ArticlePDF Available
Cybernetics and Systems Analysis, Vol. 56, No.2, March, 2020
VULNERABILITY OF COMPLEX NETWORK
STRUCTURES AND SYSTEMS
O. D. Polishchuk UDC 519.6
Abstract. Structural and functional approaches to the determination of vulnerability of complex
network structures and systems to negative internal and external influences are considered.
The concept of parameters of influence and betweenness of system elements is introduced, which
allows us to identify the most important from the functional point of view nodes and edges of the
network and develop scenarios for identifying those components of the system whose blocking
can cause greatest losses in the process of its functioning, and also quantify these losses.
The sensitivity of the system to small variations in the volume of flow movement, which are close to
the critical loading of its components, is analyzed. The obtained results can be used to improve the
available methods and develop new ones to protect real network systems from various natural and
artificial damages.
Keywords: complex network, network system, flow, stability, influence, betweenness.
INTRODUCTION
One of the areas of system research that has started to develop rapidly over the past decades [1, 2] is the study of
complex network systems (CNS). Network structures exist in the micro- and macrocosm [3, 4], biological systems
(neural, protein, metabolic, food, environmental networks, etc.), and human society (economic, social, financial, political,
religious, professional, family, and many others) [5–7]. The subject of research in the theory of complex networks (TCN)
is the formulation of universal models of network structures, determination of statistical properties that characterize their
behavior, and prediction of the behavior of networks when their structural properties change. The similarity of many
natural and artificial networks helps with the development of universal methods for studying such structures, but it does
not always help to study the processes of functioning of such systems. One of the defining features of substantially
functioning CNS is the movement of flows in them. In some cases, ensuring the movement of flows is the main goal of
creation and functioning of such systems (transport networks and systems for the supply of resources; trade and social
networks, etc.), in others, it is the process that ensures their vital activity (the movement of blood, lymph, and nerve
impulses in the human body). Discontinuation of such flows can lead to the termination of such systems. Therefore,
the flow movement can be attributed to the main or one of the main functions that is exercised by CNS [8, 9].
Among the complex networks (CN) of various types, the most interesting from an applied point of view are the
so-called scale-free networks [10]. A distinctive feature of these networks is the distribution of node degrees, which leads
to a small number of nodes that have high degree, and a huge number of nodes with a low degree (number of cities in
each country is small compared to the total number of settlements, but their importance in the life of the country cannot
be overemphasized). One of the main problems that is being investigated in the TCN is the vulnerability of the network
to accidental or targeted internal and external influences on its nodes [11–13]. This is due to the risk of consequences of
312 1060-0396/20/5602-0312 ©2020 Springer Science+Business Media, LLC
Pidstryhach Institute for Applied Problems of Mechanics and Mathematics, National Academy of Sciences of
Ukraine, Lviv, Ukraine, od_polishchuk@ukr.net. Translated from Kibernetika i Sistemnyi Analiz, No. 2, March–April,
2020, pp. 166–176. Original article submitted March 26, 2019.
DOI 10.1007/s10559-020-00247-4
the deployment of such processes, which can lead to the destabilization of transport systems and the Internet, financial
crises and failures in the operation of energy supply systems, etc. It turns out that scale-free networks are quite resistant
to accidental attacks and are very vulnerable to targeted attacks [12]. A number of structural approaches to the study of
such network phenomena has been developed within the TCN [13, 14]. However, the system may be vulnerable not only
to attacks on its structure, but also to the process of functioning. For example, global computerization makes almost all
areas of human activity sensitive to cyber attacks. During 2014–2018 hacker attacks and computer viruses infected and
destabilized the work of a number of government agencies, security services, military departments, transport and energy
systems in many countries of the world. Losses from such attacks amounted to tens of billions of dollars [15]. In Ukraine,
at the same time, hacker attacks have repeatedly blocked the work of the State Treasury of Ukraine, Ministry of Finance
of Ukraine and the Pension Fund, dozens of large banks, railway and aviation systems, energy supply systems of certain
regions, etc. It is obvious that in the future such threats will only increase, and the damage from them will grow as well.
Therefore, the identification of the most functionally important, and therefore the most attractive elements for attacks of
real CNS will help to improve existing and build new, much more effective protection systems.
The purpose of the article is to define criteria for the functional importance of elements of complex network
systems and develop scenarios for negative impacts on them in order to prevent or minimize the consequences of
potential defeats.
STRUCTURAL APPROACHES TO DETERMINING THE VULNERABILITY
OF COMPLEX NETWORKS
The structure and a number of characteristics of its elements are completely determined by the adjacency
matrix [1]. These characteristics include the degree of a node, which value for binary undirected networks is determined
by the number of its connections to adjacent nodes. For scale-free networks of this type, the following scenarios of
targeted attacks are investigated in the TCN [12, 13]:
(i) a list of network nodes is prepared in descending order of their degrees, and nodes from the beginning of this
list are sequentially removed from the structure until the percolation threshold is reached;
(ii) after extracting the next node generated in the first scenario. the list of nodes is rewritten according to the
same principle and the attack is performed on the first node of the modified list.
The second scenario of a targeted attack on a non-scale CN, which takes into account the possible change after the
next withdrawal of the network connection structure, was much more dangerous than the first [12]. In particular, it was
found that as a result of applying this scenario, after removing 4% of the nodes with the highest degree from the Internet,
this network is divided into disconnected components.
The degree of a node is its local characteristic in the network. One of the global characteristics of a node is the
centrality of mediation, which is determined by the number of all shortest paths in the network that pass through it [16].
The centrality of mediation allows one to create more effective scenarios for attacks on non-scale networks, in particular:
(i) a list of network nodes is prepared in descending order of their mediation centrality values, and nodes are
sequentially removed from the structure from the beginning of this list until the percolation threshold is reached;
(ii) after extracting the next node, the list of nodes is formed according to the previous scenario, and the attack is
carried out on the first node from the modified list.
The last two scenarios are more dangerous than the previous ones, i.e., the nodes with higher central mediation are
more important for the network than the nodes with a high degree. This was confirmed, in particular, by the analysis of
a number of global aviation networks [14].
A node may have a high degree or centrality of mediation in the network structure, but this does not always
determine its real importance in the process of functioning of the system. In many countries, there are regions that, after
periods of intensive development, went into a state of depression (exhaustion of mineral deposits that were extracted in
the region; a decrease in demand for products that the region specialized in producing, etc.). In such regions, there
is usually a well-developed infrastructure, in particular a dense transport network and energy supply network, but the
volume of flows to/from it is significantly reduced. This means that despite the high degree of nodes that are located in
the corresponding parts of the network, their functional value in the system may be small [8]. The degree of cities such as
Korosten, Kupyansk, Ternopil, and Kyiv in the railway network of Ukraine is equal to five. Obviously, this does not
313
correspond to the functional importance of these cities in the life of the country. In addition, the structural approach to
analyzing CNS vulnerability does not provide a clear answer to at least three questions:
(i) attacks on the functioning of system elements can further destabilize its operation even if the structure
is not affected;
(ii) which part of the system can be affected by this destabilization process;
(iii) what quantitative losses are expected by the system and its individual components as a result of the defeat.
FUNCTIONAL APPROACHES TO DETERMINING THE VULNERABILITY
OF NETWORK SYSTEMS
The problem of a system stability is much deeper and more complex than the problem of the stability of its
structure. Of course, the destruction of the structure, and, for example, its division into unrelated components, will
inevitably lead to the destabilization of the CNS, but failures in the system can also occur when the structure is unstable.
Moreover, the number of system elements where targeted attacks on their operation can lead to CNS failures is usually
significantly higher than the number of nodes in the structure, which removal leads to crossing the percolation threshold.
In order to confirm this, M. Newman’s approach can be used [17], who mapped a weighted network with integer weights
to a multigraph with the same adjacency matrix V==
{}Vij ij
N
,1
, whereVij is the weight of the edge that combines nodes ni
and nj,ij N,,=1,Nis the number of network nodes. If we assume that the weights are reduced to integer values of the
volume of flows that pass through the edges of the network for a certain period of time [, ]0T, then, by this approach,
even multigraph transit nodes can have a high degree of centrality of mediation on the routes of heavy flows (Fig. 1).
This means that attacks on them can lead to serious system failures.
The functional importance of a node in CNS is defined as follows. Let ukij
nn
out (, )
stand for the amount of flows
generated in the node niand accepted in the node nj, that passed by the path pnn
ki j
(, )
over the period [, ]0T,Kij is
a number of all possible paths connecting nodes niand nj,kK
ij
=1, ,ij N,,=1. Let us denote by
Vnn nn
ij kij
k
Kij
out out
(, ) (, )=
=
åu
1
total amount of flows generated in the node niand used for acceptance within the node njby all possible means
for the period [, ]0T. Parameter Vnn
ij
out (, )
determines the actual impact of the node nion the node njbased on
the total volume of flows that flow from it to the node njover the period Ò,ij N,,=1. A clear definition of the
ways and volumes of flows is typical for most industrial, financial, transport, trade networks, resource supply
systems, public administration, etc. For example, it is easy to determine how much of the railway tickets are sold
using the Internet, what percentage of utility payments or pensions are paid through the offices of “Ukrposhta”
(Ukrainian Postal Service), what percentage of public procurement is carried out using the “Prozorro” system (public
e-procurement system), etc. These data makes it possible to quantify the losses that may be inflicted on the relevant
systems, for example, as a result of cyber attacks on their computer networks.
Let Rjj
iii
L
out {}=1, ..., be the set of node numbers, the end receivers of flows generated in the node ni, and Lbe
a number of elements of the set Ri
out . Parameter
xx
i
jR
ij i
i
Vnns
out out out
out
Î
å(, )/(), [,]V01,
determines the impact force of the node niapplied on CNS in general, iN=1, . Here, s()Vstands for the sum of
the elements of the matrix V, which is equal to the total volume of flows in the network for the period [, ]0T.
314
The power of the node nithat is applied on the system is defined using the parameter pLNp
ii
out out
/, [,]01 ,
and a set Ri
out ,iN=1, , is called the area of influence of this node on CNS (Fig. 2).
For example, the area of influence of local governments or regional media is usually limited to the relevant region
of the country, while national governments and national media are limited to the entire state. Parameters xi
out ,pi
out , and
Ri
out are called the output force, power, and area, or the initial parameters of the node’s ni,iN=1, , influence on CNS,
respectively. In the simplest case, the initial area of influence of each CNS node is limited to adjacent nodes, and in the
most complex case, it forms a complete graph. Area Ri
out and parameter pi
out allow us to assess, which part of the CNS
is affected by the consequences of failures in the operation of the node ni, and the value of xi
out determines what losses it
cause in terms of under-delivery or delay in delivery of the corresponding volume of flows.
Let ukji
nn
in (,)
be the amount of flows generated in the node njand accepted in the node nithat passed by the
path pnn
kj
i
(, )
over the period [, ]0T, and Kji be the number of all possible paths connecting nodes njand ni,
kK
ji
=1, ,ij N,,=1. Let us denote
Vnn nn
ji kji
k
Kij
in in
(,) (,)=
=
åu
1
total amount of flows generated in the node njand used for acceptance within the node niby all possible means
for the period [, ]0T. Parameter Vnn
ji
in (,)
determines the actual impact of the node njon the node niaccording to
the total volumes of flows that were accepted in the node niover the period Ò,ij N,,=1. Let Gjj
iii
M
in {}=1,..., be
a set of node numbers that generate flows that are used for acceptance to the node niand Mbe the number of
elements of the set Gi
in . Parameter
xi
jG
ji
i
Vnns
in in
in
=
Î
å(,)/()V,xi
in Î[, ]01,
315
Fig. 1. Fragment of an integer weighted network: the value of the
weights is six (a); the corresponding multigraph (b).
ab
Fig. 2. The area of the input (vertical stripes Gi
in )
and output (horizontal stripes Ri
out ) influence are
reflected by the square of the network system node.
determines the impact of CNS on the node ni,iN=1, . Power of the system’s impact on the node niwe
determine using the parameter pMNp
ii
in in
/, [,]01, and a set Gi
in we will call the area of influence of CNS
on the node ni. Parameters xi
in ,pi
in , and Gi
in we will call the input force, power, and area (or input parameters of
the CNS effect on the node ni), respectively. In the simplest case, the initial area of influence of each CNS node is
limited to adjacent nodes, and in the most complex case, it forms a complete graph.
The parameters of the input and output influence of CNS nodes make it possible to give at least partial answers to
the questions formulated above regarding the most functionally important elements for destabilizing the system.
However, there is another aspect of the protection problem. It consists in timely detection and blocking of those CNS
nodes that contain a potential or real threat and can destabilize the system (hacker and terrorist groups, sources of
dangerous infectious diseases, etc.). In social online services, so-called bot networks [18] are often found, with the help
of which one person can create the illusion of a common/shared thought of many people, massively spread
disinformation, organize DDoS attacks, etc. Such botnets are often created during election campaigns and can distort the
will of citizens. They are a powerful tool for unfair competition, advertising low-quality products or, conversely,
anti-advertising of new products. Detection of generator nodes of such botnets and their blocking allows one to prevent
many negative social and economic phenomena. The input and output parameters of the CNS node influence make it
possible to accurately identify the botnet generators. Usually, the botnet generator does not require and does not receive
a return response when sending commands to the bots it created (information about the target and the content of the
attack), i.e., the following inequality is true for such entities:
x
x
i
i
in
out << 1.
From these considerations, it also follows that the area and power of the output impact of such nodes is quite large
(botnets that number more than 350 thousand nodes were found in the Twitter network [19]), and the area and power of
the input impact are small, moreover, RG
ii
inout ǻ0.
In real CNS, there are almost no nodes that are exclusively generators or receivers of flows. Indeed, for the
production of certain products, it is necessary to supply raw materials and components, mining can not be carried out
without appropriate mining equipment, etc. Let us denote RGicombining the input and output influence areas of a node
ni, i.e., RG R G
ii i
out in .
The interaction strength of node niwith CNS is defined by using the parameter xxx
iii
=+()/
in out 2and the power
of this interaction by using the parameter of piequal to the number of elements of the set RGi.
The interaction parameters allow us to define the following attack scenarios on CNS:
(i) a list of network nodes is prepared in order of decreasing the values of the forces of their interaction with the
system and nodes from the beginning of this list are sequentially removed from the structure until a predetermined level
of critical losses is reached;
(ii) after extracting the next node, the list of nodes is formed according to the previous scenario, and the attack is
carried out on the first node from the modified list.
The second scenario takes into account the need to replace blocked generator nodes and receiver nodes and the
corresponding redistribution of traffic flows by the network. Depending on how to counter potential threats, the last two scenarios
can be generated separately for generator nodes (for example, searching for initiators of DDoS attacks) and flow receiver nodes
(searching for the most likely targets of DDoS attacks). It should also be taken into account that in reality, the behavior of the
parameters of the influence of CNS nodes can be much more complex. A node that directed a flow to all adjacent nodes can
become a receiver again, and adjacent nodes from receivers can turn into generators that direct this flow further. This is how
infectious disease epidemics are deployed according to the so-called SIS scenario [20]. In addition, the parameters of the
influence of CNS nodes in general are dynamic characteristics, the value of which can change significantly over time.
As mentioned above, one of the most used methods for determining the importance of network nodes is the degree
of centrality of mediation. Perhaps the term “mediation” is the best way to define the participation of the CNS element in
the process of joint functioning and interaction of all nodes of the network or a certain part of it. Therefore, to determine
316
the functional importance of a node or edge in the system, we will use the term “mediation”. Let us denote
Pp
ij
K
ij
k
k
K
ij ij
==
{}
1a set of paths that connect generator nodes and receiver nodes of CNS flow and contain the following
edge as an element: (, )nn
ij
,ij N,,=1. Let uij
kbe the volume of flows that have passed through the path of pij
kfrom the
generator node to the receiver node, and, hence, through the edge (, )nn
ij
over the period [, ]0T. Then the value
Vij
K
ij
k
k
K
ij
ij
=
=
åu
1
defines the total amount of flows that have passed through a set of paths Pij
Kij , and, therefore, through an edge
(, )nn
ij
, for this period of time. Parameter Fij ij
K
Vs
ij
=/( )V, which determines the specific weight of flows passing
through an edge (, )nn
ij
over the period [, ]0T, we will call as the measure of mediation of this edge in the process
of CNS functioning. A set Lij of all network nodes that lie on paths from the aggregate Pij
Kij , we will call the
mediation area, and the number hij of these nodes are called the edge mediation function (, )nn
ij
,ij N,,=1
(Fig. 3).
Parameters of the degree, area, and power of edge mediation (, )nn
ij
,ij N,,=1, are global characteristics of its
importance in the process of CNS functioning. They, in particular, determine how blocking of this edge will affect the
work in the mediation area, the size of this area, and, as a result, the loss of the entire system.
Let us denote Pp
i
K
i
k
k
K
ii
==
{}
1a set of paths that connect generator nodes and receiver nodes of CNS flows and
that pass through the node ni,iN=1, . Let ui
kbe the volume of flows that have passed through the path of pi
kfrom the
generator node to the receiver node, and therefore through the node niover the period [, ]0T. Then the value
Vi
K
i
k
k
K
i
i
=
=
åu
1
defines the total amount of flows that have passed through a set of paths Pi
Ki, and hence through the node ni, for
this very period of time. Parameter Fii
K
Vs
i
=/( )V, which determines the specific weight of flows passing through
the node niover the period [, ]0T, we will call as measure of mediation of this node in the process of CNS
functioning. A set Miof all CNS nodes that lie on paths from the aggregate Pi
Ki, we will call the mediation area,
and the number hiof these nodes is called the node mediation function ni. Parameters of the degree, area, and
power of node mediation ni,iN=1, , are global characteristics of its importance in the process of CNS functioning.
They, in particular, determine how blocking of this node will affect the work in the mediation area, the size of this
area, and, as a result, the loss of the entire system.
317
Fig. 3. The area of edge mediation (, )nn
ij
in the process of CNS functioning.
ninj
The mediation parameters allow us to define the following attack scenarios on CNS:
(i) a list of network nodes is prepared in order of decreasing the values of the degree of their mediation in the
system, and the nodes from the beginning of this list are sequentially removed from the structure until a predetermined
level of critical losses is reached;
(ii) after extracting the next node, the list of nodes is formed according to the previous scenario, and the attack is
carried out on the first node from the modified list.
The second scenario takes into account the need to replace blocked nodes-generators and receivers of flows and
search for alternative routes for transit flows that passed through the blocked nodes, i.e., the corresponding redistribution
of traffic flows by the network. Similar attack scenarios are formed for edges, since in many cases it is much easier to
remove a network edge from the CNS operation process than to block one of the nodes that this edge connects. The
parameters for mediation of nodes and edges allow us to estimate which part of the CNS will be affected by the
consequences of failures of the corresponding element of the system and what losses this will cause in the sense of
non-delivery of certain volumes of transit flows.
Above, we defined the parameters of node mediation, taking into account only the transit flows that pass through it.
However, the values of mediation parameters can be significantly expanded, given that the node nican be not only a transiter,
but also a generator and a final receiver of flows. Then, a set Pi
Kican be supplemented with the paths of traffic flows that start
(generated) or end (accepted) in the node ni. Let us denote such an augmented set ~
Pi
Ki,iN=1, . Then, the value
~()/FF
iiii
=++xx
in out 3
we will call a generalized node mediation measure niin the process of CNS functioning. Respectively, a set ~
Miof
all CNS nodes that lie on paths from the aggregate ~
Pi
Ki, we will call the generalized mediation area, and the
number ~
hiof these nodes are called the generalized mediation power of the node ni,iN=1, . The generalized
mediation parameters take into account the interaction between all directly and indirectly connected CNS nodes
(generators, receivers, and transiters) and allow you to create the most effective attack scenarios for them.
The principles for building such scenarios are described above.
SENSITIVITY OF NETWORK SYSTEMS TO SMALL CHANGES
Along with targeted attacks, there is another aspect of the system’s stability, which is its sensitivity to small
changes in the structure or process of functioning. Such changes can be caused by both internal and external factors, and
lead to no less negative consequences than targeted attacks. In this case, the stability of the structure is determined by the
sensitivity to small changes in its composition (a set of nodes and connections between them) [12]. The structure is
unstable if such changes can lead to the loss of certain network properties, such as connectivity. The stability of the CNS
operation process is determined by its sensitivity to small changes in the volume of flows. For example, the system is
vulnerable to critical (close to their capacity) congestion of part of its edges or nodes, and in CNS with fully ordered
traffic flows, such as a railway transport system, it is sensitive to small delays in the train schedule. It is obvious that the
stability of the process is more or less related to the stability of the CNS structure. If small changes (blocking several
nodes and edges of the network) lead to the loss of its connectivity, this directly affects the process of functioning of the
system. If the stress on certain elements of the structure is critical, this also creates a threat of blocking them.
We will determine the most vulnerable to critical stress conditions functionally important components of CNS. For
this purpose, we will introduce [21] flowing l-core of the CNS as the largest subnet of the source network for which the
elements of the matrix Vare no less than the value of lÎ[, ]01. The adjacency matrix Vll
==
{}Vij ij
N
,1
of l-core we will
define by the formula
VVV
VijN
ij
ij ij
ij
ll
l
=³
<=
ì
í
î
if
if
,
,, , .01
318
Elements of matrix Vlwith the growing importance of ldetermine the functional priority of the corresponding
CNS subsystems.
Let us also define the CNS stress matrix U==
{}Uij ij
N
,1
with the elementsUVU
ij ij ij
=/max ,where
Uij
max is a bandwidth
(maximum allowed amount of flows) of the edge (, )nn
ij
,ij N,,=1, and let us introduce b-core of the CNS stress as the largest
subnet of the source network for which the elements of the matrix Uare no less than the values of bÎ[, ]01.
Let us define by the formula
UuU
UijN
ij
ij ij
ij
bb
b
=³
<=
ì
í
î
if
if
,
,, , ,01
the adjacency matrix Ubb
==
{}Uij ij
N
,1
of b-core.
Elements of matrix Ubwith the growing importance of bdetermine the most stressed components of the system.
Then, the nonzero elements of the matrix
Wlb l b´
=
{}VU
ij ij ij
N
,1
for values land b, close to one, determine the most vulnerable of the functionally most important components of the
system belonging to the intersection of l-and b-cores of CNS. A slight increase in the volume of flows in such
components can lead to their blocking in the system, causing it the greatest harm. In Fig. 4a, the main highways of
the central part of the Lviv city, the structure of which was formed long before the advent of automobile and electric
transport, are reflected. This is the main reason for long traffic jams (blocking important components of the road
network) that constantly occur in the center of Lviv. In Fig. 4b and 4c, fragments of the flow 0.8-core and 0.9-core
load of this transport system (TS), are shown, respectively. In Fig. 4d, the most vulnerable to congestion of the road
network section (non-zero elements of the matrix Wlb´), which repeatedly led to the temporary collapse of the TS
center of Lviv. In general, for an arbitrary network system elements of its matrix Wlb´they are the most vulnerable,
i.e., the components that are attractive from the point of view of successful implementation for targeted attacks on it.
It is obvious that blocking of these components creates difficulties for traffic flows on all adjacent roads.
In contrast to targeted defeats, failures that occur as a result of small changes in the volume of traffic flows can
often be prevented. Thus, the analysis of risks associated with critical stress allows us to increase the throughput of CNS
elements in advance, choose alternative or create new flow paths. The disadvantages associated with a low-latency
sensitive flow schedule can be overcome by optimizing this schedule, etc. Since failures of a single element negatively
affect the operation of all directly or indirectly related CNS elements, i.e., on a certain subsystem, and shortcomings in the
functioning of individual subsystems (on CNS in general), it is advisable to use the methods of continuous monitoring and
comprehensive assessment of the functioning of complex systems, described in detail in [22, 23].
319
Fig. 4. Fragments: main roads of town center (a); flow-core of town center (b);
the core workload of the town center (c); the most vulnerable component
of the road of the town center (d).
ab dc
Usually, after blocking a system whose structure is determined by the matrix Wlb´, CNS tries to redirect flows in
other ways. As a result, other flow cores and load cores are formed in the network, the cross section of which creates new
threats for blocking system components. This process can spread over large areas of the CNS and requires rapid analysis
and appropriate decisions to prevent wide propagation of such processes. In the case of a high rate of propagation, they
can develop into so-called cascading phenomena in the network. The most reliable and effective way to counteract such
processes is to reserve alternative flow paths, in other words, to seal the network.
CONCLUSIONS
Determining the most important elements of real CNS with a scale-free structure from a functional point of view is
relevant for improving the means of protecting these systems from targeted attacks and other negative internal and
external influences. The concepts of influence parameters and mediation of CNS elements introduced in the work made it
possible to develop scenarios for identifying those components of the system whose blocking can lead to the greatest
losses in the course of its operation, as well as to quantify these losses. The sensitivity of the system to small changes in
the volume of traffic flows, the values of which are close to the critical load of composite CNS, was analyzed. It is shown
that critical load of system elements can lead to the same consequences as deliberate removal of them from the network
structure or purposeful blocking of the functioning process. The obtained results can be used to improve existing and
develop new methods for protecting real network systems from natural and artificial lesions of various types.
REFERENCES
1. S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D. U. Hwang, “Complex networks: Structure and dynamics,”
Physics Reports, Vol. 424, No. 4, 175–308 (2006). https://doi.org/10.1016/j.physrep.2005.10.009.
2. A.-L. Barab¿si and J. Frangos, Linked: The New Science of Networks, Basic Books, New York (2002).
3. G. Bianconi and A.-L. Barab¿si, “Bose–Einstein condensation in complex networks,” Physical Review Letters,
Vol. 86, No. 24, 5632–5635 (2001). https://doi.org/10.1103/PhysRevLett.86.5632.
4. R. de Regt, S. Apunevych, C. von Ferber, Yu. Holovatch, and B. Novosyadlyj, “Network analysis of the
COSMOS galaxy field,” Monthly Notices of the Royal Astronomical Society, Vol. 477, Iss. 4, 4738–4748 (2018).
https://doi.org/10.1093/mnras/sty801.
5. S. N. Dorogovtsev and J. F. F. Mendes, Evolution of Networks: From Biological Nets to the Internet and WWW,
Oxford University Press, Oxford (2013).
6. S. Bornholdt and H. G. Schuster, Handbook of Graphs and Networks: From the Genome to the Internet,
Jon Wiley & Sons, New York (2006).
7. G. Caldarelli and A. Vespignani, Large Scale Structure and Dynamics of Complex Networks: From Information
Technology to Finance and Natural Science, World Scientific, New York (2007).
8. O. D. Polishchuk and M. S. Yadzhak, “Network structures and systems: I. Flows characteristics of complex
networks,” System Research & Information Technologies, No. 2, 42–54 (2018). https://doi.org/10.20535/
SRIT.2308-8893.2018.2.05.
9. D. O. Polishchuk and O. D. Polishchuk, “Monitoring of the flow of transport networks with partially ordered
traffic,” in: Proc. of the ÕÕ²²² Sci.-Techn. Conf. Young Scientists of Karpenko Physico-Mechanical Institute of
the NAS of Ukraine (Lviv, Oct. 23–25, 2013), Lviv (2013), pp. 326–329.
10. R. Albert and A.-L. Barab¿si, “Statistical mechanics of complex networks,” Review of Modern Physics, Vol. 74,
No. 1, 47–97 (2002). https://doi.org/10.1103/RevModPhys.74.47.
11. Yu. Holovatch, O. Olemskoi, C. von Ferber, T. Holovatch, O. Mryglod, I. Olemskoi, and V. Palchykov,
“Complex networks,” J. of Physical Studies, Vol. 10, No. 4, 247–289 (2006).
12. R. Albert, H. Jeong, and A.-L. Barab¿si, “Error and attack tolerance of complex networks,” Nature, Vol. 406,
378–482 (2000). https://doi.org/10.1038/35019019.
320
13. P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han, “Attack vulnerability of complex networks,” Physical Review E,
Vol. 65, Iss. 5, 056109-1–056109-14 (2002). https://doi.org/10.1103/PhysRevE.65.056109.
14. R. Guimera, S. Mossa, A. Tutschi, and A. N. Amaral, “The worldwide air transportation network: Anomalous
centrality, community structure, and cities’ global roles,” in: Proc. National Academy of Sciences of USA,
Vol. 102, No. 22, 7794–7799 (2005). https://doi.org/10.1073/pnas.0407994102.
15. Petya.A virus attacks reach $ 8 billion worldwide. URL: https://www.unian.ua/science/2003241-zbitki-vid-ataki
-virusu-petyaa-syagayut-8-milyardiv-dolariv-ekspert.html.
16. L. C. Freeman, “A set of measures of centrality based upon betweenness,” Sociometry, Vol. 40, No. 1, 35–41
(1977). https://doi.org/10.2307/3033543.
17. M. E. J. Newman, “Analysis of weighted networks,” Physical Review E, Vol. 70, No. 5, 056131-1–056131-9
(2004). https://doi.org/10.1103/PhysRevE.70.05613.
18. Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro, “Aiding the detection of fake accounts in large scale social
online services,” in: Proc. 9th USENIX Symposium on Networked Systems Design and Implementation (San Jose,
CA, USA, April 25–27, 2012), San Jose (2012), pp. 197–210.
19. N. Abokhodair, D. Yoo, and D. W. McDonald, “Dissecting a social botnet: Growth, content and influence in
Twitter,” in: Proc. 18th ACM Conference on Computer Supported Cooperative Work & Social Computing
(Vancouver, BC, Canada, March 14–18, 2015), Vancouver (2015), pp. 839–851.
20. R. Pastor-Satorras and A. Vespignani, “Epidemic spreading in scale-free networks,” Physical Review Letters,
Vol. 86, No. 14, 3200–3202 (2001). https://doi.org/10.1103/PhysRevLett.86.3200.
21. O. D. Polishchuk and M. S. Yadzhak, “Network structures and systems: II. Network and multiplex cores,” System
Research & Information Technologies, No. 3, 38–51 (2018). https://doi.org/ 10.20535/SRIT.2308-8893.2018.3.04.
22. D. O. Polishchuk, O. D. Polishchuk, and M. S. Yadzhak, “Complex deterministic evaluation of the complex
hierarchical-network systems: Part I. Methods description, System Research & Information Technologies, No. 1,
21–31 (2015).
23. O. D. Polishchuk, M. I. Tyutyunnyk, and M. S. Yadzhak, “Quality estimation of functioning of complex systems
on the base of parallel organization of calculations,” Information Extraction and Processing, Iss. 26 (102),
121–126 (2007).
321
... These approaches can be based on deterministic, statistical, stochastic and hybrid principles [1,7]. Each of them has its own advantages and disadvantages [12]. Purpose of deterministic methods consists in formulation of conclusions regarding actual state and operational quality of each system element (node, edge, flow). ...
... The history of nuclear power started over half the century ago. At the beginning of its development, it was estimated that the probability of a serious nuclear reactor accident comprises 1 accident in 10 million years [12]. During the operation of nuclear reactors there were at least 15 serious accidents and catastrophes. ...
... 6. Analysis of system operation history. Solution of this problem allows to track and forecast the quality of system operation, to determine trends of its development in the context of improvement or deterioration and to prevent possible failures [12]. ...
Article
Full-text available
This work proposes methodology for complex evaluation of real large complex dynamical system with hierarchically-network structure, the component of which are the methods for local, forecasting, interactive and aggregated evaluation of its main objects. It is showed that when combined, together with use of adjusted rating scale they form up quite comprehensive, adequate, and integral notion regarding state, operation quality and interaction of objects of studied system and its subsystems on all levels of its structure. Described methodology is applied for development of software for evaluation of state and functioning quality of track and station facilities of Ukrainian Railways. Separate methods of proposed methodology were applied for evaluation of quality of prosthesis of lower limbs of disabled persons and level of recovery of functional capabilities of human musculoskeletal system at different cases of pathologies and means of rehabilitation which indicates universality of proposed approach for complex systems evaluation. Results of the evaluations should be used to make decision about how to proceed with regard to the objects of estimation.
... Complex systems appear, operate and develop within long periods of time and with natural processes of "aging", despite regular improvements, more strict and accurate control over their behaviour is required. This is why the development of methods for evaluation and forecasting the state, operation quality and interaction between structural elements of CLSTS is actual problem [18][19][20][21][22]. Often the cause of accidents is the wrong evaluation of the current situation or an inadequate forecast of its future development. ...
... Aggregation of evaluations of system components is known for a long time [22,24,25]. We used it to make generalized conclusions about the behavior of system elements according to the set of characteristics, parameters and evaluation criteria [26,27] in a continuous, discrete, conceptual, and precise rating scale [21,22]. ...
... Aggregation of evaluations of system components is known for a long time [22,24,25]. We used it to make generalized conclusions about the behavior of system elements according to the set of characteristics, parameters and evaluation criteria [26,27] in a continuous, discrete, conceptual, and precise rating scale [21,22]. Aggregation is useful for determining the optimal operation modes of CDS [28] and selecting an optimal system from a given class of equivalent systems [29]. ...
Article
Full-text available
This article covers the problem of processing of Big Data that describe process of complex networks and network systems operation. It also introduces the notion of hierarchical network systems combination into associations and conglomerates alongside with complex networks combination into multiplexes. The analysis is provided for methods of global network structures study depending on the purpose of the research. Also the main types of information flows in complex hierarchical network systems being the basic components of associations and conglomerates are covered. The main approaches for the formation of generalized conclusions about operation quality of complex hierarchical network systems are analyzed. Advantages and drawbacks of the “weakest” element method and a weighted linear aggregation method are determined. Nonlinear aggregation method is proposed for evaluating the quality of the system, which consists of elements of the same priority. Hybrid approaches to form generalized conclusions are developed based on the main aggregation methods. It is shown that they allow to obtain more reliable aggregation results.
... These approaches can be based on deterministic, statistical, stochastic and hybrid principles [16][17][18][19]. Each of them has its own advantages and disadvantages [20]. Purpose of deterministic methods consists in formulation of conclusions regarding actual state and operational quality of each system element (node, edge, flow) [21,22]. ...
... Usually, the most popular purpose of evaluation consists in the search of system objects whose operation is unsatisfactory [20]. The notion "system object" will hereinafter designate structural unit of system of any hierarchy levelfrom element to the subsystem of highest level of splitting. ...
... High-speed train movement does not pose any danger to railway of high quality and can cause a catastrophe if the state of track is unsatisfactory. Purpose of evaluation may also consist in choosing the best system from a given class of equivalent systems [20]. ...
Article
Full-text available
Region of the country is treated as an open megasystem that consists of many interconnected complex network systems. Classification of such systems on the basis of ordered motion of flows is performed. The main approaches to investigation of complex systems are described. Theory of evaluation is considered as a tool for analysis of network systems. Purpose and subject of evaluation of the systems are formulated. The main problems of evaluation are analyzed and the ways of further research are determined.
... Methods of evaluation can be based on deterministic [4,5], statistical [6,7], stochastic [8] or hybrid [9] approaches. Each of them has its own benefits and disadvantages [10]. Deterministic methods generate an evaluation of the real state and functioning quality of a particular object in the system [11,12]. ...
... The most of methods of evaluation focus on procedures of aggregation [10,16,17]. However, fuzzy or unilateral local evaluations do not allow us to form reasoned generalized conclusion and build an accurate forecast of behavior of the system even on a short-term perspective. ...
... In general, the methods used to evaluate the state and functioning quality of the system should focus on the type, structure, function and its other features. Sufficiently detailed overview of the methods of evaluation and the peculiarities of their use can be found in [4,6,10,14,23]. ...
Article
Full-text available
Methods of complex evaluation based on local, forecasting, aggregated, and interactive evaluation of the state, function quality, and interaction of complex system's objects on the all hierarchical levels is proposed. Examples of analysis of the structural elements of railway transport system are used for illustration of efficiency of proposed approach.
... Complex systems appear, operate and develop within long periods of time and with natural processes of "aging", despite regular improvements, more strict and accurate control over their behaviour is required. This is why the development of methods for evaluation and forecasting the state, operation quality and interaction between structural elements of CDS is actual problem [17][18][19][20][21]. Often the cause of accidents is the wrong evaluation of the current situation or an inadequate forecast of its future development. ...
... Aggregation of evaluations of system components is known for a long time [21,23,24]. We used it to make generalized conclusions about the behavior of system elements according to the set of characteristics, parameters and evaluation criteria [25,26] in a continuous, discrete, conceptual, and precise rating scale [20,21]. ...
... Aggregation of evaluations of system components is known for a long time [21,23,24]. We used it to make generalized conclusions about the behavior of system elements according to the set of characteristics, parameters and evaluation criteria [25,26] in a continuous, discrete, conceptual, and precise rating scale [20,21]. Aggregation is useful for determining the optimal operation modes of CDS [27] and selecting an optimal system from a given class of equivalent systems [28]. ...
Article
Full-text available
The main approaches for the formation of generalized conclusions about operation quality of complex hierarchical network systems are analized. Advantages and drawbacks of the "weakest" element method and a weighted linear aggregation method are determined. Nonlinear aggregation method is proposed for evaluating the quality of the systems, which consist of elements of the same priority. Hybrid approaches to form generalized conclusions are developed based on the main aggregation methods. It is shown that they allow to obtain more reliable aggregation results.
... The study of different types of complex dynamical systems (technical, biological, social, economical) has attracted the attention of many researchers for a long time already [1][2][3][4]. Important direction of such a study is development of methods for evaluation of state, operating quality, and interaction between objects of those systems [5][6][7][8][9][10]. Among main problems arising in this case local and global evaluation of complex dynamical systems quality [10,11] may be pointed out, as well as determination of their optimal operation modes [12], analysis of system behaviour during a certain period of time, and the choice of optimal operating system out of certain class of equivalent systems. ...
... Important direction of such a study is development of methods for evaluation of state, operating quality, and interaction between objects of those systems [5][6][7][8][9][10]. Among main problems arising in this case local and global evaluation of complex dynamical systems quality [10,11] may be pointed out, as well as determination of their optimal operation modes [12], analysis of system behaviour during a certain period of time, and the choice of optimal operating system out of certain class of equivalent systems. We propose a unified approach to solving the above-listed problems. ...
Article
Full-text available
Methods are proposed for evaluation of complex dynamical systems, choice of their optimal operating modes, determination of optimal operating system out of given class of equivalent systems, system’s timeline behaviour analysis on the basis of versatile multicriteria, and multilevel analysis of behaviour of system's elements.
... As a rule, the weighted linear aggregation method (WLAM) is used to form generalized conclusions about the state and operation quality of the system [28]. In this paper we analyze three approaches to form aggregated evaluations: the "weakest" element method (WEM), WLAM and nonlinear aggregation method (NAM). ...
Article
Full-text available
The main approaches for the formation of generalized conclusions about operation quality of complex hierarchical network systems are analyzed. Advantages and drawbacks of the “weakest” element method and a weighted linear aggregation method are determined. Nonlinear aggregation method is proposed for evaluating the quality of the system, which consists of elements of the same priority. Hybrid approaches to form generalized conclusions are developed based on the main aggregation methods. It is shown that they allow us to obtain more reliable generalized conclusions.
... At this hierarchy level (level of system BSS) data analysis and timely response to detected local problems in the network elements (nodes, edges and flows) is carried out. The main purpose of information analysis at this level is to discover potentially failure (or "the weakest") BSS elements [23][24][25][26]. Failure of such elements often leads to the cascading phenomena (all catastrophes usually start from "minor failures" at system elements level). ...
Article
Full-text available
This article covers the problem of processing of Big Data that describe process of complex networks and network systems operation. It also introduces the notion of hierarchical network systems combination into associations and conglomerates alongside with complex networks combination into multiplexes. The analysis is provided for methods of global network structures study depending on the purpose of the research. Also the main types of information flows in complex hierarchical network systems being the basic components of associations and conglomerates are covered. Approaches are proposed for creation of efficient computing environments, distributed computations organization and information processing methods parallelization at different levels of system hierarchy.
Article
Full-text available
Subject of research is complex networks and network systems. The network system is defined as a complex network in which flows are moved. Classification of flows in the network is carried out on the basis of ordering and continuity. It is shown that complex networks with different types of flows generate various network systems. Flow analogues of the basic concepts of the theory of complex networks are introduced and the main problems of this theory in terms of flow characteristics are formulated. Local and global flow characteristics of networks bring closer the theory of complex networks to the systems theory and systems analysis. Concept of flow core of network system is introduced and defined how it simplifies the process of its investigation. Concepts of kernel and flow core of multiplex are determined. Features of operation of multiplex type systems are analyzed.
Article
Full-text available
The notion of flow core of the network system is introduced and the functional advantages of its structure compared with the core of the complex network are analyzed. It has been shown that the flow cores allow us to construct a much more adequate with functional point of view the models of network systems than the cores of complex networks. This is demonstrated on the examples of practically important problems of controllability, observability and synchronization of complex networks. On the base of analysis of the structures of real systems, a generalized definition of the multiplex is proposed and the notion of its kernel is introduced. A few of modeling problems of multiplexes are considered and it is established that the effect of the "small world" in them increa¬ses. The flow adjacency matrix for the multiplex system is constructed. On its basis, a few of local and global characteristics of the multiplex system are determined and the properties of its flow core are investigated. Methods of reducing the dimension of models of multiplex systems with simulta¬neous monitoring of the quantitative measure of maintaining their adequacy are analyzed. Key words: complex network, network system, flow, multiplex, model, core, kernel
Article
Full-text available
NETWORK STRUCTURES AND SYSTEMS: I. FLOWS CHARACTERISTICS OF COMPLEX NETWORKS Polishchuk O.D., Yadzhak M.S. Structural and functional directions of complex network systems research are considered. The net¬work system is defined as a complex network on which the flows are moved. Classification of net¬work systems is carried out on the basis of continuity and level of ordering of flows motion. Along with the structural characteristics of complex networks are introduced flow characteristics of net¬work systems. The problem of critical loading of network components is studied. Problems of di¬mension and adequacy of models of network systems are considered. It is shown how the system's flow characteristics allow us to identify and exclude fictitious nodes and links from its structure and determine the hidden elements of the system. It was investigated how on the basis of the analysis of flows processes in the system the structure of scale-free networks changes not only during the growth stage, but also during the whole life cycle of the corresponding network system. The prob¬lem of isolated zones of network systems is considered and the algorithm for finding alternative ways of flows motion in bypassing unattainable components of the network is proposed. Key words: complex network, network system, flow, dimension, adequacy, alternative ways, growth, preferential attachment
Article
Full-text available
The complex network analysis of COSMOS galaxy field for R.A. = 149.4 deg - 150.4 deg and Decl. = 1.7 deg - 2.7 deg is presented. 2D projections of spatial distributions of galaxies in three redshift slices 0.88-0.91, 0.91-0.94 and 0.94-0.97 are studied. We analyse network similarity/peculiarity of different samples and correlations of galaxy astrophysical properties (colour index and stellar mass) with their topological environments. For each slice the local and global network measures are calculated. Results indicate a high level of similarity between geometry and topology of different galaxy samples. We found no clear evidence of evolutionary change in network measures for different slices. Most local network measures have non-Gaussian distributions, often bi- or multi-modal. The distribution of local clustering coefficient C manifests three modes which allow for discrimination between stand-alone singlets and dumbbells (0 <= C < 0.1), intermediately packed galaxies (0.1 <= C < 0.9) and cliques (0.9 <= C <= 1). Analysing astrophysical properties, we show that mean values and distributions of galaxy colour index and stellar mass are similar in all slices. However, statistically significant correlations are found if one selects galaxies according to different modes of C distribution. The distribution of stellar mass for galaxies with interim C differ from the corresponding distributions for stand-alone and clique galaxies. This difference holds for all redshift slices. Besides, the analogous difference in the colour index distributions is observed only in the central redshift interval.
Conference Paper
Full-text available
Users increasingly rely on the trustworthiness of the information exposed on Online Social Networks (OSNs). In addition, OSN providers base their business models on the marketability of this information. However, OSNs suffer from abuse in the form of the creation of fake accounts, which do not correspond to real humans. Fakes can introduce spam, manipulate online rating, or exploit knowledge extracted from the network. OSN operators currently expend significant resources to detect, manually verify, and shut down fake accounts. Tuenti, the largest OSN in Spain, dedicates 14 full-time employees in that task alone, incurring a significant monetary cost. Such a task has yet to be successfully automated because of the difficulty in reliably capturing the diverse behavior of fake and real OSN profiles. We introduce a new tool in the hands of OSN operators, which we call SybilRank. It relies on social graph properties to rank users according to their perceived likelihood of being fake (Sybils). SybilRank is computationally efficient and can scale to graphs with hundreds of millions of nodes, as demonstrated by our Hadoop prototype. We deployed SybilRank in Tuenti's operation center. We found that ∼90% of the 200K accounts that SybilRank designated as most likely to be fake, actually warranted suspension. On the other hand, with Tuenti's current user-report-based approach only ∼5% of the inspected accounts are indeed fake.
Article
Full-text available
A Family of new measures of point and graph centrality based on early intuitions of Bavelas (1948) is introduced. These measures define centrality in terms of the degree to which a point falls on the shortest path between others and therefore has a potential for control of communication. They may be used to index centrality in any large or small network of symmetrical relations, whether connected or unconnected.
Article
Full-text available
The Internet has a very complex connectivity recently modeled by the class of scale-free networks. This feature, which appears to be very efficient for a communications network, favors at the same time the spreading of computer viruses. We analyze real data from computer virus infections and find the average lifetime and persistence of viral strains on the Internet. We define a dynamical model for the spreading of infections on scale-free networks, finding the absence of an epidemic threshold and its associated critical behavior. This new epidemiological framework rationalizes data of computer viruses and could help in the understanding of other spreading phenomena on communication and social networks.
Article
Full-text available
We study the response of complex networks subject to attacks on vertices and edges. Several existing complex network models as well as real-world networks of scientific collaborations and Internet traffic are numerically investigated, and the network performance is quantitatively measured by the average inverse geodesic length and the size of the largest connected subgraph. For each case of attacks on vertices and edges, four different attacking strategies are used: removals by the descending order of the degree and the betweenness centrality, calculated for either the initial network or the current network during the removal procedure. It is found that the removals by the recalculated degrees and betweenness centralities are often more harmful than the attack strategies based on the initial network, suggesting that the network structure changes as important vertices or edges are removed. Furthermore, the correlation between the betweenness centrality and the degree in complex networks is studied.
Article
Complex interacting networks are observed in systems from such diverse areas as physics, biology, economics, ecology, and computer science. For example, economic or social interactions often organize themselves in complex network structures. Similar phenomena are observed in traffic flow and in communication networks as the internet. In current problems of the Biosciences, prominent examples are protein networks in the living cell, as well as molecular networks in the genome. On larger scales one finds networks of cells as in neural networks, up to the scale of organisms in ecological food webs. This book defines the field of complex interacting networks in its infancy and presents the dynamics of networks and their structure as a key concept across disciplines. The contributions present common underlying principles of network dynamics and their theoretical description and are of interest to specialists as well as to the non-specialized reader looking for an introduction to this new exciting field. Theoretical concepts include modeling networks as dynamical systems with numerical methods and new graph theoretical methods, but also focus on networks that change their topology as in morphogenesis and self-organization. The authors offer concepts to model network structures and dynamics, focussing on approaches applicable across disciplines.
Article
Coupled biological and chemical systems, neural networks, social interacting species, the Internet and the World Wide Web, are only a few examples of systems composed by a large number of highly interconnected dynamical units. The first approach to capture the global properties of such systems is to model them as graphs whose nodes represent the dynamical units, and whose links stand for the interactions between them. On the one hand, scientists have to cope with structural issues, such as characterizing the topology of a complex wiring architecture, revealing the unifying principles that are at the basis of real networks, and developing models to mimic the growth of a network and reproduce its structural properties. On the other hand, many relevant questions arise when studying complex networks’ dynamics, such as learning how a large ensemble of dynamical systems that interact through a complex wiring topology can behave collectively. We review the major concepts and results recently achieved in the study of the structure and dynamics of complex networks, and summarize the relevant applications of these ideas in many different disciplines, ranging from nonlinear science to biology, from statistical mechanics to medicine and engineering.