Skip to main content
Home
  • Log in
  • My Cart

Advanced Search

  • Home
  • Articles
  • Front Matter
  • News
  • Podcasts
  • Authors
  • Submit
Research Article

Generalized network dismantling

View ORCID ProfileXiao-Long Ren, Niels Gleinig, Dirk Helbing, and Nino Antulov-Fantulin

    See allHide authors and affiliations

    PNAS April 2, 2019 116 (14) 6554-6559; first published March 15, 2019; https://doi.org/10.1073/pnas.1806108116
    1. Edited by H. Eugene Stanley, Boston University, Boston, MA, and approved February 15, 2019 (received for review April 12, 2018)

    • Article
    • Figures & SI
    • Info & Metrics
    • PDF

    Significance

    The proper functioning of many sociotechnical systems depends on their level of connectivity. By removing or deactivating a specific set of nodes, a network structure can be dismantled into isolated subcomponents, thereby disrupting the malfunctioning of a system or containing the spread of misinformation or an epidemic. We propose a generalized network-dismantling framework, which can take realistic removal costs into account such as the node price, the protection level, or removal energy. We discuss applications of cost-efficient dismantling strategies to real-world problems such as containing an epidemic or dismantling criminal or corruption networks.

    Abstract

    Finding an optimal subset of nodes in a network that is able to efficiently disrupt the functioning of a corrupt or criminal organization or contain an epidemic or the spread of misinformation is a highly relevant problem of network science. In this paper, we address the generalized network-dismantling problem, which aims at finding a set of nodes whose removal from the network results in the fragmentation of the network into subcritical network components at minimal overall cost. Compared with previous formulations, we allow the costs of node removals to take arbitrary nonnegative real values, which may depend on topological properties such as node centrality or on nontopological features such as the price or protection level of a node. Interestingly, we show that nonunit costs imply a significantly different dismantling strategy. To solve this optimization problem, we propose a method which is based on the spectral properties of a node-weighted Laplacian operator and combine it with a fine-tuning mechanism related to the weighted vertex cover problem. The proposed method is applicable to large-scale networks with millions of nodes. It outperforms current state-of-the-art methods and opens more directions for understanding the vulnerability and robustness of complex systems.

    • complex systems
    • robustness
    • network fragmentation
    • spectral partitioning
    • network immunization

    Networking the world creates many opportunities, but sometimes also produces undesired side effects. For instance, in a hyperconnected world, systemic instability can seriously undermine the functionality of a network based on cascading effects (1). The quick global spread of rumors and fake news may be seen as recent examples (2, 3), while the spread of epidemics (4, 5) or failure propagation (6, 7) is a problem that has been around much longer. Furthermore, it is known that the network structure, for example the exponent characterizing scale-free networks, is of particular importance for the controllability of cascading effects (8). For certain scaling exponents of scale-free networks, the variance or mean value of relevant quantities may not be well defined, which means that unpredictable or uncontrollable behavior may result. It may then be impossible to contain epidemic-spreading processes. Similar circumstances may make it impossible to contain the spread of computer viruses or misinformation—a problem that not only is relevant for the quick increase of cyberthreats, but also may undermine the functionality of markets or societal or political institutions.

    However, the removal or deactivation of even a small set of nodes may dismantle the network into isolated subcomponents and thereby stop the malfunctioning of a system. The effectiveness of node removal depends on the network structure and the removal strategy. For example, scale-free networks (9, 10) are known to be more robust to random removals than Erdős–Rényi networks (11, 12), but at the same time more vulnerable to targeted attacks (13⇓⇓–16).

    Finding the most efficient removal strategy which dismantles a network (17, 18) into isolated subcomponents of a specified maximum size at minimum overall cost belongs to a class of hard computational problems, called nondeterministic polynomial hard (NP-hard) problems. Essentially, this implies that there is currently no algorithm that can find the best dismantling solution for large-scale networks. It is, therefore, a challenge to find good approximations of the optimal dismantling strategy. For example, novel approximations (17⇓⇓⇓⇓⇓–23) have been proposed based on spin-glass and optimal percolation theory. However, all these methods make the implicit assumption that the cost of removing nodes is the same. Only recently have people been interested in the effect of removal costs that depends on the node degree (24, 25). However, these studies were restricted to random network structures (24) or edge-based strategies (25), but they did not tackle the generalized network-dismantling optimization problem.

    This paper addresses the question of how to select the set of nodes in a network that, when removed or (de)activated, can stop the spread of (dis)information, mitigate an epidemic, or disrupt a malicious system by fragmenting it into small components at minimum overall cost. In the generalized network-dismantling problem, the cost of removing a node can be an arbitrary nonnegative real value, which can, for example, be specified as a function of a node’s centrality properties (26) or also nontopological variables. Understanding the key relationships between dismantling solutions and their overall costs enables one to increase the level of robustness of real-world systems.

    The main contributions of this paper are as follows:(i) We argue that some problems such as containing crime, corruption, epidemics, or fake news cannot be adequately addressed with the well-known network-dismantling problem assuming identical node removal costs and that for nonunit removal costs another, more efficient solution strategy is needed. (ii) We study the generalized network-dismantling problem, which seeks to find a set of nodes that, when removed from a network, results in a network fragmentation into components of at most size C at minimal overall cost. Compared with the prevailing approach in network science (17⇓⇓⇓⇓⇓–23), we allow for removal costs that have arbitrary nonnegative real values. (iii) We formulate a node-weighted graph-cutting objective function, which determines the upper bound for the node-weighted bisection. We study its analytical solution and approximation and present analytical bounds and convergence proofs. (iv) To dismantle large-scale networks, we propose an efficient iterative node-weighted spectral bisection method, which has complexity O(n⋅log2+ϵ(n))O(n⋅log2+ϵ(n)). We combine the spectral approach with a fine-tuning mechanism by mapping the problem to the weighted vertex cover problem (28). (v) We show that our approach outperforms current state-of-the-art methods (17⇓⇓⇓⇓–22) for nonunit costs. In the unit cost scenario, our approach performs better than or comparable to the state-of-the-art methods.

    The generalized network-dismantling problem is related to the weighted partitioning problem in graph theory (29), which was addressed by means of vertex separators. The main difference is that the weighted partitioning problem specifies the number of partitions and the network-dismantling problem specifies only the target size C. For more differences between separator, partitioning, and dismantling problems, see SI Appendix, section 7. Although different versions of weighted separator problems were studied long ago by graph theory (30, 31), the main focus was not on realistic node removal costs for real-world networks. Moreover, according to a recent review of graph partitioning methods (32), these methods are not well applicable to large-scale complex networks due to their broad (or even heavy-tailed) degree distribution compared with traditional graphs. Probably for this reason, the weighted partitioning problem has not been applied as much in the network science community (17⇓⇓⇓⇓–22).

    Problems with Nonuniform Removal Costs

    While criminal and corruption networks are one of humanity’s biggest problems, it seems that effective ways to dismantle them are still needed. A typical approach to fight organized crime and corruption is to try to identify the underlying organization’s network and then to remove the leader of the organization. It turns out, however, that it often requires an extremely great effort to remove the higher echelons of such organizations, because of their special protection measures. Removal costs of criminals or corrupt persons largely depend on their position in the network. It has also been found that it is often ineffective to remove the boss of a corruption or criminal network, as someone else will quickly take the leadership position of the organization and continue running the criminal or corruption network (33); besides, the transition period is often characterized by an increase in the level of crime, until the power struggle is decided. Therefore, we generalize the dismantling problem to nonunit node removal costs. As we will show, this class of problems has different kinds of solutions. Specifically, the dismantling procedure does not go for the big nodes first. It is less costly (i.e., more effective) to dismantle the network by initially removing some medium-sized nodes. In this paper, we propose an algorithm to solve the generalized network-dismantling problem and apply it to a variety of problems ranging from crime networks to epidemic spreading to corruption networks.

    Generalized Network-Dismantling Problem

    For a network G(V,E)G(V,E) with a set of nodes, V, and a set of edges, E, a set of nodes, S, is called a C-dismantling set, if the largest connected component of the network after removing S contains at most C nodes (17, 34). In this paper, the ratio of C and |V||V| is denoted by c. Finding a minimal C-dismantling set is an NP-hard problem. Current state-of-the-art methods (17⇓⇓⇓⇓–22) make the implicit assumption that the cost of node removal is the same for all of the nodes in a network, regardless of their importance. Here, thus, we generalize the network-dismantling problem in such a way that the cost of removing a node i can be an arbitrary nonnegative value wi∈Rwi∈R. More formally, for a given network G(V,E)G(V,E) with costs (w1,…,w|V|)(w1,…,w|V|) written to diagonal matrix W, we aim to find a set of nodes S(G,W,C)⊆VS(G,W,C)⊆V, the removal of which will create a fragmentation of the network into components of at most size C at a minimum overall removal cost. For the optimal set, the overall removal cost is denoted by Cost(G,W,C)Cost(G,W,C). In SI Appendix, section 7, we show more details about the hardness of (generalized) network dismantling. It is easy to see that the case when the cost matrix W equals the identity matrix (W=IW=I), this problem corresponds to the standard network-dismantling problem and its solution is related to the solution of the generalized problem by the inequalities

    wminCost(G,I,C)≤Cost(G,W,C)≤wmaxCost(G,I,C),wminCost(G,I,C)≤Cost(G,W,C)≤wmaxCost(G,I,C),
    where wmin,wmaxwmin,wmax denote the minimal and maximal node removal costs.

    Node-Weighted Partition.

    Let us assume that we want to partition the network G=(V,E)G=(V,E) into two parts M⊆VM⊆V and its complement M¯¯¯¯¯=V\MM¯=V\M. Whether a node i belongs to the set M or not is represented by the following vector v∈Rnv∈Rn:

    vi≔{+1 −1 i∈M,otherwise.vi≔+1 i∈M,−1 otherwise.
    [1]The classical spectral bisection of a graph aims to minimize the number of edges that have to be removed between M and M¯¯¯¯¯M¯. In this paper we propose a node-weighted spectral cut objective function, where the cost of cutting the edge (i,j)(i,j) is equal to the cost of removing nodes i and j. Then the upper bound of the removal cost is
    12∑i,j−12(vivj−1)Ai,j(wi+wj−1),12∑i,j−12vivj−1Ai,jwi+wj−1,
    [2]
    where A is the adjacency matrix of the network. Therefore, if an edge (i,j)(i,j) connects nodes from different parts, the associated cost is wi+wj−1wi+wj−1, as vivj=−1vivj=−1 and Ai,j=1Ai,j=1. In contrast, if the edge (i,j)(i,j) connects nodes from the same cluster (vivj=1vivj=1), it will not be removed and the associated cost is zero. Without loss of generality (see SI Appendix, section 1 for more details), we assume that the proxy for the weight is proportional to the degree centrality wi∝diwi∝di. The term (wi+wj−1)wi+wj−1 contains the constant element −1 to lead to a more elegant notation. Now, we define the matrix B by the elements Bi,j=Ai,j(wi+wj−1)Bi,j=Ai,jwi+wj−1 and define the node-weighted Laplacian of the matrix B=AW+WA−AB=AW+WA−A by Lw=DB−BLw=DB−B. In matrix notation the optimization problem can now be written as
    min14vTLwvmin14vTLwv
    [3]
    subject to
    1Tv=0,1Tv=0,
    [4]
    vi∈{+1,−1},i∈{1,2,…,n}.vi∈+1,−1,i∈1,2,…,n.
    [5]
    Matrices W and DBDB are diagonal matrices with the elements Wii=diWii=di and (DB)ii=∑nj=1Bij(DB)ii=∑j=1nBij. See SI Appendix, section 1 for more details.

    When the cost matrix equals the identity matrix (W=IW=I), we get the unweighted Laplacian, which corresponds to the classical bisection problem (30, 35). The additional constraint 1Tv=01Tv=0 enforces that clusters are of the same size. Unfortunately, the optimization problem is NP hard. Therefore, we follow the standard relaxation (30) from the integer constraint vi∈{+1,−1}vi∈+1,−1 to vi∈Rvi∈R. The solution to this relaxed constrained minimization problem is, according to the Courant–Fisher theorem, analytically given by the second-smallest eigenvector of the node-weighted Laplacian λ2v(2)=Lwv(2)λ2v(2)=Lwv(2). A more detailed derivation of this solution is presented in SI Appendix, section 1. If we remove all of the nodes i whose corresponding value in the second-smallest eigenvector is nonnegative (v(2)i≥0vi(2)≥0) and has a neighbor j with a negative entry (v(2)j<0vj(2)<0), the network will fragment into two subnetworks M and M¯¯¯¯¯M¯. Note that we fine-tune the spectral approximation solution, which increases the performance of our algorithm and is described later.

    The node-weighted spectral cut is recursively applied to M and M¯¯¯¯M¯ until the network is sufficiently fragmented into small subnetworks of maximum size C.

    Spectral Approximation.

    To find the second-smallest eigenvectors for large-scale networks, we propose the following simple and elegant approximation algorithm, which falls into the class of power-iteration methods (36). Note that LwLw is a real, symmetric, and positive semidefinite matrix. Then, it has real nonnegative eigenvalues λ1≤λ2≤…≤λnλ1≤λ2≤…≤λn with the eigenvectors v(1),…,v(n)v(1),…,v(n), which form an orthonormal basis of RnRn. In SI Appendix, section 2, we show spectral bounds for degree-based cost λn≤6⋅d2maxλn≤6⋅dmax2, where dmaxdmax is the maximum degree of any node of the network. In the case of nontopological costs, we use the following spectral bound λn≤4dmax(wmax+1)λn≤4dmax(wmax+1), where wmaxwmax is the maximum cost. To compute v(2)v(2), we consider the matrix L˜=6⋅d2max⋅I−LwL̃=6⋅dmax2⋅I−Lw, which has the same eigenvectors v(1),…,v(n)v(1),…,v(n) as LwLw. Now the corresponding eigenvalues are shifted such that λ1˜=6⋅d2max≥…≥λn˜=6⋅d2max−λn≥0λ1̃=6⋅dmax2≥…≥λñ=6⋅dmax2−λn≥0. Let v(1)v(1) be the eigenvector with the largest eigenvalue and v(2)v(2) be the eigenvector with the second-largest eigenvalue. Then, we find the eigenvector of LwLw associated with the eigenvalue λ2λ2 via the following steps: (i) Start with a random vector v uniformly drawn from the unit sphere SnSn, (ii) force it to be perpendicular to the first eigenvector v1=(1,…,1)Tv1=(1,…,1)T of the weighted Laplacian LwLw, and (iii) apply the linear operator L˜kL̃k with unit normalization to our vector v. The pseudocode of this spectral approximation is as follows: (i) Draw v randomly from a uniform distribution on the unit sphere. (ii) Set v=v−vT1vvT1v1⋅v1v=v−v1Tvv1Tv1⋅v1. (iii) For i=1i=1 to k=η(n)k=η(n), set v=L˜v∥∥L˜v∥∥v=L̃v‖L̃v‖.

    The intuition that the random vector v converges exponentially to some eigenvector of LwLw with eigenvalue λ2λ2 is closely related to the spectral properties of operator L˜kL̃k. Note that we can represent our random vector v in the orthonormal eigenvector basis as v=∑ni=1ψiv(i)v=∑i=1nψiv(i). The second step of orthogonalization ensures ψ1=0ψ1=0 and ψ2≠0ψ2≠0 (almost surely). Finally, by applying the linear operator L˜kL̃k to vector v we get

    L˜kv=∑i=2nψiλi˜kv(i)∝ψ2v(2)+∑i=3nψi(λi˜λ2˜)kv(i).L̃kv=∑i=2nψiλĩkv(i)∝ψ2v(2)+∑i=3nψiλĩλ2̃kv(i).
    [6]When λ3>λ2λ3>λ2, we have ∣∣λi˜λ2˜∣∣<1|λĩλ2̃|<1, (λi˜λ2˜)kψivi→0λĩλ2̃kψivi→0 with exponential speed. The expected value of vector v converges to some eigenvector of LwLw with eigenvalue λ2λ2,
    E[∣∣∣λ2−vTLwvvTv∣∣∣]→0,E|λ2−vTLwvvTv|→0,
    [7]
    when the power k of operator L˜L̃ scales as O(log(n)1+ϵ)O(log(n)1+ϵ) for every real number ϵ>0ϵ>0, where n is the size of the network.

    If λ2=λ3=…=λk<λk+1λ2=λ3=…=λk<λk+1, this sequence converges to a unit length linear combination of v2,…,vkv2,…,vk and is therefore a vector which still minimizes vTLwvvTvvTLwvvTv among all vectors that are orthogonal to v1v1. Formal proofs for the convergence and bounds are given in SI Appendix, section 3.

    The computational complexity of recursively applying this procedure to smaller and smaller partitions is O(n⋅η(n)⋅log(n))O(n⋅η(n)⋅log(n)) for sparse networks. Due to the fast convergence, one can expect asymptotically good partitions when η(n)=log(n)1+ϵη(n)=log(n)1+ϵ and ϵ>0ϵ>0, which finally ends in the complexity of O(n⋅log2+ϵ(n))O(n⋅log2+ϵ(n)) for sparse networks. Further details about the asymptotic complexity are given in SI Appendix, section 4.

    Fine-Tuning of the Spectral Solution.

    Let us represent by E∗E* the set of separating edges that connect nodes from the set {vi≥0}vi≥0 to the set {vi<0}vi<0. The set of nodes that are adjacent to the separating set E∗E* is denoted by V∗V*. We can optimize the solution by finding a set of nodes which covers all of the edges in E∗E* with minimal cost. This is the weighted vertex cover problem (28) on the graph G∗=(V∗,E∗)G*=(V*,E*) with weights wiwi, from the original network G=(V,E)G=(V,E). Further details about the fine-tuning approximation are provided in SI Appendix, section 5. A general overview of our proposed method is given in Fig. 1, which we refer to as the generalized network dismantling (GND) method in the rest of this paper.

    Fig. 1.
    • Download figure
    • Open in new tab
    • Download powerpoint
    Fig. 1.

    (A) Steps of the GND algorithm. (A, 1) The inputs are the adjacency matrix A and the node removal cost matrix W. (A, 2) Construction of the cost-weighted network defined by the matrix B and its corresponding node-weighted Laplacian LwLw. (A, 3) Construction of the power Laplacian operator L˜kL̃k, which is applied to the random vector v'v′ on an n-dimensional sphere. The result gives an approximate solution to partition the network into two components {i:vi<0}{i:vi<0} and {i:vi≥0}{i:vi≥0}. (A, 4) Fine-tuning of the spectral solution with the weighted vertex cover on the subgraph of nodes that contains edges between components (represented in black and red). (B) Illustration of the procedure of the iterative GND algorithm. (C) Contributions of different parts of our method to the dismantling solution for the Petster–Hamster network. The blue line shows the performance when only steps 1–3 are adopted. The red solid line (GND algorithm) shows the performance when steps 1–4 are applied, which generates a more efficient node removal process. The red dashed line (GNDR algorithm) shows the performance when the algorithm includes steps 1–4 and the reinsertion step, which is characterized by a smaller overall node removal cost.

    Reinsertion.

    Finally, as the proposed GND method is offering a recursive solution, some of the nodes from early stages of fragmentation do not contribute to the final stage of complete fragmentation. Thus, to produce better dismantling solutions [GND with reinsertion (GNDR)], we apply the reinsertion method (19).

    Results

    To demonstrate the applicability of the proposed generalized network-dismantling framework to realistic scenarios, we apply it to some real-world networks and show that the current state-of-the-art dismantling strategy (19) delivers different results from the nonunit cost problem, as expected. In addition to the complete dismantling, we also focus on the partial dismantling of the system’s giant connected component (GCC), which reflects the fact that the budget is usually limited such that only a partial dismantling is possible.

    Fig. 2 shows some results of network dismantling, which correspond to suppressing the spread of misinformation, computer viruses, or other harmful contagion processes on the online social network [Petster–Hamster (37)]. The cost for the 80% partial dismantling with the state-of-the-art Min-Sum strategy (19) is 0.4. However, although the Min-Sum algorithm removes only 5% of nodes in this process, its cost is rather large. The reason for this becomes clear if we study the degree distribution of the removed nodes in Fig. 2C, where we note that the largest hubs tend to be removed by Min-Sum. In contrast, the random removal of nodes, also known as the site percolation process, with the same cost of 0.4 achieves fragmentation to ∼75% of the original GCC size. This implies that the state-of-the-art algorithms for unit-cost problems tend to be inefficient when applied to problems with nonunit costs. However, with the same cost of 0.4, our GND method fragments the network to 62% of the original GCC size, and for the target of 80% of the GCC size, the corresponding cost is only 0.2.

    Fig. 2.
    • Download figure
    • Open in new tab
    • Download powerpoint
    Fig. 2.

    (A) Network dismantling of three strategies: Min-Sum algorithm (17), random removal (site percolation), and GND. For the same dismantling cost 0.4, the result of Min-Sum is 5% worse than the random removal. (B) Dynamical process [susceptible-infected-removed (SIR) model (27) with β=0.04β=0.04, γ=0.01γ=0.01] on the residual network after the node removal up to 40% of the total cost. The GND produces the best immunization. (C and D) Visualization of the set of removed nodes according to Min-Sum (red) and GND (blue).

    Next, we study the dismantling on different real-world networks for three different state-of-the-art methods: equal graph partitioning (EGP) (39), Min-Sum (17), and belief propagation-guided decimation (BPD) (20). The networks in the main text include (i) a crime network with 754 nodes obtained by the projection of a bipartite network of persons and crimes (37), (ii) a corruption network (38) with 309 nodes and 3,281 edges, (iii) the online social network of Petster–Hamster (37) with 2,000 nodes and 16,631 edges, and (iv) a power-grid network (37) with 4,941 nodes and 6,594 edges. For more algorithms and networks see SI Appendix, section 8.

    In Fig. 3, the results show that, for partial dismantling, the proposed methodology (GND and GNDR) achieves the same fragmentation level with a much smaller overall dismantling cost: c = 0.2 with 0.18 (GND) vs. 0.42 (BPD) for the crime network, c = 0.2 with 0.24 (GND) vs. 0.9 (Min-Sum) for the corruption network, c = 0.2 with 0.63 (GND) vs. 0.8 (BPD) for the Petster–Hamster network, and c = 0.3 with 0.11 (GND) vs. 0.17 (BPD) for the power-grid network. In Fig. 4, we show the performance of different algorithms for the unit-cost case on two networks, where the GND and GNDR algorithms show better or comparable performance. More detailed experiments for the unit and nonunit costs are in SI Appendix, section 8. Also in SI Appendix, section 8, we summarize the ratio of the removal cost of BPD, Min-Sum, and GNDR algorithms when the target size is 0.8, 0.6, 0.4, and 0.2, respectively. The results show that the performance of GNDR is better or at least comparable for both degree-based and unit node removal costs. In SI Appendix, section 7, we have constructed the benchmark network with many loops, for which we know the optimal solution. Interestingly, we observe that loops can create problems for the BPD and Min-Sum algorithms and that the optimal solutions for network dismantling and its generalized version may coincide or deviate, depending on the chosen value of c.

    Fig. 3.
    • Download figure
    • Open in new tab
    • Download powerpoint
    Fig. 3.

    Dismantling of the criminal and corruption networks and creation of firewalls to stop the spread of misinformation or malicious software in online networks. We show the size of the GCC vs. the overall dismantling cost for four different networks: (A) crime network (37), (B) corruption network (38), (C) Petster–Hamster online social network (37), and (D) power-grid network (37). The dismantling strategy with a smaller area under the curve performs better. The EGP-W, Min-Sum-W, and BPD-W algorithms are the weighted versions of the original EGP, Min-Sum, and BPD algorithms, generalized to nonunit node removal costs (SI Appendix, section 8). For comparison with more algorithms see SI Appendix, section 8 and Fig. S4.

    Fig. 4.
    • Download figure
    • Open in new tab
    • Download powerpoint
    Fig. 4.

    (A and B) Dismantling curves showing the performance of node removal for the unit-cost case, for the (A) Petster–Hamster online social network (37) and (B) power-grid network (37). We observe that even for unit costs and complete dismantling, our proposed dismantling strategy (GNDR) provides good solutions. For the comparison of more algorithms and more networks, see SI Appendix, section 8, Figs. S5 and S6, and Table S1.

    If external information about the removal costs is available, we are able to incorporate it into the matrix W and proceed with our GND method. SI Appendix, section 2 gives spectral bounds for general nonnegative weights, for which the same spectral approximation method can be used. In Fig. 5, we show the results for the world airport network, where the cost wiwi of closing an airport i is assumed to be given by the total passengers flux of the airport. The closing of an airport can represent quarantine. Correspondingly, the reduction of the GCC size represents the containment effect for the pandemic spread. In this example, we set the target size of the GCC to 80% of the initial size. It is interesting to observe that our GND method dismantles the network with only 0.06 of the total removal costs of all nodes, which is significantly less than the cost of 0.25 by Min-Sum. We also provide a geographical visualization of the dismantling solution, where the closed airports are represented by red circles.

    Fig. 5.
    • Download figure
    • Open in new tab
    • Download powerpoint
    Fig. 5.

    Comparison of the dismantling performance for the airport network, where the removal cost is the total passenger flow of the airport. (A) Setting the target size to c=80%c=80%, the Min-Sum algorithm (17) implies a cost of closing airports with ∼25% of the total passenger flow. In contrast, our GND strategy dismantles the network to c=80%c=80% size by a cost of only 6%. In B–D, red circles visualize the airports that were closed by the Min-Sum (Upper) or the GND (Lower).

    Summary and Conclusions

    In this paper, we have studied the generalized network-dismantling problem, which seeks to find a set of nodes allowing one to dismantle a network into components up to small size C in the most cost-effective way. We do not make the assumption that the cost of removing nodes is the same for all of the nodes, which has been typically made before. Instead, we allow for node removal costs that are given by topological properties or nontopological features such as the price or protection level of a node. We acknowledge that, for the unit-cost scenario, the BPD and Min-Sum methods (17, 20) provide good solutions in many cases and have provided additional insights about the problem. However, for networked systems with nonunit node removal costs, current state-of-the-art dismantling methods will often not produce near-optimal results, while our proposed methods (GND and GNDR) do. These are based on a blend of spectral properties of a node-weighted Laplacian operator, a power-iteration method, and weighted vertex cover approximations. Understanding the theory behind network dismantling (17, 20, 24) opens up more research directions for all scientists interested in designing more robust and resilient systems in the future. Interestingly, our dismantling strategy is different from previous ones as it removes medium-size rather than big nodes first. Our results are relevant for the robustness and recommended (re)organization of current sociotechnical systems for different realistic costs. For example, we have demonstrated that generalized network dismantling can enable cost-effective immunization strategies against harmful contagion in social and transportation networks as well as the disruption of criminal and corruption networks.

    Ethics

    The method presented in this paper aims at offering a possible solution for emergencies where cutting a dysfunctional network into pieces can restore its functionality. However, we also warn of potential misuses or dual uses. When not applied in appropriate contexts and ways, the use of the dismantling approach may undermine the proper functionality of networks. Therefore, we point out that related ethical issues must be sufficiently, appropriately, and transparently addressed (40) when the method is applied. The method must be restricted to legitimate uses and actors. It may be justified to stop harmful cascading problems such as deadly epidemics and the spreading of disruptive computer malware or to dismantle criminal organizations or corruption networks. Note, however, that the use of dismantling strategies to contain misinformation can be potentially problematic, as it may result in censorship if a government, company, news agency, or other institution decides what is misinformation or not. See SI Appendix, section 9 for more details.

    Acknowledgments

    The authors thank K. K. Kleinberg and A. Lancic for useful comments. X.-L.R. thanks the China Scholarship Council for financial support. N.A.-F. and D.H. are grateful for support from the European Union Horizon 2020 projects: SoBigData under Grant 654024 and CIMPLEX under Grant 641191.

    Footnotes

    • ↵1X.-L.R. and N.G. contributed equally to this work.

    • ↵2To whom correspondence should be addressed. Email: anino@ethz.ch.
    • Author contributions: D.H. and N.A.-F. designed research; X.-L.R. and N.A.-F. performed research; X.-L.R., N.G., and N.A.-F. contributed new methods/analytic tools; X.-L.R., N.G., D.H., and N.A.-F. analyzed data; and X.-L.R., N.G., D.H., and N.A.-F. wrote the paper.

    • The authors declare no conflict of interest.

    • This article is a PNAS Direct Submission.

    • Data deposition: The code and data have been deposited at https://github.com/renxiaolong/Generalized-Network-Dismantling.

    • This article contains supporting information online at www.pnas.org/lookup/suppl/doi:10.1073/pnas.1806108116/-/DCSupplemental.

    • Copyright © 2019 the Author(s). Published by PNAS.

    This open access article is distributed under Creative Commons Attribution-NonCommercial-NoDerivatives License 4.0 (CC BY-NC-ND).

    References

    1. ↵
      1. Helbing D
      (2013) Globally networked risks and how to respond. Nature 497:51–59.
      CrossRefPubMedGoogle Scholar
    2. ↵
      1. Del Vicario M, et al.
      (2016) The spreading of misinformation online. Proc Natl Acad Sci USA 113:554–559.
      Abstract/FREE Full TextGoogle Scholar
    3. ↵
      1. Waldrop MM
      (2017) News feature: The genuine problem of fake news. Proc Natl Acad Sci USA 114:12631–12634.
      FREE Full TextGoogle Scholar
    4. ↵
      1. Vespignani A
      (2011) Modelling dynamical processes in complex socio-technical systems. Nat Phys 8:32–39.
      CrossRefGoogle Scholar
    5. ↵
      1. Brockmann D,
      2. Helbing D
      (2013) The hidden geometry of complex, network-driven contagion phenomena. Science 342:1337–1342.
      Abstract/FREE Full TextGoogle Scholar
    6. ↵
      1. Holme P,
      2. Kim BJ
      (2002) Vertex overload breakdown in evolving networks. Phys Rev E 65:066109.
      Google Scholar
    7. ↵
      1. Buldyrev SV,
      2. Parshani R,
      3. Paul G,
      4. Stanley HE,
      5. Havlin S
      (2010) Catastrophic cascade of failures in interdependent networks. Nature 464:1025–1028.
      CrossRefPubMedGoogle Scholar
    8. ↵
      1. Dorogovtsev SN,
      2. Goltsev AV,
      3. Mendes JFF
      (2008) Critical phenomena in complex networks. Rev Mod Phys 80:1275–1335.
      CrossRefGoogle Scholar
    9. ↵
      1. Barabási A-L,
      2. Albert R
      (1999) Emergence of scaling in random networks. Science 286:509–512.
      Abstract/FREE Full TextGoogle Scholar
    10. ↵
      1. Dorogovtsev SN,
      2. Mendes JFF,
      3. Samukhin AN
      (2000) Structure of growing networks with preferential linking. Phys Rev Lett 85:4633–4636.
      CrossRefPubMedGoogle Scholar
    11. ↵
      1. Erdős P,
      2. Rényi A
      (1960) On the evolution of random graphs. Inst Hung Acad Sci 5:17–61.
      Google Scholar
    12. ↵
      1. Gilbert EN
      (1959) Random graphs. Ann Math Stat 30:1141–1144.
      Google Scholar
    13. ↵
      1. Albert R,
      2. Jeong H,
      3. Barabási A-L
      (2000) Error and attack tolerance of complex networks. Nature 406:378–382.
      CrossRefPubMedGoogle Scholar
    14. ↵
      1. Cohen R,
      2. Erez K,
      3. Ben-Avraham D,
      4. Havlin S
      (2001) Breakdown of the internet under intentional attack. Phys Rev Lett 86:3682–3685.
      CrossRefPubMedGoogle Scholar
    15. ↵
      1. Schneider CM,
      2. Moreira AA,
      3. Andrade JS,
      4. Havlin S,
      5. Herrmann HJ
      (2011) Mitigation of malicious attacks on networks. Proc Natl Acad Sci USA 108:3838–3841.
      Abstract/FREE Full TextGoogle Scholar
    16. ↵
      1. Gallos LK, et al.
      (2006) Attack Strategies on Complex Networks (Springer, Berlin), pp 1048–1055.
      Google Scholar
    17. ↵
      1. Braunstein A,
      2. Dall’Asta L,
      3. Semerjian G,
      4. Zdeborová L
      (2016) Network dismantling. Proc Natl Acad Sci USA 113:12368–12373.
      Abstract/FREE Full TextGoogle Scholar
    18. ↵
      1. Morone F,
      2. Makse HA
      (2015) Influence maximization in complex networks through optimal percolation. Nature 524:65–68.
      CrossRefPubMedGoogle Scholar
    19. ↵
      1. Zdeborová L,
      2. Zhang P,
      3. Zhou H-J
      (2016) Fast and simple decycling and dismantling of networks. Sci Rep 6:37954.
      Google Scholar
    20. ↵
      1. Mugisha S,
      2. Zhou H-J
      (2016) Identifying optimal targets of network attack by belief propagation. Phys Rev E 94:012305.
      Google Scholar
    21. ↵
      1. Morone F,
      2. Min B,
      3. Bo L,
      4. Mari R,
      5. Makse HA
      (2016) Collective influence algorithm to find influencers via optimal percolation in massively large social media. Sci Rep 6:30062.
      Google Scholar
    22. ↵
      1. Tian L,
      2. Bashan A,
      3. Shi D-N,
      4. Liu Y-Y
      (2017) Articulation points in complex networks. Nat Commun 8:14223.
      Google Scholar
    23. ↵
      1. Zhou H-J
      (2013) Spin glass approach to the feedback vertex set problem. Eur Phys J B 86:455.
      Google Scholar
    24. ↵
      1. Patron A,
      2. Cohen R,
      3. Li D,
      4. Havlin S
      (2017) Optimal cost for strengthening or destroying a given network. Phys Rev E 95:052305.
      Google Scholar
    25. ↵
      1. Ren X-L,
      2. Gleinig N,
      3. Tolić D,
      4. Antulov-Fantulin N
      (2018) Underestimated cost of targeted attacks on complex networks. Complexity 2018:1–15.
      Google Scholar
    26. ↵
      1. Lü L, et al.
      (2016) Vital nodes identification in complex networks. Phys Rep 650:1–63.
      Google Scholar
    27. ↵
      1. Tolić D,
      2. Kleineberg K-K,
      3. Antulov-Fantulin N
      (2018) Simulating SIR processes on networks using weighted shortest paths. Sci Rep 8:6562.
      Google Scholar
    28. ↵
      1. Bar-Yehuda R,
      2. Even S
      (1981) A linear-time approximation algorithm for the weighted vertex cover problem. J Algorithms 2:198–203.
      CrossRefGoogle Scholar
    29. ↵
      1. Feige U,
      2. Hajiaghayi MT,
      3. Lee JR
      (2008) Improved approximation algorithms for minimum weight vertex separators. SIAM J Comput 38:629–657.
      Google Scholar
    30. ↵
      1. Fiedler M
      (1973) Algebraic connectivity of graphs. Czechoslovak Math J 23:298–305.
      Google Scholar
    31. ↵
      1. Guattery S,
      2. Miller GL
      (1998) On the quality of spectral separators. SIAM J Matrix Anal Appl 19:701–719.
      Google Scholar
    32. ↵
      1. Buluç A,
      2. Meyerhenke H,
      3. Safro I,
      4. Sanders P,
      5. Schulz C
      (2016) Recent Advances in Graph Partitioning (Springer International Publishing, Cham, Switzerland), pp 117–158.
      Google Scholar
    33. ↵
      1. Duijn PAC,
      2. Kashirin V,
      3. Sloot PMA
      (2014) The relative ineffectiveness of criminal network disruption. Sci Rep 4:4238.
      Google Scholar
    34. ↵
      1. Janson S,
      2. Thomason A
      (2008) Dismantling sparse random graphs. Combin Probab Comput 17:259–264.
      Google Scholar
    35. ↵
      1. Riolo MA,
      2. Newman MEJ
      (2014) First-principles multiway spectral partitioning of graphs. J Complex Networks 2:121–140.
      CrossRefGoogle Scholar
    36. ↵
      1. Alex P,
      2. Simon HD,
      3. Liou K-P
      (1990) Partitioning sparse matrices with eigenvectors of graphs. SIAM J Matrix Anal Appl 11:430–452.
      CrossRefGoogle Scholar
    37. ↵
      1. Schwabe D
      1. Kunegis J
      (2013) KONECT–The Koblenz network collection. Proceedings of International Conference on World Wide Web Companion, ed Schwabe D (ACM, New York), pp 1343–1350.
      Google Scholar
    38. ↵
      1. Ribeiro HV,
      2. Alves LGA,
      3. Martins AF,
      4. Lenzi EK,
      5. Perc M
      (2018) The dynamical structure of political corruption networks. J Complex Networks 6:989–1003.
      Google Scholar
    39. ↵
      1. Chen Y,
      2. Paul G,
      3. Havlin S,
      4. Liljeros S,
      5. Stanley HE
      (2008) Finding a better immunization strategy. Phys Rev Lett 101:58701.
      Google Scholar
    40. ↵
      1. Helbing D
      1. Helbing D, et al.
      (2019) Will democracy survive big data and artificial intelligence? Towards Digital Enlightenment, ed Helbing D (Springer, Cham, Switzerland), pp 73–98.
      Google Scholar
    PreviousNext
    Back to top
    Article Alerts
    Email Article
    Citation Tools
    Request Permissions
    Share
    • Tweet Widget
    • Mendeley logo Mendeley

    Article Classifications

    • Physical Sciences
    • Applied Mathematics
    Proceedings of the National Academy of Sciences: 116 (14)
    Table of Contents

    Submit

    Sign up for Article Alerts

    Jump to section

    • Article
      • Abstract
      • Problems with Nonuniform Removal Costs
      • Generalized Network-Dismantling Problem
      • Results
      • Summary and Conclusions
      • Ethics
      • Acknowledgments
      • Footnotes
      • References
    • Figures & SI
    • Info & Metrics
    • PDF

    You May Also be Interested in

    Microplastic particles in atmospheric dust.
    Microplastics in the atmosphere
    Even after atmospheric microplastics settle on land or in water, they may reenter the atmosphere, a study suggests.
    Image credit: Janice Brahney.
    Racial violence and Black mental health.
    Publicized racial violence and Black mental health
    Researchers examine how highly public racial violence affects the mental health of Black individuals in the United States.
    Image credit: iStock/fizkes.
    Human-modified landscape.
    Anthropogenic transformation of terrestrial nature
    A study examines how humans have reshaped terrestrial nature and suggests that restoring Indigenous peoples and local communities to positions of environmental stewardship may help conserve biodiversity.
    Image credit: Erle C. Ellis.
    Different artist portrayals of the virus particle that causes COVID-19.
    Science and Culture: The evolving portrait of a virus
    Since start of the pandemic, depictions of the virus that causes COVID-19 have become iconic, visual touchstones for a nervous public.
    Image credit: David Goodsell.
    Woman wearing mask has a conversation.
    Journal Club: Mask-wearing may reduce the odds of self-infection with SARS-CoV-2
    Working with members of the Deaf community to study people who don’t vocalize, researchers find that droplets from one’s own speech could contribute to infection.
    Image credit: Shutterstock/insta_photos.

    Similar Articles

    • Social network fragmentation and community health
    • Unveiling causal interactions in complex systems
    • Using machine learning to predict extreme events in complex systems
    • Emergent robustness of bacterial quorum sensing in fluid flow
    • Expression attenuation as a mechanism of robustness against gene duplication
    See more
    Site Logo
    Powered by HighWire
    • Submit Manuscript
    • Twitter
    • Youtube
    • Facebook
    • RSS Feeds
    • Email Alerts

    Articles

    • Current Issue
    • Special Feature Articles – Most Recent
    • List of Issues

    PNAS Portals

    • Anthropology
    • Chemistry
    • Classics
    • Front Matter
    • Physics
    • Sustainability Science
    • Teaching Resources

    Information

    • Authors
    • Editorial Board
    • Reviewers
    • Subscribers
    • Librarians
    • Press
    • Cozzarelli Prize
    • Site Map
    • PNAS Updates
    • FAQs
    • Accessibility Statement
    • Rights & Permissions
    • About
    • Contact

    Feedback    Privacy/Legal

    Copyright © 2021 National Academy of Sciences. Online ISSN 1091-6490. PNAS is a partner of CHORUS, COPE, CrossRef, ORCID, and Research4Life.