Evaluating Topological Vulnerability Based on Fuzzy Fractal Dimension

Tao Wen, Moxian Song, Wen Jiang

Research output: Contribution to journalArticlepeer-review

22 Scopus citations

Abstract

Complex networks have been widely applied in many complex systems existed in nature and society because of its rapid development. Many methods have been proposed to evaluate the vulnerability of the complex networks because of the high security requirements of the network. In this paper, a novel method is proposed to evaluate network’s vulnerability, which is based on fuzzy fractal dimension and average edge betweenness. Fuzzy fractal dimension can reflect the dynamic structure and topological structure of complex network, which is important to the vulnerability of complex network. So this proposed method can overcome the shortcomings of previous works by replacing the key coefficient p by fuzzy fractal dimension. In order to show this proposed method’s accuracy and effectiveness, six USAir networks in different years are applied in this paper. Three common methods are used to compare the results with this proposed method, and the RB attack strategy is used to analyze the vulnerability of dynamic characteristic. The fuzzy fractal dimension of randomly selecting largest connected subset which is close to the initial fuzzy fractal dimension shows the reliability and stability of this proposed method. The vulnerability order obtained by this proposed method is more realistic, because the Pearson correlation coefficient r about this method equals to 0.9805, which shows a extremely strong correlation with the reality.

Original languageEnglish
Pages (from-to)1956-1967
Number of pages12
JournalInternational Journal of Fuzzy Systems
Volume20
Issue number6
DOIs
StatePublished - 1 Aug 2018

Keywords

  • Average edge betweenness
  • Complex networks
  • Fractal dimension
  • Fuzzy sets
  • Vulnerability evaluation

Fingerprint

Dive into the research topics of 'Evaluating Topological Vulnerability Based on Fuzzy Fractal Dimension'. Together they form a unique fingerprint.

Cite this