1. Introduction
Numerous studies have been conducted in the last years to explore the response of real-world networks to the removal of nodes [
1,
2,
3,
4,
5,
6,
7]. These investigations simulate the consequences of node removal (attack) on the network and have applications in diverse scientific fields such as ecology [
5], transportation [
8], informatics [
9], neural [
10,
11], and social networks [
12,
13].
The main objectives of these studies have been twofold. Firstly, they aim to assess networks’ robustness, which measures the system’s ability to maintain functionality after link and node removal. Secondly, they seek to identify the link and node removals that cause the most significant damage to the network, thereby uncovering the key players that significantly influence network functioning.
Analyzing attack strategies provides valuable insights into enhancing network resilience by anticipating threats and identifying elements requiring protection [
5,
6].
An attack strategy refers to the identification and implementation of methods or techniques aiming at disrupting or dismantling a network [
5,
6,
7]. It also plays a crucial role in situations where network disruption is necessary, such as halting the spread of a disease or a computer virus or impeding the growth of a cancer cell [
14,
15,
16]. Many centralities’ measurements have been proposed to select important nodes to remove. See [
17] for a summary. Methods to measure node centralities are generally based on the topological structure of the network, such as removing nodes accounting for their degree and betweenness [
5,
17,
18]. The betweenness node removal strategy, which removes nodes according to their recalculated betweenness centrality, yields the best attack in 70-80% of the cases [
17].
The random walk (RW) on networks describes a stochastic process in which a walker travels among nodes along network links [
19,
20]. RW can be a model of transport, diffusion, and search on networks [
21,
22], a handy tool for studying the structure of networks [
19], and the importance of network nodes [
23,
24,
25].
In this manuscript, we join network attack simulation and random walk processes on networks. Here, we propose four new measures of node centrality based on RW. The new removal strategies focus on important notions in RW walks theory, such as the covering time, start, and stop nodes. Then, we test the proposed node centralities as effective strategies to rank nodes to remove to dismantle the network over synthetic and real-world networks. We compare the efficacy of the new node removal strategies based on random walks with effective node removal strategies from the literature, such as betweenness and closeness node removal.
3. Results and Discussion
In this study, we simulated random walk processes to cover the networks and evaluate node importance. We introduced four node attack strategies based on the simulated random walks process to assign each node a ranking (a value or score). Subsequently, we utilized these scores to define new node centrality measures. The introduced strategies include recurrence number, stop node, stop distance, and covering time. Then, by attacking 19 networks, four of which are synthetic, and the rest are real-world networks, we compared the efficacy of dismantling the network of the new node centralities with two well-known competitors from literature, namely Betweenness (BTW) and Closeness (CLS) node removals.
In
Figure 2, we show the LCC decrease as a function of the node removal fraction for real-world networks and in
Figure 3 for the synthetic networks.
Figure 4 displays the inverse of robustness,
, normalized per row (i.e., per network), where each cell in the table is assigned a darker color as the strategy becomes more effective than the others. We report the average inverse robustness value across all networks in the last row.
Moreover, in Figures A1 and A2 in the Appendix, we furnish the scatterplots of the random walk based node centralities vs. the betweenness node centrality for the real-world networks, and in Figures A3 and A4 in the Appendix, we depict the scatterplots of the random walk based node centralities vs. the node degree centrality for the real-world networks.
In the following, we summarize and discuss the outcomes for each NR strategy.
BTW: Our results show that the well-known betweenness nodes attack (BTW) is the best strategy overall as
(
Figure 4). BTW was the most effective on both food webs, Uk Faculty, Arenas email, and Beijing
. It has also achieved good results on synthetic networks, particularly ER networks and BBT. The performance of BTW remains quite good because
for all other networks. These results confirm previous studies indicating that betweenness is a very effective strategy for dismantling complex networks [
5,
17].
CLS: The closeness nodes attack (CLS) performs poorly on most road maps, while it is particularly effective on Uk Faculty, Little Rock Food-web, and Arenas Email regarding real-world networks. Regarding synthetic networks, it exhibits fairly good performance overall, especially on ER, BBT and LTC. CLS ranks fifth among the examined strategies as .
SN: The Stop Node (SN) has notable effectiveness on the ER random graph. Regarding real-world networks, SN is the most effective on Barcelona Flow and the second most effective on UK Faculty. It also demonstrates good effectiveness on Beijing and 4th, as well as on Road Minnesota. SN is the third strategy regarding average effectiveness, with .
We defined a ‘stop node’, the node where the RW stops its travel. For this reason, nodes acting many times as stop nodes are likely to be peripheral nodes, with a very low probability of encountering an RW. On the contrary, nodes that never (or rarely) acted as a stop node are likely to be central in the network and encounter an RW. The SN strategy removes nodes in ascending order of stop node, thus removing first the central nodes.
CT: The cover time (CT) emerges as the most effective strategy on LTC
, and two real-world networks, Beijing
and 4
th. It also exhibits noteworthy effectiveness on Beijing
and ER. CT ranks last in terms of average effectiveness, with
. The covering time is the number of time steps the RW needs to pass over all nodes in the network [
54]. The CT node attack strategy removes nodes in decreasing order of their covering time when they are the start node. This way, start nodes producing higher covering times are removed first. The CT strategy returns peculiar results; on the one hand, CT shows the worst average efficacy (lowest
); on the other hand, it carried out the best performance in dismantling one synthetic and two real-world networks. The synthetic network is the square grid LTC, i.e., the model network with a planar structure and highly homogeneous node degree. In
Figure 5 we depict the twenty most central nodes for each node removal strategy for the LTC networks of different size. The twenty most central nodes selected by the CT strategy are distributed over the entire network, whereas for all the other strategies, the most central nodes reside in a central part of the network. Therefore, for example, if we remove the highest BTW nodes from the LTC network, it will survive a large LCC composed by the peripheral nodes of the network (See
Figure 5). In other terms, CT selects nodes covering the whole network structure, and for this, removing nodes according to the CT strategy may cause a faster LCC dismantling.
The two real-world networks where CT is highly effective are the road networks of the Beijing ring. Further, CT performs well in dismantling the Minnesota road networks (
>0.85,
Figure 4). These road networks show a planar-like structure and a narrow range of node degrees (see
Figure 6). Therefore, it emerges an interesting ability of the CT node attack strategies to dismantle the networks with the specific characteristics of the planar-like structure and homogeneous node degree. In
Figure 7 we depict the fifty most central nodes for each node removal strategy for the Minnesota and the Beijing
road networks. Like what was observed for the LTC, the fifty most central nodes, according to the CT strategy, are distributed over the entire network. In contrast, for all the other strategies, most central nodes reside in a part of the network. Therefore, this CT-specific node rank property may result in the effective dismantling of real-world networks with a planar-like structure and homogeneous node degree, such as road networks.
SD: The stop distance (SD) performs well on synthetic graphs, particularly on LTC, proving the most effective strategy. As for real networks, it demonstrates a solid performance on Olocene food-web, UK Faculty, Arenas email, and Beijing . SD is the fourth strategy in terms of average effectiveness, with . We defined the stop distance for a pair of nodes and , the shortest path length between the start node and the stop node of the random walk. SD attack strategy removes nodes in ascending order of SD.
For this reason, the SD remove first the start nodes that are a small distance from the respective stop node. This strategy emerges as particularly effective node removal over the synthetic network square lattice LTC of lower dimension. As we can see in
Figure 5, the SD strategy can select nodes whose removals trigger the disruption of the LCC network in two parts. Therefore, removing nodes very near to their stop nodes can be a good method to dismantle this kind of model network and consequently select important nodes for its network robustness.
RN: For a sufficiently large number of iterations, the recurrence number (RN) approximates very well the degree (See Figures A3 and A4 in the Appendix). As easily verified, the degree vector is the eigenvector of the transition matrix corresponding to the eigenvalue 1 (Perron-Frobenius eigenvector)[
58]. Given this property, the RN is a degree-like node removal strategy and can be generally effective on most networks. Specifically, RN is the top strategy for San Francisco (reduced), San Joaquin County, and Beijing
road networks. Additionally, it maintains an average level of effectiveness
greater than 0.75 on all other real networks. As for synthetic networks, it is less effective on lattices (LTC) where
and ineffective on BBT. RN is the second most effective strategy among the tested networks with
. Remove node based on their degree requires local information only, and for this, the node degree attack is a strategy with a low computational cost. The low computational cost and the good performance confirm this strategy as a good candidate for network dismantling.