Uncertainty_in_vulnerability_of_networks_under_att
Uncertainty_in_vulnerability_of_networks_under_att
com/scientificreports
This study builds conceptual explanations and empirical examinations of the vulnerability response
of networks under attack. Two quantities of “vulnerability” and “uncertainty in vulnerability” are
defined by scrutinizing the performance loss trajectory of networks experiencing attacks. Both
vulnerability and uncertainty in vulnerability quantities are a function of the network topology and
size. This is tested on 16 distinct topologies appearing in infrastructure, social, and biological networks
with 8 to 26 nodes under two percolation scenarios exemplifying benign and malicious attacks.
The findings imply (i) crossing path, tree, and diverging tail are the most vulnerable topologies, (ii)
complete and matching pairs are the least vulnerable topologies, (iii) complete grid and complete
topologies show the most uncertainty for vulnerability, and (iv) hub-and-spoke and double u exhibit
the least uncertainty in vulnerability. The findings also imply that both vulnerability and uncertainty
in vulnerability increase with an increase in the size of the network. It is argued that in networks with
no undirected cycle and one undirected cycle, the uncertainty in vulnerability is maximal earlier in
the percolation process. With an increase in the number of cycles, the uncertainty in vulnerability is
accumulated at the end of the percolation process. This emphasizes the role of tailoring preparedness,
response, and recovery phases for networks with different topologies when they might experience
disruption.
From the six handshakes rule1,2 and the random graph theory3 to the theory of evolving networks4, much research
in network science is grappling with comprehending the nexus of network structure and function. This, in part, is
due to the need to understand the overall system’s response under peculiar circumstances. Malicious and random
attacks induced by nature or humans are pertinent examples5–7. As our daily lives depend on the functioning of
networks ranging from infrastructure (e.g., power grids, transport, gas, water) to social (e.g., communication,
social media) and biological (e.g., neural, metabolic), research has proliferated to examine the vulnerability of
networks under p ercolation5–16.
Vulnerability is critical when pondering on the ability of a network to provide continuity in its operation. It
refers to the magnitude of network performance loss relative to its pre-disruption performance in the presence of
disruptions and the absence of response resources17. Recent events including the spread of COVID-19 through
individuals over the networks of contacts in 2 02018, the shutdown of the New York City subway system following
Hurricane Ida in 202119, and the power outage experienced by 2 million Texan households induced by a massive
winter storm in 202120 have shown how the vulnerability response of systems exacerbates the effect of attacks on
our daily lives, with severe social and economic consequences.
Much of the previous research has contributed to examining the vulnerability of networks through the lens
of percolation in which links are removed or become non-functional uniformly at random or in order of their
degrees10–12,21–25. It includes sequential single link r emoval16,26, sequential multiple link r emoval6,7, randomly
chosen multiple link r emoval5,6, and targeted multiple link r emoval5,6. Examples of examining the vulnerability
of networks under random, targeted, and cascading d isruptions5,6,15 exist in traffic networks (e.g., Sioux Falls)6,16,
public transit networks (e.g., bus and subway network in Beijing, China)7, power grid networks (e.g., Continental
European Transmission Network)5, and complex networks (e.g., Erdős-Rényi and Barabási-Albert scale free
networks)15. Little is known about the vulnerability response of networks with different topologies and sizes
under different attack scenarios. This study is a natural continuation of previous research and contributes to
understanding the vulnerability response of networks by (i) introducing the concept of “uncertainty in vulner-
ability” and (ii) visualizing and measuring the vulnerability of networks with different topologies and sizes when
links are removed in order of their degrees. This happens by starting with the highest degrees and working down,
then using the lowest degrees and working up while recalculating the residual network flow in each iteration.
1
Department of Geography and Geoinformation Science, George Mason University, 4400 University Dr., Fairfax,
VA 22030, USA. 2Department of Industrial and Systems Engineering, Mississippi State University, 501 Hardy
Road, 260 McCain Hall, Mississippi State, MS 39762, USA. 3Department of Civil and Environmental Engineering,
Northwestern University, 2145 Sheridan Road, Evanston, IL 60208, USA. *email: aermagun@gmu.edu
Here, our overarching goal is to equip scientists and practitioners with the knowledge and tools necessary to
understand the vulnerability response of networks in relation to the network topology. We define two quanti-
ties to characterize the vulnerability response. The first quantity, V (G(N, L)), is the vulnerability of a network
under benign and malicious attacks and indicates how performance loss happens when links are removed by
percolation. The second quantity, U(G(N, L)), is the uncertainty in vulnerability and simply measures the area
between the upper and lower bounds of performance loss trajectories. It implies the threshold of uncertainty in
the network performance degradation. Both vulnerability and uncertainty in vulnerability quantities are a func-
tion of the network topology and size. This is tested on 16 distinct topologies appearing in infrastructure, social,
and biological networks with 8 to 26 nodes under two percolation scenarios exemplifying benign and malicious
attacks. Vulnerability and uncertainty in vulnerability quantities are established next, results and discussion
follow, and materials and methods are described thereafter.
Figure 1. Performance loss trajectory of the ring and complete networks with six links. The figure represents
the interdependencies among the network topology, redundancy level, and the delay in the network
performance loss trajectory. Considering complete network topology, the disruption of three links (|J| = 3) does
not change the performance of the networks from their original performance and ϕ|L|−|J| = ϕ|L|. We draw a
similar conclusion for ring network topology with the disruption of one link.
The betweenness centrality of links is recalculated following each removal in both scenarios as the network topol-
ogy and betweenness centrality of links does not necessarily remain identical. Departing from the original state,
ϕ|L|−|J| becomes the network performance after the elimination of |J| number of links, where J ⊆ L is the set of
disrupted links. Mathematically, we explain the general form of network flow models to calculate the network
performance ϕ|L|−|J| in Materials and Methods.
Following the disruption of ith link, two regular conditions emerge:
• ϕ|L|−i = ϕ |L|: The network’s performance is unaffected by the attack if the total delivered demand through
the network equals the total delivered demand at the original state.
• ϕ|L|−i < ϕ |L|: The network’s performance deteriorates by the attack, and the total delivered demand through
the network is less than the total delivered demand at the original state. A singular condition is ϕ|L|−i = 0,
when the total delivered demand equals zero, and the network is completely disrupted.
A peculiar condition is when ϕ|L|−i > ϕ |L| and it might happen when the network’s performance is improved
by the attack. A pertinent example is Braess’s p aradox27. Here, we do not exercise this condition as we assume
a uniform fixed link cost and uniform demand. This assumption, however, is not restrictive as our algorithm
generates two non-inferior trajectories that postulate the performance bounds under benign and malicious
attacks. These proposed bounds encompass the performance loss trajectory of network topologies with different
link characteristics.
Equation (1) mathematically examines the relative performance of the network, where �(i) ranges from 0 to 1.
ϕ|L|−i
�(i) =
ϕ|L| (1)
When �(i) = 1, the network consists of redundant links, and their removal does not lead to performance loss.
Equation (2) measures the redundancy of the network, where |L| is the cardinality of the set of operational links
at the original state, |J| is the cardinality of the set of disrupted links, and H is any possible set of disrupted links
in network G . Simply, |J| shows the maximum number of links that can be disrupted within network G without
deteriorating the original state performance, and J ⊆ L.
|J|
Re(G(N, L)) = 1 − , J ⊆ LandJ = max |H| (2)
|L| ϕ|L|−|H| =ϕ|L|
• The maximum value of Re(G(N, L)) equals one. This is obtained when |J| = 0 or the network has no redun-
dancy.
• The minimum value of Re(G(N, L)) equals lim|N|→+∞ 1 − |N|−2 |N| ≈ 0. This is obtained when network G
is a complete network with a considerably large set of nodes or a high redundancy level.
Following the relative performance and redundancy definition, we formally define vulnerability under benign
and malicious attacks in Eqs. (3) and (4), where b is the relative performance in the presence of the benign
attack and m is the relative performance in the presence of the malicious attack in network G with |L| number
of links. Sb is the area below network performance loss trajectory under benign attack and Sm is the area below
network performance loss trajectory under malicious attack.
Sb
Vb (G(N, L)) = 1 −
|L|
|L| (3)
(�b (i) + �b (i + 1))
Sb =
2
i=0
Sm
Vm (G(N, L)) = 1 −
|L|
|L| (4)
(�m (i) + �m (i + 1))
Sm =
2
i=0
Immediately, the uncertainty in vulnerability can be introduced by Eq. (5). This is the link-normalized area
between performance loss trajectories under benign and malicious attacks. It represents the uncertainty in vul-
nerability response when the network experiences random attacks falling between two extreme attack boundaries.
This quantity is always non-negative as Sb > Sm and Vm (G(N, L)) > Vb (G(N, L)). As �m (i) ≤ �(i) ≤ �b (i), it
can simply be proved that Vm (G(N, L)) ≤ V (G(N, L)) ≤ Vb (G(N, L)).
Sb − Sm
U(G(N, L)) = = Vm (G(N, L)) − Vb (G(N, L)) (5)
|L|
Results
Vulnerability under attacks. We visualize the performance loss trajectory of network disruptions for 16
topologies with different sizes in physical, social, meteorological, and biological systems documented in Sup-
plementary Information I. We depict the disruption trajectory from the original state to the complete disruption
when the network experiences an attack for each topology. Many attack scenarios are possible. However, all
attack scenarios fall in a range limited by two extreme scenarios of malicious and benign forming the lower and
upper boundaries as formally established in Supplementary Information II. The malicious and benign attack
scenarios are respectively linked to the maximum and minimum performance loss rate in each link removal step.
We employ both attack scenarios on a range of network sizes from 8 to 26 nodes. Although this range is noted in
existing analysis of actual networks with examples of transport networks28,29, gas networks30, power networks31,
and water n etworks32, it is selected to exemplify how vulnerability and uncertainty in vulnerability is a function
of the size of the network. We document the generalization of our findings for 16 network topologies with more
than 26 nodes in Supplementary Information II. The propositions posed in Supplementary Information II utilize
mathematical induction and proof by contradiction to estimate the bounds of network performance deteriora-
tion when network size goes to infinity. This assures the consistency of our conclusions regardless of the network
size. Figure 2 visualizes the trajectory of network disruptions with 8 nodes. A complete set of trajectories are
documented in Supplementary Information III.
Figure 3 depicts the vulnerability of sixteen network topologies with 8–26 nodes. Three observations are
noted. First, complete and matching pair topologies have almost the least vulnerability regardless of the net-
work size. Their vulnerability quantity ranges between 0.43 and 0.47 depending on the size of the network. The
opposites are tree, crossing path, and diverging tail topologies with the most vulnerability. Their vulnerability
quantity ranges between 0.77 and 0.90 depending on the size of the network. It means the difference between
the topology of networks can result in up to 2 times more vulnerable systems, accentuating the role of topology
in the vulnerability of networks. Second, the network experiences an increase in vulnerability with an increase
in the size of the network, although the rate of escalation is a function of the topology. The vulnerability of com-
plete grid, central ring, converging tail, and double u increases with the highest rate of 32.5%, 31.5%, 31.5%, and
30.0%, respectively when the number of nodes increases from 8 to 26. Hub-and-spoke and matching pair, quite
the opposite, manifest the lowest rate of change in their vulnerability with an increase in the size of the network.
The vulnerability of hub-and-spoke and matching pair topologies increases with a rate of 2.6% and 4.0% when
the number of nodes enlarges from 8 to 26. Third, by nature, the vulnerability of the random topology responds
differently to the size of the network as its rewiring follows a random probability distribution. The random topol-
ogy consistently dwells amongst low vulnerable topologies, particularly when its rewiring probability is greater
than 0.5. Propositions 1–5 in Supplementary Information II adopt these observations to prove the applicability
of our findings by mathematical induction for networks of sizes greater than 26 nodes.
A similar examination on uncertainty in vulnerability leads to conclusive findings derived from Fig. 4. First,
hub-and-spoke, double u, and ring topologies have the lowest uncertainty in vulnerability, regardless of the size
of the network. Their uncertainty in vulnerability quantity ranges between 0 and 0.22 depending on the size
of the network. On the contrary, the uncertainty in vulnerability of complete grid topologies ranges from 0.26
to 0.51, depending on the size of the network. Ignoring the hub-and-spoke topology with no uncertainty in
vulnerability, the difference between the topology of networks can result in more than 2 times more uncertain
systems. Second, like the pattern detected in vulnerability trajectories, the network experiences an increase in
the uncertainty in vulnerability with an increase in the size of the network. However, the rate of escalation is a
function of the topology. The uncertainty in the vulnerability of diamond and double u increases with the highest
rate of 178.4% and 128.8%, respectively, when the number of nodes increases from 8 to 26. Hub-and-spoke and
single depot topologies manifest the lowest rate of change in their uncertainty in vulnerability with an increased
rate of 0% and 17.4% when the number of nodes enlarges from 8 to 26. A comparison between vulnerability and
uncertainty in vulnerability reveals that (i) the increase rate in uncertainty in vulnerability is significantly more
than the increase rate in vulnerability when the network size increase and it is not topology-dependent, (ii) the
hub-and-spoke topology experiences the least increase in vulnerability and no changes in uncertainty in vulner-
ability with an increase in the size of the network, and (iii) the complete topology exhibits the most vulnerability
and uncertainty in vulnerability. Our conclusions are drawn under the link percolation assumption, while the
node percolation can be more debilitating in certain instances. For example, the hub-and-spoke topology is
extremely vulnerable to an attack on the hub node. Proposition 6 in Supplementary Information II adopts these
examinations and uses proof by induction to generalize our findings for networks of sizes greater than 26 nodes.
Figure 2. Disruption trajectory of 16 network topologies with 8 nodes. The x-axis represents the number of
removed links. The y-axis represents the normalized network performance. Three observations are noted. First,
topologies with no redundancy, such as Diverging Tail, Tree, Crossing Path, and Hub-and-Spoke, follow similar
disruption trajectories with no delay in network performance devolution. For these topologies Re(G(N, L))
equals 1. Second, topologies with one undirected cycle, such as Central Ring, Converging Tail, Ring, and
Double U, have one unit of delay in network performance degradations. After disconnecting the cycle, they
follow disruption trajectories like the topologies with no redundancy. The redundancy measure for such
networks equals |N|−1
|N| . Third, in the presence of a malicious attack, the increase in the minimum number of
undirected cycles in the network increases delays in the network performance degradations at the beginning of
the disruption process. The minimum number of cycles in a network equals the minimum existing node degree
in the network minus one. The number and length of delays in the middle of the disruptions process depends,
respectively, on the existence of nodes with a minimum degree greater than two in the residual network.
Figure 5 shows the trajectory of R(i) for different network topologies with 8–26 nodes. Two observations
are noted. First, the rate of change reaches its maximum at the beginning of the percolation process when the
number of disrupted links is approximately equal to 5 for network topologies with no undirected cycle. Similar
Figure 4. Uncertainty in the vulnerability of networks with different topologies and sizes.
but not identical, the rate of changes reaches its maximum when the number of disrupted links is approximately
6 for network topologies with one undirected cycle. It means one undirected cycle does not affect the trajectory
of R(i), but shifts it forward by one link. Second, as the number of cycles increases, the maximum rate of change
shifts, meaning that the maximum uncertainty about the decrease in the network performance would occur
later in the percolation process.
Vulnerability and uncertainty in vulnerability bivariate analysis. We prove that the vulnerability
quantity falls into the interval (0.33, 1) and the uncertainty in vulnerability quantity falls into the interval [0, 0.66),
regardless of the network’s topology. The proof is represented in Supplementary Information II. Immediately, we
define four domains clustering network topologies with (i) High vulnerability-Low uncertainty in vulnerability
(HL), (ii) High vulnerability-High uncertainty in vulnerability (HH), (iii) Low vulnerability-Low uncertainty
in vulnerability (LL), and (iv) Low vulnerability-High uncertainty in vulnerability (LH). Figure 6 depicts the
results for vulnerability under malicious attack. We draw similar results for vulnerability under benign attacks
in Supplementary Information IV.
In small-sized networks with 8 nodes, it is observed that all topologies are in either LL or HL, with the com-
plete grid topology as an exception. This means the uncertainty in the vulnerability of networks is low regardless
Figure 5. Trajectory of R(.) for 16 network topologies with 8 to 26 nodes but hub-and-spoke as its performance
loss trajectory under benign attack is the same as its performance loss trajectory under malicious attack. (a)
Regardless of topological characteristics, the rate of change in networks with no cycle follows a polynomial
trajectory with a degree of four. (b) The existence of one cycle would not change the regression function but shift
the trendline one unit forward. (c) The network topologies follow polynomial functions with the degree of five.
As the number of cycles increases, the skewness of the regression function decreases. Among networks with the
|N|
number of cycles ≪ i=3 |N| i , complete grid networks have the lowest skewness. (d) The network topologies
follow polynomial trendlines with a degree of five. The completeness of network topology means negative
skewness.
of the topology. In particular, it is observed that (i) diverging tail, crossing path, tree, double u, ring, central ring,
converging tail, grid, and random topologies locate in the HL region, (ii) diamond, scale-free, matching pair,
single depot, complete, and hub-and-spoke fall in the LL region, and (iii) complete grid resides in the LH region.
No network topology is detected in the HH region for networks with 8 nodes. With an increase in the size of the
network, a steady increase in both vulnerability and uncertainty in vulnerability is recognized to the extent that
no network topology remains in the LL region. The rate of escalation, however, depends on the network topol-
ogy. The lowest rate goes to hub-and-spoke with a slight increase in vulnerability and no change in uncertainty
in vulnerability when there is an increase in the size of the network. The highest shift is noticed for the diamond
topology, which moves from the LL region to the HH region.
Diverging tail, crossing path, tree, double u, ring, central ring, converging tail, and single depot remain in
the HL region. Still, the vulnerability and uncertainty in vulnerability increase with an increase in the size of the
network. Grid, complete grid, and diamond move to the HH region as the network size increases. This shift is
due to the ascending increase in the number of links with an increase in the size (i.e., number of nodes) of the
network as illustrated by the β measure in the following:
Figure 6. Bivariate analysis between vulnerability and uncertainty in vulnerability measures for different
topologies and network sizes. The correlation falls into the top left area with high vulnerability and low
uncertainty in vulnerability (HL region) when: (i) the number of cycles equals zero or the network redundancy
Re(G(N, L)) = 1, or (ii) the number of cycles equals one or the network redundancy Re(G(N, L)) = |N|−1 |N| . As
complete and matching pair networks manifest, the vulnerability measure decreases when the number of cycles
increases and the correlation approaches the bottom right area with low vulnerability and high uncertainty
in vulnerability (LH region). The decrease in the network size when |N| ≤ 12, decreases the uncertainty in
vulnerability measure and moves the correlation into the bottom left area with low vulnerability and low
uncertainty in vulnerability (LL region). However, when |N| ≥ 14, the fewer number of links than P2N , the
higher the vulnerability measure of the network, and the correlation falls into the top right area (HH region).
Figure 6. (continued)
8n(|N|−n)−6|N| 2−4n2
2 − |N| − n + 2 . K n o w i n g t h a t
|N|(|N|−1)
�β = βComplete − βGridComplete = 2|N| − 2|N| = |N| 5
(|N| − n) = |N| is held for complete grid topologies, ∂�β∂|N| = |N| + 8|N| + 8|N|n − 4 > 0, |N| ≥ 2 demon-
2
2 2
strates that the function is strictly ascending and ∂∂|N|
�β
2 = |N|3 > 0, n > 1 demonstrates that the function
8n −4
is strictly concave. As the network size goes to infinity, the complete grid topology deviates from the complete
topology and approaches the grid topology as lim|N|→∞ βGridComplete = 4 and lim|N|→∞ βGrid = 2.
• For the diamond topology, we notice that the network size increases the number of redundant links by (k − 1),
where |N| = 4k − 1, and β = 1 + 4k−1 k
.
A similar pattern is noticed for the scale-free network topology. The scale-free topology switches from LL to
the HH region as the network size increases. We speculate that the shift is due to the positive correlation between
the number of hubs and the size of the network in the scale-free topology. An increase in the number of hubs
increases the disruption scenario alternatives and the uncertainty in vulnerability. Matching pair, complete,
and random network topologies move to the LH region as they experience a higher increase in uncertainty in
vulnerability than in vulnerability with an increase in the size of the network.
Discussion
Without in-depth knowledge of the network response under attacks, there is a risk of underestimating the
stochasticity of disruptive impacts on the network performance. This might cause a loss of control over the
network devolution trajectory, and makes room for unexpected cascading failures like what was induced by a
massive winter storm in Texas in 2021. Understanding the complexity of network response under attack calls
for a holistic approach to visualize and quantify the vulnerability trajectory of networks when experiencing the
loss of performance. We have introduced two quantities of vulnerability (V ) and uncertainty in vulnerability
(U), and visually examined the transition of complex networks from an original performance state to a complete
disruption for sixteen distinct topologies. Our selected topologies exist in biology, economy, sociology, and civil
infrastructures. Without loss of generality, we have examined networks with 8 to 26 nodes to ponder the nexus
of vulnerability response and the size of the network.
Ranking network topologies by their vulnerability, we have determined crossing path, tree, and diverging
tail are the most vulnerable networks. At the same time, complete and matching pairs exhibit almost the lowest
vulnerability under the malicious attack. The largest gap in vulnerability exists between tree and complete topolo-
gies to the extent that the vulnerability of the tree topology is almost 2 times the complete topology. We have also
determined that the vulnerability of networks increases with an increase in the size of the network and notice
a slight change in the vulnerability ranking of networks. Ranking network topologies by their uncertainty in
vulnerability have indicated a low correlation between our two quantities. Ipso facto, uncertainty in vulnerability
is not necessarily a function of vulnerability when different topologies are considered. We have recognized that
complete grid and complete topologies show the most uncertainty in vulnerability, unlike hub-and-spoke and
double u. Similar to the vulnerability, uncertainty in the vulnerability of networks increases with an increase
in the size of the network. This finding has practical implications in network inauguration or expansion as it
provides insights on (i) how the vulnerability of a network topology changes with an increase in the size and (ii)
how the vulnerability of a network can be regulated by shepherding the network growth into the desired topology.
The findings have demonstrated that the vulnerability response of networks to an increase in size falls into
two categories depending on the network’s topology. For the first category, vulnerability increases at a faster rate
than the corresponding uncertainty in vulnerability. The hub-and-spoke and single depot topologies are the only
examples. The uncertainty in vulnerability of the hub-and-spoke topology equals zero regardless of the network
size. For the second category, uncertainty in vulnerability increases at a faster rate than the corresponding vulner-
ability. The remaining network topologies, except the random topology, fall in this category. As suggested by its
name, random is the only topology with unstable behavior. Although the uncertainty in vulnerability increases
with an increase in the size of random networks, their vulnerability fluctuates and is not a function of the size.
Depending on the network topology, the structure of the residual network may or may not change under
percolation. For instance, the tree and ring topologies maintain and lose their configuration, respectively, under
percolation in which links are removed at random or in order of their degrees. A tree network with 8 nodes and
7 links shrinks to two tree topologies following a link removal. However, a ring network with 8 nodes and 8 links
metamorphoses into a tree network with 7 links following a link removal. This leads the performance loss trajec-
tory of networks to diverge or converge under benign and malicious attacks over the percolation process, forming
a heterogeneous uncertainty in vulnerability. It means the area between the upper and lower bounds of perfor-
mance loss trajectories does not shrink or expand continually when links are removed in order of their degrees.
We have argued that the contour of the area is a function of the network topology, and the number of cycles
explains the heterogeneous uncertainty in vulnerability formed over the percolation process. In networks with
no undirected cycle, the uncertainty in vulnerability is maximum earlier in the percolation process. Diverging
tail, tree, and crossing paths are three examples. Interestingly, they also exhibit the highest vulnerability. With
an increase in the number of cycles, the uncertainty in vulnerability is accumulated at the end of the percolation
process. An extreme example is detected in complete, matching pair, and random topologies. Interestingly, they
also exhibit the lowest vulnerability. Hence, we have indicated a negative correlation between the vulnerability
and network circuity estimated by β measure. It means an increase in the number of cycles reduces the vulnerabil-
ity of networks. We have tentatively argued that a network is less vulnerable with aconsiderably high β. On the
contrary, the rate of growth in the number of links over the number of nodes ∂|N| ∂β
is positively correlated with
the uncertainty in the vulnerability of networks.
This immediately has practical implications. Not only are tree, crossing path, and diverging tail the most
vulnerable topologies, but they also exhibit the highest uncertainty in performance loss earlier in the process
when they experience a random attack. This emphasizes the time sensitivity of maintenance and recovery of tree,
crossing path, and diverging tail topological systems when they are under attack and the role of preparedness
to avoid the spread of the attack. We take post disruption casualty evacuation as a pertinent example of imple-
menting these implications in transport networks. Here, the search and rescue teams can identify the affected
areas with topologies resembling tree, crossing path, and diverging tail as more probable to contain trapped
residents. The reason is that all routes out of the affected areas can be disrupted faster than expected. Relying on
such inferences, the teams prioritize the emergency deployment across these areas. Conversely, complete and
matching pair networks are the least vulnerable topologies but exhibit a wider range of uncertainty in vulner-
ability at a later stage under a random attack. This is alarming. We analogize them to dormant volcanoes. They
might not cause any concern when they are attacked, but they experience a remarkable performance loss as the
attack continues and links become unfunctional one by one. This emphasizes the role of protection during the
attack. Protecting transport networks under a limited budget provides another pertinent example of using these
inferences in the interest of infrastructure network resilience. Planners and emergency managers can identify
the minimum number of paths__ if protected__ that can maintain the transport network performance under
random attacks. The optimal protection policy enhances the evacuation procedure and reduces the subsequent
humanitarian logistics costs.
Potential avenues remain for future research leading to intriguing additional questions that connect the
theoretical explorations in this work to real-world networks in specific domains. First, we have considered net-
works under uniform demand, while most real-world networks exhibit demand patterns with higher-density
axes over both time and space and reflect underlying demand patterns. Although our analysis provides a basis
for comparison, it might underestimate or overestimate vulnerability or exaggerate it for links intended for
higher flows than links designed to ensure basic access. An extension of this work would consider expanding the
notion of uncertainty in vulnerability to incorporate variability in demand patterns (e.g., best case attack under
most favorable demand, worst case attack under least favorable demand). Second, we have adopted the linear
programming for maximum throughput allocation, as flow allocation rules in most networks tend to follow some
sort of optimal principle. In certain networks, however, flow allocation follows significantly different principles,
such as user-optimized flow rules in congestible transport networks. Third, we have considered networks with
unlimited link capacity, whereas, in practice, capacity constraints often lead to progressive failure. The existence
of capacitated links affects the post-disruption flow redistribution and changes the performance degradation
trajectory and, consequently, the vulnerability bonds. While the new bounds fall into our proposed vulnerabil-
ity bounds, their patterns will provide information about the trajectory of uncertainty in the vulnerability of
capacitated networks, including the magnitude and number of sudden performance degradations. Fourth, we
have produced our analysis under the link percolation assumption. While much of the literature has focused on
link percolation, equally important is node percolation, which would debilitate many links simultaneously. This
is especially acute for certain topologies such as hub-and-spoke networks, where an attack on hub nodes could
make an entire network unfunctional.
s.t.
� �
� � ≤� 1∀� i, j ∈ OD, h = i
fijhk − fijkh = 0∀ i, j ∈� OD,
� h ∈ N − {i, j} (8)
= −ωij ∀ i, j ∈ OD, h = j
k:(h,k)∈L k:(k,h)∈L
(9)
0 ≤ ωij ≤ 1∀ i, j ∈ OD
|N|
≤ P2 ∀ i, j ∈ OD, ∀(h, k) ∈ L − J
0 ≤ fijhk (10)
≤ 0∀ i, j ∈ OD, ∀(h, k) ∈ J
ϕ|L|−|J| = ωij
(11)
(i,j)∈OD
Equation (7) represents the objective function and maximizes the total delivered demand through the short-
est unblocked paths after eliminating |J| links. M is a sufficiently big scalar that assigns high weights to the total
delivered flow to prevent feasible but inapplicable solutions. We explain it for a hub-and-spoke network with
three nodes and six origin–destination pairs (i.e., OD = {(1, 2), (1, 3), (2, 1), (2, 3), (3, 1), (3,
2)}). The expected
maximum delivered demand (i,j)∈OD ωij equals P32 = 6, and the total network flow equals (h,k)∈L fijhk = 8,
where the flow on each link in L = {(1, 2), (1, 3), (2, 1), (2, 3), (3, 1), (3, 2)} equals 2. However, when M = 1, the
model excludes this solution as it results in a negative objective function (−2). The model returns zero total
delivered demand and zero total network flow as the optimal solution, resulting in a better objective function
(0). We address it by setting the value of M as |L|. In our hub-and-spoke network example, the model returns the
first solution as optimum with the objective function value of 28.
Equation (8) sends one unit of demand from each origin, passes it through transshipment nodes, and delivers
it to each destination. Equation (9) delivers no more than one unit of demand from an origin to a destination,
and Eq. (10) enables each operational link (h, k) ∈ L − J to pass total network flow at once and disables each
eliminated link (h, k) ∈ J to pass any flow across the network. As the model has no binary or integer variables, its
solution time would decrease from exponential to polynomial. Equation (11) calculates the network performance
ϕ|L|−|J|, which is the residual network after the elimination of |J| links. We use the Dijkstra algorithm to find the
maximum delivered demands through the shortest unblocked paths for large networks.
Vulnerability algorithm. Two greedy algorithms are proposed to explore the sequence of link removal
procedures that respectively (i) maximizes the total unsatisfactory demand after the removal of each link, also
called a malicious attack simulation, and (ii) minimizes the total unsatisfactory demand after the removal of
each link, also called a benign attack. The input of each algorithm is the topological characteristics and the flow
on each link at the original state. After removing a link, the flow is redistributed through the residual network.
The procedure repeats until no link remains undisrupted. The Malicious-Benign Attack Simulation algorithm
is as follow:
Data availability
The datasets used or analyzed during the current study will be available from the corresponding author on rea-
sonable request. Upon the acceptance (1) the authors will post data via a controlled repository and (2) all data
will be available for re-use and redistribution, except for commercial use, with proper citations and acknowl-
edgement of the authors.
References
1. Milgram, S. The small world problem. Psychol. Today 2(1), 60–67 (1967).
2. Guare, J. Six degrees of separation: A play. Vintage (1990).
3. Erdos, P. & Rényi, A. Asymmetric graphs. Acta Math. Acad. Sci. Hungar 14(295–315), 15 (1963).
4. Albert, R. & Barabási, A. L. Topology of evolving networks: Local events and universality. Phys. Rev. Lett. 85(24), 5234 (2000).
5. Molnár, F. Jr., Derzsy, N., Szymanski, B. K. & Korniss, G. Building damage-resilient dominating sets in complex networks against
random and targeted attacks. Sci. Rep. 5, 8321. https://doi.org/10.1038/srep08321 (2015).
6. Sohouenou, P. Y. R., Neves, L. A. C., Christodoulou, A., Christidis, P. & Lo Presti, D. Using a hazard-independent approach to
understand road-network robustness to multiple disruption scenarios. Transp. Res. Part D Transp. Environ. 93, 1. https://doi.org/
10.1016/j.trd.2020.102672 (2021).
7. Su, Z. et al. Robustness of interrelated traffic networks to cascading failures. Sci. Rep. 4, 1. https://d
oi.o
rg/1 0.1 038/s rep05 413 (2014).
8. Berezin, Y., Bashan, A., Danziger, M. M., Li, D. & Havlin, S. Localized attacks on spatially embedded networks with dependencies.
Sci. Rep. 5, 8934 (2015).
9. Podobnik, B. et al. Predicting the lifetime of dynamic networks experiencing persistent random attacks. Sci. Rep. 5, 14286 (2015).
10. Hu, F., Yeung, C. H., Yang, S., Wang, W. & Zeng, A. Recovery of infrastructure networks after localized attacks. Sci. Rep. 6(1), 1–10
(2016).
11. Sun, S. et al. Impact of degree heterogeneity on attack vulnerability of interdependent networks. Sci. Rep. 6, 32983 (2016).
12. Tian, L., Bashan, A., Shi, D. N. & Liu, Y. Y. Articulation points in complex networks. Nat. Commun. 8(1), 1–9 (2017).
13. Xue, Y. & Bogdan, P. Reconstructing missing complex networks against adversarial interventions. Nat. Commun. 10(1), 1–12
(2019).
14. Moutsinas, G. & Guo, W. Node-level resilience loss in dynamic complex networks. Sci. Rep. 10(1), 1–12 (2020).
15. Bai, Y., Huang, N., Wang, L. & Wu, Z. Robustness and vulnerability of networks with dynamical dependency groups. Sci. Rep. 6,
1. https://doi.org/10.1038/srep37749 (2016).
16. Sohouenou, P. Y. R. & Neves, L. A. C. Assessing the effects of link-repair sequences on road network resilience. Int. J. Crit. Infra-
struct. Protect. 34, 1. https://doi.org/10.1016/j.ijcip.2021.100448 (2021).
17. Bell, M. G., Kurauchi, F., Perera, S. & Wong, W. Investigating transport network vulnerability by capacity weighted spectral analysis.
Transp. Res. Part B Methodol. 99, 251–266 (2017).
18. Chanan, M. Going viral: A coronavirus diary. Free Assoc. Psychoanal. Cult. Media Groups Polit. 78, 1–16 (2020).
19. Guo, X., Zhu, A., Li, Q. & Chen, R. Improving the response to inland flooding. Science 374(6569), 831–832 (2021).
20. Busby, J. W. et al. Cascading risks: Understanding the 2021 winter blackout in Texas. Energy Res. Soc. Sci. 77, 102106 (2021).
21. Cohen, R., Erez, K., Ben-Avraham, D. & Havlin, S. Breakdown of the internet under intentional attack. Phys. Rev. Lett. 86(16),
3682–3685 (2001).
22. Murray, P. M. & Mahmassani, H. S. A methodology for the determination of vulnerable links in a transportation network. Transp.
Res. Rec. J. Transp. Res. Board 1882, 88–96 (2004).
23. Shao, S., Huang, X., Stanley, H. E. & Havlin, S. Percolation of localized attack on complex networks. New J. Phys. 17(2), 023049
(2015).
24. Bellingeri, M., Bevacqua, D., Scotognella, F., Alfieri, R. & Cassi, D. A comparative analysis of link removal strategies in real complex
weighted networks. Sci. Rep. 10(1), 1–15 (2020).
25. Fair, K. R., Bauch, C. T. & Anand, M. Dynamics of the global wheat trade network and resilience to shocks. Sci. Rep. 7(1), 1–14
(2017).
26. Ermagun, A. & Tajik, N. Recovery patterns and physics of the network. PLoS ONE 16(1), e0245396 (2021).
27. Braess, D. Über ein Paradoxon aus der Verkehrsplanung. Unternehmensforschung 12(1), 258–268 (1968).
28. Ermagun, A. & Levinson, D. Spatiotemporal traffic forecasting: review and proposed directions. Transp. Rev. 38(6), 786–814 (2018).
29. Ermagun, A., Chatterjee, S. & Levinson, D. Using temporal detrending to observe the spatial correlation of traffic. PLoS ONE 12(5),
e0176853 (2017).
30. Morshedlou, N., Barker, K., González, A. D. & Ermagun, A. A heuristic approach to an interdependent restoration planning and
crew routing problem. Comput. Ind. Eng. 161, 107626 (2021).
31. Kim, D. H., Eisenberg, D. A., Chun, Y. H. & Park, J. Network topology and resilience analysis of South Korean power grid. Phys.
A 465, 13–24 (2017).
32. Schaake Jr, J. C., & Lai, D. Linear programming and dynamic programming application to water distribution network design
(1969).
Author contributions
A.E.: conceptualization, methodology, visualization, and writing—original draft; N.T.: methodology, software,
formal analysis, visualization, and writing—original draft; H.M.: conceptualization, resources, and writing—
review and editing; all authors reviewed the manuscript and approved the content of the paper.
Competing interests
The authors declare no competing interests.
Additional information
Supplementary Information The online version contains supplementary material available at https://doi.org/
10.1038/s41598-023-29899-w.
Correspondence and requests for materials should be addressed to A.E.
Reprints and permissions information is available at www.nature.com/reprints.
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and
institutional affiliations.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International
License, which permits use, sharing, adaptation, distribution and reproduction in any medium or
format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the
Creative Commons licence, and indicate if changes were made. The images or other third party material in this
article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the
material. If material is not included in the article’s Creative Commons licence and your intended use is not
permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
1. use such content for the purpose of providing other users with access on a regular or large scale basis or as a means to circumvent access
control;
2. use such content where to do so would be considered a criminal or statutory offence in any jurisdiction, or gives rise to civil liability, or is
otherwise unlawful;
3. falsely or misleadingly imply or suggest endorsement, approval , sponsorship, or association unless explicitly agreed to by Springer Nature in
writing;
4. use bots or other automated methods to access the content or redirect messages
5. override any security feature or exclusionary protocol; or
6. share the content in order to create substitute for Springer Nature products or services or a systematic database of Springer Nature journal
content.
In line with the restriction against commercial use, Springer Nature does not permit the creation of a product or service that creates revenue,
royalties, rent or income from our content or its inclusion as part of a paid for service or for other commercial gain. Springer Nature journal
content cannot be used for inter-library loans and librarians may not upload Springer Nature journal content on a large scale into their, or any
other, institutional repository.
These terms of use are reviewed regularly and may be amended at any time. Springer Nature is not obligated to publish any information or
content on this website and may remove it or features or functionality at our sole discretion, at any time with or without notice. Springer Nature
may revoke this licence to you at any time and remove access to any copies of the Springer Nature journal content which have been saved.
To the fullest extent permitted by law, Springer Nature makes no warranties, representations or guarantees to Users, either express or implied
with respect to the Springer nature journal content and all parties disclaim and waive any implied warranties or warranties imposed by law,
including merchantability or fitness for any particular purpose.
Please note that these rights do not automatically extend to content, data or other material published by Springer Nature that may be licensed
from third parties.
If you would like to use or distribute our Springer Nature journal content to a wider audience or on a regular basis or in any other manner not
expressly permitted by these Terms, please contact Springer Nature at
onlineservice@springernature.com