» Articles » PMID: 37443331

Avalanche-size Distribution of Cayley Tree

Overview
Journal Sci Rep
Specialty Science
Date 2023 Jul 13
PMID 37443331
Authors
Affiliations
Soon will be listed here.
Abstract

Attacks on networks is a very important issue in developing strategies of eradicating spreads of malicious phenomena in networks, such as epidemics and fake information. This field of research is referred to as networks immunization. The traditional approach to evaluating the effectiveness of attacks on networks focuses on measuring macro parameters related to the entire attack, such as the critical probability of a percolation occurrence in the network [Formula: see text] and the relative size of the largest component in the network, known as the giant component, but not considering the attack on a micro perspective, which is the analysis of node removals, during an attack, themselves, their characteristics and results. In this paper we present and apply the last method of focusing on the micro scale of an attack. Based on the theory of percolation in networks, we analyze the phenomenon of an avalanche which results due to a single node removal from a network. An avalanche is a state in which a removal of a single node from the giant component of a network leads to the disconnection of additional nodes. This process significantly contributes to the fragmentation (immunization) of the network, comparing to the impact of the initial node removal alone. Specifically, we focus on the size parameter of an avalanche, which is the number of nodes that are disconnected from the giant component due to a single node removal. Relating to a random attack on a network of the type of Cayley tree, we derive analytically the distribution of the sizes of avalanches that occur during the entire attack on it, until the network is dismantled (immunized) and the attack is terminated.

References
1.
Motter A, Lai Y . Cascade-based attacks on complex networks. Phys Rev E Stat Nonlin Soft Matter Phys. 2003; 66(6 Pt 2):065102. DOI: 10.1103/PhysRevE.66.065102. View

2.
Watts D, Strogatz S . Collective dynamics of 'small-world' networks. Nature. 1998; 393(6684):440-2. DOI: 10.1038/30918. View

3.
Holme P, Kim B, Yoon C, Han S . Attack vulnerability of complex networks. Phys Rev E Stat Nonlin Soft Matter Phys. 2002; 65(5 Pt 2):056109. DOI: 10.1103/PhysRevE.65.056109. View

4.
Kim J, Goh K, Kahng B, Kim D . Probabilistic prediction in scale-free networks: diameter changes. Phys Rev Lett. 2003; 91(5):058701. DOI: 10.1103/PhysRevLett.91.058701. View

5.
Shargel B, Sayama H, Epstein I, Bar-Yam Y . Optimization of robustness and connectivity in complex networks. Phys Rev Lett. 2003; 90(6):068701. DOI: 10.1103/PhysRevLett.90.068701. View