Attack results in logical layer, showing (a) relative size S, (b) diameter D, (c) mean path length L, and (d) network performance parameter E versus tolerance parameter α.