Towards Evaluating the Robustness of the Open-Source Product Community under Multiple Attack Strategies
Abstract
:1. Introduction
2. Model Construction and Characteristics Analysis of the Community Network
2.1. Data Collection and Pre-Processing
2.2. Network Construction and Network Characteristics
2.3. Evaluation Indexes for Open-Source Product Community Networks
3. Methodology
3.1. Node Importance Evaluation Method
3.2. Robustness Evaluation of Knowledge Collaboration Networks
3.2.1. Network Robustness Attack Strategies
3.2.2. Network Robustness Evaluation Indexes
4. Robustness Simulation and Results
4.1. Robustness Simulation Process
4.2. Results Analysis
4.2.1. Structural Robustness of the Network under Node Attack Strategies
4.2.2. Knowledge Robustness of the Network under Node Attack Strategies
4.2.3. Structural Robustness of the Network under Edge Attack Strategies
4.2.4. Knowledge Robustness of the Network under Edge Attack Strategies
4.3. Discussion
5. Conclusions
Supplementary Materials
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
OSPC | open-source product community |
OSC | open-source community |
KCN | knowledge collaboration network |
BC | betweenness centrality |
CC | closeness centrality |
NS | node strength |
EC | eigenvector centrality |
C | structural hole |
RA | random node is attacked |
RD | random edge is attacked |
KI | knowledge influence node is attacked |
KC | knowledge collaboration ability node is attacked |
KD | knowledge dissemination ability node is attacked |
KE | knowledge influence edge is attacked |
KW | knowledge weight edge is attacked |
References
- Panchal, J.H. Co-evolution of products & communities in mass collaborative product development—A computational exploration. In Proceedings of the International Conference on Engineering Design, Palo Alto, CA, USA, 24–27 August 2009. [Google Scholar]
- Malinen, S. Understanding user participation in online communities: A systematic literature review of empirical studies. Comput. Hum. Behav. 2015, 46, 228–238. [Google Scholar] [CrossRef]
- Beenen, G.; Ling, K.; Wang, X.; Chang, K.; Frankowski, D.; Resnick, P.; Kraut, R.E. Using social psychology to motivate contributions to online communities. J. Comput. Mediat. Comm. 2005, 10, 212–221. [Google Scholar]
- Fuge, M.; Agogino, A. How Online Design Communities Evolve Over Time: The Birth and Growth of OpenIDEO. In Proceedings of the ASME International Design Engineering Technical Conferences & Computers & Information in Engineering Conference, Buffalo, NY, USA, 17–20 August 2014. [Google Scholar]
- Fuge, M.; Tee, K.; Agogino, A.; Maton, N. Analysis of collaborative design networks: A case study of OpenIDEO. J. Comput. Inf. Sci. Eng. 2014, 14, 021009. [Google Scholar] [CrossRef]
- Albert, R.; Jeong, H.; Barabasi, A.L. Error and attack tolerance of complex networks. Nature 2000, 406, 378–382. [Google Scholar] [CrossRef] [PubMed]
- Holme, P.; Kim, B.J.; Yoon, C.N.; Han, S.K. Attack vulnerability of complex networks. Phys. Rev. E 2002, 65, 56109. [Google Scholar] [CrossRef]
- Yang, Q.; Scoglio, C.M.; Gruenbacher, D.M. Robustness of supply chain networks against underload cascading failures. Phys. A Stat. Mech. Appl. 2021, 563, 125466. [Google Scholar] [CrossRef]
- Zhang, X.; Lei, S.; Sun, J.; Kou, W. Robustness of Multi-Project Knowledge Collaboration Network in Open Source Community. Entropy 2023, 25, 108. [Google Scholar] [CrossRef]
- Jia, T.; Liu, W.; Liu, X. A cross-city exploratory analysis of the robustness of bus transit networks using open-source data. Phys. A Stat. Mech. Appl. 2021, 580, 126133. [Google Scholar] [CrossRef]
- Ren, G. Robustness Analysis of Air Route Network Based on Topology Potential and Relative Entropy Methods. J. Adv. Transp. 2021, 2021, 5527423. [Google Scholar] [CrossRef]
- He, J.; Zheng, T. Research on the Model of Industrial Interconnection Intelligent Manufacturing Supply and Demand Network and Its Robustness. Discret. Dyn. Nat. Soc. 2022, 2022, 8076551. [Google Scholar] [CrossRef]
- Yang, G.; Qi, X.; Liu, L. Research on network robustness based on different deliberate attack methods. Phys. A Stat. Mech. Appl. 2020, 545, 123588. [Google Scholar] [CrossRef]
- Cui, P.; Zhu, P.; Wang, K.; Xun, P.; Xia, Z. Enhancing robustness of interdependent network by adding connectivity and dependence links. Phys. A Stat. Mech. Appl. 2018, 497, 185–197. [Google Scholar] [CrossRef]
- Zhao, J.; Bai, A.; Xi, X.; Huang, Y.; Wang, S. Impacts of malicious attacks on robustness of knowledge networks: A multi-agent-based simulation. J. Knowl. Manag. 2020, 24, 1079–1106. [Google Scholar] [CrossRef]
- Tian, Y.; Chang, B.Q.; Tian, Z.R.; Zhang, Y. Knowledge sharing: Share or not—Based on the user perspective of open–source digital innovation community. Stud. Sci. Sci. 2021, 39, 1474–1484. [Google Scholar]
- Xu, B.; Jones, D.R. Volunteers’ participation in open source software development. ACM SIGMIS Database 2010, 41, 69–84. [Google Scholar] [CrossRef]
- Zhou, H.; You, S.; Yang, M. Robustness Evaluation of the Open Source Product Community Network Considering Different Influential Nodes. Entropy 2022, 24, 1355. [Google Scholar] [CrossRef]
- Moreno, Y.; Nekovee, M.; Pacheco, A.F. Dynamics of rumor spreading in complex networks. Phys. Rev. E 2004, 69, 66130. [Google Scholar] [CrossRef]
- Lordan, O.; Albareda-Sambola, M. Exact calculation of network robustness. Reliab. Eng. Syst. Saf. 2018, 183, 276–280. [Google Scholar] [CrossRef]
- Wei, X.; Zhao, J.C.; Liu, S.; Wang, Y.S. Identifying influential spreaders in complex networks for disease spread and control. Sci. Rep. 2022, 12, 5550. [Google Scholar] [CrossRef]
- Kitsak, M.; Gallos, L.K.; Havlin, S.; Liljeros, F.; Muchnik, L.; Stanley, H.E.; Makse, H.A. Identification of influential spreaders in complex networks. Nat. Phys. 2010, 6, 888–893. [Google Scholar] [CrossRef]
- Xie, L.X.; Sun, H.H.; Yang, H.Y.; Zhang, L. Key node recognition in complex networks based on the K–shell method. J. Tsinghua Univ. Sci. Technol. 2022, 62, 849–861. [Google Scholar]
- Yang, Y.; Hu, M.; Huang, T. Influential nodes identification in complex networks based on global and local information. Chin. Phys. B 2020, 29, 088903. [Google Scholar] [CrossRef]
- Yan, X.; Cui, Y.; Ni, S. Identifying influential spreaders in complex networks based on entropy weight method and gravity law. Chin. Phys. B 2020, 29, 48902. [Google Scholar] [CrossRef]
- Yang, Y.; Yu, L.; Wang, X. A novel method to evaluate node importance in complex networks. Phys. A Stat. Mech. Appl. 2019, 526, 121118. [Google Scholar] [CrossRef]
- Wang, N.; Gao, Y.; He, J.T.; Yang, J. Robustness evaluation of the air cargo network considering node importance and attack cost–Reliability Engineering & System Safety. Reliab. Eng. Syst. Saf. 2022, 217, 108026. [Google Scholar]
- Hao, Y.; Han, J.; Lin, Y.; Liu, L. Vulnerability of complex networks under three-level-tree attacks. Phys. A 2016, 462, 674–683. [Google Scholar] [CrossRef]
- Park, J.; Gabbard, J.L. Factors that affect scientists’ knowledge sharing behavior in health and life sciences research communities: Differences between explicit and implicit knowledge. Comput. Hum. Behav. 2017, 78, 326–335. [Google Scholar] [CrossRef]
- Duanmu, J.L.; Fai, F.M. A processual analysis of knowledge transfer: From foreign MNEs to Chinese suppliers. Int. Bus. Rev. 2007, 16, 449–473. [Google Scholar] [CrossRef]
- Lei, S.; Zhang, X.; Xie, S.; Zheng, X. Dynamic robustness of semantic-based collaborative knowledge network of open source project. Entropy 2021, 23, 391. [Google Scholar] [CrossRef]
- He, Z.; Navneet, K.; van Dam, W.; Van Mieghem, P. Robustness assessment of multimodal freight transport networks. Reliab. Eng. Syst. Saf. 2021, 207, 107315. [Google Scholar] [CrossRef]
- Wang, S.; Lv, W.; Zhang, J.; Luan, S.; Chen, C.; Gu, X. Method of power network critical nodes identification and robustness enhancement based on a cooperative framework. Reliab. Eng. Syst. Saf. 2021, 207, 107313. [Google Scholar] [CrossRef]
- Zhang, H.H.; Wu, W.Q.; Zhao, L.M. A study of knowledge supernetworks and network robustness in different business incubators. Phys. A Stat. Mech. Appl. 2016, 447, 545–560. [Google Scholar] [CrossRef]
- Davis, G.F.; Yoo, M.; Baker, W.E. The small world of the American corporate elite, 1982–2001. Strateg. Organ. 2003, 1, 301–326. [Google Scholar] [CrossRef]
- Zhao, S.; Liu, Q.; Liu, F.; Zhang, Y. Analysis on characteristics of structural hole based for weighted co-author networks. Comput. Eng. Appl. 2016, 52, 40–44. [Google Scholar]
- Burt, R.S. Structural holes and good ideas. Am. J. Sociol. 2004, 110, 349–399. [Google Scholar] [CrossRef]
- Tzeng, G.H.; Huang, J.J. Multiple attributes decision making—Methods and applications. Eur. J. Oper. Res. 2011, 4, 287–288. [Google Scholar]
- Yu, H.; Liu, Z.; Li, Y. Key nodes in complex networks identified by multi–attribute decision–making method. Acta Phys. Sin. 2013, 62, 020204. [Google Scholar] [CrossRef]
- Pu, C.L.; Li, S.Y.; Yang, X.X.; Yang, J.; Wang, K. Information transport in multiplex networks. Phys. A 2016, 447, 261–269. [Google Scholar] [CrossRef]
- Cowan, R.; Jonard, N. Network structure and the diffusion of knowledge. J. Econ. Dyn. Control 2004, 28, 1557–1575. [Google Scholar] [CrossRef]
- Xi, Y.; Dang, Y. The method to analyze the robustness of knowledge network based on the weighted supernetwork model and its application. Syst. Eng. Theory Pract. 2007, 27, 134–140. [Google Scholar] [CrossRef]
- Lu, D.; Wu, J.; Liu, P.; Sheng, Y. Analysis of key developer type and robustness of collaboration network in open source Software. Comput. Sci. 2020, 47, 101–105. [Google Scholar]
- O’Mahony, S. Guarding the commons: How community managed software projects protect their work. Res. Policy 2003, 32, 1179–1198. [Google Scholar] [CrossRef]
- Chen, C.J.; Hung, S.W. To give or to receive? Factors influencing members’ knowledge sharing and community promotion in professional virtual communities. Inform. Manag. 2010, 47, 226–236. [Google Scholar] [CrossRef]
Topology Parameter | Node | Edge | Average Degree | Average Path Length | Clustering Coefficient | Density | Overall Network Efficiency |
1428 | 8461 | 5.93 | 3.11 | 0.43 | 0.0075 | 0.1322 | |
Network characteristic | Small-world characteristic | Scale-free property | Assortativity | ||||
Yes | Yes | heterogeneous network |
Node and Edge Type | Evaluating Indexes |
---|---|
knowledge influence node | node betweenness, node strength (node weight), eigenvector centrality, structural hole |
knowledge collaboration ability node | out-degree, in-degree, number of project topics involved |
knowledge dissemination ability node | closeness centrality, clustering coefficient, edge weight of node |
knowledge influence edge | edge betweenness |
knowledge weight edge | edge weight |
Knowledge Influence Nodes | Knowledge Collaboration Ability Nodes | Knowledge Dissemination Ability Nodes | Knowledge Influence Edges | Knowledge Weight Edges | |||||
---|---|---|---|---|---|---|---|---|---|
Node Number | Node Number | Node Number | Edge | Influence | Edge | Weight | |||
711 | 0.861 | 711 | 0.970 | 130 | 0.865 | 1089–711 | 19,253.1 | 1231–711 | 65 |
19 | 0.627 | 149 | 0.964 | 142 | 0.856 | 19–711 | 16,779.9 | 149–872 | 43 |
149 | 0.601 | 26 | 0.852 | 149 | 0.854 | 1–7 | 14,667.8 | 649–837 | 43 |
130 | 0.594 | 130 | 0.812 | 19 | 0.854 | 8–26 | 9389.5 | 711–1231 | 43 |
26 | 0.537 | 142 | 0.798 | 26 | 0.843 | 19–149 | 8640.0 | 149–19 | 41 |
142 | 0.480 | 19 | 0.629 | 649 | 0.829 | 19–142 | 8076.2 | 644–149 | 38 |
7 | 0.329 | 77 | 0.543 | 77 | 0.797 | 130–711 | 7696.2 | 130–649 | 37 |
77 | 0.318 | 7 | 0.419 | 711 | 0.796 | 7–1373 | 7538.3 | 421–711 | 30 |
899 | 0.280 | 90 | 0.343 | 7 | 0.783 | 711–26 | 6966.1 | 461–711 | 29 |
649 | 0.250 | 43 | 0.339 | 42 | 0.781 | 711–142 | 6874.4 | 483–445 | 28 |
Attack Type | Attack Strategy | Strategy Description |
---|---|---|
Random attack strategies | Random node is attacked (RA) | Randomly select n nodes for removal to simulate the irregular loss of users. |
Random edge is attacked (RD) | Randomly select n edges for removal to simulate the irregular loss of user knowledge contribution. | |
Deliberate attack strategies | Knowledge influence node is attacked (KI) | Sort the knowledge influence nodes in the initial network in descending order based on their importance, remove the node with the highest importance value and its connected edges, and calculate the current network robustness. Reorder the knowledge influence nodes in the current network in descending order based on their importance, and repeat the above steps n times to simulate the continuous loss of knowledge influence users in the community. |
Knowledge collaboration ability node is attacked (KC) | Sort the knowledge collaboration nodes in the initial network in descending order based on their importance, remove the node with the highest importance value and its connected edges, and calculate the current network robustness. Reorder the knowledge collaboration nodes in the current network in descending order based on their importance, and repeat the above steps n times to simulate the continuous loss of knowledge collaboration users in the community. | |
Knowledge dissemination ability nodes is attacked (KD) | Sort the knowledge propagation nodes in the initial network in descending order based on their importance, remove the node with the highest importance value and its connected edges, and calculate the current network robustness. Reorder the knowledge dissemination nodes in the current network in descending order based on their importance, and repeat the above steps n times to simulate the continuous loss of knowledge dissemination users in the community. | |
Knowledge influence edge is attacked (KE) | Sort the edges in the network in descending order based on their betweenness, remove the edge with the highest betweenness, and calculate the current network robustness. Repeat the above steps n times to simulate the continuous loss of existing important knowledge contributions. | |
Knowledge weight edge is attacked (KW) | Sort the important knowledge edges in descending order based on their weights in the network, remove the edge with the highest weight value, and calculate the current network robustness. Repeat the above steps n times to simulate the continuous reduction of user knowledge contribution. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhou, H.; Yang, M. Towards Evaluating the Robustness of the Open-Source Product Community under Multiple Attack Strategies. Sustainability 2023, 15, 13035. https://doi.org/10.3390/su151713035
Zhou H, Yang M. Towards Evaluating the Robustness of the Open-Source Product Community under Multiple Attack Strategies. Sustainability. 2023; 15(17):13035. https://doi.org/10.3390/su151713035
Chicago/Turabian StyleZhou, Hongli, and Mingxuan Yang. 2023. "Towards Evaluating the Robustness of the Open-Source Product Community under Multiple Attack Strategies" Sustainability 15, no. 17: 13035. https://doi.org/10.3390/su151713035
APA StyleZhou, H., & Yang, M. (2023). Towards Evaluating the Robustness of the Open-Source Product Community under Multiple Attack Strategies. Sustainability, 15(17), 13035. https://doi.org/10.3390/su151713035