [34] found that cascading failures can cause the network to become almost entirely disrupted. erefore, we need to study the destruction strategy under the cascade model to detect cyber threats. Under the cascade model, the dynamic nature of the network makes it difficult to estimate the network performance after a node is removed. Various destruction strategies have been proposed to maximize the declining network performance. Yan et al. [35] used reinforcement learning to increase the damage of sequential topology attacks to the power network, while Zhang et al. [36] used a genetic algorithm to solve a multiobjective optimization problem under the cascading failure model and produced a variety of node selection schemes to provide attackers with choices. Zhu et al. [37] found that attacks based on load or degree are relatively ineffective and proposed a new attack strategy based on a risk graph. Wang et al. [38] pruned the solution space and used particle swarm optimization (PSO) to obtain the k critical line combinations in which faults caused the greatest damage to the power grid.
However, the above methods do not consider the cost of node heterogeneity and attackers with constrained budgets. For example, in a terrorist network [5], the layers of protection around core members make it much more challenging to kill terrorist leaders than other members. At the same time, the attacker's combat capability is limited in a complex area. erefore, it is vital to design attack strategies based on one's own ability to disband and nullify terrorist groups as much as possible. We propose a hybrid DSA-TS algorithm to solve such problems. is method combines the simulated annealing algorithm and the tabu search algorithm and efficiently screens the optimal node removal sequence through the initial solution generation strategy based on node influence (CI) and the directional disturbance strategy.

Model and Problem Definition
In this section, we introduce the network model, cascading failure model, and heterogeneous cost model. We also define and analyze the complexity of the problem considered in this study.

Network Model.
We model the network as an undirected graph G � (V, E), where V is the node set and E is edge set in network G. e adjacency matrix A(G) � (a ij ) n×n represents the connection between nodes. If a ij � a ji � 1, there is an edge between nodes v i and v j ; otherwise, there is no edge. We define the set of neighbors of node u ∈ V as N(u). In graph theory, the degree of a node d(u) refers to the number of edges associated with the node. e degree of the node is equal to the number of neighbor nodes d(u) � |N(u)|.

Cascading Failure Model.
Many cascading failure models [39][40][41][42] have been proposed. e local load redistribution model proposed by Wang et al. [42] is widely used to analyze applied flow networks such as power and communication systems. In our cascading failure model, each node has an initial load L i and a processing load capacity C i . When node v i is destroyed, the load of the node will be offloaded to neighboring nodes according to the rules, so that neighbor node v j will receive an increased load of ΔL ij . If the node load exceeds its capacity L i + ΔL ij > C i , the node will be destroyed due to overloading. We define each parameter as follows.
Definition 1. In most networks, the node load is related to the degree. For simplicity, we define the node load L i as a function of the degree d(v i ). e initial load of node v i is defined as where α, p are used to control the strength of the correlation between the initial load and the node degree.

Definition 2.
With the failure of a node, the increased load of the neighbor nodes is related to the degree. Obviously, a node with a higher degree can more easily receive the load. After node v i is destroyed, the increased load Δ L ij received by the neighbor node v j is defined as where N(v i ) is the neighbor node set of node v i .

Definition 3.
In real networks, the capacity is severely limited by cost. e capacity of a node is assumed to be linearly related to the initial load of the node [7], defined as where λ is related to the initial load and characterizes the capability of a node. Figure 1 shows a simple example of how the load is distributed when a node is removed. e initial network parameters are α � p � 1 and λ � 1.5. According to these parameters and the node degree, we initialize the load and capacity of each node (see equations (1) and (3)).

Heterogeneous Cost Model.
In different application scenarios, the node removal costs will typically be different. Without loss of generality, we believe that more important nodes will have a higher level of protection. e importance of nodes is usually determined according to the scenario, e.g., the transportation hub in a transportation network and core routes in a communication network. e cost of v i is defined as c i . In this paper, without loss of generality, we assume that the node removal cost is related to the degree of the node. As the Security and Communication Networks degree of the nodes is moderately heterogeneous, the cost of node removal is also heterogeneous.
However, under the fixed overall network protection resources, the total cost of removing all nodes is fixed [43]. It is impossible to provide unlimited protection measures for a certain node. In this paper, we define the sum of the removal costs of all nodes in the network as the sum of the node degrees in the network, c s � n i�0 d(v i ). e removal cost of each node is related to the total cost of removing all nodes. erefore, an increase in the node removal cost reflects not only an increase in the difficulty of the attack but also the greater level of protection of the node. At the same time, the attacker's budget B is constrained, which is related to the sum cost of removing all nodes in the network. Each parameter can be formulated as follows.

Definition 4.
e cost of node v i is defined as where c ≥ 0 is a cost-sensitive parameter. When c � 0, the cost of each node is the same; as c increases, the node costs become more heterogeneous.

Definition 5. e attacker's budget B is defined as
where β ∈ [0, 1] is the budget constraint parameter, which describes the ability of the attacker. From the perspective of extremes, when β � 0, we cannot remove node from the network, and all nodes can be removed when β � 1.

Problem Description.
Some system crashes are caused by a small number of critical nodes. However, different node removal sequences will have different effects on the network due to the cascading effect. In Figure 2, different removal methods and removal sequences have completely different effects on the network. As the transmission of network cascading is essentially load propagation, different removal sequences may interrupt or change the spread of the load. is article considers the impact on node-by-node removal on the network. After the current node removal completes the network cascade, the next node is removed. We define the removal sequence as DS � v 1 , v 2 , . . . , v k . e removal cost of each node is different, and more important nodes tend to have higher removal costs (see equation (4)).
erefore, in the case of cost heterogeneity under a constrained removal cost, the goal of this research is to choose a node removal sequence DS that minimizes the network performance degradation rate F(DS). We define the problem as follows.
Definition 6 (budget-constrained network destruction (BCND) problem). Given a network G � (V, E) and the attacker's budget B, choose a suitable node removal sequence DS ∈ V so as to minimize the network performance degradation rate by cascading. BCND is formally defined as follows.
where c DS is the total cost of node set DS. F is our optimization goal, defined as the ratio between the remaining network and the original network after the network is attacked, For different application scenarios, our network evaluation methods vary. Without loss of generality, the topological characteristics of the network are often used as indicators for evaluating network performance, such as the number of remaining nodes in the network, the largest component size [27], and the network connectivity [28]. Here, we use the network connectivity as an index to evaluate network performance. Network connectivity describes the connectivity between any two points in the network.
Definition 7. Network connectivity can be defined as where g i is a connected subgraph in network G and δ i is the number of nodes in connected subgraph g i . If node 3 is removed, its load will be distributed to neighboring nodes in accordance with the principle of load distribution (see equation (2)), such as ΔL 31 � 3 × 1/1 + 3 + 3 � 3/7 and ΔL 34 � ΔL 36 � 9/7. Because C 1 > L 1 + ΔL 31 and the load of nodes 4 and 6 does not exceed the capacity of the node, the network does not cascade.
Usually, the search for an optimal removal set in the network is NP-hard. is shows that it is difficult to accurately solve this kind of problem in large-scale networks. Suppose that G is an undirected graph with n nodes. Although the cost is constrained, we need to compare approximately n! solutions to obtain the optimal solution using an exhaustive method.

The Proposed Method (DSA-TS)
According to Definition 5, the large solution space makes it difficult to find an accurate solution to the BCND problem. At the same time, as pointed out in the Introduction, the problems of heterogeneous node cost and the different impact of the sequence of node removal on the network persist. To solve these problems, this paper proposes a hybrid DSA-TS algorithm.
is section introduces the DSA-TS algorithm and describes the algorithm framework, initial solution generation strategy, directed simulated annealing algorithm, and tabu search.

Algorithm Framework.
e overall framework of the algorithm is shown in Figure 3 and Algorithm 1. ere are three main parts: initial solution generation strategy, directed simulated annealing algorithm, and tabu search. e main idea is to search for possible node combinations through the directed simulated annealing algorithm based on the initial solution. As different node removal sequences have different cascading effects, the tabu search algorithm and the simulated annealing algorithm are merged. Before each temperature drop, the tabu search algorithm is used to select the final sequence of node removal in the solution.
In Section 4.2, we introduce the initial solution generation strategy, which quantifies the influence of removing each node from the network. Algorithm 2 focuses on the problem whereby the initial solution is not necessarily the global optimum and proposes a directed simulated annealing algorithm. We improve the algorithm and propose a directional disturbance strategy, which mainly solves the low disturbance accuracy of the standard simulated annealing algorithm. Algorithm 3 considers different attacks that may cause different network cascading phenomena. A tabu search strategy is proposed to adjust the order of node removal.
e parameters used in this paper are listed in Table 1.

Initial Solution Generation Strategy.
e initial solutions of heuristic algorithms affect the generation of the final solution and the convergence speed of the algorithm. Usually, these initial solutions are generated at random. In the BCND problem, where the solution space is vast, a good initial solution will accelerate the convergence of the algorithm. erefore, to speed up the convergence of the algorithm, we use the cascading potential [30] to design an index for evaluating the node values (node cascading influence, CI) and use this to generate the initial solution. e value CI i /c i is calculated under a unit cost for each node, and the results are sorted in descending order. e node removal sequence DS that produces the maximum node cost is selected from front to back as the initial sequence for the removal of nodes. e CI indicator evaluates the impact of removing a node on neighboring nodes and considers the importance of the removed node itself in the network structure.
Definition 8. CI is defined as follows: where Φ(i) is the set of neighbor nodes that fail due to overload after v i is removed. e term j∈N(i)/Φ(i) ΔL ij /C j − L j indicates that as the node is removed, some neighbor nodes do not fail, but their load increases. is factor must be considered because it makes it easier for the surrounding nodes to reach the state of being on the verge of overload, enhancing the influence of the removed node relative to

Security and Communication Networks 7
other nodes. Simultaneously, the removal of high-level nodes may have a greater impact on the network, so we need to consider the effect on the network after high-level nodes are removed. erefore, a monotonically increasing function f(x) is introduced (1/2 ≤ f(x) ≤ 1). A removed node with a higher degree will have a higher value of f(x).

Directed Simulated Annealing
Algorithm. e simulated annealing algorithm was proposed by Kirkpatrick et al. [44] in 1983. e main idea is to approximate the global optimum from the local optimum by simulating the annealing principle in metallurgical processing. "Annealing" is a physical term that refers to the process of heating and then cooling. e Metropolis criterion [45] is a key part of simulated annealing algorithms, as new states are determined probabilistically rather than completely deterministically. e Metropolis algorithm is the basis of simulated annealing, but its optimization speed is too slow when used directly. erefore, to ensure convergence within a limited time, a new system was constructed in which the main parameters are the initial temperature τ and the end temperature τ stop .
is article uses the widely accepted geometric reduction law for the cooling step: where τ k represents the temperature of the algorithm after k iterations and r is the annealing rate, generally a constant value between 0.5 and 0.99. e specific steps of the proposed algorithm are shown in Algorithm 2. e basic idea of the algorithm is to constantly disturb the initial solution DS to find the optimal node set of the network. However, the BCND problem has the characteristics of a constrained budget and large search space. If the random disturbance strategy generates a neighborhood solution based on the initial solution, the efficiency will be very low. To solve these two problems, this paper proposes a directed disturbance strategy, which can efficiently search for possible neighborhood solutions. Because the attack cost of each node is heterogeneous, the average cost of selecting different node combinations for removal is different. erefore, we define the algorithm disturbance direction, di rect, to describe the disturbance direction of the neighborhood solution.
We assume that the initial disturbance direction, direct � 0, creates a random disturbance. DS refers to the unselected nodes in the network. When direct � 0, the algorithm randomly removes u · |DS| nodes and exchanges them with high-CI nodes in DS to generate DS ′ . If the disturbed node combination is better than the old node set, the direction of the disturbance depends on the change in the cost of the optimal solution relative to the suboptimal solution. When the average cost of the optimal solution is less than the suboptimal solution's average cost, di rect � − 1 and the algorithm disturbs the node removal sequence in the direction of lower cost. us, the high-cost nodes in DS will be selected and exchanged with the low-cost nodes in DS ′ . When di rect � 1, the algorithm disturbs the node removal sequence in the direction of higher cost, and the low-cost nodes in DS are exchanged with the high-cost nodes in DS ′ . When the average removal cost is equal, di rect � 0 and a random disturbance is created. If the effect of the disturbed node combination is poor, the latest solution is accepted with probability esp(− (Γ(G, DS ′ ) − Γ(G, DS min ))/τ). If the latest solution is accepted, the disturbance continues in the original direction; otherwise, a random disturbance is performed.  8 Security and Communication Networks

Tabu Search.
e tabu search algorithm is a global stepby-step optimization algorithm based on a local neighborhood search. e algorithm has a fast convergence speed and can avoid becoming trapped around local optima. e principle was first proposed by Glover [46] in the late 1970s. After some development and improvement, a complete set of algorithms was finally formed. e algorithm used in this study is an improved tabu search algorithm. It aims to solve a problem with the original tabu search algorithm whereby combinatorial optimization becomes difficult under large-scale and restricted conditions. e designed algorithm can efficiently solve the BCND problem.
To solve the problem of the order of node removal causing the network to produce different cascading phenomena, we designed an internal search strategy based on the solution DS generated after the external search. is strategy changes the order in which nodes are removed to obtain the optimal collapse of the network (see Algorithm 3). e algorithm mainly comprises the following parts: movement mechanism, tabu table, amnesty rules, and termination criteria. We will introduce these parts in detail below.
e movement mechanism represents the process of the current solution moving to another solution, which determines the form of the solution generated in the neighborhood and the relationship between successive solutions. erefore, a good movement mechanism will impact the search efficiency. erefore, we regard the exchange of positions between nodes as a movement and introduce the internal exchange rate χ. Each exchange process involves u ts · |DS| nodes. e tabu list is a unique component at the core of the tabu search algorithm. It records and prohibits changes to prevent search loops from appearing and preventing the algorithm from becoming trapped around local optima. e critical factors for its design are the tabu object and the length of the tabu. e object and length of the tabu significantly affect the search speed and the quality of the settlement. Tabu objects are those limited by the tabu table. When initializing the tabu table, this algorithm selects u ts · |DS| nodes from the initial solution DS and exchanges them with other unselected nodes.
is exchange method reduces the chance of important nodes (in the order of removal) from being moved to the end. e tabu length is the number of iterations after which the tabu object fails.
is paper introduces a tabu length parameter ε. e tabu length is related to the length of the tabu table ε · 1/u ts , where the value of ε is determined by the network size and experience. e amnesty rule is a moderate relaxation of the tabu list. When a tabu object becomes the historical best solution, it is amnestied without being restricted by the tabu list. As the termination criterion, we use the length 1/u ts of the tabu table as the maximum number of iterations. If the obtained solution persistently exceeds the historical optimal solution, the algorithm continues even if the maximum number of iterations has been exceeded.

Experiments and Algorithm Analysis
In this section, we first introduce the experimental dataset and the comparison algorithm and then demonstrate the effectiveness of the proposed algorithm and the comparison algorithm on a simulated network and a real network under different cost heterogeneities. Further, we analyze the convergence of the algorithm when removing different components.

Experimental Parameters.
We used Python 3.6 to run the simulations of scale-free networks on a PC with an Intel Core i7-9750 3.2 GHz CPU and 8.0 GB of RAM. e parameters of each part of the algorithm were set as follows: DSA parameters-initial temperature τ � 100, termination temperature τ stop � 1, annealing rate c � 0.8, disturbance ratio u sa � 0.1, and number of iterations l � 10; TS parameters-disturbance ratio u ts � 0.1 and tabu length ε � 0.2.

Data Description.
We first verify the effectiveness of the algorithm using synthetic and real networks. In this paper, three types of simulation networks with N � 1000 and 〈k〉 � 6 are generated for experimentation.
Scale-free network generated by the Barabasi-Albert (BA) model [47]: the characteristic of scale-free networks is that a small number of nodes have a large number of connections and most other nodes have very few connections with a power-law degree distribution. Small-world network generated by the Watts-Strogatz (WS) model [48]: in this kind of network, most arbitrary nodes can visit other nodes with fewer steps or hops. Random network generated by the Erdös-Rényi (ER) model [49]: we connect each pair of nodes with a probability p � 0.006. Since each pair of nodes is connected with equal probability, the random network is a homogeneous network in which most of the nodes' degrees are around pN. ese three network models basically cover the complex network structure characteristics in reality.
As real networks, we consider six real network from an industry perspective, including power grids [50], a communication network [51], a road network [50], an interpersonal network [50], Facebook [52], and an economic network [50]. Different types of networks have different structural characteristics, such as different degree distributions, and different network sparseness. is feature affects the heterogeneity of costs and the robustness of the network. e purpose of the simulation network is to verify the universality of the algorithm for a certain type of network, and the real network verifies the validity of the application in reality.
e specific characteristics of the networks are summarized in Table 2.

Comparison Algorithm.
To show the effectiveness of the proposed DSA-TS algorithm, we compare it with seven popular baseline algorithms, including HD, RIF, and HCI.
HD [24]. e HD algorithm sorts all nodes in the network by degree. On the premise of not exceeding a given cost, the node removal sequence runs from the largest to the smallest degree.
RIF [54]. is is the failure risk index, which calculates the ratio of the load of the node to the load of neighboring nodes: RIF � L i / j∈N(i) L j . A higher ratio indicates that the removal of the node is more likely to cause the failure of neighbor nodes. All nodes are sorted according to the RIF size, and the attack nodes are selected in order from largest to smallest without exceeding a given cost.
HCI. e HCI algorithm is sorted in descending order of each node's CI (Section 4.2), and the node removal sequence is determined from largest to smallest such that the attack meets the given cost constraints.

Effectiveness of the Proposed DSA-TS Algorithm.
To verify the effectiveness of the proposed DSA-TS algorithm, its performance was compared with that of the baseline algorithms on simulated and real networks. First, a scale-free network, a small-world network, and a random network were generated with n � 1000 nodes and an average degree of 〈k〉 � 6. e network load and capacity initialization parameters were set to α � p � 1 and λ � 2. We compared the network connectivity under different removal costs. As shown in Figure 4, the DSA-TS algorithm achieves superior performance with different types of simulation networks and node cost heterogeneities. Note that when the cost-sensitive parameter c � 2, the budget required to completely destroy the network based on degree (HD) and node influence (HCI) becomes progressively worse. In Figure 4(g), the network connectivity under the two removal strategies of HD and HCI suffers almost no drop. erefore, as the cost heterogeneity increases, one cannot only consider the role of nodes and ignore the removal cost.
For the real networks, we considered six different domains and network characteristics for experimentation. e network load and redundant initialization parameters were consistent with those in Figure 4. As the effectiveness of the algorithm under different costs has been proved in Figure 4, this experiment mainly verified the effectiveness of the algorithm when the cost-sensitive parameter c � 1. As shown in Figure 5, the proposed algorithm still achieves superior performance.

Convergence of DSA-TS.
e proposed algorithm combines directed simulated annealing with a tabu search to solve the BCND problem. e role of each component in the algorithm is now examined. We deleted some of the algorithm components and compared the convergence with the complete algorithm under different budgets. e experimental results are shown in Figure 6, where DSA indicates the absence of the tabu search algorithm and SA-TS indicates the absence of the directed disturbance strategy. e abscissa is the number of algorithm iterations, and the ordinate is the minimum connectivity of the network. e experimental results show that the DSA-TS algorithm converges faster under different budgets and is less likely to become trapped around local optima, thus producing better results. By analyzing the experimental phenomena, it can be found that in Figure 6(a), the small removal cost means that the number of nodes that can be selected is limited and the algorithm convergence is similar, so no real difference is apparent. In Figures 6(b) and 6(c), the DSA-TS algorithm outperforms the comparison method in terms of convergence speed and optimal solution. By comparison, the directed search strategy has a significant impact on the algorithm and produces different results from the other two algorithms with β � 0.15. As the cost increases, the gap between DSA and DSA-TS becomes progressively smaller because as the removal cost increases, it becomes easier to cascade the network. erefore, the DSA-TS algorithm achieves better performance in terms of convergence speed and convergence effect.

Experimental Results and Discussion
is section analyzes the cascade features and node removal characteristics of the networks under different heterogeneous costs. Since most networks in the real-world present scale-free characteristics, this section uses scale-free network with N � 1000 and 〈k〉 � 6 for experimentation. We find that as the cost heterogeneity increases, low-cost nodes play an increasingly important role in network security.

Network Cascading Characteristics under Cost
Heterogeneity.
is section mainly examines the network  Table 2, including the number of nodes n and links m within the networks, the average degree 〈k〉 [24], the maximum degree k max , the average shortest path length L, and the clustering coefficient CC [53] which represents the degree of clustering between nodes in a network.
cascading characteristics under cost heterogeneity. As shown in Figures 3 and4, as the removal cost increases, the cascading of networks under different cost-sensitive parameters exhibits burstiness and unpredictability. Although the budget for complete network cascading decreases as the level of node redundancy increases, the generation of network cascading can still appear suddenly. In Figure 6, the abscissa is the removal cost parameter and the ordinate is the number of nodes in the network that have failed due to cascading. is feature increases the difficulty of algorithm design. e budget required for complete network cascading under different cost-sensitive parameters is shown in Figure 7, where the abscissa is the cost-sensitive parameter and the ordinate is the cascading cost constraint parameter generated by the network. Here, we refer to the cost constraint parameter as the generation time of network cascading. As the total removal cost for a certain network is c sum , earlier cascading generates a smaller budget B.
is experiment shows that, under different node capacity redundancy parameters, an increase in cost heterogeneity causes the budget required for complete network cascading to first increase and then decrease and reach a peak around c � 1. From the perspective of network defense, this phenomenon shows that defending too many or too few important nodes increases the network's vulnerability. Defense resources should be allocated reasonably according to the value of the nodes in the network.

Optimal Node Removal Characteristics under Cost Heterogeneity.
is section analyzes the characteristics of the critical nodes of the network under the heterogeneity of costs. In Figure 8, the abscissa is the cost-sensitive parameter and the ordinate is the average degree of the optimal set of collapsed nodes d. Figure 8(a) shows that the average degree of the critical node set continues to decrease as the cost heterogeneity increases. At the same time, the downward trend of the average degree is an S-shaped curve, and it drops rapidly around c � 1.
e small and medium graphs in Figure 8  with respect to the cost heterogeneity. e number of nodes rises in an S-shaped curve, with a rapid increase around c � 1. is shows that the heterogeneity of node cost has an important influence on node selection. As the cost heterogeneity increases, more nodes with lower costs will be attacked.
To better analyze the distribution characteristics of the selected nodes under different cost heterogeneities, we present a box diagram of the removed critical nodes in Figure 8(b). From top to bottom, the box plot indicates the upper outlier, the upper edge, the upper quartile, the median, the lower quartile, and the lower edge. When c < 1, nodes with higher degrees are all selected, and nodes with lower costs play a supplementary role. When c � 1, the nodes with lower cost play a role, but some high-cost nodes are still selected. When c > 1, the selected nodes have a low  degree, and low-cost nodes play a leading role. Figure 9 visualizes the removed nodes under different cost heterogeneities in a scale-free network.

Conclusion
is paper has investigated the destruction strategy for cost heterogeneous networks using the cascading failure model. In recent years, researchers have sought to maximize the declining network performance by removing as few network nodes as possible, but the cost heterogeneity of the nodes has been ignored. is paper has proposed a heterogeneous cost model of the relationship between nodes and costs. We assumed that the cost is related to the degree of the nodes and can be adjusted by a cost-sensitive parameter c. We found that due to the cascading characteristics of the network, different node removal orders have different effects on network performance. e DSA-TS algorithm was designed to select the sequence of nodes for removal that maximizes the declining network performance when the attacker's budget is constrained. In DSA-TS, a directional disturbance strategy improves the algorithm's convergence speed, and a tabu search and simulated annealing algorithm are merged to identify the optimal node removal order. e algorithm's effectiveness was proved through experiments on three simulated networks with different cost heterogeneities and six real networks. e convergence of different components of the algorithm was used to prove the convergence of the DSA-TS algorithm.
We conducted extensive experiments on a scale-free network and analyzed the cascading characteristics. As the cost heterogeneity increases, the budget required for complete network cascading first increases and then decreases, reaching a peak near c � 1. From the perspective of the defender, this phenomenon shows that protection resources should be allocated according to the influence of the nodes. At the same time, we found that an increase in cost heterogeneity causes the average degree of the selected nodes to decrease along an S-shaped curve, with low-cost nodes playing a crucial role in network security. erefore, from an attack perspective, the vulnerable nodes that threaten network security are determined not only by their influence on the network but also by their protection situation. When important nodes are overprotected, other nodes may pose a greater threat to network security. e optimal network destruction strategy is still an open question, especially in terms of how to be adapted or extended in real or emulated environments. e current cost model is relatively simple, and there are many types of devices in the real network. us, in the future, we will build a more realistic cost model so that our method can be applied in reality.
Data Availability e following are the links to the datasets used in this article: power grid, road network, interpersonal network, Facebook, and economic network (http://networkrepository.com/ index.php); communication network (http://snap.stanford. edu/data/as-733.html).

Conflicts of Interest
e authors declare that there are no conflicts of interest regarding the publication of this paper.