IDEAS home Printed from https://ideas.repec.org/a/sae/risrel/v227y2013i6p576-585.html
   My bibliography  Save this article

Network vulnerability assessment via bi-objective optimization with a fragmentation approach as proxy

Author

Listed:
  • César Yajure
  • Darihelen Montilla
  • Jose Emmanuel Ramirez-Marquez
  • Claudio M Rocco S

Abstract

The fragmentation of a network is used to understand the effects of element removals on its cohesion. Minimum information is required to fragment a network, namely: the topology of the network. Continuous fragmentation of a network can be used to uncover important/critical elements in the network. This article proposes a bi-objective optimization model that, when solved, provides the most economical network fragmentation strategies for increasing element fragmentation cost. After description and solution of the model, the manuscript describes, via experimentation, how the results of the model can be used as a surrogate metric for understanding element importance performance in real service networks. The experimentation is complemented with a classical example of social network analysis. The results show that the proposed fragmentation models can be used as a guide to identify sets of elements that contribute to the successful performance of a system.

Suggested Citation

  • César Yajure & Darihelen Montilla & Jose Emmanuel Ramirez-Marquez & Claudio M Rocco S, 2013. "Network vulnerability assessment via bi-objective optimization with a fragmentation approach as proxy," Journal of Risk and Reliability, , vol. 227(6), pages 576-585, December.
  • Handle: RePEc:sae:risrel:v:227:y:2013:i:6:p:576-585
    DOI: 10.1177/1748006X13489490
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/1748006X13489490
    Download Restriction: no

    File URL: https://libkey.io/10.1177/1748006X13489490?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Zio, E. & Golea, L.R. & Rocco S., C.M., 2012. "Identifying groups of critical edges in a realistic electrical network by multi-objective genetic algorithms," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 172-177.
    2. Myung, Young-Soo & Kim, Hyun-joon, 2004. "A cutting plane algorithm for computing k-edge survivability of a network," European Journal of Operational Research, Elsevier, vol. 156(3), pages 579-589, August.
    3. Crucitti, Paolo & Latora, Vito & Marchiori, Massimo & Rapisarda, Andrea, 2003. "Efficiency of scale-free networks: error and attack tolerance," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 320(C), pages 622-642.
    4. Stephen P. Borgatti, 2006. "Identifying sets of key players in a social network," Computational and Mathematical Organization Theory, Springer, vol. 12(1), pages 21-34, April.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Alexander Veremyev & Oleg A. Prokopyev & Eduardo L. Pasiliao, 2014. "An integer programming framework for critical elements detection in graphs," Journal of Combinatorial Optimization, Springer, vol. 28(1), pages 233-273, July.
    2. Chen, Wei & Jiang, Manrui & Jiang, Cheng & Zhang, Jun, 2020. "Critical node detection problem for complex network in undirected weighted networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 538(C).
    3. Claudio M Rocco S & Juan Carlos Ruiz, 2012. "Assessing the importance of components in a system modeled as a network," Journal of Risk and Reliability, , vol. 226(5), pages 464-475, October.
    4. Mark J. O. Bagley, 2019. "Networks, geography and the survival of the firm," Journal of Evolutionary Economics, Springer, vol. 29(4), pages 1173-1209, September.
    5. Hosseinali Salemi & Austin Buchanan, 2022. "Solving the Distance-Based Critical Node Problem," INFORMS Journal on Computing, INFORMS, vol. 34(3), pages 1309-1326, May.
    6. Andrea Avena-Koenigsberger & Xiaoran Yan & Artemy Kolchinsky & Martijn P van den Heuvel & Patric Hagmann & Olaf Sporns, 2019. "A spectrum of routing strategies for brain networks," PLOS Computational Biology, Public Library of Science, vol. 15(3), pages 1-24, March.
    7. Zou, Qiling & Chen, Suren, 2019. "Enhancing resilience of interdependent traffic-electric power system," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    8. Zhou, Yaoming & Wang, Junwei, 2018. "Efficiency of complex networks under failures and attacks: A percolation approach," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 512(C), pages 658-664.
    9. Raddant, Matthias & Takahashi, Hiroshi, 2019. "The Japanese corporate board network," Kiel Working Papers 2130, Kiel Institute for the World Economy (IfW Kiel).
    10. Marco Di Summa & Syed Md Omar Faruk, 2023. "Critical node/edge detection problems on trees," 4OR, Springer, vol. 21(3), pages 439-455, September.
    11. Karakose, Gokhan & McGarvey, Ronald G., 2018. "Capacitated path-aggregation constraint model for arc disruption in networks," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 109(C), pages 225-238.
    12. Viljoen, Nadia M. & Joubert, Johan W., 2016. "The vulnerability of the global container shipping network to targeted link disruption," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 462(C), pages 396-409.
    13. Heetae Kim & Petter Holme, 2015. "Network Theory Integrated Life Cycle Assessment for an Electric Power System," Sustainability, MDPI, vol. 7(8), pages 1-15, August.
    14. Zio, Enrico, 2016. "Challenges in the vulnerability and risk analysis of critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 152(C), pages 137-150.
    15. Qian Ye & Hyun Kim, 2019. "Assessing network vulnerability of heavy rail systems with the impact of partial node failures," Transportation, Springer, vol. 46(5), pages 1591-1614, October.
    16. Lindquist, Matthew J. & Zenou, Yves, 2019. "Crime and Networks: 10 Policy Lessons," IZA Discussion Papers 12534, Institute of Labor Economics (IZA).
    17. Caterina Liberati & Massimiliano Marzo & Paolo Zagaglia & Paola Zappa, 2015. "Drivers of demand and supply in the Euro interbank market: the role of “Key Players” during the recent turmoil," Financial Markets and Portfolio Management, Springer;Swiss Society for Financial Market Research, vol. 29(3), pages 207-250, August.
    18. Mishael Milaković & Simone Alfarano & Thomas Lux, 2010. "The small core of the German corporate board network," Computational and Mathematical Organization Theory, Springer, vol. 16(2), pages 201-215, June.
    19. Deb Verhoeven & Katarzyna Musial & Stuart Palmer & Sarah Taylor & Shaukat Abidi & Vejune Zemaityte & Lachlan Simpson, 2020. "Controlling for openness in the male-dominated collaborative networks of the global film industry," PLOS ONE, Public Library of Science, vol. 15(6), pages 1-23, June.
    20. Li, Y.F. & Sansavini, G. & Zio, E., 2013. "Non-dominated sorting binary differential evolution for the multi-objective optimization of cascading failures protection in complex networks," Reliability Engineering and System Safety, Elsevier, vol. 111(C), pages 195-205.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:risrel:v:227:y:2013:i:6:p:576-585. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.