Complex networks’ resilience against attacks represents a crucial issue in terms of network structure integrity. We investigate the effect of removing nodes on the network diameter in the case of a simultaneous targeted attack and sequential targeted attack. The analysis has been implemented on several network instances, taking into account different centrality measures and clustering coefficients values. Empirical networks have also been observed to compare the effects of the two removal schemes. According to classical literature, we assume that the network attacker has a wide-ranging knowledge of the system. It can be defined as clairvoyant since it knows, a priori, of all the characteristics of the problem’s instances. This awareness is not always applicable when real networks are characterised by a dynamic environment. Hence, we distinguish between clairvoyant and non-clairvoyant attacks.
Ferraro, G., Iovanella, A. (2018). Clairvoyant targeted attack on complex networks. INTERNATIONAL JOURNAL OF COMPUTATIONAL ECONOMICS AND ECONOMETRICS, 8(1), 41-62 [10.1504/IJCEE.2018.10007881].
Clairvoyant targeted attack on complex networks
FERRARO, GIOVANNA;IOVANELLA, ANTONIO
2018-01-01
Abstract
Complex networks’ resilience against attacks represents a crucial issue in terms of network structure integrity. We investigate the effect of removing nodes on the network diameter in the case of a simultaneous targeted attack and sequential targeted attack. The analysis has been implemented on several network instances, taking into account different centrality measures and clustering coefficients values. Empirical networks have also been observed to compare the effects of the two removal schemes. According to classical literature, we assume that the network attacker has a wide-ranging knowledge of the system. It can be defined as clairvoyant since it knows, a priori, of all the characteristics of the problem’s instances. This awareness is not always applicable when real networks are characterised by a dynamic environment. Hence, we distinguish between clairvoyant and non-clairvoyant attacks.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.