z-logo
open-access-imgOpen Access
Maximizing Network Resilience against Malicious Attacks
Author(s) -
Wenguo Li,
Yong Li,
Yi Tan,
Chun Chen,
Ye Cai,
Kwang Y. Lee,
Michael Pecht
Publication year - 2019
Publication title -
scientific reports
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.24
H-Index - 213
ISSN - 2045-2322
DOI - 10.1038/s41598-019-38781-7
Subject(s) - resilience (materials science) , computer science , heuristic , set (abstract data type) , distributed computing , network topology , complex network , computer security , computer network , artificial intelligence , physics , world wide web , thermodynamics , programming language
The threat of a malicious attack is one of the major security problems in complex networks. Resilience is the system-level self-adjusting ability of a complex network to retain its basic functionality and recover rapidly from major disruptions. Despite numerous heuristic enhancement methods, there is a research gap in maximizing network resilience: current heuristic methods are designed to immunize vital nodes or modify a network to a specific onion-like structure and cannot maximize resilience theoretically via network structure. Here we map complex networks onto a physical elastic system to introduce indices of network resilience, and propose a unified theoretical framework and general approach, which can address the optimal problem of network resilience by slightly modifying network structures (i.e., by adding a set of structural edges). We demonstrate the high efficiency of this approach on three realistic networks as well as two artificial random networks. Case studies show that the proposed approach can maximize the resilience of complex networks while maintaining their topological functionality. This approach helps to unveil hitherto hidden functions of some inconspicuous components, which in turn, can be used to guide the design of resilient systems, offer an effective and efficient approach for mitigating malicious attacks, and furnish self-healing to reconstruct failed infrastructure systems.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here