Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser:...

Preview:

Citation preview

Mitigation strategies on scale-free networks against cascading failures

Jianwei Wang

Adviser: Frank,Yeong-Sung LinPresent by Chris Chang

AgendaIntroduction

The mitigation strategy

The analysis of four mitigation methods

Conclusion

AgendaIntroduction

The mitigation strategy

The analysis of four mitigation methods

Conclusion

IntroductionCascading failures induced by random failure or

intentional attacks are common phenomena and can occur in many of the real-world networks

By studying the dynamic evolving mechanism of cascading failure in real-world networks, a number of important aspects of cascading failures have been discussed and many valuable results have been obtained in the literature : the models for describing cascade phenomena the cascade control and defense strategies cascading failures in real networks the attack strategies the robustness of coupled networks

IntroductionThus far, to obtain the optimal robustness of

networks against cascading failures, there are few works about the mitigation mechanism on the overload node and selecting what type of and how many nodes to adopt the mitigation strategy.

IntroductionHowever, in many infrastructure networks, when

the load on a node exceeds its capacity…

1. There exist some measures or replacement equipment to maintain its normal and efficient function to avoid the cascading propagation.

2. The choice of the mitigation strategy on some key nodes is very important. (under the limitation of the total protection cost in realistic networks)

IntroductionWe introduce a simple efficient mitigation

mechanism for an overload node and develop two new methods to select nodes to adopt the mitigation strategy.

By the normalized average avalanche size and the new unique robustness measure, we numerically investigate the efficiencies of the different mitigation strategies on enhancing the robustness of Barabasi–Albert scale-free networks against cascading failures.

AgendaIntroduction

The mitigation strategy

The analysis of four mitigation methods

Conclusion

The mitigation strategyIn the real-world networks, to avoid the

propagation of cascading-failure-induced disasters, due to some protection measures the overload nodes will be not removed from the network, and can redistribute some of the load on them to its neighboring nodes to maintain their normal and efficient functions.

Our aim is to examine the effectiveness of the mitigation strategy and to find a better method to suppress cascading failures.

The mitigation strategyIn the cascading model, the initial load Li of node

i with the degree ki is defined as Li = (ki)α.α (> 0) is a tunable parameter which controls the

strength of the initial load of node i.

The capacity Ci of node i is proportional to its initial load and is defined as Ci =(1+β)Li β is the tolerance parameter characterizing the

tolerance of the network against cascading failures.

The mitigation strategyAfter node i fails, the additional load Lji received

by node j among its neighboring nodes is proportional to its initial load, where Γi represents the set of all neighboring nodes of node i.

The mitigation strategySuppose that a node in a network at most adopt

once mitigation strategy and mark the number that node i adopt the mitigation strategy by δi

for any node i in a network, δi ≤ 1

the node once again overloads may be removed from the network.

We will choose some of the nodes to protect them by the mitigation strategy, and set ξi = 1 if node i can adopt the mitigation, otherwise set ξi = 0.

The mitigation strategyTo avoid the malfunction of the node and

consider the limitation of the mitigation strategy, we think that after adopting the mitigation strategy, the load on the node should be lower than its capacity and be higher than its initial load.

The mitigation strategyAt t + 1 time, we define the load L(i)t +1 on node i

that adopt the mitigation strategy at t time as :

L(i)t +1 = Li + p(Ci − Li )

The mitigation strategyTherefore, at t time the redistributed load ∆Li,t by

the node i adopted the mitigation strategy is defined as :

∆ Li,t = L(i)t − Li − p(Ci − Li)

The mitigation strategyUnder the above assumptions, node j among the

neighboring nodes of node i can receive the extra load ∆Lji as follows:

The mitigation strategyHere we only consider cascading failures

triggered by removing a single node and calculate the number si of broken nodes induced by removing node i.

By the normalized average avalanche size S, we quantify the network robustness against cascading failures. S is defined as :

where N represents the number of all nodes in a network.

The mitigation strategyOur aim in this paper is to discuss the optimal

mitigation strategy with the lower price and higher robustness.

We propose four methods to select nodes and apply the mitigation strategy to these nodes.

The mitigation strategy(1) The mitigation on the node with the highest

load (MHL) :Generally speaking, the nodes with the highest

load can be more likely to trigger the cascading propagation.

According the value of the parameter α and the degree of the node, the bigger the degree of a node, the higher the load of this node.

Selecting the nodes in the descending order of their load

The mitigation strategy(2) The mitigation on the node with the lowest

load (MLL): In previous studies, we discuss the effects of the

removal of the nodes with the lowest load on the network robustness against cascading failures and find that these nodes also play vital roles in the cascading propagation.

Selecting the nodes in the ascending order of their load

The mitigation strategy(3) The mitigation on the node that the

breakdowns of its neighboring nodes can be more likely to trigger its malfunction (MHHC):

(4) The mitigation on the node that its removal can be more likely to trigger the breakdowns of its neighboring nodes (MHC):

The mitigation strategy

we select the highest value of βi1,i, βi2,i, and βi3,i to define βi of node i.

we select the highest value of βi,i1 , βi,i2 , and βi,i3 to define βi,c on node i.

The mitigation strategyIn the strategy MHHC, we select the nodes in the

descending order of βi in the network to adopt the mitigation strategy.

In the MHC, we select the nodes in the descending order of βi,c in the network to adopt the mitigation strategy.

AgendaIntroduction

The mitigation strategy

The analysis of four mitigation methods

Conclusion

The analysis of four mitigation method

We investigate the efficiencies of four mitigation methods on improving the scale-free network robustness against cascading failures.

The scale-free networks are generated by the well-known Barabasi–Albert model. In computer simulations, we fix the total network size as N = 1000 and set the average degree of the network to ⟨k⟩ = 4.

The analysis of four mitigation method

In the cascading model, the bigger the value α, the higher the heterogeneity of the load distribution. Therefore, in four cases of α = 0.4, α = 0.7, α = 1.0, and α = 1.3, we analyze four mitigation methods.

m(n) : representing the proportion between the number of mitigation nodes and the total number of nodes in a network; we choose the proportion of the mitigation nodes to m(n) = 0.1, m(n) = 0.3, m(n) = 0.5, and m(n) = 0.7, respectively.

The analysis of four mitigation method

First, we compare four mitigation methods and investigate the effects of four mitigation methods on improving the robustness of BA networks against cascading failures by two measures :the normalized average avalanche size S p(s) : represents the proportion between the number

of protected nodes after adopting the mitigation methods and the number of broken nodes induced before adopting the mitigation strategy.

(p(s) can better reflect the significant improvement resilience of the BA network)

The analysis of four mitigation method

we compare the normalized average avalanche size S between before and after adopting the mitigation strategy and analyze the improved proportion p(s) of four mitigation methods.

when α = 0.4…

The analysis of four mitigation method

For the bigger normalized average avalanche size choose the MHL as the optimal protection

For the smaller normalized average avalanche size the MHHC is most efficient.

Therefore, according to the different value of the capacity parameter β, we can select the optimal strategy and the number of nodes adopted the mitigation method.

The analysis of four mitigation method

when α = 0.7…

The analysis of four mitigation method

when α = 1.0…

The analysis of four mitigation method

when α = 1.3…

The analysis of four mitigation method

we can observe that as the value α increases, for the smaller β the original order of the efficiency of four mitigation methods is gradually changing from MHL > MHHC > MHC > MLL toMHL > MHC > MHHC > MLL

This is mainly originated from that as the value α increases, the strength of the heterogeneity of the distribution of the load makes the nodes with the higher load more important.

The analysis of four mitigation method

However, for the bigger β, owing to the earlier protection on the easy-to-failure nodes among the neighboring nodes of a removal node, the MHHC is most efficient than others to suppress cascading failures.

The analysis of four mitigation method

Next, we analyze the effect of the value α on the mitigation strategy.

AgendaIntroduction

The mitigation strategy

The analysis of four mitigation methods

Conclusion

ConclusionIn this paper, according to the load on a node

and the local characteristics of the dynamical evolving process of cascading failures, we propose four mitigation methods and address the optimization of protection strategies in BA scale-free networks.

ConclusionWe conclude that to avoid the smaller avalanche

size (correspond to the bigger value β) the MHHC and the MHC generally are more efficient than the MHL and the MLL.

For the bigger avalanche size (correspond to the smaller value β), the MHL is most efficient.

ConclusionFrom the choice of the mitigation methods and

the number of nodes adopted the mitigation strategy, according to the parameters in the cascading model, we give the better strategy to protect BA scale-free networks.

Thank you for your attention

Recommended