Skip to main content

ORIGINAL RESEARCH article

Front. Phys., 25 October 2021
Sec. Social Physics
This article is part of the Research Topic Data-Driven Mathematical and Statistical Models of Online Social Networks View all 16 articles

Assessing the Structural Vulnerability of Online Social Networks in Empirical Data

Dayong Zhang,Dayong Zhang1,2Changyong Guo
Changyong Guo3*Zhaoxin Zhang
Zhaoxin Zhang3*Gang Long,Gang Long3,4
  • 1State Key Laboratory of Communication Content Cognition, People’s Daily Online, Beijing, China
  • 2Department of New Media and Arts, Harbin Institute of Technology, Harbin, China
  • 3School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China
  • 4China Information Technology Security Evaluation Center, Beijing, China

Assessing the structural vulnerability of online social networks has been one of the most engaging topics recently, which is quite essential and beneficial to holding the network connectivity and facilitating information flow, but most of the existing vulnerability assessment measures and the corresponding solutions fail to accurately reveal the global damage done to the network. In order to accurately measure the vulnerability of networks, an invulnerability index based on the concept of improved tenacity is proposed in the present study. Compared with existing measurements, the new method does not measure a single property performance, such as giant component size or the number of components after destruction, but pays special attention to the potential equilibrium between the removal cost and the removal effect. Extensive experiments on real-world social networks demonstrate the accuracy and effectiveness of the proposed method. Moreover, compared with results of attacks based on the different centrality indices, we found an individual node’s prominence in a network is inherently related to the structural properties of network. In high centralized networks, the nodes with higher eigenvector are more important than the others in maintaining stability and connectivity. But in low centralized networks, the nodes with higher betweenness are more powerful than the others. In addition, the experimental results indicate that low centralized networks can tolerate high intentional attacks and has a better adaptability to attacks than high centralized networks.

Introduction

With the revolution of the WWW technology, Web 2.0 characterized by social collaborative technologies is emerging and fast-growing. People are increasingly inclined to cultivate their virtual social relations and virtual life on the existing prevalent online social networks [1], such as Facebook, Blogger, Wiki, and Digg. These online social networks can provide favorable platforms for people to exchange opinions or information with one another [2]. Specifically, online social networks are creating ties for us with a very wide range of people, which not only are bonded in relationships with acquaintances, as well as maintain close relationships with friends, schoolmates, and family members, but also are embodied in some new relationships in an online virtual world.

In order to defend some potential disruptions and facilitate information flow, assessing the vulnerability of online social networks has been one of the most engaging topics [3, 4]. The concept of vulnerability is generally used to find and characterize a lack of robustness and resilience of a complex system [5]. The vulnerability of a network structure was analyzed first by Albert et al. [6] and was regarded as a previously overlooked “Achilles’ heel.” Initially, vulnerability assessment was focused on some simple and generic models such as the Erdös–Rényi (ER) random model and the Barabási–Albert (BA) scale free model [6, 7]. Over the years, some scholars have found that the inherent preferential attachment mechanism and the structural properties of network may be responsible for the vulnerability of network [810]. Especially, a series of numerical simulations were introduced to study tolerance to random removals and intentional attacks in complex networks [1113]. Most experimental studies have shown that the Barabási–Albert (BA) network and other similar heterogeneous networks are very robust to random removals but are very fragile against intentional attacks based on the degree or betweenness [6, 14]. For homogeneous networks such as regular networks and random networks, the effect of random removals is equivalent to that of intentional attacks [6], while for small-world networks, long-range link attacks can cause their collapse directly [13]. Some achievements have been made in the research of some typical network models, but how the dynamical processes, such as resilience to damage or tolerance to attacks, are influenced by the specific topological structure of a network remains unknown.

In recent years, there has been much effort directed at developing methods for vulnerability assessment [1517]. The main results are largely based on two aspects, including critical node identification and removal effect evaluation. The former reflects the nodal prominent position in maintaining the network connectivity or facilitating information flow, while the latter refers to how to quantify the effect caused by the removal of a finite number of nodes. Indeed, the identification of critical individuals is an influence maximization problem [18], which aims to select a minimal node set to generate a maximal outcome in a given network. The quantification methods can be roughly classified into three categories: centrality-based algorithms, random-walk algorithms, and greedy-based algorithms. Structural connectivity has become the primary test criterion for vulnerability assessment [19]. In most instances, these evaluation metrics such as the characteristic path length [6] and the network efficiency [20, 21] are relatively straightforward and can more clearly characterize the changes in the connectivity of the target network before and after some nodes are removed. However, they only provide a useful topological snapshot for connected networks and are not suitable to assess the network vulnerability in terms of disconnectivity [15]. In addition, the existing measurements are difficult to reach equilibrium between the removal cost and the removal effect.

The primary purpose of this article is to fill this gap by exploring a new method to effectively quantify the vulnerability of the network structure. The new method focuses on how to identify the importance, or status, of a node in the network, and on further use of available resources to efficiently disrupt network operation, which comprehensively takes account of the cost with which one can disrupt a network and the attack effect. The contributions of this study can be summarized as the following:

1) An invulnerability index based on the concept of improved tenacity is proposed to measure the adaptability to attacks.

2) Low centralized networks can have a better adaptability to attacks than high centralized networks.

3) The experimental results verify the outperformance of the proposed method.

The rest of the article is organized as the following: In Methods, in order to assess the vulnerability of networks more properly, we present an invulnerability index based on the concept of improved tenacity to examine network adaptability to attacks. Generally, a network with a higher invulnerability index performs better under intentional attacks. In Network Data, we will examine the static properties of real online social networks empirically, in order to summarize the generalized differences in the topological structure of various online social networks. Especially, in Discussion, we will display the threshold behavior of the aforementioned networks on experimental observation, and further compare the efficiency of node removal with different centrality indices to find the vulnerability of online social networks.

Methods

The Attack Strategies

Inspired by the well-known percolation theory in statistical physics, the robustness and resilience of a network is usually defined as the network structural degradation caused by the removal of some critical nodes [19]. Tolerance to random removals and intentional attacks is understood as the ability of the network to maintain operations and connectivity under the loss of some nodes or links [8]. In order to ensure the efficiency of attacks, it is necessary to identify the most vulnerable nodes in a network. Indeed, the identification of critical nodes is an influence maximization problem [18]. The quantification algorithms can be roughly classified into three categories: centrality-based algorithms, random-walk algorithms, and greedy-based algorithms.

Centrality-based algorithms perform a fundamental quantification by considering geodesics between nodes to evaluate nodal importance. Up to now, many centrality-based algorithms have been proposed, such as degree centrality [22, 23], betweenness centrality [22, 24], closeness centrality [22, 25], eigenvector centrality [26], and other improved centrality-based algorithms [2729]. The random-walk algorithms include the well-known PageRank [30] and other improved algorithms [31]. Random-walk algorithms work only well for directed networks. Greedy-based algorithms formulate the influence measurement as a discrete optimization problem, and their elementary strategies are to select the spreaders that contribute the largest incremental influence one by one, according to a specified influence cascade model [32]. In terms of algorithm construction, although greedy-based algorithms can achieve excellent results, they also have very high computational complexity and are not suitable for large-scale social networks.

Previous studies have shown that the adaptability of networks behaves differently from various attack strategies [20, 33]. Thus, in this article, we will study tolerance to various attacks in real online social networks and further find a minimized set of nodes triggering the collapse of network. We will consider four straightforward and efficient centrality indices as attack strategies to identify the importance of nodes.

1) Degree centrality: The algorithm measures a node’s influence according to the number of edges attached to it, which reflects the ability of a node to connect directly with other nodes.

2) Betweenness centrality: The algorithm measures a node’s influence through the ratio of the shortest path over the nodes to the number of all paths, which considers the global structure information of a given graph.

3) Closeness centrality: The basic idea behind the closeness centrality is that a node is central if it is “close” to many other nodes [34]. Thus, the closeness centrality score of node i is defined as the reciprocal of the sum of geodesic distances to all other nodes.

4) Eigenvector centrality: The algorithm is based on the principle that a node should be viewed as important if it is linked to other nodes which are important themselves. Thus, the eigenvector centrality of node i is defined as the proportional to the sum of the eigenvector centralities of the nodes it is connected to [28].

Because the removal of nodes under intentional attacks changes the balance of structure and leads to a global redistribution over all the networks, we recalculate the degree centrality, the betweenness centrality, the closeness centrality, and the eigenvector centrality, every time a small fraction of nodes is removed.

Evaluation Metrics

Numerous empirical results on real networks have revealed that the heterogeneous topology structure may be fit for most real networks [3537], where degree distribution significantly deviates from a Poisson and low degree nodes are far more abundant than the nodes with high degrees. Due to the inhomogeneity of general networks, removing some critical nodes will decrease the network connectivity and lead to the loss of the global information-carrying ability of the network [6, 20]. Generally, when assessing the vulnerability of a network under intentional attacks, three performance criteria should be concerned in the framework of graph theory [38]:

1) The number of components that are being removed.

2) The number of disconnected subgroups after intentional attacks.

3) The size of the largest remaining group within which mutual communication can still occur.

Most of the online social networks can be abstracted as a non-complete connected graph G=(V,E), where individual members and personal relationships can be defined by a set of nodes Vand a set of edges E, respectively. In general, a good social network should have short distance between nodes, average distance, and high connectivity. In fact, there has been much effort directed at developing methods for evaluating network adaptability to attacks. In most instances, the characteristic path length and the network efficiency as evaluation metrics can only provide a useful topological snapshot for connected networks [39]. But for disconnected networks, the geodesic distance between any two nodes belonging to two disconnected subgroups is identically zero or infinity, which will directly affect the accuracy of evaluation results. In graph theory, some helpful indicators of evaluating network vulnerability have been proposed. These metrics relates to network topology and attributes, such as toughness [40], integrity [41], tenacity [42], and scattering number [43]. The detailed description of each indicator is shown in Table 1.

TABLE 1
www.frontiersin.org

TABLE 1. Evaluation metrics based on graph theory.

As one of the basic concepts of graph theory, connectivity plays a vital role in network performance and is fundamental to vulnerability measures. The concept of connectivity K(G) of G is defined as

K(G)=min{|S|:SV},(1)

where |S| is a cutset of V(G). In Eq. 1, the connectivityK(G) asks for the minimum number of nodes whose removal renders the graph Gdisconnected. As one of the graph theoretical concepts, connectivity deals with the criterion (1).

Toughness and integrity are two other graph concepts used in the vulnerability assessment. The notion of the toughness T(G) ofG, originally introduced by Chvátal [40], is defined as follows:

T(G)=min{|S|w(GS):SV,w(GS)2},(2)

where w(GS) stands for the number of components of GS. Unlike the connectivity K(G), the toughness T(G) incorporates the relationship between the size of the cutset and the number of components after destruction and takes into account of the criteria (1) and (2). But the toughness T(G) is still insufficient to measure the network vulnerability. Considering the graphs G1 and G2 (see Figure 1), two graphs have the same connectivity and toughness, where K(G1)=K(G2)=1 and T(G1)=T(G2)=13, but they are really different in the vulnerability of graphs. For instance, after the minimum cutset {u1} is removed, we find that the G1has been divided into three small components, while the vast majority of nodes of G2 have been retained in the largest connected component {u2,u6,u5}, within which mutual communication among the remaining nodes can still occur. It implies that the connectivity K(G) and toughness T(G) cannot accurately reveal the global damage done to the network.

FIGURE 1
www.frontiersin.org

FIGURE 1. Non-complete connected graphs G1 (A) and G2 (B).

The notion of integrity introduced as another vulnerability parameter of graphs [41] focuses on the criteria (1) and (3). For a non-complete connected graph G, its integrity I(G) is defined as follows:

I(G)=min{|S|+m(GS):SV},(3)

where m(GS) denotes the giant component size after destruction.

Obviously, the disruption is more successful if the disconnected network contains more components and is much more successful if, in addition, the components are small. Unfortunately, connectivity and toughness give the minimum cost to disrupt a network but fail to indicate accurately what remains after the disruption. Although Barefoot’s integrity has taken the size of the largest remaining component after destruction into account, it cannot indicate the extent of the damage.

The notion of tenacity was originally proposed in Ref. [42], where they introduced the mix-tenacity to measure the vulnerability of Harary graphs. The precise definition of tenacity is defined as follows:

R(G)=min{|S|+m(GS)w(GS):SV,w(GS)2}(4)

The tenacity R(G) of graphs directly integrates all three criteria, such as the cost of network breakage, the number of components, and the giant component size, and is considered to be a reasonable measure for the vulnerability of graphs. As shown in Figures 2A,B, it is easy to know that R(G1)=min{1+23}=1 andR(G2)=min{2+14}=34, R(G1)>R(G2), which indicates the adaptability to attacks for G1is better than G2.

FIGURE 2
www.frontiersin.org

FIGURE 2. Dividing processes of the graphs G1 (A) and G2 (B).

In general, if the network remains more disconnected subgroups and smaller connected component size after destruction, the disruption is more successful. As shown in Figures 3A,B, G3 and G4 all have the same number of nodes and edges. After {u1,u2} and {u2,u1,u4} are removed respectively, the minimum toughness and the minimum tenacity can be obtained, which are T(G3)=T(G4)=12 andR(G3)=R(G4)=43. The cutsets {u1,u2} and {u2,u1,u4} are the minimum removal costs of the graph G3 and the graph G4, respectively. But we find that there are differences both in the attack efficacy in the graph G3 and graph G4, where for the graph G3, the minimum removal cost is 2 and the giant component size also is 2; while for the graph G4, the minimum removal cost is 3 and the giant component size is 1. As discussed earlier, the tenacity R(G)is still an imperfect criterion to assess network vulnerability.

FIGURE 3
www.frontiersin.org

FIGURE 3. Dividing processes of the graphs G3 (A) and G4 (B).

In Ref. [43], Hendry used the concept of scattering number to measure the vulnerability of extremal non-Hamiltonian graphs and found that it was more efficient for measuring the degree of global destruction. The scattering number S(G) of Gis defined as follows:

S(G)=max{w(GS)|S|:SV,w(GS)2}.(5)

So we think that it is necessary to add the criterion to reveal the global damage done to networks under attacks, and keep its priority in assessing the vulnerability of networks. Therefore, we propose an improved tenacity based on the concepts of scattering number and tenacity, which is named Rsca(G) and defined as follows:

Rsca(G)=min{m(GS)|w(GS)|S||:SV,w(GS)2}.(6)

As shown in Figures 3A,B, Rsca(G3)=min{1+23}=1 and Rsca(G4)=min{2+14}=34, Rsca(G3)>Rsca(G4), which indicates the anti-interference capability of G3is better than G4.

Compared with existing evaluation metrics [6, 20, 21, 3942], our notion of improved tenacity is not to measure a single property performance such as giant component size or the number of components after destruction, which is insufficient to evaluate the network vulnerability by only considering whether or not it is a disconnected network, and how fragmental the network becomes, but to pay special attention to the potential equilibrium between the giant component size and the number of components under intentional attacks. As shown in definition (6), the number of componentsw(GS)and the size of the largest connected componentm(GS)are re-calculated after each iteration, so the whole computational complexity of the proposed method isO(n2). The result demonstrates that the proposed algorithm has relatively less computational burden in evaluating the vulnerability of networks and can be applicable to large-scale networks.

Network Data

Data Description

Because online social networks serve as much social function as other kinds of social interaction, including e-mail exchanging, text messaging, instant messaging, digital video sharing, and so on, each edge meaning a connection in online social networks is complex and changeable, whereas each node meaning an individual of online social networks is constant. To measure the vulnerability of networks more properly, our method will pay more attention to the importance of nodes, rather than edges. Our data set is composed of six undirected and unweighted networks, that is, networks that have a binary nature, where the edges between nodes are either present or not, and each edge has no directional character. Table 2 indicates that the six real social network include the following: OClinks is a representative online community network, where users are from the University of California, Irvine, which is from Panzarasa et al.’s [44]; Twitter, Wiki-Vote, and Facebook can be downloaded from the Stanford network dataset (http://snap.stanford.edu/data/index.html); and Lilac and RenRen are collected from the online social networks by us.

TABLE 2
www.frontiersin.org

TABLE 2. The basic topological properties of the six online social networks.

In Table 1, we show the main topological properties of a series of online social networks, belonging to two different types: the online community service based on group-centered service and the social network service based on individual-centered service. The first three networks, Lilac, OClinks, and Wiki-vote, are three examples of online community services, where the users have a common interest and purpose and can exchange information or seek help. In these networks, the nodes are the registered users, and the links represent a relationship between two users existing message exchange. In the latter part of Table 1, we show three examples of social network services. Twitter is a social news website, where users may mention other people or follow other people to make his/her posts, so the links imply communication between users existing mention or comment. RenRen is a real-name social networking internet platform in China, where users can connect and communicate with each other or enjoy a wide range of other features and services, so the links reflect different kinds of social relationships between the users. Facebook is an ego network consisting of friends lists from Facebook.

Structure of Networks

The most basic topological characterization of networks can be obtained in terms of the degree distribution P(k), defined as the probability that a node is chosen uniformly at random has degree k or, equivalently, as the fraction of nodes in the graph having degree k [19]. In recent years, scientists approached the study of real networks from the available databases and found most of the real networks having inhomogeneous structure, where the connections within nodes of the highest degree are rather sparse, and a large number of nodes just have a few connections. Moreover, most of real networks exhibit power law–shaped degree distributionP(k)kγ, with exponents varying in the range 2<γ<3[35, 36], and a little of them follow shifted power law distribution, stretched exponential distribution, or more complicated distributions [37].

The empirical results demonstrate that the degree distributions P(k)of aforementioned networks are subjected to two types: the segmented power law distribution (Lilac, OClinks, and Wiki-Vote) and the stretched exponential distribution (Twitter, RenRen, and Facebook). The insets in Figures 4A–C show the degree distributions P(k) of Lilac, OClinks, and Wiki-Vote are heavy-tailed, and approximately follow the power law distribution, where γ=1.72, γ=0.99, and γ=1.31, respectively. However, when the size of data set is small, it may happen that the data have a rather strong intrinsic noise due to the finiteness of the sampling. In order to avoid the statistical fluctuations, one better possibility is to measure the cumulative degree distributionsP(xk). The cumulative degree distributions P(xk)of Lilac, OClinks, and Wiki-Vote show two different scaling regions: a slow region and a rapid decaying region, and are well-approximated by the segmented power law distribution. The crossover takes place between k = 10 and k = 100, and the cumulative degree distributions P(xk) of Lilac network can be defined by the following equation:

P(xk)k(r1){r1=0.89,ifk16r1=2.11,ifk>16.

The similar trend is shown in Figure 4B, where the probability P(xk) of the OClinks network can be fitted by the following equation:

P(xk)k(r1){r1=0.51,ifk20r1=2.02,ifk>20.

As shown in Figure 4C, the probability P(xk) of the Wiki-Vote network can be fitted by the following equation:

P(xk)k(r1){r1=0.45,ifk63r1=2.26,ifk>63.

Otherwise, the insets in Figures 5A–C show the degree distributions of Twitter, RenRen, and Facebook, where R2=0.815,R2=0.811, and R2=0.809, respectively, and the curves of the degree distributions are not well-approximated by a power law distribution. Figures 5A–C indicate that the degree distributions of Twitter, RenRen, and Facebook obey the stretched exponential distributionP(xk)=e(kk0)c, where the graph of logP(xk) versus kk0 is characteristically stretched, and a stretching exponent c takes a value between 0 and 1. The stretching exponent c can be obtained fromP(xk), as we add the slope of logP(xk) in a log–log plot. As shown in Figure 5, the distribution functions of Twitter, RenRen, and Facebook can be defined byP(xk)=e(kk0)0.79, P(xk)=e(kk0)0.89, and P(xk)=e(kk0)0.94, respectively.

FIGURE 4
www.frontiersin.org

FIGURE 4. Cumulative degree distribution P(xk)in Lilac network (A), OClinks network (B), and Wiki-Vote (C). The insets show the degree distributions P(k)of Lilac, OClinks, and Wiki-Vote are heavy-tailed.

FIGURE 5
www.frontiersin.org

FIGURE 5. Stretched exponential distributions of Twitter (A), RenRen (B), and Facebook (C) are clear. The insets exhibit the degree distribution P(k)of Twitter network, RenRen, and Facebook network.

The stretched exponential distribution is obtained by inserting a fractional power law distribution into the exponential distribution: asc=1, the usual exponential function is recovered; asc0, the distribution follows the power law distribution. In general, the power law distribution is characterized by a slower than exponentially decaying probability tail. In contrast with Twitter, RenRen, and Facebook, wherec=0.79, c=0.89, and c=0.94 approachingc=1, some extremum nodes in Lilac, OClinks, or Wiki-Vote can occur with a more non-negligible probability.

In this section, we have examined the static properties of a variety of online social networks empirically and found that two types of networks, the online community service and the social network service, have completely different structural properties. As shown in Figures 4A–C, Lilac network, OClinks network, and Wiki-Vote network exhibit a highly inhomogeneous degree distribution, where the simultaneous presence of a few nodes tending to link many other nodes, and a large number of poorly connected nodes. But in Figures 5A–C, the curves of degree distributions have witnessed that the nodes in Twitter, RenRen, and Facebook networks are more evenly distributed than those in Lilac, OClinks, and Wiki-Vote networks, where extreme value still runs at a relatively low level. As it can be noticed, Twitter, RenRen, and Facebook as social network services are mainly based on an individual-centered online platform for organizing feature and technical feature themselves and have lower centralization than the Lilac, OClinks, and Wiki-Vote network based on group-centered service.

Discussion

When the vast majority of real networks, especially online social networks, are fragmented into relatively tiny isolated components, these networks will lose transmission capacities between individual components, indicating the collapse of network is approaching. So, we only find an optimal threshold that can trigger the collapse of the network. In general, the problem can be analytically treated by using percolation theory, where one defines a critical probability fc below which the network percolates, and a set of critical exponents can characterize the phase transition. In Ref. [6], Albert et al. have studied how the properties of some networks with given order and size change when a fraction f of the nodes are removed, where the average characteristic path length as an order parameter displays for both errors and attacks a threshold-like behavior. In this section, we first study the changes in the improved tenacity Rsca(G) when a small fraction f of the nodes is removed gradually, and use the new criterion characterizing the phase transition to obtain the critical probability fc. Then, we compare four attack strategies, that is, degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality (the algorithms defined as in The Attack Strategies), to estimate which solution is the most effective and also to determine the most important nodes for online social networks.

As shown by the curved lines in Figure 6, the performance of improved tenacity Rsca(G) in the aforementioned networks displays a threshold-like behavior: first, Rsca(G) drops with the fraction of removed nodes f increasing, indicating the ability of the network to maintain its connectivity properties is sensitive to intentional attacks, and the size of fragments is increasing significantly. Especially, the insets of Figure 6 show the giant component size m(GS) rapidly decreases with f increasing. Second, we find that the curve of improved tenacity Rsca(G) abruptly decays at the critical value fc, the same trend as the giant component size m(GS)(see the inset of Figure 6, where the slope of curve is sharply downward), implying fc is precisely the threshold triggering the collapse of network. In addition, it is worth noticing that the critical value fc can be obtained fast by using the definition (6). AslogRsca(G)0, from Lilac network to Facebook network, the critical value fc={0.17,0.23,0.21,0.31,0.32,017}. Although the largest component of the remaining nodes still is larger, where the giant component sizem(GS) runs from 233 to 1864 (shown in Table 3), accounting for 16.93–26.2% of the total, intentional attacks have led to the breakdown of the overall connectivity.

FIGURE 6
www.frontiersin.org

FIGURE 6. From (A–F), indicating the performance of improved tenacity Rsca(G) in six online social networks (from Lilac to Facebook) when a fraction f of the nodes is removed. ○, preferential removal of the most connected nodes; △, preferential removal of the nodes with maximum betweenness; *, preferential removal of the nodes with maximum eigenvector; and □, preferential removal of the nodes with minimum closeness. Degree, betweenness, eigenvector, and closeness are recomputed each time the nodes are removed. Inset refers to the performance of the giant component size.

TABLE 3
www.frontiersin.org

TABLE 3. Tenacity level of selected online social networks

The centrality concept seeks to quantify an individual node’s prominence within a network by summarizing structural relations among the nodes. A node’s prominence reflects its greater visibility to the other network nodes. In online social networks, central nodes are likely to be more influential and have greater access to information and can communicate their opinions to others more efficiently. Further research indicates that the various roles of the same node based on different centrality indices show the striking difference in maintaining network connectivity. Looking at the changes in the critical fraction fc, from Figures 6A–F, fcd={0.17,0.24,0.23,0.37,0.44,0.48} relating to the degree-based attacks, fcb = {0.18,0.25,0.27,0.31,0.32,0.17} relating to the betweenness-based attacks, fcc = {0.2,0.26,0.3,0.32,0.35,0.18} related to the closeness-based attacks, while fce = {0.17,0.23,0.21,0.37,0.43,0.37} related to the eigenvector-based attacks. Obviously, in the cases of Lilac, OClinks, and Wiki-Vote, the attacks based on the eigenvector centrality actually have a better performance than the attacks based on other indices, rooting in the critical fractionfce<fcd<fcb<fcc. Although in Lilac fce = fcd, the giant component sizem(GS)under the attacks based on the eigenvector centrality is significantly smaller than the result based on the degree centrality. The conclusion described before indicates the role of the nodes with high eigenvector is the most important than the others in maintaining connectivity of the network. In the diffusion of information, especially in online social networks, a user with high eigenvector centrality has connections to many other users that are themselves highly connected and central within the network, thus multiplying his or her capabilities in maintaining communication of network. But in the cases of Twitter, RenRen, and Facebook, the attacks based on the betweenness centrality fcb cause a greater amount of damage than the others, where fcb<fcc<fcefcd. The main reason for the differentiation from various networks may closely relate with their organizing features and technical features, which are characterized by their topological structures.

Another important conclusion that can be drawn from the results presented is that the performance of improved tenacity Rsca(G) in Twitter, RenRen, or Facebook is better than that in Lilac, OClinks, or Wiki-Vote, which implies the former has higher anti-interference capability than the latter. In general, a low centralized network can improve network resilience by reorganizing network to increase local control and the execution of a service. Analogously, for the lack of obvious centralization and a strict inhomogeneous topology structure, social network services, like Twitter, RenRen, or Facebook, can tolerate higher intentional attacks based on some critical individuals than high centralized networks. In addition, as shown in Table 3, although the critical probability fc of Twitter or RenRen is much larger than the threshold fc of Lilac, OClinks, or Wiki-Vote, the corresponding proportion of the giant component size of the former is alsways lower than that of the latter. Therefore, it is difficult to judge which network has higher adaptability facing intentional attacks from the attack cost or the giant component size scale. Compared with the single criterion, such as removal cost, the giant component size, and the number of components, our proposed method can comprehensively consider the attack effect and attack cost.

Conclusion

In this article, we synthetically take account of the cost with which one can disrupt a network and the effect of, and a new evaluation method based on the concepts of scattering number and tenacity. Compared with existing evaluation metrics, our method focuses on the potential equilibrium between the attack effect and the attack cost. For this purpose, we first examined empirically the static properties of six online social networks, including three online community services and three social network services, that is, Lilac, OClinks, Wiki-Vote, Twitter, RenRen, and Facebook, and found that there are wide differences in the topological structure of networks.

Second, we studied the changes in the improved tenacity Rsca(G) when a small fraction f of the nodes is removed gradually and found the curve of improved tenacity displays a threshold-like behavior, when the minimum of tenacity approaches zero. Then, we compared the four solutions of intentional attacks based on the different indices, that is, degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality, and found that an individual node’s prominence in a network is inherently related to structural properties: the role of the nodes with higher eigenvector is more important than the others in maintaining stability and connectivity of high centralized networks, such as Lilac, OClinks, and Wiki-Vote, but the nodes with higher betweenness are more powerful than the others in low centralized networks, such as Twitter, RenRen, and Facebook. Moreover, the empirical study revealed that low centralized networks can tolerate high intentional attacks and have higher anti-interference capabilities than high centralized networks.

Data Availability Statement

The original contributions presented in the study are included in the article/Supplementary Material; further inquiries can be directed to the corresponding authors.

Author Contributions

Conceptualization, DZ and CG; methodology, DZ and ZZ; validation, DZ and GL; formal analysis, DZ, ZZ, and CG; resources, DZ and GL; data curation, DZ; original draft preparation, DZ; revise and editing, DZ, ZZ, and CG; project administration, CG; funding acquisition, DZ and ZZ. All authors have read and agreed to the published version of the manuscript.

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s Note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Acknowledgments

This work was partly supported by State Key Laboratory of Communication Content Cognition, People’s Daily Online (No. A12001) and Natural Science Foundation of Heilongjiang Province of China (No. LC2018031).

Supplementary Material

The Supplementary Material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fphy.2021.733224/full#supplementary-material

References

1. Leimeister J. M., Sidiras P., Krcmar H. Exploring Success Factors of Virtual Communities: the Perspectives of Members and Operators. J Organizational Comput Electron commerce (2006) 16:279–300. doi:10.1207/s15327744joce1603&4_7

CrossRef Full Text | Google Scholar

2. Liu Z., Hu B. Epidemic Spreading in Community Networks. Europhys Lett (2005) 72:315–21. doi:10.1209/epl/i2004-10550-5

CrossRef Full Text | Google Scholar

3. Deng X. L, Ding H., Chen Y., Chen C., Lv TJ. Novel Node Centrality-Based Efficient Empirical Robustness Assessment for Directed Network. Complexity (2020) 2020. 1-14. doi:10.1155/2020/8715619

CrossRef Full Text | Google Scholar

4. Zeng Y., Xiao R. A Networked Approach to Dynamic Analysis of Social System Vulnerability. J Intell Fuzzy Syst (2015) 28:189–97. doi:10.3233/IFS-141289

CrossRef Full Text | Google Scholar

5. Kuhnle A., Nguyen N. P., Dinh T. N., Thai M. T. Vulnerability of Clustering under Node Failure in Complex Networks. Soc Netw Anal Min (2017) 7:8. doi:10.1007/s13278-017-0426-5

CrossRef Full Text | Google Scholar

6. Albert R., Jeong H., Barabási A.-L. Error and Attack Tolerance of Complex Networks. Nature (2000) 406:378–82. doi:10.1038/35019019

PubMed Abstract | CrossRef Full Text | Google Scholar

7. Holmgren A. J. Using Graph Models to Analyze the Vulnerability of Electric Power Networks. Risk Anal (2006) 26:955–69. doi:10.1111/j.1539-6924.2006.00791.x

PubMed Abstract | CrossRef Full Text | Google Scholar

8. Callaway D. S., Newman M. E. J., Strogatz S. H., Watts D. J. Network Robustness and Fragility: Percolation on Random Graphs. Phys Rev Lett (2000) 85:5468–71. doi:10.1515/9781400841356.510

PubMed Abstract | CrossRef Full Text | Google Scholar

9. Buldyrev S. V., Parshani R., Paul G., Stanley H. E., Havlin S. Catastrophic Cascade of Failures in Interdependent Networks. Nature (2010) 464:1025–8. doi:10.1038/nature08932

PubMed Abstract | CrossRef Full Text | Google Scholar

10. Gao J., Buldyrev S. V., Havlin S., Stanley H. E. Robustness of A Network of Networks. Phys Rev Lett (2011) 107:195701. doi:10.1103/PhysRevLett.107.195701

PubMed Abstract | CrossRef Full Text | Google Scholar

11. Cohen R., Ben-Avraham D., Havlin S. Percolation Critical Exponents in Scale-free Networks. Phys Rev E (2002) 66:36113. doi:10.1103/PhysRevE.66.036113

PubMed Abstract | CrossRef Full Text | Google Scholar

12. Vázquez A., Moreno Y. Resilience to Damage of Graphs with Degree Correlations. Phys Rev E (2003) 67:015101. doi:10.1103/PhysRevE.67.015101

CrossRef Full Text | Google Scholar

13. Jalili M. Error and Attack Tolerance of Small-Worldness in Complex Networks. J Informetrics (2011) 5:422–30. doi:10.1016/j.joi.2011.03.002

CrossRef Full Text | Google Scholar

14. Wu J., Tan S-Y., Liu Z., Tan Y-J., Lu X. Enhancing Structural Robustness of Scale-free Networks by Information Disturbance. Sci Rep (2017) 7:7559. doi:10.1038/s41598-017-07878-2

PubMed Abstract | CrossRef Full Text | Google Scholar

15. Grubesic T. H., Matisziw T. C., Murray A. T., Snediker D. Comparative Approaches for Assessing Network Vulnerability. Int Reg Sci Rev (2008) 31:88–112. doi:10.1177/0160017607308679

CrossRef Full Text | Google Scholar

16. Estrada E., Hatano N. A Vibrational Approach to Node Centrality and Vulnerability in Complex Networks. Physica A: Stat Mech its Appl (2010) 389:3648–60. doi:10.1016/j.physa.2010.03.030

CrossRef Full Text | Google Scholar

17. Chen B. Y., Lam W. H. K., Sumalee A., Li Q., Li Z.-C. Vulnerability Analysis for Large-Scale and Congested Road Networks with Demand Uncertainty. Transportation Res A (2012) 46:501–16. doi:10.1016/j.tra.2011.11.018

CrossRef Full Text | Google Scholar

18. Morone F., Makse H. A. Influence Maximization in Complex Networks through Optimal Percolation. Nature (2015) 524:65–8. doi:10.1038/nature14604

PubMed Abstract | CrossRef Full Text | Google Scholar

19. Boccaletti S., Latora V., Moreno Y., Chavez M., Hwang D. Complex Networks: Structure and Dynamics. Phys Rep (2006) 424:175–308. doi:10.1016/j.physrep.2005.10.009

CrossRef Full Text | Google Scholar

20. Latora V., Marchiori M. Efficient Behavior of Small-World Networks. Phys Rev Lett (2001) 87:198701. doi:10.1103/PhysRevLett.87.198701

PubMed Abstract | CrossRef Full Text | Google Scholar

21. Crucitti P., Latora V., Marchiori M., Rapisarda A. Error and Attack Tolerance of Complex Networks. Physica A: Stat Mech its Appl (2004) 340:388–94. doi:10.1016/j.physa.2004.04.031

CrossRef Full Text | Google Scholar

22. Freeman L. C. Centrality in Social Networks: Conceptual Clarification. Social Networks (1979) 1:215–39. doi:10.1016/0378-8733(78)90021-7

CrossRef Full Text | Google Scholar

23. Uddin S., Hossain L., Wigand R. T. New Direction in Degree Centrality Measure: Towards a Time-Variant Approach. Int J Info Tech Dec Mak (2014) 13:865–78. doi:10.1142/S0219622014500217

CrossRef Full Text | Google Scholar

24. Newman M. E. J. A Measure of Betweenness Centrality Based on Random Walks. Soc Networks (2005) 27:39–54. doi:10.1016/j.socnet.2004.11.009

CrossRef Full Text | Google Scholar

25. Wehmuth K., Ziviani A. DACCER: Distributed Assessment of the Closeness Centrality Ranking in Complex Networks. Computer Networks (2013) 57:2536–48. doi:10.1016/j.comnet.2013.05.001

CrossRef Full Text | Google Scholar

26. Li X. J., Liu Y .Z., Jiang Y. C., Liu X. Identifying Social Influence in Complex Networks: A Novel Conductance Eigenvector Centrality Model. Neurocomputing (2015) 210:141–54. doi:10.1016/j.neucom.2015.11.123

CrossRef Full Text | Google Scholar

27. Chen D., Lü L., Shang M.-S., Zhang Y.-C., Zhou T. Identifying Influential Nodes in Complex Networks. Physica A: Stat Mech its Appl (2012) 391:1777–87. doi:10.1016/j.physa.2011.09.017

CrossRef Full Text | Google Scholar

28. Iyer S., Killingback T., Sundaram B., Wang Z. Attack Robustness and Centrality of Complex Networks. Plos One (2013) 8:e59613. doi:10.1371/journal.pone.0059613

PubMed Abstract | CrossRef Full Text | Google Scholar

29. Nguyen Q., Pham H. D., Cassi D., Bellingeri M. Conditional Attack Strategy for Real-World Complex Networks. Physica A: Stat Mech its Appl (2019) 530:121561. doi:10.1016/j.physa.2019.121561

CrossRef Full Text | Google Scholar

30. Brin S., Page L. The Anatomy of A Large-Scale Hypertextual Web Search Engine. Comp Networks ISDN Syst (1998) 30:107–17. doi:10.1016/S0169-7552(98)00110-X

CrossRef Full Text | Google Scholar

31. Zengin Alp Z., Gündüz Öğüdücü Ş. Identifying Topical Influencers on Twitter Based on User Behavior and Network Topology. Knowledge-Based Syst (2018) 141:211–21. doi:10.1016/j.knosys.2017.11.021

CrossRef Full Text | Google Scholar

32. Erkol Ş., Castellano C., Radicchi F. Systematic Comparison between Methods for the Detection of Influential Spreaders in Complex Networks. Sci Rep (2019) 9:15095. doi:10.1038/s41598-019-51209-6

PubMed Abstract | CrossRef Full Text | Google Scholar

33. Nie T., Guo Z., Zhao K., Lu Z.-M. New Attack Strategies for Complex Networks. Physica A: Stat Mech its Appl (2015) 424:248–53. doi:10.1016/j.physa.2015.01.004

CrossRef Full Text | Google Scholar

34. Liao H., Mariani M. S., Medo M., Zhang Y.-C., Zhou M.-Y. Ranking in Evolving Complex Networks. Phys Rep (2017) 689:1–54. doi:10.1016/j.physrep.2017.05.001

CrossRef Full Text | Google Scholar

35. Eom Y. H., Jeon C., Jeong H., Kahng B. Evolution of Weighted Scale-free Networks in Empirical Data. Phys Rev E Stat Nonlin Soft Matter Phys (2008) 77:056105. doi:10.1103/PhysRevE.77.056105

PubMed Abstract | CrossRef Full Text | Google Scholar

36. Kujawski B., Hołyst J., Rodgers G. J. Growing Trees in Internet News Groups and Forums. Phys Rev E Stat Nonlin Soft Matter Phys (2007) 76:036103. doi:10.1103/PhysRevE.76.036103

PubMed Abstract | CrossRef Full Text | Google Scholar

37. Slanina F. Dynamics of User Networks in On-Line Electronic Auctions. Advs Complex Syst (2014) 17. 1–14. doi:10.1142/S0219525914500027

CrossRef Full Text | Google Scholar

38. Kirlangic A. The Rupture Degree and Gear Graphs. Bull Malaysian Math Sci Soc (2009) 32:31–6.

Google Scholar

39. Bellingeri M., Bevacqua D., Scotognella F., Alfieri R., Nguyen Q., Montepietra D, et al. Link and Node Removal in Real Social Networks: A Review. Front Phys (2020) 8:228. doi:10.3389/fphy.2020.00228

CrossRef Full Text | Google Scholar

40. Chvátal V. Tough Graphs and Hamiltonian Circuits. Discrete Maths (1973) 5:215–28. doi:10.1016/0012-365x(73)90138-6

CrossRef Full Text | Google Scholar

41. Barefoot C. A., Entringer R., Swart H. Vulnerability in Graphs—A Comparative Survey. J Combin Math Combin Comput (1987) 1:13–22.

Google Scholar

42. Cozzens M. B., Moazzami D., Stueckle S. Tenacity of Harary Graphs. J Combin Math Combin Comput (1994) 16:33–56.

Google Scholar

43. Hendry G. R. T. Scattering Number and Extremal Non-hamiltonian Graphs. Discrete Maths (1988) 71:165–75. doi:10.1016/0012-365x(88)90069-6

CrossRef Full Text | Google Scholar

44. Panzarasa P, OpsahlCarley T. K. M., Carley K. M. Patterns and Dynamics of Users' Behavior and Interaction: Network Analysis of an Online Community. J Am Soc Inf Sci (2009) 60:911–32. doi:10.1002/asi.21015

CrossRef Full Text | Google Scholar

Keywords: online social network, vulnerability, structural property, centrality index, vulnerability assessment

Citation: Zhang D, Guo C, Zhang Z and Long G (2021) Assessing the Structural Vulnerability of Online Social Networks in Empirical Data. Front. Phys. 9:733224. doi: 10.3389/fphy.2021.733224

Received: 30 June 2021; Accepted: 13 September 2021;
Published: 25 October 2021.

Edited by:

Chengyi Xia, Tianjin University of Technology, China

Reviewed by:

Michele Bellingeri, University of Parma, Italy
Zhen Wang, Hangzhou Dianzi University, China

Copyright © 2021 Zhang, Guo, Zhang and Long. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Changyong Guo, guocy@hit.edu.cn; Zhaoxin Zhang, heart@hit.edu.cn

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.