Publication Type
Journal Article
Version
acceptedVersion
Publication Date
12-2022
Abstract
How can we assess a network's ability to maintain its functionality under attacks Network robustness has been studied extensively in the case of deterministic networks. However, applications such as online information diffusion and the behavior of networked public raise a question of robustness in probabilistic networks. We propose three novel robustness measures for networks hosting a diffusion under the Independent Cascade or Linear Threshold model, susceptible to attacks by an adversarial attacker who disables nodes. The outcome of such a process depends on the selection of its initiators, or seeds, by the seeder, as well as on two factors outside the seeder's discretion: the attacker's strategy and the probabilistic diffusion outcome. We consider three levels of seeder awareness regarding these two uncontrolled factors, and evaluate the network's viability aggregated over all possible extents of an attack. We introduce novel algorithms from building blocks found in previous works to evaluate the proposed measures. A thorough experimental study with synthetic and real, scale-free and homogeneous networks establishes that these algorithms are effective and efficient, while the proposed measures highlight differences among networks in terms of robustness and the surprise they furnish when attacked. Last, we devise a new measure of diffusion entropy, and devise ways to enhance the robustness of probabilistic networks.
Keywords
Graphs and networks, Stochastic processes, Reliability and robustness
Discipline
Databases and Information Systems | OS and Networks
Research Areas
Data Science and Engineering
Publication
IEEE Transactions on Knowledge and Data Engineering
Volume
34
Issue
12
First Page
5884
Last Page
5895
ISSN
1041-4347
Identifier
10.1109/TKDE.2021.3071081
Publisher
Institute of Electrical and Electronics Engineers
Citation
LOGINS, Alvis; LI, Yuchen; and KARRAS, Panagiotis.
On the robustness of diffusion in a network under node attacks. (2022). IEEE Transactions on Knowledge and Data Engineering. 34, (12), 5884-5895.
Available at: https://ink.library.smu.edu.sg/sis_research/6234
Copyright Owner and License
Authors
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1109/TKDE.2021.3071081