Recovery of complex network after intentional attack
Partially due to the fast developments of the network technology, the complex networks have found their wide applications in many different areas. One of the most significant observations is that many real-life systems can be resembled as scale-free networks, where the nodal degrees of the networks...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis-Master by Coursework |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/152507 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-152507 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1525072023-07-04T17:04:28Z Recovery of complex network after intentional attack Wang, Hongbo Xiao Gaoxi School of Electrical and Electronic Engineering EGXXiao@ntu.edu.sg Engineering::Electrical and electronic engineering Partially due to the fast developments of the network technology, the complex networks have found their wide applications in many different areas. One of the most significant observations is that many real-life systems can be resembled as scale-free networks, where the nodal degrees of the networks approximately follow a power-law distribution. In such networks, a limited number of nodes, known as hubs or hub nodes, have very high degrees. It is known that when these hub nodes are broken down or under attack, the connectivity of the networks may be badly destroyed. Repairing or recovering of the networks under or after intentional attack therefore becomes an important topic that has been attracting intensive research interests. Existing studies have typically considered the cases where system repairing could be carried out on global basis or the attacked nodes can partially or totally recover their function, both of which may not necessarily be the case in many real-life applications. In this study, we mainly focus on the cases where system recovery is mainly done by network link compensation, and more specifically, when such link compensations are mainly carried out based on local system information. Considering that the average shortest path length indicates the average cost of inter-nodal communications in the network and the largest cluster size indicates whether the network is still largely connected after the attack and repair, in our study we mainly adopt these two metrics to reflect the survivability of the network. Extensive numerical simulations are conducted to compare and evaluate a few different link compensation schemes under different attack methods. Best repairing methods under different types of intentional attacks are identified. The evaluation of these methods, as we believe, shall lay a basis for further studies and future developments of more effective system repairing schemes. Master of Science (Communications Engineering) 2021-08-23T05:29:03Z 2021-08-23T05:29:03Z 2021 Thesis-Master by Coursework Wang, H. (2021). Recovery of complex network after intentional attack. Master's thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/152507 https://hdl.handle.net/10356/152507 en application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering |
spellingShingle |
Engineering::Electrical and electronic engineering Wang, Hongbo Recovery of complex network after intentional attack |
description |
Partially due to the fast developments of the network technology, the complex networks have found their wide applications in many different areas. One of the most significant observations is that many real-life systems can be resembled as scale-free networks, where the nodal degrees of the networks approximately follow a power-law distribution. In such networks, a limited number of nodes, known as hubs or hub nodes, have very high degrees. It is known that when these hub nodes are broken down or under attack, the connectivity of the networks may be badly destroyed. Repairing or recovering of the networks under or after intentional attack therefore becomes an important topic that has been attracting intensive research interests. Existing studies have typically considered the cases where system repairing could be carried out on global basis or the attacked nodes can partially or totally recover their function, both of which may not necessarily be the case in many real-life applications. In this study, we mainly focus on the cases where system recovery is mainly done by network link compensation, and more specifically, when such link compensations are mainly carried out based on local system information. Considering that the average shortest path length indicates the average cost of inter-nodal communications in the network and the largest cluster size indicates whether the network is still largely connected after the attack and repair, in our study we mainly adopt these two metrics to reflect the survivability of the network. Extensive numerical simulations are conducted to compare and evaluate a few different link compensation schemes under different attack methods. Best repairing methods under different types of intentional attacks are identified. The evaluation of these methods, as we believe, shall lay a basis for further studies and future developments of more effective system repairing schemes. |
author2 |
Xiao Gaoxi |
author_facet |
Xiao Gaoxi Wang, Hongbo |
format |
Thesis-Master by Coursework |
author |
Wang, Hongbo |
author_sort |
Wang, Hongbo |
title |
Recovery of complex network after intentional attack |
title_short |
Recovery of complex network after intentional attack |
title_full |
Recovery of complex network after intentional attack |
title_fullStr |
Recovery of complex network after intentional attack |
title_full_unstemmed |
Recovery of complex network after intentional attack |
title_sort |
recovery of complex network after intentional attack |
publisher |
Nanyang Technological University |
publishDate |
2021 |
url |
https://hdl.handle.net/10356/152507 |
_version_ |
1772825959036092416 |