Skip to main content

ORIGINAL RESEARCH article

Front. Phys., 20 December 2021
Sec. Social Physics
This article is part of the Research Topic Network Resilience and Robustness: Theory and Applications View all 21 articles

Network Robustness Analysis Based on Maximum Flow

  • 1School of Humanities and Social Sciences, Xi’an Jiaotong University, Xi’an, China
  • 2School of Mechano-Electronic Engineering, Xidian University, Xi’an, China

Network robustness is the ability of a network to maintain a certain level of structural integrity and its original functions after being attacked, and it is the key to whether the damaged network can continue to operate normally. We define two types of robustness evaluation indicators based on network maximum flow: flow capacity robustness, which assesses the ability of the network to resist attack, and flow recovery robustness, which assesses the ability to rebuild the network after an attack on the network. To verify the effectiveness of the robustness indicators proposed in this study, we simulate four typical networks and analyze their robustness, and the results show that a high-density random network is stronger than a low-density network in terms of connectivity and resilience; the growth rate parameter of scale-free network does not have a significant impact on robustness changes in most cases; the greater the average degree of a regular network, the greater the robustness; the robustness of small-world network increases with the increase in the average degree. In addition, there is a critical damage rate (when the node damage rate is less than this critical value, the damaged nodes and edges can almost be completely recovered) when examining flow recovery robustness, and the critical damage rate is around 20%. Flow capacity robustness and flow recovery robustness enrich the network structure indicator system and more comprehensively describe the structural stability of real networks.

Introduction

Nowadays, the network exists in every aspect of human life, and our life is convenient and complicated because of the network. Whether it is a technical network such as a computer network or a social network such as an interpersonal relationship, it will inevitably be disturbed or damaged, thus affecting the normal operation of the network, or worse, leading to the paralysis of the network. In the case of interference or disruption, robustness becomes the key to whether the network system can continue to operate normally. Specifically, network robustness describes the ability of a network to maintain a certain level of structural integrity and original functionality after nodes or edges experience random or deliberate attacks [1]. For example, robustness will be the decisive factor when a cell encounters external environmental changes or internal genetic variations, when an ecosystem encounters man-made disturbances and when a piece of computer software encounters disk failures, network overloads, or deliberate attacks [2]. Therefore, the robustness of a complex network has become an important topic of academic research due to the widespread existence of the complex network and the important role it plays for nature and human society. The early researchers of complex network robustness were Albert et al. [3], who pointed out that the scale-free network is more vulnerable under deliberate attack and more robust when subjected to random attack; Holme et al. [4] conducted an in-depth study on the robustness of the network as reflected by the changes in various indicators under different types of attack; Paul et al. [5] discussed how to effectively improve network robustness; He C-Q et al. [6] summarized the changing trend of robustness under different network topologies; Du W and Cai M et al. [7] proposed connection robustness and recovery robustness based on the connectivity and resilience of the network and selected four types of complex networks, including the random network and the scale-free network, for extensive experiments, and it is concluded that the random network is the best robust to deliberate attacks, and the node resilience of the scale-free network is better than the edge; Lu P-L et al. [8] explored the impact of the initial clustering coefficient on robustness when attacked by different conditions for three complex networks with the same degree distribution and different clustering coefficients and showed that the larger the initial clustering coefficient, the worse is the robustness of the network.

In research studies of the complex network robustness, the establishment of robustness evaluation indicators provides a certain basis for it. To ensure that the evaluation indicators can truly reflect the robustness of the complex network, measurability, sensitivity, and objectivity are required. Nowadays, robustness evaluation indicators generally include the network global effect, average path length, connectivity, relative size of the maximum connected subgraph, betweenness, circle rate, clustering coefficient [9], k-core structure [10, 11], core [12], and generalized k-cores [13, 14]. Among them, as the level of network damage caused by the attack increases, the average shortest path becomes larger and then smaller [9], and this trend of change is not a significant guide for practical applications; the betweenness index takes into account the changes of nodes and edges in the network but does not consider changes in the network size and structure as a whole [9]; the clustering coefficient reflects the tightness of connections between nodes in the network and is also an indicator of local change in the network; considering the maximum connected subgraph, the robustness of the complex network is defined as the size of the maximum connected subgraph in the network after randomly or deliberately removing a certain percentage of nodes from the network [15]; in single networks, k-core is defined as a maximal set of nodes that have at least k neighbors within the set [16], and the generalized k-core (Gk-core) is a core structure, which is obtained by implementing a k-leaf pruning procedure that progressively removes nodes with degree less than k alongside their nearest neighbors [14]. It can be seen that the existing robustness evaluation indicators mostly consider local changes in the network. No research has been carries out to measure robustness from the perspective of network flow, a metric that describes the global topology of the network, and it can reflect the structural characteristics of network connections comprehensively and break the limitations on network weights and propagation methods [17]. In addition, the failure mechanism of the nodes when the network is attacked is also an important factor in network robustness analysis [1]. Most of the existing studies have focused on the mechanism of system failure, but in real life, except the occurrence of failure, it also includes the repair of failure, which is the recovery of damaged nodes or edges according to certain recovery mechanisms. Therefore, it is necessary to consider the resilience after the network is damaged in the construction of the network robustness evaluation indicators.

In this study, we propose two types of network structural robustness measurement indicators, namely, capacity robustness based on maximum flow and recovery robustness based on maximum flow, in terms of the ability of the network to resist damage and the ability of the network structure to recover after damage, respectively. We use non-global information to recover deleted nodes and edges after the network is destroyed. In order to verify the effectiveness of the robustness indicators proposed in this study, we perform robustness experimental analysis on several typical networks such as the BA scale-free network (a scale-free network proposed by Barabasi and Albert), ER random network (a random network proposed by Erdos and Renyi), nearest neighbor coupled (NNC) regular network, and WS small-world network (a small-world network proposed by Watts and Strogatz) and finally explore the relationship between network structure characteristics and network structure robustness.

Materials and Methods

Related Work

The complex network theory emerged in the 1960s and generally refers to the network with some or all of the properties in self-organization, self-similarity, attractor, small-world, and scale-free [9]. The complex network is an abstract complex system whose complexity is mainly reflected in the number of connected nodes and its complex topological structure. It is often used to study the structural properties, formation mechanisms, and evolution laws of the real network. The network robustness and destruction resistance are important parts of the current research on complex networks.

Generally, when a network is attacked, depending on intensity and extensity of error, the attacked nodes are impaired to become non-functional nodes or partially functional nodes (nodes as being a state that is functional but not at full power) [18], and these lost functions will be shared by the coupling relationships of neighboring nodes. This additional functional commitment puts a lot of pressure on the normal operation of the neighboring nodes and the entire network system, and in severe cases, it may lead to failure of other nodes or a whole network crash. The ability to maintain the function and property of the network that the damaged network has is network robustness. Similar to robustness, destruction resistance indicates the performance changes when a network is under attack. The difference is that the destruction resistance prefers the ability to maintain or recover to an acceptable level when the network is damaged.

Existing correlational researches mostly focus on the measurement of the robustness and destruction resistance of the network, make structural optimizations to them, and further apply them in relevant practical areas: In an earlier study, Albert et al. [3] compared the robustness of ER network and scale-free (SF) network under deliberate and random attacks, and the results showed that SF network is significantly more robust than ER network during random attack, while the robustness of SF network is much less weak under deliberate attack, and simply deleting a small number of nodes with the largest degree may cause the network to collapse completely. Cohen et al. proposed the theoretical analytical conditions for network collapse under random attack based on percolation theory and applied them to the Internet and found high robustness of the Internet against random attack [19]; then they analyzed the robustness of SF network such as the Internet under deliberate attack through theoretical calculations and numerical simulations and argued that the Internet is highly sensitive and vulnerable to deliberate attack [20]. Darren et al. [21] achieved the identification of road segment importance using the road network robustness index and considered the road network robustness index in terms of topological attributes, capacity, and traffic flow characteristics of the road segments in the network. Tan Y-J and Wu J et al. [22] conducted research from the analysis and optimization of destruction resistance, proposed the influence of network aggregation and mixing on destruction resistance of network, and combined with the actual network researches to analyze optimization and control of destruction resistance, which provided a direction for the study of destruction resistance of complex network at that time. Du W and Cai M et al. [7] proposed connectivity robustness and recovery robustness based on the connectivity and recovery ability of the network and simulated a certain scale of regular network, small-world network, scale-free network, and random network for a large number of experiments, and it is concluded that random network has the best robustness against deliberate attack compared with the other three networks and that the node resilience of scale-free network is better than the edge resilience. Based on the complex network theory, Lu S [23] selected an aviation system as the research object modeled and analyzed the aviation network using Pajck software, summarized the changes of various parameters in the system, and proposed ideas to improve the robustness of air cargo. Focusing on interdependent networks, Dong G-G [24] et al. investigated the case of interdependent networks by generalizing feedback and non-feedback conditions, and specifically, they developed a new mathematical framework and used percolation theory to investigate numerically and analytically the percolation of interdependent networks with partial multiple-to-multiple dependency links. Shi H [25] proposed a shock resistance assessment method based on complex network, using peak ground acceleration as a reference to assess the destruction resistance of complex network buildings in an earthquake environment, and the assessment results were consistent with reality, which helped the timely measurement of building shock resistance. Dong G-G and Wang F et al. [26] developed two types of coupled giant network theoretical research frameworks, “deterministic coupled modes” and “coupled modes under arbitrary distribution”, to study the resilient behavior of the system, and concluded that there is indeed an optimum coupling structure among the subnetworks, which makes the entire system has the best connectivity and destruction resistance. Mariani et al. [27] focused on one of the non-random structure patterns in networks—nestedness, and concentrated on their discussion on three main aspects: the existing methodologies to nestedness in networks, the key theoretical mechanisms to explain nestedness in ecological and socioeconomic networks, and implications of the nested topology of interactions for the stability and viability of a given interacting systems. Wuellner et al. [28] analyzed the individual structures of the seven largest U.S. passenger carriers and found that networks with dense interconnectivity are extremely resilient to both targeted removal of airports (nodes) and random removal of flight paths (edges), and here, they measured the interconnectivity of the network using the k-core structure, which is a subgraph of the network constructed by iteratively pruning all vertices with a degree less than k. Shang Y-L [14] developed a mathematical framework for understanding the robustness of networks based on the number of nodes and edges in the Gk-core (a generalization of the ordinary k-core decomposition) under two general attacks with limited knowledge (min-n and max-n attacks), and it was found that knowing one more node (from n = 1 to n = 2) during attacks is most beneficial in terms of changing the robustness of the Gk-core. Therefore, research studies related to network robustness can help people understand the mechanisms and rules of network system failure or collapse and can identify better ways to prevent the failure of real network systems and build more robust systems, making real life more stable [29].

It can be seen that the research studies on network robustness pay more attention to measurement models and indicator changes and are devoted to the optimization of network destruction resistance and defense capability, while the in-depth studies of network resilience performance are not as mature as the research on network robustness. Resilience is the ability of a system to recover from an unfavorable state to a normal state (i.e., the initial state, or adjust itself to a new state according to new demands or conditions), which reflects the system’s adaptability and survivability [30]. Through the propagation and diffusion effects of the network, the behavior and recoverability of the nodes in the network can have a significant impact on the resilience of the network community and the entire network; at the same time, by adjusting the network structure and characteristics, the overall local and node-level resilience of the network will be optimized [31]. Thus, network resilience, although a relatively new concept, is an important field of network research.

Bai Y-N et al. [32] stated that a coupled network can be recovered only when the proportion of failed nodes in that network is less than the resilience threshold. In recent years, some scholars have further explored the influencing factors of network resilience performance and concluded that the coupling strength of the coupled network [33], the node recovery order of the dependent network [34], and the node importance ranking of the fault network [35] all have impact on the network resilience performance. Some scholars have optimized the network recovery model based on the equal probability recovery mechanism [36] and proposed a weighted probability recovery mechanism [35]. However, we can find that existing studies on network resilience measurements mostly focus on different typical networks and different network sizes, and network resilience is analyzed by comparing the number of nodes after recovery of the damaged network and the number of original network nodes, ignoring the impact of the network structure on the overall network function. The number of nodes, node-to-node connections, change in the overall structural characteristics of the network, and the magnitude of the change after recovery of the damaged network are important elements in the study of network resilience.

Definition of Structural Robustness Indicators Based on Maximum Flow

Network Model and Related Definitions

For a given capacity-containing network denoted as G=(V,E,c), where V={v1,v2,,vn} is the set of nodes, E={(vi,vj)| vi,vjV} is the set of edges, (vi,vj) is the outgoing arc of node vi and is also the incoming arc of the node vj, c is the capacity set of edges, and the set element c(vi,vj) represents the capacity of the edge (vi,vj), when G is the directed network, set c is symmetric, namely, c(vi,vj)=c(vj,vi), and when G is an undirected network, set c is asymmetric. In the capacity network G=(V,E,c), the flow from the source point vs to the sink point vt is denoted as fst. Suppose fst meets the following requirements (see Eqs 1, 2):

jf(vi,vj)jf(vj,vi)={fst, vi=vs0, vivs,vtfst, vi=vt,(1)
0f(vi,vj)c(vi,vj), (vi,vj)E,(2)

then fst is one of the feasible flows of the capacity network G. If this flow is the largest of all feasible flows, it is called the maximum flow and is denoted as fmax [15]. (vi,vj) is the edge of the directed network, and for the undirected network, it is expressed as {vi,vj}.

Network Robustness Based on Maximum Flow

Complex network robustness refers to the ability of a network to remain connected even under random or deliberate attack, and its concept is widely used in various fields such as physics, sociology, and transportation. In the presence of uncertainty and crisis, robustness has become critical to whether the system can continue to operate. The existing robustness indicators mainly consider whether the network is connected or not and reflect the robustness of the network after a disruption from the network structure, that is, it only considers whether the nodes are connected or not but does not measure whether the circulation between the nodes is damaged. The network maximum flow considers not only whether the connections of nodes exist but also how the transmission capacity of the already existing nodes and connections, that is, it considers both the fact of existence and the quality of existence of the nodes. Therefore, in view of the maximum flow’s ability to characterize the connectivity of the network structure, this study uses maximum flow as a basic index to evaluate the robustness of the network and then proposes “capacity robustness based on maximum flow” and “recovery robustness based on maximum flow,” and the former reflects the ability of the network structure itself to resist attacks, while the latter reflects the resilience of the network after damage [7].

Capacity Robustness Based on Maximum Flow

Capacity robustness based on maximum flow (later referred to as flow capacity robustness) is the ability of the remaining nodes in the network to maintain circulation among themselves after some nodes have been damaged by an attack. There are two general ways to attack a network: one is a deliberate attack and the other is a random attack. The former refers to a purposeful and planned attack on the network such as prioritizing attacks on the more important nodes or edges; the latter refers to a network in which nodes or edges are attacked in a certain proportion at random. In this study, two types of damage strategies are used: deliberate attack and random attack. Specifically, a deliberate attack is to select the top n% of nodes with the largest degree to destroy, and a random attack is to randomly select n% of nodes for damage, and both strategies use one-time damage.

First, the network maximum flow matrix W is defined as the matrix consisting of the maximum flow values between all pairs of nodes in the network (see Eq. 3):

W=[0cfmax(v1,v2)cfmax(v2,v1)0cfmax(v1,vN)cfmax(v2,vN)cfmax(vN,v1)cfmax(vN,v2)                            0         ],(3)

where N is the size of the network G=(V,E,c); V={v1,v2,,vN} is the set of nodes, cfmax(vi,vj) is the maximum flow value between nodes vi and vj, and cfmax(vi,vi)=0. Note that the method applies not only to directed network but also to the undirected network, and not only to 0–1 network but also to the weighted network. The difference in application to different networks lies in the calculation of maximum flow. For example, in the undirected network, cfmax(vi,vj)=cfmax(vj,vi); in the directed network, cfmax(vi,vj)cfmax(vj,vi). Similarly, for 0–1 network and weighted network, the corresponding maximum flow matrix is calculated to bring in the method.

Then Vd is defined as the set of damaged nodes, Nd is the number of nodes in Vd, p=n% is the node damage rate, Nd=pN, Vs is the set of remaining nodes in the network after destruction, Ns is the number of nodes in Vs, and V=Vd+Vs means the set V is equal to the union of the set Vd and the set Vs. Therefore, the damaged network satisfies Gs=(Vs,Es,cs), where Es is the set of edges of the network Gs, and cs is the capacity set of edges.

Based on the maximum flow matrix, Wc is defined as the matrix after removing the nodes in the set Vd from the maximum flow matrix W at one time (see Eq. 4):

Wc=[0         cfmax(vi,vi+1)cfmax(vi+1,vi)     0  cfmax(vi,vi+Ns1)  cfmax(vi+1,vi+Ns1)      cfmax(vi+Ns1,vi)cfmax(vi+Ns1,vi+1)                                             0                 ],(4)

where cfmaxW and node viVs.

Wc is defined as the maximum flow matrix recomputed from the damaged network (see Eq. 5):

Wc*=[0      cfmax*(vi,vi+1)cfmax*(vi+1,vi)     0  cfmax*(vi,vi+Ns1)  cfmax*(vi+1,vi+Ns1)     cfmax*(vi+Ns1,vi)cfmax*(vi+Ns1,vi+1)                                             0                 ],(5)

where cfmaxW, that is, cfmax is the maximum flow matrix calculated from the network Gs; node viVs. It is important to state that the maximum flow takes into account not only the fact that the nodes are connected to each other but also more importantly, the quality of the transmission between the nodes. That means the disruption or attack will lead to a reduction in the quality of data transmission, even if the connectivity is intact. Therefore, the recomputed maximum flow matrix, even if the nodes are still connected to each other, may produce a change in the quality of the traffic and thus affect the overall network transmission capacity.

Finally, the flow capacity robustness C is defined as follows (see Eq. 6):

C=WcWc=[0      cfmax*(vi,vi+1)cfmax*(vi+1,vi)     0  cfmax*(vi,vi+Ns1)  cfmax*(vi+1,vi+Ns1)     cfmax*(vi+Ns1,vi)cfmax*(vi+Ns1,vi+1)                                             0                 ][0         cfmax(vi,vi+1)cfmax(vi+1,vi)     0  cfmax(vi,vi+Ns1)  cfmax(vi+1,vi+Ns1)      cfmax(vi+Ns1,vi)cfmax(vi+Ns1,vi+1)                                             0                 ]=vi,vjVscfmax*(vi,vj)vi,vjVscfmax(vi,vj).(6)

Recovery Robustness Based on Maximum Flow

In the real world, if it is difficult to obtain information about a specific individual, the information can be recovered to some extent by asking people who are related to the individual, and similar approaches have been used to find keyman in terrorist groups through connections between network nodes [37]. In this study, we recover the network through non-global information and define recovery robustness based on maximum flow (later referred to as flow recovery robustness), for example, the ability to recover disappeared network structure elements (broken nodes and edges) from information related to unbroken nodes after some nodes in a network have been attacked. Figure 1 visualizes the network structure of a network after attack and recovery. Specifically, Figure 1A shows a network of size 10 with node set V={0,1,2,3,4,5,6,7,8,9} and edge set E. We attack the network by removing the nodes and corresponding edges of the node set Vd={2,3,4,9} (red points and edges in Figure 1A), and the damaged network is shown in Figure 1B. After that, the network is recovered by the information of the remaining nodes of the network, where the set of recovered nodes Vr={2,4,9} (in Figure 1C, the recovered nodes and edges are represented by green notes and green dashed lines, respectively) and the set of unrecovered nodes Vu={3}. And, it can be seen that node 9 is a fully recovered node (i.e., both the node and the corresponding edges are fully recovered) and nodes two and four are not fully recovered nodes (that is, the node is recovered and the corresponding edges are not fully recovered).

FIGURE 1
www.frontiersin.org

FIGURE 1. Damaged and recovery network structure. (A) Original network, where the red nodes are the nodes to be removed; (B) network that has not been recovered after attack; and (C) recovered network after attack.

We define Gr=(Vr,Er,cr) as the recovered network based on the damaged network Gs=(Vs,Es,cs), where Vr is the set of nodes of the recovered network based on the information related to the nodes in Vs, Nr is the number of nodes in the set Vr, Er is the set of edges of the network Gr, and cr is the capacity set of edges; when Vu is the set of unrecovered nodes, then V=Vr+Vu means the set V is equal to the union of the set Vr and the set Vu.

Based on the maximum flow matrix, Wr is defined as the matrix that removes the nodes in the set Vu from the maximum flow matrix W at one time (see Eq. 7); that is, it retains the nodes in the recovered network:

Wr=[0         cfmax(vi,vi+1)cfmax(vi+1,vi)     0  cfmax(vi,vi+Nr1)  cfmax(vi+1,vi+Nr1)      cfmax(vi+Nr1,vi)cfmax(vi+Nr1,vi+1)                                             0                 ],(7)

where  cfmaxW and node viVr.

Wr is defined as the maximum flow matrix recomputed according to the recovered network (see Eq. 8):

Wr*=[0      cfmax*(vi,vi+1)cfmax*(vi+1,vi)     0  cfmax*(vi,vi+Nr1)  cfmax*(vi+1,vi+Nr1)     cfmax*(vi+Nr1,vi)cfmax*(vi+Nr1,vi+1)                                             0                 ],(8)

where cfmaxW; that is, cfmax is the maximum flow matrix calculated from the network Gr; node viVr.

Finally, the flow recovery robustness R is defined as follows (see Eq. 9):

R=WrWr=[0      cfmax*(vi,vi+1)cfmax*(vi+1,vi)     0  cfmax*(vi,vi+Nr1)  cfmax*(vi+1,vi+Nr1)     cfmax*(vi+Nr1,vi)cfmax*(vi+Nr1,vi+1)                                             0                 ][0         cfmax(vi,vi+1)cfmax(vi+1,vi)     0  cfmax(vi,vi+Nr1)  cfmax(vi+1,vi+Nr1)      cfmax(vi+Nr1,vi)cfmax(vi+Nr1,vi+1)                                             0                 ]=vi,vjVrcfmax*(vi,vj)vi,vjVrcfmax(vi,vj).(9)

In order to explore the relationship between the aforementioned robustness indicators and the network topology, this study analyzes and verifies them through simulation experiments of typical networks.

Results

Four Typical Network Structures

In general, network models can be divided into three categories [38]: the first category is the random network; the second category is the regular network; and the third category is network structures between random and regular networks, which have some characteristics of both regular and random networks, including scale-free network and small-world network. In this study, four types of typical network, including regular network, random network, scale-free network, and small-world network, will be analyzed for structural robustness using the robustness indicators based on maximum flow.

Regular Network

A regular network is the network structure obtained by connecting nodes according to defined rules, and its structure is symmetric. A nearest neighbor coupled network and star network are two typical types of the regular network. In this study, we use the nearest neighbor coupled network (NNC) as the test network; that is, for a given even value of k, the N nodes in the network are connected to a ring, where each node is connected to only k/2 neighboring nodes.

BA Scale-free Network

The concept of the scale-free network started with an article by Barabasi and Albert published in 《Science》 in 1999 [39]. By studying the topology of the World Wide Web, they found that the node degree distribution obeys a power law distribution and proposed a classical model (BA model) for constructing a scale-free network. The initial number of nodes in the network is u0, and the growth rate is u. Through growth and meritocratic connection, the probability that a new node is connected to an already existing node vi in the network is Πi=kijkj, and a scale-free network of size N=t+u0 nodes and ut edges is formed after time t. The node degree obeys the probability distribution of p(k)=2u2k3. Most nodes in a scale-free network are connected to only a few nodes, while a small number of nodes have an extremely large number of node connections.

ER Random Network

The ER random network was proposed by Erdos and Renyi in 1960 [40], and it is one of the main reference models for network research. The connections between network nodes of a random network are random, given the network size N and the total number of edges n, any two nodes, are connected at a time with probability q=2nN(N1) without repetition until the total number of edges of the network reaches n, and an ER random network is obtained. The degree values of most nodes in the network are concentrated around a particular value, the average degree k=q(N1), and the degrees of nodes obey the Poisson distribution P(k)=eλλkk!, where λ is the average incidence of random events per unit time.

WS Small-World Network

A small-world network is a type of network with short mean path lengths and high clustering coefficients. The first to propose a method for constructing a small-world network were Watts and Strogatz [41]. The specific construction algorithm is as follows:

1) Constructing a regular network encloses a nearest neighbor coupled network containing N nodes to a ring, where each node is connected to the k/2 nodes adjacent to its left and right, wherek is an even number.

2) Random reconnection randomly reconnects each edge in a regular network with probability p, that is, leaving one end of the edge unchanged and connecting the other endpoint randomly at a new location, but self-connections and repeated connections should be excluded.

p=0 corresponds to the nearest neighbor coupled network, p=1 corresponds to the ER random network, and 0<p<1 corresponds to the WS small-world network, which is a transitional network between the regular network and random network, taking into account the characteristics of both.

Simulation Experiment and Discussion

The simulation experiments were all implemented using Python 3.8 programming. Our method is applicable to many types of networks, such as the directed network, undirected network, 0–1 network, and weighted network, but in order to facilitate comparison with other methods and to focus on reflecting the impact of differences in the network structure on robustness, the networks chosen for the experiments were all undirected and unweighted 0–1 benchmark networks; that is, the same maximum flow value between the same node pairs cfmax(vi,vj)=cfmax(vj,vi). The size N of all four typical networks was incremented from 50 to 550, with steps of 10 from 50 to 100 and 30 from 100 to 550. Specifically, the average degree of the NNC regular network was incremented from 2 to 20 in steps of 2, and the average degree here is the average number of neighboring nodes of each node; ER random network density increased from 0.01 to 0.1 in steps of 0.01 and from 0.1 to 0.5 in steps of 0.1, and it should be noted that the network density is numerically equal to the probability of connection q between two points; the growth rate of BA scale-free network increased from 2 to 20 in steps of 2, and the growth rate indicates the number of edges added to the network per unit of time; the average degree of the WS small-world network increased from 2 to 10 in steps of 2, and the reconnection probability increased from 0.002 to 0.01 in steps of 0.002 and then from 0.01 to 0.1 in steps of 0.01. It should be noted that the experimental results are the statistical mean of 10 independent randomized experiments.

The attack strategies used in this study are random attack and deliberate attack. The random attack randomly selects n% of the nodes from the network nodes for damage, and the deliberate attack selects the top n% of the nodes with the largest degree value in the network for damage, where the damage rate n% is taken as [1, 5, 10, 15, 20, 25, 30, 35, 40, 45, 50, 55, 60, 65, 70%]. The network recovery strategy used in the experiment is a non-global information-based network recovery, that is, the network is restored by adding points and edges to the network using the information of neighboring nodes and edges of the remaining nodes in the network after the damage. For ease of understanding, we provide a brief explanation of attack and recovery strategies based on real-life scenarios: a random attack in the definition can be understood as natural disasters (such as earthquakes), which occur independent of human factors and attack humans at random; a deliberate attack can be understood as traffic jams, road controls, and accidents caused by human factors, or in the case of police arrest operation, the collapse of an entire criminal organization by arresting the key figures. For a non-global information recovery strategy, project onto the social interactions, if it is difficult to obtain information about a particular individual, a feasible approach is to recover information about the individual to some extent by asking people who are related to the individual, and a similar strategy has been used to find key individuals in terrorist groups [37]. In order to facilitate the comparison of network parameters and network structures, we fixed the network size N, so this article only analyzes the experimental results of the network size of 100.

Analysis of Experimental Results of Flow Capacity Robustness

Figure 2 gives the changing situation of the flow capacity robustness for BA scale-free network of size 100, where Figure 2A and Figure 2B show the flow capacity robustness under deliberate and random attacks with the change in the node damage rate and growth rate, respectively, and Figure 2C shows the difference in flow capacity robustness under two types of attacks. From Figure 2A and Figure 2B, it can be seen that the overall network flow shows a significant decreasing trend as the node damage rate increases, regardless of whether it is a deliberate attack or a random attack. Specifically, when the network is deliberately attacked, the circulation capacity of the BA scale-free network, which has a small network growth rate, decreases rapidly when the nodes start to be damaged, showing the “emergent” phenomenon. It shows that the network with a small growth rate is more dependent on nodes with a larger degree, and only a few nodes with a large degree are damaged deliberately and can have a significant influence on the network, while the increase in the network growth rate can improve the flow capacity robustness. In contrast, for a BA scale-free network under random attack, the network growth rate has little effect on its flow capacity robustness, and there is almost a synchronous trend under different growth rates. Figure 2C shows the change in the difference between the flow capacity robustness under random attack minus the flow capacity robustness under deliberate attack (all similar differences below are for random attack minus deliberate attack, referred to as the flow capacity robustness difference). It can be seen that the flow capacity robustness differences are all greater than 0, reflecting to some extent that the robustness of the BA scale-free network against a random attack is better than that of the network against a deliberate attack. And the larger the growth rate of the network, the smaller is the flow capacity robustness difference, while the network with a larger growth rate has smoother flow capacity robustness change as the node damage rate increases.

FIGURE 2
www.frontiersin.org

FIGURE 2. Changes in flow capacity robustness of the BA scale-free network. (A) Change in flow capacity robustness under different damage rates and increase rates for BA scale-free network under deliberate attack; (B) change in flow capacity robustness under different damage rates and increase rates for BA scale-free network under random attack; (C) change in the difference between the flow capacity robustness under random attack minus the flow capacity robustness under deliberate attack.

Figure 3 shows the results of the flow capacity robustness of the ER random network with size 100. It can be seen that the flow capacity robustness shows a decreasing trend with increasing node damage rate under both attack strategies, and the change of node damage rate brings an unstable change in network flow when network density is small (around 0.1). In contrast, network flow decreases smoothly at higher network densities. A deliberate attack can cause the “emergent” phenomenon of the ER random network with low network density when the node damage rate is small, suggesting that the flow capacity robustness of the low-density random network is more dependent on nodes with higher degrees. From Figure 3C, it can be seen that the flow capacity robustness difference is greater at smaller network densities (around 0.1), indicating that a low-density random network is not truly “random,” and therefore, the destructiveness of a deliberate attack in a low-density ER random network is much higher than that in a random attack. As network density increases, the gap between the destructiveness of the two attack strategies narrows significantly.

FIGURE 3
www.frontiersin.org

FIGURE 3. Changes in flow capacity robustness of the ER random network. (A) Change in flow capacity robustness under different damage rates and network density for ER random network under deliberate attack; (B) change in flow capacity robustness under different damage rates and network density for the ER random network under random attack; (C) change of the difference between the flow capacity robustness under random attack minus the flow capacity robustness under deliberate attack.

The flow capacity robustness results for an NNC regular network of size 100 are shown in Figure 4. The results show that the trend of network flows for deliberate and random attacks is very similar, that is, the overall decreases with the increase in the node damage rate, and an early “emergent” phenomenon of the flow capacity robustness emerges earlier in the regular network with a small average degree. Unlike the BA scale-free network and ER random network, the “emergent” phenomenon occurs in the NNC regular network under a random attack, that is, it is most sensitive to the initially disrupted 10% of nodes, and network flow decreases rapidly. This is also consistent with the case that NNC regular network nodes’ degree is the same, indicating that random and deliberate attacks have the same effect on the regular network. The change in the flow capacity robustness difference is also concentrated in a narrow range ([-0.025,0.025]), which indicates that the two attack strategies do not differ much for the NNC regular network and confirms that the same value of node degree of the regular network makes the two attacks essentially indistinguishable.

FIGURE 4
www.frontiersin.org

FIGURE 4. Changes in flow capacity robustness of NNC regular network. (A) Change in flow capacity robustness under different damage rates and average degree for the NNC regular network under deliberate attack; (B) change in flow capacity robustness under different damage rates and average degree for an NNC regular network under random attack; (C) change in the difference between the flow capacity robustness under random attack minus the flow capacity robustness under deliberate attack.

Figure 5 shows the experimental results of the flow capacity robustness for a WS small-world network of size 100, average degree 10, and reconnection probability increasing from 0.002 to 0.1. With the increases in the node damage rate, the overall network flow still shows a decreasing trend, but it can be seen that the flow capacity robustness under random attack decreases more regularly and smoothly, while the flow capacity robustness with a small reconnection probability does not change significantly during a deliberate attack (Figure 5A). From the results of the change of the flow capacity robustness difference, the difference at low reconnection probability and high damage rate is more obvious, and the destructive effect of a deliberate attack is significantly higher than that of a random attack.

FIGURE 5
www.frontiersin.org

FIGURE 5. Changes in flow capacity robustness of the WS small-world network with 10 average degrees. (A) Change in flow capacity robustness under different damage rates and reconnection probability for the WS small-world network with 10 average degrees under deliberate attack; (B) change in flow capacity robustness under different damage rates and reconnection probability for the WS small-world network with 10 average degrees under random attack; (C) change in the difference between the flow capacity robustness under random attack minus the flow capacity robustness under deliberate attack.

The results of the flow capacity robustness experiments with a size of 100, a fixed reconnection probability of 0.1, and a mean degree increasing from 2 to 10 are shown in Figure 6. It can be seen that under the two attack methods, the smaller the network average, the earlier is the “emergent” phenomenon, and with the damage intensity increases, the overall network flow still shows a downtrend. The flow capacity robustness difference shows a large variation with the node damage rate’s change at smaller average degree; specifically, the change from a positive to negative flow robustness difference is accompanied by the change from a small to large node damage rate.

FIGURE 6
www.frontiersin.org

FIGURE 6. Changes in flow capacity robustness of the WS small-world network with 0.1 reconnection probability. (A) Change in flow capacity robustness under different damage rates and average degree for the WS small-world network with 0.1 reconnection probability under deliberate attack; (B) change in flow capacity robustness under different damage rates and average degree for the WS small-world network with 0.1 reconnection probability under random attack; (C) change in the difference between the flow capacity robustness under random attack minus the flow capacity robustness under deliberate attack.

Based on the previous experiments, Figure 7 shows how the flow capacity robustness indicator of several representative network parameters changes with the increase in the node damage rate, and the corresponding error bars are also shown in the figure, which is the standard of the mean (standard error).

FIGURE 7
www.frontiersin.org

FIGURE 7. (A) Flow capacity robustness of four typical networks under deliberate attack. (B) Flow capacity robustness of four typical networks under random attack.

For a deliberate attack (Figure 7A), an “emergent” phenomenon of a low-density ER random network is more obvious, and almost no “emergent” phenomenon occurs for higher network densities, with a smooth decrease in network flow transmission capability. As for a BA scale-free network, although the flow capacity robustness is not as good as that of the high-density ER random network, it also shows a relatively stable downtrend, and the network flow transmission capacity of a low growth rate decreases faster than that of a high-growth network. The network flow transmission capability of an NNC regular network is similar to that of a BA scale-free network, and both show a steady decline. For a WS small-world network, when the network average degree is fixed, the smaller the reconnection probability, the larger is the flow capacity robustness and the more robust is the network. This also reflects small-world network between theeregular network and random network, where the higher the reconnection probability and the closer to random network, the more fragile is the network; conversely, the closer to the regular network, the more stable is the network. When network reconnection probability is fixed, the larger the average degree, the stronger is the network flow transmission capability and the greater is the flow capacity robustness; on the contrary, the weaker the network flow transmission capability and the smaller the flow capacity robustness. It can be seen that there are several small-scale rebounds in the network flow capacity robustness, which is due to the fact that the nodes with the same degree value are not unique and the order of nodes of two adjacent attacks is much more likely different, that is, the n+1 th attack is not necessarily carried out on the basis of the nth damaged node, which leads to a rebound of robustness in a small range. It can be seen that the error bars in some results are relatively obvious, which may be related to the network size and the number of experiments repeated.

For random attack (Figure 7B), in the ER random network, the low-density network appears “emergent” phenomenon faster, and the trend of change is unstable. In contrast, the growth rate of the BA scale-free network is not as sensitive to the random attack as deliberate attack, and it can be seen that there is little difference in the flow capacity robustness for growth rates of 6 and 16. NNC regular network flow is steadily decreasing with an increasing node damage rate, and the greater the average degree, the greater is the flow capacity robustness, which is basically consistent with the situation of the deliberate attack. The results of the WS small-world network show that after fixing reconnection probability, the larger the average degree, the larger is the flow capacity robustness; after fixing the average degree, the smaller the reconnection probability, the faster the “emergent” phenomenon appears.

Figure 7 shows how the flow capacity robustness indicator of several representative network parameters changes with the increase in the node damage rate under deliberate and random attacks. Furthermore, we conducted experiments on the same network with classical robustness, and the results are shown in Figure 8. Here, we chose the robustness based on the maximum connected subgraph as the classical robustness indicator, which is defined as follows:

M=NmNNd,(10)

where N is the size of the initial network; Nd is the number of nodes removed from the network; and Nm is the number of nodes in the maximum connected subgraph in the network when the nodes are removed.

FIGURE 8
www.frontiersin.org

FIGURE 8. (A) Classical robustness of four typical networks under deliberate attack. (B) Classical robustness of four typical networks under random attack.

Figure 8A shows how the classical robustness indicator changes under a deliberate attack. It can be seen that similar to flow capacity robustness, the robustness of a small-density ER random network (network density = 0.02) is relatively poor, and as network density increases, the network robustness increases. Compared with a small increase rate (increase rate = 6), a BA scale-free network is more robust at a large increase rate (increase rate = 16). The robustness of the NNC regular network is also stronger at a large average degree. The reconnection probability of a WS small-world network has little effect on network robustness, while the network average degree has a more significant impact on robustness, with the higher the average degree, the stronger is the robustness. For a random attack (Figure 8B), the classical robustness indicator shows a similar pattern of variation, that is, high network density is stronger than low network density (ER random network), high increase rate is stronger than low increase rate (BA scale-free network), and high network average degree is stronger than low network average degree (NNC regular network, WS small-world network). Compared to the results of flow capacity robustness (Figure 7), due to the different standards of the indicators, the result curves of robustness are not exactly the same, but the trend in relative magnitude of network robustness is basically consistent. This also demonstrates the reasonableness of our method compared with the classical robustness indicator. Figure 8 shows how the classical robustness indicator of several representative network parameters changes with the increase in the node damage rate under deliberate and random attacks.

Analysis of Experimental Results of the Flow Recovery Robustness

We still use two attack strategies, deliberate and random attacks, and the node recovery strategy is based on the non-global information: nodes vi and vj are adjacent nodes, after node vi is removed, and if node vj is still in the remaining network Vs, then node vi and edge {vi,vj} can be recovered by the information of node vj. The pseudo-code for the node recovery strategy is given as follows:

Program Network Recovery

Dim is Adjacent As Boolean

For vj in Vs

For vi in Vd

If is Adjacent (vi,vj) = True

add node vi to network G

add edge {vi,vj} to network G

End If

End For

End For

End Network Recovery

Figure 9 shows the flow recovery robustness indicator, and its difference varies with the change in the node damage rate and growth rate for the BA scale-free network of size 100. It can be seen that the recovered network flow shows similar changes with the increase in the node damage rate under both two attack strategies; that is, when fewer nodes are damaged (damage rate less than 20%), the network resilience is strong, and almost all of the damaged nodes can be recovered. In this study, we call this damage rate “critical damage rate” for the flow recovery robustness, and the damaged network can be fully recovered when the node damage rate is less than or equal to this critical damage rate. As the number of damaged nodes increases, the recovery ability of the network becomes weaker, and the “emergent” phenomenon appears. At the same time, it can be seen that when the number of attacked nodes reaches a large value (the damage rate is around 70%), the network flow recovered from a deliberate attack is less than that from a random attack. The flow recovery robustness difference increases with the increase in the node damage rate, indicating that as the level of network damage increases, the gap between the random attack and deliberate attack in the recovery ability of the network after damage becomes more and more significant.

FIGURE 9
www.frontiersin.org

FIGURE 9. Changes of flow recovery robustness of the BA scale-free network. (A) Change in flow recovery robustness under different damage rates and increase rates for BA scale-free network under deliberate attack; (B) change in flow recovery robustness under different damage rates and increase rates for BA scale-free network under random attack; (C) change in the difference between the flow recovery robustness under random attack minus the flow capacity robustness under deliberate attack.

Figure 10 shows the experimental results of the flow recovery robustness of ER random network of size 100 under deliberate and random attacks. The resilience of the network remains strong when the node damage rate is small, and the damaged nodes can be almost fully recovered. As the damage rate increases, the recovered network flow attenuates. In addition, when network density is small (less than 0.1), the number of nodes that cannot be recovered from the initial damage of the ER random network under deliberate attack increases rapidly, that is, the “emergent” phenomenon occurs at the early stage of attack. The flow recovery robustness difference demonstrates the same condition: two attack strategies have a significant difference in the impact of network resilience, that is, a deliberate attack leads to an “emergent” phenomenon in the early stage of damage, but not in a random attack. As the network density increases, the resilience of the ER random network is almost the same for both attacks.

FIGURE 10
www.frontiersin.org

FIGURE 10. Changes in flow recovery robustness of ER random network. (A) Change in flow recovery robustness under different damage rates and network density for ER random network under deliberate attack; (B) change in flow recovery robustness under different damage rates and network density for ER random network under random attack; (C) change in the difference between the flow recovery robustness under random attack minus the flow capacity robustness under deliberate attack.

Figure 11 shows results of the flow recovery robustness for the NNC regular network of size 100. When the network average degree is small, unrecovered nodes increase rapidly at the beginning of damage, showing an “emergent” phenomenon. As a larger average degree, the nodes can recover completely at the initial stage of damage and then the flow recovery robustness begins to decrease smoothly. The flow recovery robustness difference shows that the difference is large only when a small average degree and low damage rate are present at the same time. In other cases, the difference converges to 0, that is, the difference in the impact of the two attack strategies on the network is not significant.

FIGURE 11
www.frontiersin.org

FIGURE 11. Changes in flow recovery robustness of NNC regular network. (A) Change in flow recovery robustness under different damage rates and average degree for NNC regular network under deliberate attack; (B) change in flow recovery robustness under different damage rates and average degree for NNC regular network under random attack; (C) change in the difference between the flow recovery robustness under random attack minus the flow capacity robustness under deliberate attack.

The experimental results of the WS small-world network with fixed mean degree are shown in Figure 12, and we set a network average degree to 10. As the attack level increases, the network recovery flow goes from almost fully recoverable to significantly reduced. We can also find that reconnection probability has almost no effect on the network resilience, especially under random attack. The flow recovery robustness difference also varies with the change in the node damage rate, and there is no significant pattern to follow in the effect of reconnection probability on this difference.

FIGURE 12
www.frontiersin.org

FIGURE 12. Changes of flow recovery robustness of WS small-world network with 10 average degrees. (A) Change in flow recovery robustness under different damage rates and reconnection probability for the WS small-world network with 10 average degrees under deliberate attack; (B) change in flow recovery robustness under different damage rates and reconnection probability for the WS small-world network with 10 average degrees under random attack; (C) change in the difference between the flow recovery robustness under random attack minus the flow capacity robustness under deliberate attack.

Figure 13 shows the experimental results of a WS small-world network with a fixed reconnection probability, which is fixed at 0.1. It can be seen that the resilience of a low–average degree network decreases and is more prone to an “emergent” phenomenon, and during a deliberate attack, as the network average degree increases, the flow recovery robustness shows a downtrend. It can be seen from Figure 13C that when the network average degree is low, the changes of the flow recovery robustness have their own patterns, and after the average degree increases, the difference change shows a certain pattern, that is, the change is more stable.

FIGURE 13
www.frontiersin.org

FIGURE 13. Changes in flow recovery robustness of a WS small-world network with 0.1 reconnection probability. (A) Change in flow recovery robustness under different damage rates and average degree for the WS small-world network with 0.1 reconnection probability under deliberate attack; (B) change in flow recovery robustness under different damage rates and average degree for the WS small-world network with 0.1 reconnection probability under random attack; (C) change in the difference between the flow recovery robustness under random attack minus the flow capacity robustness under deliberate attack.

Next, Figure 14 shows the changes of the flow recovery robustness indicator for the network with different parameters. In case of a deliberate attack (Figure 14A), for ER random networks, the low-density network is more unstable than the high-density network in terms of network resilience. Specifically, the flow recovery robustness of the low-density network shows a rapid decline in the early stage, while the recovery ability of the high-density network is almost 100% until the damage rate reaches the critical value (20%), and the flow recovery robustness decreases smoothly after exceeding the critical damage rate. The BA scale-free network, on the other hand, presents an almost coincident resilience with an ER random network of higher density (network density = 0.3), and it can be seen that the growth rate does not have much influence on the flow recovery robustness of the BA scale-free network. The recovery capability of the NNC regular network also shows a steady decrease with the increase in damage rate, and there is no critical damage rate in the NNC regular network, that is, the flow recovery robustness decreases when the network is initially damaged on a small scale (damage rate <20%), especially in the NNC regular network with a small average degree. For the WS small-world network, when the network average degree is fixed, the higher the reconnection probability, the better is the network’s resilience, and there is a corresponding critical damage rate. Conversely, the smaller the reconnection probability, the worse is the recovery capability and there is no corresponding critical damage rate. When the reconnection probability is fixed, the larger is the network average degree, the higher is the flow recovery robustness.

FIGURE 14
www.frontiersin.org

FIGURE 14. (A) Flow recovery robustness of four typical networks under deliberate attack. (B) Flow recovery robustness of four typical networks under random attack.

During a random attack (Figure 14B), the ER random network does not appear as an “emergent” phenomenon similar to the rapid decrease in network recovery ability during a deliberate attack and has a corresponding critical damage rate, regardless of network density. The BA scale-free network shows a steady decline after critical damage rate is reached, and the growth rate does not have a significant impact on recovery ability. Similarly, the NNC regular network shows a trend of strong recovery ability in the early stage and a steady decline in the later stage, and the greater the average network degree, the greater is the flow recovery robustness. For the WS small-world network, the overall trend of the flow recovery robustness is more stable than for deliberate attack, but still, after fixing the network average degree, the flow recovery robustness increases as reconnection probability increases, and the change in resilience is more stable for the network with higher reconnection probability; after fixing reconnection probability, the network average degree increases, and the network’s resilience is enhanced, and the change of the flow recovery robustness is smoother for the network with a larger average degree. It can be seen that a small rebound in the flow recovery robustness during random attack occurs. It is normal for a small rebound to occur because the latter of two adjacent attacks does not based on the previous one but randomly damages a certain percentage of nodes again.

Figure 14 shows how the flow recovery robustness indicator of several representative network parameters changes with the increase in the node damage rate under deliberate and random attacks. Finally, in order to verify the effectiveness of the recovery strategy in this study, we make the difference between the flow recovery robustness and the flow capacity robustness, which is intended to consider the difference between the network flows after network recovery and before recovery. As can be seen from Figure 15, the flow recovery robustness after recovery is greater than the flow capacity robustness before recovery in varying levels for all four typical networks, whether under a deliberate or random attack, which reflects the effectiveness of the recovery strategy based on non-global information.

FIGURE 15
www.frontiersin.org

FIGURE 15. Difference between the flow recovery robustness and the flow capacity robustness of four typical networks. (A, B), respectively, show the difference between the flow recovery robustness and the flow capacity robustness in BA scale-free network under deliberate attack and random attack; (C, D), respectively, show the difference between the flow recovery robustness and the flow capacity robustness in ER random network under deliberate attack and random attack; (E, F), respectively, show the difference between the flow recovery robustness and the flow capacity robustness in the NNC regular network under deliberate attack and random attack; (G, H), respectively, show the difference between the flow recovery robustness and the flow capacity robustness in the WS small-world network under deliberate attack and random attack.

Discussion

In this study, we define two types of robustness evaluation indicators based on network maximum flow: the flow capacity robustness, which assesses the ability of the network to resist attack, and the flow recovery robustness, which assesses the ability to rebuild the network after an attack on the network. In order to verify the effectiveness of the proposed robustness evaluation indicators, this study conducts experimental analysis on four typical networks, and the experimental results show that after ER random network is attacked, the high-density network outperforms the low-density network in terms of connectivity and resilience; network growth rate of the BA scale-free network does not have a significant effect on robustness changes in most cases; robustness of the NNC regular network decreases steadily as the node damage rate increases, and the greater the average degree, the greater is the robustness; for the WS small-world network, when we fix the network average degree, the larger the reconnection probability, the better is the connectivity and recovery ability of the network after attack, and when we fix reconnection probability, the bigger the network average degree, the greater is the robustness. When examining the flow recovery robustness, we find that there is a critical damage rate (nodes and edges that are damaged can be almost completely recovered when the node damage rate is less than this critical value), and the critical damage rate is located around 20%. In addition, the decline in robustness based on network maximum flow not only appears an “emergent” phenomenon as the number of attacked nodes increases but also presents a certain “emergent” phenomenon with the change in network structure parameters. Finally, this study also verifies the effectiveness of our adopted non-global information-based recovery strategy for attacked network through difference values between the flow recovery robustness and the flow capacity robustness. The flow capacity robustness and the flow recovery robustness based on network maximum flow proposed in this study enrich the network structure indicator system and more comprehensively describe structural stability of real networks such as interpersonal networks and Internet. The main work in this study focuses on the design of two types of the robustness evaluation indicators based on network maximum flow and the experimental characterization of typical networks, and more in-depth theoretical analysis and quantitative description are the main elements of the subsequent study. Furthermore, we will try to extend our method from static networks to dynamic networks. Methods that have been used to deal with dynamic networks include exponential random graph models [42], stochastic block models [43, 44], continuous latent space models [44, 45], latent feature models [46, 47], and majority dynamics [48]. We will extend our indicators to dynamic networks by referring to existing methods.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.

Author Contributions

MC conceived and put forward the research ideas and carried out the research. JL and YC were in charge of the calculation and experimental data. MC, JL, and YC collected information and wrote the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant No. 71501153, the Innovation Capability Support Project of Shaanxi Province of China under Grant No. 2021KRM135, the Research Fund of Grand Theory and Practical Problem in Philosophy and Social Science of Shaanxi Province of China under Grant No. 2021ND0221, and the Research Fund of the Education Department of Shaanxi Province of China under Grant No. 20JG020.

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s Note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

1. Liu X-M. Research on the Robustness and Controllability of Complex Networks. Wuhan, China: Huazhong University of Science & Technology (2016).

Google Scholar

2. Jie J. Study of Robustness in the World. J Syst Eng (2005) 2:153–9. doi:10.3969/j.issn.1000-5781.2005.02.009

CrossRef Full Text | Google Scholar

3. Albert R, Jeong H, Barabási A-L. Error and Attack Tolerance of Complex Networks. Nature (2000) 406(6794):378–82. doi:10.1016/j.physa.2004.04.03110.1038/35019019

PubMed Abstract | CrossRef Full Text | Google Scholar

4. Holme P, Kim BJ, Yoon CN, Han SK. Attack Vulnerability of Complex Networks. Phys Rev E (2002) 65(5):056109. doi:10.1103/PhysRevE.65.056109

PubMed Abstract | CrossRef Full Text | Google Scholar

5. Paul G, Tanizawa T, Havlin S, Stanley HE. Optimization of Robustness of Complex Networks. Eur Phys J B (2004) 38:187–91. doi:10.1140/epjb/e2004-00112-3

CrossRef Full Text | Google Scholar

6. He C-Q. Research on Robustness during Network Evolution. Shanghai, China: Shanghai Jiaotong University (2009).

Google Scholar

7. Du W, Cai M, Du H-F. Study on Indices of Network Structure Robustness and Their Application. J Xi’an Jiaotong Univ (2010) 44(4):93–7.

Google Scholar

8. Lu P-L, Dong M, Cao L. Analysis of Influence of Clustering Coefficient as its index on Robustness of Complex Network. J Lanzhou Univ Technol (2019) 45(3):101–7.

Google Scholar

9. Zhang J-Y. Robust Analysis of Urban Road Network under Different Attack Conditions. Dalian, China: Dalian Jiaotong University (2020).

Google Scholar

10. Dorogovtsev SN, Goltsev AV, Mendes JFF. K-Core Organization of Complex Networks. Phys Rev Lett (2006) 96:040601. doi:10.1103/PhysRevLett.96.040601

PubMed Abstract | CrossRef Full Text | Google Scholar

11. Morone F, Del Ferraro G, Makse HA. The K-Core as a Predictor of Structural Collapse in Mutualistic Ecosystems. Nat Phys (2019) 15:95–102. doi:10.1038/s41567-018-0304-8

CrossRef Full Text | Google Scholar

12. Liu Y-Y, Csóka E, Zhou H, Pósfai M. Core Percolation on Complex Networks. Phys Rev Lett (2012) 109:205703. doi:10.1103/PhysRevLett.109.205703

PubMed Abstract | CrossRef Full Text | Google Scholar

13. Shang Y. Attack Robustness and Stability of Generalized K-Cores. New J Phys (2019) 21:093013. doi:10.1088/1367-2630/ab3d7c

CrossRef Full Text | Google Scholar

14. Shang Y-L. Generalized K -cores of Networks under Attack with Limited Knowledge. Chaos Solitons Fractals (2021) 152:111305. doi:10.1016/j.chaos.2021.111305

CrossRef Full Text | Google Scholar

15. Dorogovtsev SN, Mendes JFF, Samukhin AN. Giant Strongly Connected Component of Directed Networks. Phys Rev E (2001) 64(2 Pt 2):025101. doi:10.1103/PhysRevE.64.025101

PubMed Abstract | CrossRef Full Text | Google Scholar

16. Panduranga NK, Gao J, Yuan X, Stanley HE, Havlin S. Generalized Model for K -Core Percolation and Interdependent Networks. Phys Rev E (2017) 96(3-1):032317. doi:10.1103/PhysRevE.96.032317

PubMed Abstract | CrossRef Full Text | Google Scholar

17. Linton CF, Stephen PB, Douglas RW. Centrality in Valued Graphs: a Measure of Betweenness Based on Network Flow. Soc Networks (1992) 13(2):141–54. doi:10.1016/0378-8733(91)90017-N

CrossRef Full Text | Google Scholar

18. Shang Y. Vulnerability of Networks: Fractional Percolation on Random Graphs. Phys Rev E Stat Nonlin Soft Matter Phys (2014) 89(1):012813. doi:10.1103/physreve.89.01281342

PubMed Abstract | CrossRef Full Text | Google Scholar

19. Cohen R, Erez K, Ben-Avraham D, Havlin S. Resilience of the Internet to Random Breakdowns. Phys Rev Lett (2000) 85(21):4626–8. doi:10.1103/PhysRevLett.85.4626

PubMed Abstract | CrossRef Full Text | Google Scholar

20. Cohen R, Erez K, Ben-Avraham D, Havlin S. Breakdown of the Internet under Intentional Attack. Phys Rev Lett (2001) 86:3682–5. doi:10.1103/PhysRevLett.86.3682

PubMed Abstract | CrossRef Full Text | Google Scholar

21. Scott DM, Novak DC, Aultman-Hall L, Guo F. Network Robustness index: a New Method for Identifying Critical Links and Evaluating the Performance of Transportation Networks. J Transport Geogr (2006) 14(3):215–27. doi:10.1016/j.jtrangeo.2005.10.003

CrossRef Full Text | Google Scholar

22. Tan Y-J, Wu J, Deng H-Z, Zhu D-Z. Invulnerability of Complex Networks: a Survey. Syst Eng (2006) 10:1–5.

Google Scholar

23. Lu S. Robust Analysis of Aviation Logistics System Based on Complex Network Theory. Changchun, China: Jilin University (2014).

Google Scholar

24. Dong G, Chen Y, Wang F, Du R, Tian L, Stanley HE. Robustness on Interdependent Networks with a Multiple-To-Multiple Dependent Relationship. Chaos (2019) 29(7):073107. doi:10.1063/1.5093074

PubMed Abstract | CrossRef Full Text | Google Scholar

25. Shi H. Invulnerability Estimation Model of Buildings with Complex Networks under strong Earthquakes. China Earthquake Eng J (2017) 39(6):1024–8.

Google Scholar

26. Dong G, Wang F, Shekhtman LM, Danziger MM, Fan J, Du R, et al. Optimal Resilience of Modular Interacting Networks. Proc Natl Acad Sci USA (2021) 118(22):e1922831118. doi:10.1073/pnas.1922831118

PubMed Abstract | CrossRef Full Text | Google Scholar

27. Mariani MS, Ren Z-M, Bascompte J, Tessone CJ. Nestedness in Complex Networks: Observation, Emergence, and Implications. Phys Rep (2019) 813:1–90. doi:10.1016/j.physrep.2019.04.001

CrossRef Full Text | Google Scholar

28. Wuellner DR, Roy S, D’Souza RM. Resilience and Rewiring of the Passenger Airline Networks in the United States. Phys Rev E (2010) 82(5):056101. doi:10.1103/PhysRevE.82.056101

CrossRef Full Text | Google Scholar

29. Liu Y, Sanhedrai H, Dong G, Shekhtman LM, Wang F, Buldyrev SV, et al. Efficient Network Immunization under Limited Knowledge. Natl Sci Rev (2021) 8(1):nwaa229. doi:10.1093/nsr/nwaa229

PubMed Abstract | CrossRef Full Text | Google Scholar

30. McDaniels T, Chang S, Cole D, Mikawoz J, Longstaff H. Fostering Resilience to Extreme Events within Infrastructure Systems: Characterizing Decision Contexts for Mitigation and Adaptation. Glob Environ Change (2008) 18(2):310–8. doi:10.1016/j.gloenvcha.2008.03.001

CrossRef Full Text | Google Scholar

31. van der Vegt GS, Essens P, Wahlström M, George G. Managing Risk and Resilience. Amj (2015) 58(4):971–80. doi:10.5465/amj.2015.4004

CrossRef Full Text | Google Scholar

32. Bai Y-N, Huang N, Sun L-N, Zhang Y (2017). “Failure Propagation of Dependency Networks with Recovery Mechanism,” In: 2017 Annual Reliability and Maintainability Symposium (RAMS), Orlando, FL, January 23–26, 2017 (IEEE), 1–6. doi:10.1109/RAM.2017.7889721

CrossRef Full Text | Google Scholar

33. Liu R-R, Li M, Jia C-X. Cascading Failures in Coupled Networks: the Critical Role of Node-Coupling Strength across Networks. Sci Rep (2016) 6:35352. doi:10.1038/srep35352

PubMed Abstract | CrossRef Full Text | Google Scholar

34. Hong S, Lv C, Zhao T, Wang B, Wang J, Zhu J. Cascading Failure Analysis and Restoration Strategy in an Interdependent Network. J Phys A: Math Theor (2016) 49(19):195101–12. doi:10.1088/1751-8113/49/19/195101

CrossRef Full Text | Google Scholar

35. Wang L-X. Study on Key Fault Node Location and Recovery Technology in Complex Networks. Xi'an, China: Xidian University (2019).

Google Scholar

36. Li Zhao Z, Guo Yan-Hui Y-H, Xu Guo-Ai G-A, Hu Zheng-Ming Z-M. Analysis of Cascading Dynamics in Complex Networks with an Emergency Recovery Mechanism. wlxb (2014) 63(15):158901–428. doi:10.7498/aps.63.158901

CrossRef Full Text | Google Scholar

37. Bohannon J. Counterterrorism's New Tool: 'Metanetwork' Analysis. Science (2009) 325(5939):409–11. doi:10.1126/science.325-40910.1126/science.325_409

PubMed Abstract | CrossRef Full Text | Google Scholar

38. Wang X-F, Li X, Chen G-R. Complex Network Theory and Application. Beijing: Tsinghua University Press (2006). p. 18.

Google Scholar

39. Barabási A-L, Albert R. Emergence of Scaling in Random Networks. Science (1999) 286(5439):509–12. doi:10.1126/science.286.5439.509

PubMed Abstract | CrossRef Full Text | Google Scholar

40. Erdös P, Rényi A. (2011). On The Evolution of Random Graphs. The Structure and Dynamics of Networks. New Jersey, US: Princeton University Press, 38–82. doi:10.1515/9781400841356.38

CrossRef Full Text | Google Scholar

41. Watts DJ, Strogatz SH. Collective Dynamics of 'small-World' Networks. Nature (1998) 393(6684):440–2. doi:10.1038/30918

PubMed Abstract | CrossRef Full Text | Google Scholar

42. Guo F, Hanneke S, Fu W-J, Xing EP(2007). “Recovering Temporally Rewiring Networks: A Model-Based Approach,” In: Proceedings of the 24th International Conference on Machine Learning, Corvallis, USA, January 1, 2007, 321–8.

Google Scholar

43. Xing EP, Fu W, Song L. A State-Space Mixed Membership Blockmodel for Dynamic Network Tomography. Ann Appl Stat (2010) 4(2):536–66. doi:10.1214/09-AOAS311

CrossRef Full Text | Google Scholar

44. Hoff PD. Hierarchical Multilinear Models for Multiway Data. Comput Stat Data Anal (2011) 55(1):530–43. doi:10.1016/j.csda.2010.05.020

CrossRef Full Text | Google Scholar

45. Sarkar P, Moore AW. Dynamic Social Network Analysis Using Latent Space Models. SIGKDD Explor Newsl (2005) 7(2):31–40. doi:10.1145/1117454.1117459

CrossRef Full Text | Google Scholar

46. Heaukulani C, Ghahramani Z (2013). “Dynamic Probabilistic Models for Latent Feature Propagation in Social Networks,” In: Proceedings of the 30th International Conference on Machine Learning, Atlanta, US, June 16, 2013, 28, 275–83.

Google Scholar

47. Kim M, Leskovec J. Nonparametric Multi-Group Membership Model for Dynamic Networks. Adv Neural Inf Process Syst (2013) 25:1385–93.

Google Scholar

48. Shang Y. A Note on the Majority Dynamics in Inhomogeneous Random Graphs. Results Math (2021) 76(3):1–17. doi:10.1007/s00025-021-01436-z

CrossRef Full Text | Google Scholar

Keywords: network robustness, maximum flow, connectivity, resilience, critical damage rate

Citation: Cai M, Liu J and Cui Y (2021) Network Robustness Analysis Based on Maximum Flow. Front. Phys. 9:792410. doi: 10.3389/fphy.2021.792410

Received: 10 October 2021; Accepted: 29 November 2021;
Published: 20 December 2021.

Edited by:

Gaogao Dong, Jiangsu University, China

Reviewed by:

Guangquan Xu, Tianjin University, China
Yilun Shang, Northumbria University, United Kingdom

Copyright © 2021 Cai, Liu and Cui. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Meng Cai, mengcai@mail.xjtu.edu.cn

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.