{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:11:10Z","timestamp":1760235070605,"version":"build-2065373602"},"reference-count":34,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2021,7,25]],"date-time":"2021-07-25T00:00:00Z","timestamp":1627171200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>The paper discusses issues concerning the occurrence of anomalies affecting the process of phase transitions. The considered issue was examined from the perspective of phase transitions in network structures, particularly in IT networks, Internet of Things and Internet of Everything. The basis for the research was the Potts model in the context of IT networks. The author proposed the classification of anomalies in relation to the states of particular nodes in the network structure. Considered anomalies included homogeneous, heterogeneous, individual and cyclic disorders. The results of tests and simulations clearly showed the impact of anomalies on the phase transitions in the network structures. The obtained results can be applied in modelling the processes occurring in network structures, particularly in IT networks.<\/jats:p>","DOI":"10.3390\/e23080949","type":"journal-article","created":{"date-parts":[[2021,7,25]],"date-time":"2021-07-25T22:06:21Z","timestamp":1627250781000},"page":"949","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Modeling and Analysis of Anomalies in the Network Infrastructure Based on the Potts Model"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7573-3856","authenticated-orcid":false,"given":"Andrzej","family":"Paszkiewicz","sequence":"first","affiliation":[{"name":"Department of Complex Systems, The Faculty of Electrical and Computer Engineering, Rzeszow University of Technology, al. Powsta\u0144c\u00f3w Warszawy 12, 35-959 Rzesz\u00f3w, Poland"}]}],"member":"1968","published-online":{"date-parts":[[2021,7,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Auyang, S.Y. (1999). Foundation of Complex-System Theories, University Press.","DOI":"10.1017\/CBO9780511626135"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.physrep.2005.10.009","article-title":"Complex networks: Structure and dynamics","volume":"424","author":"Boccaletti","year":"1999","journal-title":"Phys. Rep."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.futures.2014.02.002","article-title":"A pragmatist approach to transdisciplinarity in sustainability research: From complex systems theory to reflexive science","volume":"65","author":"Popa","year":"2015","journal-title":"Futures"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.camwa.2012.12.005","article-title":"Modeling complex systems with adaptive networks","volume":"65","author":"Sayama","year":"2013","journal-title":"Comput. Math. Appl."},{"key":"ref_5","unstructured":"Stanley, H.E. (1989). Introduction to Phase Transitions and Critical Phenomena, Oxford University Press."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1140\/epjb\/e2007-00270-8","article-title":"Phase transitions in social networks","volume":"59","author":"Fronczak","year":"2007","journal-title":"Eur. Phys. J. B"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"022140","DOI":"10.1103\/PhysRevE.96.022140","article-title":"Unsupervised learning of phase transitions: From principal component analysis to variational autoencoders","volume":"96","author":"Wetzel","year":"2017","journal-title":"Phys. Rev. E"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"032145","DOI":"10.1103\/PhysRevE.96.032145","article-title":"Phase transition and power-law coarsening in an Ising-doped voter model","volume":"96","author":"Lipowski","year":"2017","journal-title":"Phys. Rev. E"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Gozdur, R. (2020). Study of Quasi-Static Magnetization with the Random-Field Ising Model. Algorithms, 13.","DOI":"10.3390\/a13060134"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1007\/BF01009445","article-title":"The Ising model in a random magnetic field","volume":"34","author":"Fisher","year":"1984","journal-title":"J. Stat. Phys."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Lipowski, A., Ferreira, A.L., and Lipowska, D. (2020). Cluster Structure of Optimal Solutions in Bipartitioning of Small Worlds. Entropy, 22.","DOI":"10.3390\/e22111319"},{"key":"ref_12","first-page":"177","article-title":"Potts model on complex networks. Phys. Condens","volume":"38","author":"Dorogovtsev","year":"2004","journal-title":"Matter"},{"key":"ref_13","first-page":"13","article-title":"A Review of the Potts Model","volume":"8","author":"Beaudin","year":"2007","journal-title":"Rose-Hulman Undergrad. Math. J."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Ngo, V.T., Nguyen, P.-T., and Diep, H.T. (2020). Statistical Physics Approach to Liquid Crystals: Dynamics of Mobile Potts Model Leading to Smectic Phase, Phase Transition by Wang\u2013Landau Method. Entropy, 22.","DOI":"10.3390\/e22111232"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Borzemski, L., \u015awi\u0105tek, J., and Wilimowska, Z. (2018). Use of Ising Model for Analysis of Changes in the Structure of the IT Network. Advances in Intelligent Systems and Computing, Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology\u2013ISAT 2018 PART I, Nysa, Poland, 16\u201318 September 2018, Springer.","DOI":"10.1007\/978-3-319-99996-8"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/s001910050048","article-title":"About some formalisms of interaction Phase transition models in economics?","volume":"7","author":"Hors","year":"1997","journal-title":"J. Evol. Econ."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Onuki, A. (2002). Phase Transition Dynamics, Cambridge University Press.","DOI":"10.1017\/CBO9780511534874"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Li, C., Liu, F., and Li, P. (2018). Ising Model of User Behavior Decision in Network Rumor Propagation. Discret. Dyn. Nat. Soc., 5207475.","DOI":"10.1155\/2018\/5207475"},{"key":"ref_19","unstructured":"Liu, S., Ying, L., and Shakkottai, S. (October, January 29). Influence maximization in social networks: An ising-model-based approach. Proceedings of the 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton, IL, USA."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.1109\/TCNS.2017.2673539","article-title":"I-CSMA: A link-scheduling algorithm for wireless networks based on Ising model","volume":"5","author":"Wang","year":"2018","journal-title":"IEEE Trans. Control Netw. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Paszkiewicz, A., and W\u0119grzyn, J. (2020). Responsiveness of the Sensor Network to Alarm Events Based on the Potts Model. Sensors, 20.","DOI":"10.3390\/s20236979"},{"key":"ref_22","first-page":"157","article-title":"Adaptive Scheduling in Wireless Sensor Networks Based on Potts Model","volume":"2","author":"Assa","year":"2012","journal-title":"Am. J. Intell. Syst."},{"key":"ref_23","unstructured":"Antonio, K.E.S., Pinol, C.M.N., and Banzon, R.S. (2021, June 07). An Ising Model Approach to Malware Epidemiology. Available online: https:\/\/arxiv.org\/abs\/1007.4938."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.compeleceng.2016.11.018","article-title":"A comparative analysis of structural graph metrics to identify anomalies in online social networks","volume":"57","author":"Kaur","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/j.procs.2015.04.191","article-title":"Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach","volume":"48","author":"Jabez","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Patel, D., Srinivasan, K., Chang, C.-Y., Gupta, T., and Kataria, A. (2020). Network Anomaly Detection inside Consumer Networks\u2014A Hybrid Approach. Electronics, 9.","DOI":"10.3390\/electronics9060923"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","article-title":"A survey of network anomaly detection techniques","volume":"60","author":"Ahmed","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"3799","DOI":"10.1016\/j.ins.2007.03.025","article-title":"A hybrid machine learning approach to network anomaly detection","volume":"177","author":"Shon","year":"2007","journal-title":"Inf. Sci."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1007\/s10586-017-1117-8","article-title":"A survey of deep learning-based network anomaly detection","volume":"22","author":"Kwon","year":"2019","journal-title":"Clust. Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"2367","DOI":"10.3390\/e17042367","article-title":"An Entropy-Based Network Anomaly Detection Method","volume":"17","author":"Jasiul","year":"2015","journal-title":"Entropy"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"7821","DOI":"10.1073\/pnas.122653799","article-title":"Community structure in social and biological networks","volume":"97","author":"Girvan","year":"2002","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1180","DOI":"10.1126\/science.aab3326","article-title":"Simple universal models capture all classical spin physics","volume":"351","author":"Cubitt","year":"2016","journal-title":"Science"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/978-3-319-11248-0_19","article-title":"The use of statistical signatures to detect anomalies in computer network","volume":"324","author":"Bolanowski","year":"2015","journal-title":"Lect. Notes Electr. Eng."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1109\/TDSC.2011.14","article-title":"Anomaly Detection in Network Traffic Based on Statistical Inference and alpha-Stable Modeling","volume":"8","author":"Dimitriadis","year":"2011","journal-title":"IEEE Trans. Dependable Secur. Comput."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/8\/949\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:34:44Z","timestamp":1760164484000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/8\/949"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,25]]},"references-count":34,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2021,8]]}},"alternative-id":["e23080949"],"URL":"https:\/\/doi.org\/10.3390\/e23080949","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2021,7,25]]}}}