Recovery of complex network after intentional attack

Partially due to the fast developments of the network technology, the complex networks have found their wide applications in many different areas. One of the most significant observations is that many real-life systems can be resembled as scale-free networks, where the nodal degrees of the networks...

Full description

Saved in:
Bibliographic Details
Main Author: Wang, Hongbo
Other Authors: Xiao Gaoxi
Format: Thesis-Master by Coursework
Language:English
Published: Nanyang Technological University 2021
Subjects:
Online Access:https://hdl.handle.net/10356/152507
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-152507
record_format dspace
spelling sg-ntu-dr.10356-1525072023-07-04T17:04:28Z Recovery of complex network after intentional attack Wang, Hongbo Xiao Gaoxi School of Electrical and Electronic Engineering EGXXiao@ntu.edu.sg Engineering::Electrical and electronic engineering Partially due to the fast developments of the network technology, the complex networks have found their wide applications in many different areas. One of the most significant observations is that many real-life systems can be resembled as scale-free networks, where the nodal degrees of the networks approximately follow a power-law distribution. In such networks, a limited number of nodes, known as hubs or hub nodes, have very high degrees. It is known that when these hub nodes are broken down or under attack, the connectivity of the networks may be badly destroyed. Repairing or recovering of the networks under or after intentional attack therefore becomes an important topic that has been attracting intensive research interests. Existing studies have typically considered the cases where system repairing could be carried out on global basis or the attacked nodes can partially or totally recover their function, both of which may not necessarily be the case in many real-life applications. In this study, we mainly focus on the cases where system recovery is mainly done by network link compensation, and more specifically, when such link compensations are mainly carried out based on local system information. Considering that the average shortest path length indicates the average cost of inter-nodal communications in the network and the largest cluster size indicates whether the network is still largely connected after the attack and repair, in our study we mainly adopt these two metrics to reflect the survivability of the network. Extensive numerical simulations are conducted to compare and evaluate a few different link compensation schemes under different attack methods. Best repairing methods under different types of intentional attacks are identified. The evaluation of these methods, as we believe, shall lay a basis for further studies and future developments of more effective system repairing schemes. Master of Science (Communications Engineering) 2021-08-23T05:29:03Z 2021-08-23T05:29:03Z 2021 Thesis-Master by Coursework Wang, H. (2021). Recovery of complex network after intentional attack. Master's thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/152507 https://hdl.handle.net/10356/152507 en application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering
spellingShingle Engineering::Electrical and electronic engineering
Wang, Hongbo
Recovery of complex network after intentional attack
description Partially due to the fast developments of the network technology, the complex networks have found their wide applications in many different areas. One of the most significant observations is that many real-life systems can be resembled as scale-free networks, where the nodal degrees of the networks approximately follow a power-law distribution. In such networks, a limited number of nodes, known as hubs or hub nodes, have very high degrees. It is known that when these hub nodes are broken down or under attack, the connectivity of the networks may be badly destroyed. Repairing or recovering of the networks under or after intentional attack therefore becomes an important topic that has been attracting intensive research interests. Existing studies have typically considered the cases where system repairing could be carried out on global basis or the attacked nodes can partially or totally recover their function, both of which may not necessarily be the case in many real-life applications. In this study, we mainly focus on the cases where system recovery is mainly done by network link compensation, and more specifically, when such link compensations are mainly carried out based on local system information. Considering that the average shortest path length indicates the average cost of inter-nodal communications in the network and the largest cluster size indicates whether the network is still largely connected after the attack and repair, in our study we mainly adopt these two metrics to reflect the survivability of the network. Extensive numerical simulations are conducted to compare and evaluate a few different link compensation schemes under different attack methods. Best repairing methods under different types of intentional attacks are identified. The evaluation of these methods, as we believe, shall lay a basis for further studies and future developments of more effective system repairing schemes.
author2 Xiao Gaoxi
author_facet Xiao Gaoxi
Wang, Hongbo
format Thesis-Master by Coursework
author Wang, Hongbo
author_sort Wang, Hongbo
title Recovery of complex network after intentional attack
title_short Recovery of complex network after intentional attack
title_full Recovery of complex network after intentional attack
title_fullStr Recovery of complex network after intentional attack
title_full_unstemmed Recovery of complex network after intentional attack
title_sort recovery of complex network after intentional attack
publisher Nanyang Technological University
publishDate 2021
url https://hdl.handle.net/10356/152507
_version_ 1772825959036092416