The Analysis for the Vulnerability of the Interdependent and Interconnected Network of Networks Based on the Correlation Degree Distribution Functions
JIN Weixin1,2, SONG Ping1,3, LIU Guozhu1
1. The State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System(CEMEE),Luoyang 471003, China; 2. The Information Operations and Command Training Department, National Defense University,Beijing 100091,China; 3. The Military Communication Comand Department, Xi’an Communication Institute,Xi’an 710106,China
Abstract:In this paper, research status quo on the cascading vulnerability of interdependent networks is reviewed firstly. Secondly,its progress and unsolved problem are analyzed.Based on this,the blind area of the present interdependent networks vulnerability research—correlation mechanism and correlation principle of interdependent networks are deeply analyzed and studied,and the vulnerability analysis models which based on the correlation degree distribution functions are built,at the same time,six criteria of interdependent networks vulnerability evaluation are summed up.Lastly,the conclusion and proposal are put forward.
金伟新, 宋凭, 刘国柱,. 基于关联分布函数的相互依赖网络脆弱性分析[J]. 复杂系统与复杂性科学, 2016, 13(4): 8-17.
JIN Weixin, SONG Ping, LIU Guozhu. The Analysis for the Vulnerability of the Interdependent and Interconnected Network of Networks Based on the Correlation Degree Distribution Functions[J]. Complex Systems and Complexity Science, 2016, 13(4): 8-17.
[1] Helbing D. Globally networked risks and how to respond[J].Nature , 2013,497:51-59. [2] Vespignani A. The fragility of interdependency[J].Nature ,2010,464:984-985. [3] Buldyrev S V, Parshani R ,Paul G,et al. Catastrophic cascade of failures in interdependent networks[J].Nature, 2010 ,464:1025-1028. [4] Parshani R, Buldyrev S V, Havlin S.Interdependent networks:reducing the coupling strength leads to a change from a first to second order percolation transition[J].Physical Review Letters, 2010,105(4): 048701. [5] Bashan A, Parshani R, Havlin S. Percolation in networks composed of connectivity and dependency links[J].Physical Review E ,2011,83(5):051127. [6] Shao J, Buldyrev S V, Havlin S,et al. Cascade of failures in coupled network systems with multiple support-dependence relations[J].Physical Review E,2011,83(3):036116. [7] Schneider C M,André A,Andrade M S,et al. Mitigation of malicious attacks on networks[J].PNAS ,2011,108(10) :3838-3841. [8] Gao J, Buldyrev S V, Stanley H E ,et al. Networks formed from interdependent networks[J].Nature Physics,2012,8:40-48. http://www.nature.com/naturephysics. [9] Li W, Bashan A, Buldyrev S V,et al. Cascading failures in interdependent lattice networks:the critical role of the length of dependency links[J].Physical Review Letters,2012,108(22):228702. [10] Gao J, Buldyrev S V, Havlin S,et al. Robustness of a network formed by n interdependent networks with a one-to-one correspondence of dependent nodes[J].Physical Review E,2012, 85(6):066134. [11] Dong G, Gao J, Jin R,et al. Robustness of network of networks under targeted attack[J].Physical Review E ,2013,87: 052804. [12] Zhou D, Gao J, Stanley H E ,et al. Percolation of partially interdependent scale-free networks[J].Physical Review E ,2013,87(5):052812. [13] Hu Y, Zhou D,Zhang R,et al. Percolation of interdependent networks with intersimilarity[J].Physical Review E, 2013,88(5):052805.