Skip to main content

2021 | OriginalPaper | Buchkapitel

Comprehensive Degree Based Key Node Recognition Method in Complex Networks

verfasst von : Lixia Xie, Honghong Sun, Hongyu Yang, Liang Zhang

Erschienen in: Information and Communications Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Aiming at the problem of the insufficient resolution and accuracy of the key node recognition methods in complex networks, a Comprehensive Degree Based Key Node Recognition Method (CDKNR) in complex networks is proposed. Firstly, the K-shell method is adopted to layer the network and obtain the K-shell (Ks) value of each node, and the influence of the global structure of the network is measured by the Ks value. Secondly, the concept of Comprehensive Degree (CD) is proposed, and a dynamically adjustable influence coefficient μi is set, and the Comprehensive Degree of each node is obtained by measuring the influence of the local structure of the network through the number of neighboring nodes and sub-neighboring nodes and influence coefficient μi. Finally, the importance of nodes is distinguished according to the Comprehensive Degree. Compared with several classical methods and risk assessment method, the experimental results show that the proposed method can effectively identify the key nodes, and has high accuracy and resolution in different complex networks. In addition, the CDKNR can provide a basis for risk assessment of network nodes, important node protection and risk disposal priority ranking of nodes in the network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yu, E.: A Re-ranking algorithm for identifying influential nodes in complex networks. IEEE Access 8, 211281–211290 (2020) Yu, E.: A Re-ranking algorithm for identifying influential nodes in complex networks. IEEE Access 8, 211281–211290 (2020)
2.
Zurück zum Zitat Yu, E.Y.: Identifying critical nodes in complex networks via graph convolutional networks. Knowl.-Based Syst. 198, 1–8 (2020) Yu, E.Y.: Identifying critical nodes in complex networks via graph convolutional networks. Knowl.-Based Syst. 198, 1–8 (2020)
3.
Zurück zum Zitat Yan, X.L.: Identifying influential spreaders in complex networks based on entropy weight method and gravity law. Chin. Phys. B 29(4), 582–590 (2020) Yan, X.L.: Identifying influential spreaders in complex networks based on entropy weight method and gravity law. Chin. Phys. B 29(4), 582–590 (2020)
4.
Zurück zum Zitat Ullah, A.: Identification of Influential nodes via effective distance-based centrality mechanism in complex networks. Complexity 2021(11), 1–6 (2021) Ullah, A.: Identification of Influential nodes via effective distance-based centrality mechanism in complex networks. Complexity 2021(11), 1–6 (2021)
5.
Zurück zum Zitat Qiu, L.Q.: Ranking influential nodes in complex networks based on local and global structures. Appl. Intell. 1–14 (2021) Qiu, L.Q.: Ranking influential nodes in complex networks based on local and global structures. Appl. Intell. 1–14 (2021)
6.
Zurück zum Zitat Liu, J.G.: Ranking the spreading influence in complex networks. Physica A Stat. Mech. Appl. 392(18), 4154–4159 (2013) Liu, J.G.: Ranking the spreading influence in complex networks. Physica A Stat. Mech. Appl. 392(18), 4154–4159 (2013)
7.
Zurück zum Zitat Zeng, A.: Ranking spreaders by decomposing complex networks. Phys. Lett. A 377(14), 1031–1035 (2013) Zeng, A.: Ranking spreaders by decomposing complex networks. Phys. Lett. A 377(14), 1031–1035 (2013)
8.
Zurück zum Zitat Namtirtha, A.: Weighted kshell degree neighborhood: a new method for identifying the influential spreaders from a variety of complex network connectivity structures. Expert Syst. Appl. 139, 1–15 (2020) Namtirtha, A.: Weighted kshell degree neighborhood: a new method for identifying the influential spreaders from a variety of complex network connectivity structures. Expert Syst. Appl. 139, 1–15 (2020)
9.
Zurück zum Zitat Wen, T.: Identification of influencers in complex networks by local information dimensionality. Inf. Sci. 512, 549–562 (2020) Wen, T.: Identification of influencers in complex networks by local information dimensionality. Inf. Sci. 512, 549–562 (2020)
10.
Zurück zum Zitat Berahmand, K.: A new local and multidimensional ranking measure to detect spreaders in social networks. Comput. 101(11), 1711–1733 (2019) Berahmand, K.: A new local and multidimensional ranking measure to detect spreaders in social networks. Comput. 101(11), 1711–1733 (2019)
11.
Zurück zum Zitat Bae, J.: Identifying and ranking influential spreaders in complex networks by neighborhood coreness. Phys. A: Statal Mech. Appl. 395, 549–559 (2014) Bae, J.: Identifying and ranking influential spreaders in complex networks by neighborhood coreness. Phys. A: Statal Mech. Appl. 395, 549–559 (2014)
12.
Zurück zum Zitat Kitsak, M.: Identification of influential spreaders in complex networks. Nat. Phys. 6(11), 888–893 (2010) Kitsak, M.: Identification of influential spreaders in complex networks. Nat. Phys. 6(11), 888–893 (2010)
13.
Zurück zum Zitat Ibnoulouafi, A.: M-Centrality: identifying key nodes based on global position and local degree variation. J. Stat. Mech. Theory Exp. (7), 1–30 (2018) Ibnoulouafi, A.: M-Centrality: identifying key nodes based on global position and local degree variation. J. Stat. Mech. Theory Exp. (7), 1–30 (2018)
14.
Zurück zum Zitat Maji, G.: Influential spreaders identification in complex networks with potential edge weight based k-shell degree neighborhood method. J. Comput. Sci. 39, 1–9 (2020) Maji, G.: Influential spreaders identification in complex networks with potential edge weight based k-shell degree neighborhood method. J. Comput. Sci. 39, 1–9 (2020)
15.
Zurück zum Zitat Maji, G.: A systematic survey on influential spreaders identification in complex networks with a focus on K-shell based techniques. Expert Syst. Appl. 161, 1–18 (2020) Maji, G.: A systematic survey on influential spreaders identification in complex networks with a focus on K-shell based techniques. Expert Syst. Appl. 161, 1–18 (2020)
16.
Zurück zum Zitat Zhang, D.Y.: Identifying and quantifying potential super-spreaders in social networks. Sci. Rep. 9(1), 1–11 (2019) Zhang, D.Y.: Identifying and quantifying potential super-spreaders in social networks. Sci. Rep. 9(1), 1–11 (2019)
17.
Zurück zum Zitat China National Standardization Administration Committee: Information Security Risk Assessment Specification: GB/T 20984–2007[S]. China Standard Press, Beijing (2007) China National Standardization Administration Committee: Information Security Risk Assessment Specification: GB/T 20984–2007[S]. China Standard Press, Beijing (2007)
18.
Zurück zum Zitat Peng, J.H.: Utility based security risk measurement model. J. Beijing Univ. Posts Telecommun. 29(2), 59–61 (2006) Peng, J.H.: Utility based security risk measurement model. J. Beijing Univ. Posts Telecommun. 29(2), 59–61 (2006)
Metadaten
Titel
Comprehensive Degree Based Key Node Recognition Method in Complex Networks
verfasst von
Lixia Xie
Honghong Sun
Hongyu Yang
Liang Zhang
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-86890-1_20

Premium Partner