Core identification and attack strategies against regenerative complex networks

Article English OPEN
Guo, Weisi ; Lu, X.

Modelling enemy networks in a way that reveals their key entities and links is important when disrupting complex networks with high redundancy. In this paper, we examine how best to attack such networks under a limited ground intelligence constraint. The key modelling contribution is to include both the heterogeneity of the node functions and the dynamics of recuperation after destruction. Through identifying the core nodes, the results show that ground intelligence should focus on locating and attacking high degree nodes, yielding a 41% reduction in conflict length over random opportunistic targeting and a 23% reduction over specialist targeting. Even when difficult to replace specialists are considered, targeting high degree nodes that can recuperate quickly, remains the most effective method of attack. The impact is to allow military forces to more effectively target enemy nodes that will cause functional paralysis and create further collapses.
  • References (12)
    12 references, page 1 of 2

    1 V. Krebs, “Mapping Networks of Terrorist Cells,” Connections, vol. 24, 2002.

    2 G. Chen, X. Wang, and X. Li, Fundamentals of Complex Networks: Models, Structures and Dynamics. Wiley, 2005.

    3 H. Zhou and R. Mondragon, “Redundancy and robustness of AS-level Internet topology and its models,” IET Electronics Letters, vol. 40, 2004.

    4 J. Memmott, N. M. Waser, and M. V. Price, “Tolerance of Pollination Networks to Species Extinctions,” Proceedings of the Royal Society of London, Series B: Biological Sciences, vol. 271, 2004.

    5 D. Garlaschelli, G. Caldarelli, and L. Pietronero, “Universal Scaling Relations in Food Webs,” Nature, vol. 423, 2003.

    6 I. Moon and K. M. Carley, “Modeling and Simulating Terrorist Networks in Social and Geospatial Dimensions,” IEEE Intelligent Systems, vol. 22, 2007.

    7 J. Bascompte, P. Jordano, C. Melian, and J. Olesen, “The Nested Assembly of Plant-Animal Mutualistic Networks,” Proceedings of the National Academy of Sciences (PNAS), vol. 100, 2003.

    8 R. Marion and M. Uhl-Bien, “Complexity Theory and Al-Qaeda: Examining Complex Leadership,” Emergence, vol. 5, 2003.

    9 P. Klerks, “The network paradigm applied to criminal organisations,” Connections, vol. 24, 2001.

    10 J. A. Dunne, R. J. Williams, and N. D. Martinez, “Network Structure and Biodiversity Loss in Food Webs: Robustness Increases with Connectance,” Ecology Letters, vol. 5, 2002.

  • Metrics
    views in OpenAIRE
    views in local repository
    downloads in local repository

    The information is available from the following content providers:

    From Number Of Views Number Of Downloads
    Warwick Research Archives Portal Repository - IRUS-UK 0 113
Share - Bookmark