Home Mathematics On dynamic network security: A random decentering algorithm on graphs
Article Open Access

On dynamic network security: A random decentering algorithm on graphs

  • M.T. Trobajo EMAIL logo , J. Cifuentes-Rodríguez and M.V. Carriegos
Published/Copyright: June 22, 2018

Abstract

Random Decentering Algorithm (RDA) on a undirected unweighted graph is defined and tested over several concrete scale-free networks. RDA introduces ancillary nodes to the given network following basic principles of minimal cost, density preservation, centrality reduction and randomness. First simulations over scale-free networks show that RDA gives a significant decreasing of both betweenness centrality and closeness centrality and hence topological protection of network is improved. On the other hand, the procedure is performed without significant change of the density of connections of the given network. Thus ancillae are not distinguible from real nodes (in a straightforward way) and hence network is obfuscated to potential adversaries by our manipulation.

MSC 2010: 68R10; 94C15

1 Introduction

Network analysis [1] is a research field related to a wide range of scientific areas having roots in seminal papers on social sciences [2, 3, 4, 5] but also of increasing interest in Biology [6, 7], Engineering [8, 9], Finance [10] or Computer Science and Security [11, 12, 13]. Networks are structures collecting a fixed number of objects or entities called nodes together with relations between them called links. Hence algebraic structures like graphs, directed graphs and their weighted versions [14] are fundamental tools to describe networks in order to perform simulations and qualitative or quantitative analysis by means of statistical or numerical procedures.

In addition to social or physical networks, like social work environments [15], transportation networks [8, 9], supply systems [16, 17], we have technological networks, like the Internet [18] or data networks, whose nodes are computers or virtual machines or email clients [11] and links represent the data exchange between nodes.

Distributed computing over telecommunication networks, peer-to-peer file sharing, online communities, social networks or even virtual networks in the cloud are emerging topics of increasing interest in several branches of applied mathematics which are essentially graph structures. This applies also to privacy concerns related to data-analysis over graphs and networks including attack or fraud auditing techniques in cybersecurity research [11].

Privacy breaches in a network can be grouped into three categories [19]: 1) identity disclosure: the identity of an individual who is associated with a node is revealed; 2) link disclosure: the sensitive relationships between two individuals are disclosed; and 3) content disclosure: the sensitive data associated with each node is compromised, e.g. the email message sent and/or received by the individuals in a email communication network. A privacy-preserving system over graphs and networks should consider all of these issues.

Those issues imply the following challenges [19]:

Challenge 1

To model the knowledge and the capability of an adversary/attacker because any topological structures of the graph can be exploited by the attacker to derive private information.

Challenge 2

To quantify the information as a function of several different measures associated to the graph: degree, centrality, betweenness, average path length, diameter, clustering coefficient etc. Should we attempt to modify these metrics? How?

Challenge 3

To define graph-modification algorithms that balance privacy and data utility. The nodes and links of a graph are all correlated. Thus, the impact of a single change of an edge or a node can spread across the whole network.

Challenge 4

To model the behavior of the participants involved in a network-based collaborative computing environment.

Several privacy models, adversaries and graph-modification algorithms have been proposed recently [20, 21, 22] in order to face the challenges above. Note also that network recovery can be approached by similar methods (see [23, 24, 25]). Unfortunately, it is unlikely to solve all problems in a single shot as protection against each type of privacy branch requires different techniques or even a combination of them [19].

In this work we focus on topological properties related to centrality in networks. Structural central features of technological and communication networks are associated with their capacity to share and broadcast information in a secure way.

To be specific, when the flow of the information is condensed into a few amount of nodes, it is easier to crash the network by removing or infecting some of those nodes before the system administrator detects and stops the attack. Thus, networks with a few of such central nodes, called hubs, are more vulnerable to targeted attacks [26, 27]. Our goal is to obtain suitable dynamic extensions to hide the central structure of the network, so that it becomes less vulnerable to attacks.

Therefore, it’s necessary to know how principal or central a node is, and moreover, if a network has a high level of centralization or not. Concepts of centrality and centralization measures are discussed in the following sections. Note that there have been studies on hiding nodes in a network [28] but the focus therein is not on centrality but on percolation threshold.

Section 2 is devoted to some topics on centrality and centralization measures. Then section 3 describes the effect on the underlying graph of introducing ancillary nodes to a given network; afterwards, in section 4 we propose our Random Decentralized Algorithm (RDA) to perform those dynamic extensions on networks. In 5 we provide several numerical simulations, test RDA and analyze numerical and graphical results in order to establish some final conclusions and comments.

2 Graph centrality measures

From a computer science perspective, a network can be identified with a graph G = (V, E), where V = {v1, v2, …, vn} is the set of vertices or nodes and EV × V is the set of links or edges; a pair (vi, vj) ∈ E if and only if vertices vi and vj are connected. In this work we are interested in network structures with data exchanges, where nodes are terminals or other connected computational devices. Therefore, two nodes are linked if and only if they are connected and there is information exchange between them. Several approaches to technological communication networks could be modeled by graphs, but it is not within the scope of this paper to cover all cases, so we are considering binary relations uniquely, which implies that underlying graphs are undirected and unweighted. Also the graph will be assumed to have no isolated nodes nor loops. We will call such networks simple networks. Finally, the networks will be assumed to be connected. We shall refer to Brandes and Erlebach [1] for terminology and basic properties on Network Analysis.

An undirected graph G = (V, E) consists of two sets V, and E, such that V ≠ ∅ and E is a set of unordered pairs of elements of V. A graph G is completely determined by its adjacency matrix A(G) = A = (aij), where aij = 1 ⇔ (vi, vj) ∈ E and aij = 0 ⇔ (vi, vj) ∉ E. Symmetric 0-1 matrix A(G) contains relevant information about the topology of the network, such as centralization, number of triangles, diameter of the network, presence of cohesive clusters, bipartite character, randomness, etc. ([1, 5, 29]).

We briefly discuss in this section some measures of centrality of a single node within a graph -point centrality measures- and Freeman’s normalization procedure to measure the centrality of the graph taken as a whole -network centralization measures-. Much work has been done on centrality properties and their applications [30, 31, 32]. In this paper we follow Freeman [33] who in the seventies collected and formalized point centrality and network centrality concepts.

Definition 1

Degree point centrality computes the total amount of adjacencies (direct neighbors) of a nodevk, which corresponds to the sum of terms of row (or column)kof the adjacency matrix A.

CD(vk)=i=1nak,i

Therefore, a node with high degree centrality is an important node of communication, due to its capacity to have direct contact with a great number of nodes in the network. Nevertheless, a node could have high degree, but be disconnected to other nodes if their neighbors have no links to others in the network. So, it is central in a “local sense”. To solve this limitation, we consider betweenness and closeness point centrality measures, which take into account the connections of all the nodes in the network.

Betweenness point centrality quantifies the ratio of geodesics (shortest paths) linking two nodes passing through a third point vk with respect to all geodesics between them.

Definition 2

Ifgi, jdenotes the number of geodesics connectingvi, vjandgi, j(vk) the number of those shortest paths passing troughvk, the betweenness index ofvkis given by

CB(vk)=i<jnj=1ngi,j(vk)gi,j

A node with high value of betweenness is also a communication hub, having the capacity to control a significant part of the flow of information in the network due to the great proportion of nodes communicated through it.

Definition 3

The closeness index of a nodevkis given by

CC(vk)=1i=1ndi,k

wheredi, kdenotes the distance between nodesvi, andvk.

A node with high closeness is an important communication node, related to efficiency [34] and minimal cost in communication, due its proximity to other nodes in the network.

The three structural point centrality measures described above strongly depend on the network size and have normalized versions. In section 5, we compute and plot that measures for simulated networks and apply Freeman’s normalization in order to compare centrality in networks removing network size effect.

Centrality network indexes (or centralization indexes) quantify the homogeneity of point centrality of all the nodes in the network. Networks with high level of centralization have great differences between point centrality value of the most central point and the others. Networks with low level of centralization have homogeneous point centrality values, which are around the value of the most central node.

Definition 4

(cf. Freeman [33]). Freeman’s normalized indexes of network centralization measures are defined as follows:

CX=i=1nCXCX(vi)maxGGni=1nCXCX(vi)

whereCX(−) is a point centrality measure, CXits value at the most central node andGnis the set of networks of size ton. Note thatCXtakes values between 0 and 1.

It is evident that from the point of view of degree, betweenness and closeness point centrality, the center of the star is the most central node in all three cases. The star is the network in which the maximum value in the denominator is reached.

Theorem 1

Degree-based centrality measures are computed as follows:

  1. Degree network centrality

    CD=i=1n(CDCD(vi))(n1)(n2)
  2. Betweenness network centrality

    CB=2i=1n(CBCB(vi))(n1)2(n2)
  3. Closeness network centrality

    CC=(2n3)i=1n(CCCC(vi))(n2)

Proof

(i) and (ii) see Freeman [33]. (iii) is a slight modification with respect to its counterpart Freeman’s coefficient. Considering point closeness centrality as CC(vi) = 1/∑ di, j it’s easy to proof that the maximum value of i=1nCCCC(vi)isn22n3. □

3 Dynamic extensions

Hiding network topology can be important in order to protect node’s identity or other confidencial parameters [35]. Our goal in this paper is to hide information about the topology of a given network by adding ancillary nodes. To be concise, given a network (fig. 1), we add a new node A6 and its connections to the remaining nodes (fig. 2).

Fig. 1 Original Network
Fig. 1

Original Network

Fig. 2 Extended Network
Fig. 2

Extended Network

Note that this manipulation is cheap and possible in virtual environments where nodes are virtual machines in a cloud.

Some topological properties may be directly shifted by means of such an operation because in particular the characteristic polynomial of the graph and hence its roots (spectrum) are manipulated.

Note also that in such a dynamic enlargement both the number of ancillary nodes added as well as their connections have to be decided.

Definition 5

A dynamic enlargement of a graphG = (V, E) is a new graphΓ(G) = (V,E) whereVVandEE. We say that a dynamic enlargement is connected ifΓ(G) is a connected graph.

We deal with adjacency matrices of simple and connected networks. Consequently, this matrices are binary and symmetric, their diagonal entries are equal to zero and there does not exist a node permutation to get a block decomposition of the adjacency matrix. In particular, matrices of above examples are:

A(G)=(0101010110010011100100110)A(Γ(G))=(01010101100100111001001100)

Dynamic enlargement with one ancilla gives the incidence matrix A(Γ(G)) where connections ⋆ have to be decided.

4 The dynamic Random Decentering Algorithm (RDA)

Now we propose an algorithm transforming a given graph G into a dynamic enlargement Γ(G) of graph G with the following principles:

  1. Minimal cost. Algorithm does add one single ancillary node in each step. This minimizes the manipulation cost in physical networks. However we can design a significant number of ancillae by means of running algorithm in a loop.

  2. Topological properties preservation. Density case. Enlargements should have similar topological features to original networks. Nevertheless, topological measures are related one with another. It is not possible to preserve more than one of them with the extension process. For example, average degreekand densitydare widely used to analyze the connectivity of a network. Neverthelessk〉 = d(n − 1). Thus an algorithm preservingkreturns sparse networks with small density values, while ifdis preserved, 〈kincreases proportionally to (n − 1) . In this work, we propose dynamic enlargementsΓ(G) having similar density of connections toG.

  3. Centrality and centralization reduction. Distribution of centralities in networkΓ(G) should be more homogeneous than in networkGhence centralization of network decreases each time algorithm is performed.

  4. Algorithm protection. Dynamic enlargement links should be obtained by a random process.

Notations used in the sequel are detailed next: A is the adjacency matrix of original graph G = (V, E), n = # V is the size of matrix A, m = 12A1 is the number of edges, and parameter p is the proportion of ancillae we add.

We will obtain a succession of dynamic extensions A = A(0), A(1), …, A(pn) of the original graph to reach the number of required ancillae; parameters n(t), m(t) are referred to the correspondent extension with n = n(0), m = m(0). We also use the notation Δm(t) = m(t) − m(t − 1) for the number of links we add in the step A(t − 1) → A(t). Requirements we stated for our algorithm yield the following equalities related to the parameters:

Principle 1 implies

n(t)=n(t1)+1

then, by recurrence

n(t)=n(0)+t(1)

Principle 2 establishes that

2m(0)n(0)(n(0)1)=2m(t)n(t)(n(t)1)

It follows that

m(t)=m(0)(n(0)+t)(n(0)+t1)n(0)(n(0)1)

thus, the number of links added in each step Δm(t) = m(t) − m(t − 1) can be approximated by the nearest integer to the quotient

2m(0)(n(0)+t1)n(0)(n(0)1)(2)

On the other hand, to follow principles 3 and 4, a multinomial distribution law is applied. A new ancillary node links to a previous node vi with probability

pi=1/dij1/dji=1,2,,n(t1)(3)

at each step t.

In order to avoid multilinks we apply this probability model step by step, recalculating probabilities pi after each selection (no replacement probability model).

We provide a self-explain pseudocode of RDA (see Algorithm 1). After performing RDA algorithm we obtain all the adjacency matrices of the successive dynamic extensions and its basic topological properties (size, number or links and node degrees).

The following sections are devoted to obtaining experimental results. The centrality measures of the enlarged networks will be computed and plotted as functions of the number of added nodes. It is worth to remark here that original graphs are chosen to be scale-free graphs randomly obtained by BA algorithm.

5 Experiments

In this section section we carry out dynamic extensions over simulated networks and analyze numerical changes on centrality and centralization measures and their relations. We have conducted the experiments on simulated data that closely model technological data networks we are interested in.

5.1 Real world networks. Scale-free

Several models to generate real world networks have been proposed since the 50’s [36, 37, 38, 39, 40, 41]. Paul Erdós and Alfred Rényi modeled random networks, characterized by having nodes with approximately the same degree, showing low level of centralization and being robust against target attacks but vulnerable to random attacks. On the other hand, scale free networks have a few nodes with a great number of connections (called hubs), whereas most nodes have small degree. Networks with this characteristics might appear in complex and computational networks, have high level of centralization and are more vulnerable to coordinated attacks than to random threats.

Algorithm 1. Random Decentering Algorithm RDA
Require: A = A(0) incidence matrix
Require: p > 0 proportion of ancillary nodes
Ensure: tnumber of stepsandA(t) dynamic enlargement ofA(0) following principles 1-4.
1: n(0) ← nandt ← 0
2: whilein(0)do
3: d(0;i)=k=1n(0)A(0;k,i)
4: end while
5:m(0)=12i=1n(0)d(0;i)
6:whilet < pndo
7: tt + 1
8: n(t) ← n(t) + 1
9: Δm(t)=[2m(0)n(t1)n(0)(n(0)1)]
10: chooseΔm(t) elements without replacement {k1, …, kΔm(t)} ⊂ {1, …, n(t − 1)} with probabilitiesp(t,i)=1/d(t1,i)i=1n+t11/d(t1,i)
11: A(t; i, j) = A(t − 1, i, j) fori, j = 1, …, n(t − 1)
12: Ifk ∈ {k1, …, kΔm(t)} then
13:   A(t;n(t), k) = A(t; k, n(t)) = 1
14:   d(t, i) = d(t − 1, i) + 1
15: else
16:   A(t; n(t), k) = A(t; k,n(t)) = 0
17:    d(t, i) = d(t − 1, i)
18: end if
19: d(t, n(t)) = Δm(t)
20: end while
21: returnA(t);d(t, i); n(t);m(t)    i = 1, …, n(t)    t = 0, …, np

5.2 Simulation data

Simulated data of our experiment were eventually obtained by BA scale free algorithm [37] with SFNG m-file of MATLAB. We carried out BA simulations and obtained networks with different size but similar density we call “original networks”. Random Decentralized Algorithm (RDA) was applied with different percentage p of ancillary points added. We shall refer to the dynamic extensions as “extended networks” at each algorithm step t. Degree point centrality index was obtained for single nodes in all the networks, original and extended and degree distribution plots were also performed. Finally, network centrality indexes were obtained together with their evolution graphs over all the algorithm steps from 0% to 100% of ancillary nodes added.

Six original networks were randomly obtained by BA algorithm and several sizes n=40, 80, 100, 150, 200, 250. Parameters were selected in order to get networks with similar density d ≈ 0.1. RDA algorithm was performed for each original matrix A with proportion p = 1 (100% of ancillary nodes added). Finally, sequences of matrices A(t) were stored from t = 0 (adjacency matrix of the original network) to t = [p*n(0)] = n(0).

5.3 Results

In order to compare the point degree distribution for original and extended networks, frequency plots were performed for 25% and %75 of ancillary nodes added (figs. 3, 4). While original scale-free networks fit to decreasing exponential shapes, extended networks show right displacement and tendency to converge towards bell shapes, typical for random networks, witch are robust to target attacks.

Fig. 3 Frequency plots for point degree with 25% of nodes added
Fig. 3

Frequency plots for point degree with 25% of nodes added

Fig. 4 Frequency plots for point degree with 75% of nodes added
Fig. 4

Frequency plots for point degree with 75% of nodes added

Centralization measures were computed for all original and extended matrices A(t). As we have mentioned before, all measures have been normalized. Consequently, potential network-size effect has been removed. This reveals that centralization decreases as t incerases. Table 1 contains absolute values of degree, betweenness and closeness centralization measures respectively.

Table 1

Absolute values of degree network centrality (CD), betweenness network centrality (CB) and closeness network centrality (CC) for the original simulated networks and extended networks with 0%, 25%, 50%, 75% and 100% of ancillary points.

CDCBCC
n0%25%50%75%100%0%25%50%75%100%0%25%50%75%100%
400.3590.2700.2050.1600.1260.4480.3270.2080.1410.0940.4170.3600.3040.2550.211
800.3190.2370.1880.1470.1220.1770.1050.0610.0360.0260.3710.3090.2550.2080.177
1000.3240.2410.1830.1420.1170.1600.0860.0470.0270.0180.3610.2760.2180.1710.137
1500.2990.2210.1710.1440.1230.0730.0370.0220.0140.0100.2840.2100.1560.1220.097
2000.3040.2250.1740.1410.1160.0630.0310.0170.0110.0070.2720.1930.1380.1040.079
2500.3870.2940.2280.1840.1500.0710.0360.0190.0120.0080.3140.2200.1590.1200.094

As we remarked above, original simulated networks were randomly obtained by BA algorithm. In spite of the random character of BA algorithm, networks obtained by RDA have similar centralization values of degree (varying between 0.304 and 0.387) and closeness (between 0.272 and 0.417). Nevertheless, betweenness network centrality tends to decrease when n increases (from 0.071 and 0.448). On the one hand, the range of variation of betweenness values is greater in general for this index [4] than the others. Furthermore, the inherent nature of BA algorithm tends to get short paths between nodes if seeds have small size compared to the final size of the scale free network. This fact implies that nodes have low point betweenness centrality and the same occurs with betweenness network index.

In order to analyze variations of centralization measures as a function of t, relative values of centralization indexes were obtained (table 2) and evolution plots were obtained in each case (figs. 5, 6 and 7). Values with 0% of ancillary points added are reference values and hence omitted in this table.

Fig. 5 Relative Degree network centrality
Fig. 5

Relative Degree network centrality

Fig. 6 Relative Closeness network centrality
Fig. 6

Relative Closeness network centrality

Fig. 7 Relative Betweenness network centrality
Fig. 7

Relative Betweenness network centrality

Table 2

Relative values of degree network centrality (CD), betweenness network centrality (CB) and closeness network centrality (CC) for the original simulated networks and extended networks with 25%, 50%, 75% and 100% of ancillary points.

CDCBCCC
n25%50%75%100%25%50%75%100%25%50%75%100%
4075.19957.21444.45235.20472.89446.38231.35121.03186.36672.77161.09950.517
8074.39959.11646.12538.40659.12634.44520.13314.40583.27568.70856.01147.798
10074.31656.49143.86436.05653.97129.66017.18811.47776.31960.40447.38737.978
15073.73457.17848.01241.16451.38129.62919.74014.10473.95055.10442.98234.000
20073.83357.17046.26038.11170.93750.93338.40429.05370.93750.93338.40429.053
25076.00059.01147.50138.86970.07350.47838.29729.96070.07350.47838.29729.960

RDA gets significant increasing values of centralization indexes in all cases. CC and CB tend to decrease faster for original networks with a large size while CD does not. On the other hand, RDA shows greater variation of relative values of CB. With 25% of nodes added, CD and CC have a decrease between 70% and 86%, and between 50% and 72%. If 50% of ancillary nodes are added to the networks with RDA, the percentage of decrease varies between 50% and 72% for CD and CC, while CB decreases between 27% and 46%. The greatest variation is observed with 100% of nodes added, 36% to 50% for CD and CC and 11% to 21% for betweenness CB.

6 Conclusions

In this paper we give an algorithm that modifies the character of a given scale-free network by means of adding ancillary nodes.

First experimental results show decreasing values of network centralization measures. This provides a possible tool for protecting communication networks from vulnerabilities exploiting topology of underlying graph, and consequently RDA provides an answer to Challenge 1 and Challenge 2.

It remains to face Challenge 3 by estimating the consequences of each single change in terms of data preserving. Note that RDA algorithm improve node‘s privacy becouse centrality decreases and therefore principal nodes are hidden within new ancillary nodes. However, more experiments are needed in the future.

We note once again that a dynamic treatment like RDA is cheap to implement on networks of virtual machines in the cloud, but its implementation on cyber-physical environments needs previous study in order to evaluate the cost of introducing each ancillary node and each ancillary link.

Some pending tasks are (1) to get, if possible, a true random network from a scale-free one by means of adding ancillary nodes; (2) to compute effectively how many ancillary nodes are necessary to hide main properties of original network; (3) to perform experiments of order 10n nodes, n = 4, 5,.. in order to check our procedure in real world networks.

Acknowledgement

This research was partially supported by INCIBE (Spanish Institute of Cybersecurity) under grant X47.

References

[1] Brandes U., Erlebach T., Network Analysis, Lecture Notes in Computer Science, 1989, 3418, Springer.Search in Google Scholar

[2] Borgatti S. P., Dynamic Social Network Modeling and Analysis, Workshop Summary and Papers, 2003.Search in Google Scholar

[3] Borgatti S. P., Ajay M., Brass D. J., Labianca G., Network Analysis in the Social Sciences, Science, 2009, 892-895.10.1126/science.1165821Search in Google Scholar PubMed

[4] Freeman L., The development of social network analysis, A Study in the Sociology of Science, 2004, 1.Search in Google Scholar

[5] Seary A. J., Richards W. D., Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, Spectral methods for analyzing and visualizing networks: an introduction, 2003.Search in Google Scholar

[6] Lozano M., García-Martínez C., Rodríguez F. J., Trujillo H. M., Optimizing network attacks by artificial bee colony, Information Sciences, 2017, 377, 30-50.10.1016/j.ins.2016.10.014Search in Google Scholar

[7] Zhang B., Horvath S., A general framework for weighted gene coexpression network analysis, Statistical Applications in Genetics and Molecular Biology, 2005, 4.10.2202/1544-6115.1128Search in Google Scholar PubMed

[8] Guida M., Funaro M., Topology of the Italian airport network: A scale-free small-world network with a fractal structure?, Chaos, Solitons and Fractals, 2007, 31, 3, 527-536.10.1016/j.chaos.2006.02.007Search in Google Scholar

[9] Pedroche F., Romance M., Criado R., Some rankings based on PageRank applied to the Valencia metro, International Journal of Complex Systems in Science, 2016.Search in Google Scholar

[10] Balci M. A., Fractional virus epidemic model on financial networks, Open Mathematics, 2016, 14, 1074-1086.10.1515/math-2016-0098Search in Google Scholar

[11] Chapanond A., Krishnamoorthy M. S., Yener B., Graph theoretic and spectral analysis of Enron email data, Computational and Mathematical Organization Theory, 2005, 11, 265-281.10.1007/s10588-005-5381-4Search in Google Scholar

[12] Cvetović D., Simić S., Graph spectra in Computer Science, Linear Algebra and its Applications, 2011, 434, 6, 1545-1562.10.1016/j.laa.2010.11.035Search in Google Scholar

[13] Dang-Pham D., Pittayachawan S., Bruno V., Applications of social network analysis in behavioural information security research: Concepts and empirical analysis, Computers & Security, 2017, 68, 1-15.10.1016/j.cose.2017.03.010Search in Google Scholar

[14] Diestel R., Graph Theory. Graduate Texts in Mathematics, Springer-Verlag, 2005.10.1007/978-3-642-14279-6_7Search in Google Scholar

[15] Benito del Pozo P., Serrano N., Marqués-Sánchez P., Social networks and healthy cities: spreading good practices based on a spanish case study, Geographical Review, 2016.10.1111/j.1931-0846.2016.12210.xSearch in Google Scholar

[16] Pasqualetti F., Bicchi A., Bullo F., A graph-theoretical characterization of power network vulnerabilities, 2011, 3918-3923.10.1109/ACC.2011.5991344Search in Google Scholar

[17] Sridhar S., Hahn A., Govindarasu M., Cyber-Physical System Security for the Electric Power Grid, Proceedings of the IEEE, 2012, 100, 1, 210-224.10.1109/JPROC.2011.2165269Search in Google Scholar

[18] Puzis R., Yagil D., Elovici Y., Braha D., Collaborative attack on Internet users’ anonymity, Internet Research, 2009, 19, 1, 60-77.10.1108/10662240910927821Search in Google Scholar

[19] Liu K., Das K., Grandison T., Kargupta H., Privacy-Preserving Data Analysis on Graphs and Social Networks, Next Generation of Data Minning, 2008.10.1201/9781420085877.ch21Search in Google Scholar

[20] Arsič B., Cvetović D., Simić S., Škarić M., Graph spectral techniques in computer sciences, Applicable Analysis and Discrete Mathematics, 2012, 6, 1, 1-30.10.2298/AADM111223025ASearch in Google Scholar

[21] Cvetkoviı D., Rowlinson P., Simiı S., Eigenspaces of graphs, Eigenspaces of graphs, 1997, 66.10.1017/CBO9781139086547Search in Google Scholar

[22] Simic S. Andelic M., DaFonseca C. M., Zivkovic D., On the Multiplicities of Eigenvalues of Graphs and Their Vertex Deleted Subgraphs: Old and New Results, Electronic Journal of Linear Algebra, 2015, 30, 85-105 66.10.13001/1081-3810.2936Search in Google Scholar

[23] Shang, Y., Impact of self-healing capability on network robustness, Phys Rev E Stat Nonlin Soft Matter Phys., 2015, 91, 4, 042804.10.1103/PhysRevE.91.042804Search in Google Scholar PubMed

[24] Shang, Y., Effect of link oriented self-healing on resilience of networks, Journal of Statistical Mechanics: Theory and Experiment, 2016, 8, 083403.10.1088/1742-5468/2016/08/083403Search in Google Scholar

[25] Shang, Y., Localized recovery of complex networks against failure, Scient. Rep., 2016, 6, 30521 EP -.10.1038/srep30521Search in Google Scholar PubMed PubMed Central

[26] Holme P., Kim B. J., Yoon C., Han S. K., Attack vulnerability of complex networks, Phys. Rev. E, 2002, 65, 056109.10.1103/PhysRevE.65.056109Search in Google Scholar

[27] Iyer S., Killingback T. and Sundaram B. Wang Z., Attack Robustness and Centrality of Complex Networks, PLoS ONE, 2013, 8, 4, e59613.10.1371/journal.pone.0059613Search in Google Scholar

[28] Shang Y., Robustness of scale-free networks under attack with tunable grey information, EPL (Europhysics Letters), 2011, 95, 28005.10.1209/0295-5075/95/28005Search in Google Scholar

[29] West, D. B., Introduction to Graph Theory, Prentice Hall, 2001.Search in Google Scholar

[30] Borgatti S. P., Everett M. G., A Graph-theoretic perspective on centrality, ESocial Networks, 2006, 28, 466-484.10.1016/j.socnet.2005.11.005Search in Google Scholar

[31] Bounova G. de Weck O., Overview of metrics and their correlation patterns for multiple-metric topology analysis on heterogeneous graph ensembles, Phys. Rev. E, 2012, 85, 016117.10.1103/PhysRevE.85.016117Search in Google Scholar

[32] Canright G. S., Engø-Monsen K., Some Relevant Aspects of Network Analysis and Graph Theory, Elsevier, 2008, 361-424.10.1016/B978-044452198-9.50017-3Search in Google Scholar

[33] Freeman L. C., Centrality in social networks conceptual clarification, Social Networks, 1978, 215-239.10.1016/0378-8733(78)90021-7Search in Google Scholar

[34] Latora V. Marchiori M., Efficient Behavior of Small-World Networks, Phys. Rev. Lett., 2001, 87, 19, 198701.10.1103/PhysRevLett.87.198701Search in Google Scholar PubMed

[35] LaVigne R. Zhang C. D. L., Maurer U. Moran T., Mularczyk M., Tschudi D., Topology-Hiding Computation Beyond Semi-Honest Adversaries, IACR Cryptology ePrint Archive, 2018, 255.10.1007/978-3-030-03810-6_1Search in Google Scholar

[36] Barabási A. L., Scale-Free Networks: A Decade and Beyond, Science, 2009, 325, 5939, 412-413.10.1126/science.1173299Search in Google Scholar PubMed

[37] Barabási A. L., Réka A., Emergence of Scaling in Random Networks, Science, 1999, 286, 5439, 509-512.10.1126/science.286.5439.509Search in Google Scholar

[38] Barabási A. L., Réka A., Hawoong J., Mean-field theory for scale-free random networks, Physica A: Statistical Mechanics and its Applications, 1999, 272, 1-2, 173-187.10.1016/S0378-4371(99)00291-5Search in Google Scholar

[39] Erdös P., Rényi A., On random graphs I, Publicationes Mathematicae (Debrecen), 1959, 6, 290-297.Search in Google Scholar

[40] Meghanathan N., A Model for Generating Random Networks with Clustering Coefficient Corresponding to Real-World Network Graphs, International Journal of Control and Automation, 2016, 9, 163-176.10.14257/ijca.2016.9.1.15Search in Google Scholar

[41] Pedroche F., Criado R., Garcia E., Romance M., Matrix growth models based on centrality measures: a first analysis, International Journal of Complex Systems in Science, 2011, 1, 124-128.Search in Google Scholar

Received: 2017-09-29
Accepted: 2018-04-23
Published Online: 2018-06-22

© 2018 Trobajo et al., published by De Gruyter

This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.

Articles in the same Issue

  1. Regular Articles
  2. Algebraic proofs for shallow water bi–Hamiltonian systems for three cocycle of the semi-direct product of Kac–Moody and Virasoro Lie algebras
  3. On a viscous two-fluid channel flow including evaporation
  4. Generation of pseudo-random numbers with the use of inverse chaotic transformation
  5. Singular Cauchy problem for the general Euler-Poisson-Darboux equation
  6. Ternary and n-ary f-distributive structures
  7. On the fine Simpson moduli spaces of 1-dimensional sheaves supported on plane quartics
  8. Evaluation of integrals with hypergeometric and logarithmic functions
  9. Bounded solutions of self-adjoint second order linear difference equations with periodic coeffients
  10. Oscillation of first order linear differential equations with several non-monotone delays
  11. Existence and regularity of mild solutions in some interpolation spaces for functional partial differential equations with nonlocal initial conditions
  12. The log-concavity of the q-derangement numbers of type B
  13. Generalized state maps and states on pseudo equality algebras
  14. Monotone subsequence via ultrapower
  15. Note on group irregularity strength of disconnected graphs
  16. On the security of the Courtois-Finiasz-Sendrier signature
  17. A further study on ordered regular equivalence relations in ordered semihypergroups
  18. On the structure vector field of a real hypersurface in complex quadric
  19. Rank relations between a {0, 1}-matrix and its complement
  20. Lie n superderivations and generalized Lie n superderivations of superalgebras
  21. Time parallelization scheme with an adaptive time step size for solving stiff initial value problems
  22. Stability problems and numerical integration on the Lie group SO(3) × R3 × R3
  23. On some fixed point results for (s, p, α)-contractive mappings in b-metric-like spaces and applications to integral equations
  24. On algebraic characterization of SSC of the Jahangir’s graph 𝓙n,m
  25. A greedy algorithm for interval greedoids
  26. On nonlinear evolution equation of second order in Banach spaces
  27. A primal-dual approach of weak vector equilibrium problems
  28. On new strong versions of Browder type theorems
  29. A Geršgorin-type eigenvalue localization set with n parameters for stochastic matrices
  30. Restriction conditions on PL(7, 2) codes (3 ≤ |𝓖i| ≤ 7)
  31. Singular integrals with variable kernel and fractional differentiation in homogeneous Morrey-Herz-type Hardy spaces with variable exponents
  32. Introduction to disoriented knot theory
  33. Restricted triangulation on circulant graphs
  34. Boundedness control sets for linear systems on Lie groups
  35. Chen’s inequalities for submanifolds in (κ, μ)-contact space form with a semi-symmetric metric connection
  36. Disjointed sum of products by a novel technique of orthogonalizing ORing
  37. A parametric linearizing approach for quadratically inequality constrained quadratic programs
  38. Generalizations of Steffensen’s inequality via the extension of Montgomery identity
  39. Vector fields satisfying the barycenter property
  40. On the freeness of hypersurface arrangements consisting of hyperplanes and spheres
  41. Biderivations of the higher rank Witt algebra without anti-symmetric condition
  42. Some remarks on spectra of nuclear operators
  43. Recursive interpolating sequences
  44. Involutory biquandles and singular knots and links
  45. Constacyclic codes over 𝔽pm[u1, u2,⋯,uk]/〈 ui2 = ui, uiuj = ujui
  46. Topological entropy for positively weak measure expansive shadowable maps
  47. Oscillation and non-oscillation of half-linear differential equations with coeffcients determined by functions having mean values
  48. On 𝓠-regular semigroups
  49. One kind power mean of the hybrid Gauss sums
  50. A reduced space branch and bound algorithm for a class of sum of ratios problems
  51. Some recurrence formulas for the Hermite polynomials and their squares
  52. A relaxed block splitting preconditioner for complex symmetric indefinite linear systems
  53. On f - prime radical in ordered semigroups
  54. Positive solutions of semipositone singular fractional differential systems with a parameter and integral boundary conditions
  55. Disjoint hypercyclicity equals disjoint supercyclicity for families of Taylor-type operators
  56. A stochastic differential game of low carbon technology sharing in collaborative innovation system of superior enterprises and inferior enterprises under uncertain environment
  57. Dynamic behavior analysis of a prey-predator model with ratio-dependent Monod-Haldane functional response
  58. The points and diameters of quantales
  59. Directed colimits of some flatness properties and purity of epimorphisms in S-posets
  60. Super (a, d)-H-antimagic labeling of subdivided graphs
  61. On the power sum problem of Lucas polynomials and its divisible property
  62. Existence of solutions for a shear thickening fluid-particle system with non-Newtonian potential
  63. On generalized P-reducible Finsler manifolds
  64. On Banach and Kuratowski Theorem, K-Lusin sets and strong sequences
  65. On the boundedness of square function generated by the Bessel differential operator in weighted Lebesque Lp,α spaces
  66. On the different kinds of separability of the space of Borel functions
  67. Curves in the Lorentz-Minkowski plane: elasticae, catenaries and grim-reapers
  68. Functional analysis method for the M/G/1 queueing model with single working vacation
  69. Existence of asymptotically periodic solutions for semilinear evolution equations with nonlocal initial conditions
  70. The existence of solutions to certain type of nonlinear difference-differential equations
  71. Domination in 4-regular Knödel graphs
  72. Stepanov-like pseudo almost periodic functions on time scales and applications to dynamic equations with delay
  73. Algebras of right ample semigroups
  74. Random attractors for stochastic retarded reaction-diffusion equations with multiplicative white noise on unbounded domains
  75. Nontrivial periodic solutions to delay difference equations via Morse theory
  76. A note on the three-way generalization of the Jordan canonical form
  77. On some varieties of ai-semirings satisfying xp+1x
  78. Abstract-valued Orlicz spaces of range-varying type
  79. On the recursive properties of one kind hybrid power mean involving two-term exponential sums and Gauss sums
  80. Arithmetic of generalized Dedekind sums and their modularity
  81. Multipreconditioned GMRES for simulating stochastic automata networks
  82. Regularization and error estimates for an inverse heat problem under the conformable derivative
  83. Transitivity of the εm-relation on (m-idempotent) hyperrings
  84. Learning Bayesian networks based on bi-velocity discrete particle swarm optimization with mutation operator
  85. Simultaneous prediction in the generalized linear model
  86. Two asymptotic expansions for gamma function developed by Windschitl’s formula
  87. State maps on semihoops
  88. 𝓜𝓝-convergence and lim-inf𝓜-convergence in partially ordered sets
  89. Stability and convergence of a local discontinuous Galerkin finite element method for the general Lax equation
  90. New topology in residuated lattices
  91. Optimality and duality in set-valued optimization utilizing limit sets
  92. An improved Schwarz Lemma at the boundary
  93. Initial layer problem of the Boussinesq system for Rayleigh-Bénard convection with infinite Prandtl number limit
  94. Toeplitz matrices whose elements are coefficients of Bazilevič functions
  95. Epi-mild normality
  96. Nonlinear elastic beam problems with the parameter near resonance
  97. Orlicz difference bodies
  98. The Picard group of Brauer-Severi varieties
  99. Galoisian and qualitative approaches to linear Polyanin-Zaitsev vector fields
  100. Weak group inverse
  101. Infinite growth of solutions of second order complex differential equation
  102. Semi-Hurewicz-Type properties in ditopological texture spaces
  103. Chaos and bifurcation in the controlled chaotic system
  104. Translatability and translatable semigroups
  105. Sharp bounds for partition dimension of generalized Möbius ladders
  106. Uniqueness theorems for L-functions in the extended Selberg class
  107. An effective algorithm for globally solving quadratic programs using parametric linearization technique
  108. Bounds of Strong EMT Strength for certain Subdivision of Star and Bistar
  109. On categorical aspects of S -quantales
  110. On the algebraicity of coefficients of half-integral weight mock modular forms
  111. Dunkl analogue of Szász-mirakjan operators of blending type
  112. Majorization, “useful” Csiszár divergence and “useful” Zipf-Mandelbrot law
  113. Global stability of a distributed delayed viral model with general incidence rate
  114. Analyzing a generalized pest-natural enemy model with nonlinear impulsive control
  115. Boundary value problems of a discrete generalized beam equation via variational methods
  116. Common fixed point theorem of six self-mappings in Menger spaces using (CLRST) property
  117. Periodic and subharmonic solutions for a 2nth-order p-Laplacian difference equation containing both advances and retardations
  118. Spectrum of free-form Sudoku graphs
  119. Regularity of fuzzy convergence spaces
  120. The well-posedness of solution to a compressible non-Newtonian fluid with self-gravitational potential
  121. On further refinements for Young inequalities
  122. Pretty good state transfer on 1-sum of star graphs
  123. On a conjecture about generalized Q-recurrence
  124. Univariate approximating schemes and their non-tensor product generalization
  125. Multi-term fractional differential equations with nonlocal boundary conditions
  126. Homoclinic and heteroclinic solutions to a hepatitis C evolution model
  127. Regularity of one-sided multilinear fractional maximal functions
  128. Galois connections between sets of paths and closure operators in simple graphs
  129. KGSA: A Gravitational Search Algorithm for Multimodal Optimization based on K-Means Niching Technique and a Novel Elitism Strategy
  130. θ-type Calderón-Zygmund Operators and Commutators in Variable Exponents Herz space
  131. An integral that counts the zeros of a function
  132. On rough sets induced by fuzzy relations approach in semigroups
  133. Computational uncertainty quantification for random non-autonomous second order linear differential equations via adapted gPC: a comparative case study with random Fröbenius method and Monte Carlo simulation
  134. The fourth order strongly noncanonical operators
  135. Topical Issue on Cyber-security Mathematics
  136. Review of Cryptographic Schemes applied to Remote Electronic Voting systems: remaining challenges and the upcoming post-quantum paradigm
  137. Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
  138. On dynamic network security: A random decentering algorithm on graphs
Downloaded on 10.12.2025 from https://www.degruyterbrill.com/document/doi/10.1515/math-2018-0059/html
Scroll to top button