期刊文献+

基于网络模型的脆弱性的特例分析

Special Analysis of Vulnerability Based on Network Models
下载PDF
导出
摘要 以美国劫机事件绘制的网络模型作为数据源,将其理想化为相同规模的均匀结构和层次结构,利用现有的攻击策略,针对三种不同分布的模型进行脆弱性分析实验,并根据实验得到网络被攻击前、后效率的下降比例,以此定量衡量不同网络模型的脆弱性差异。 Using the model'which depicted airplane kidnappers attacks in the US as the source of data, this paper idealizes it and obtains another two structures with the same scale, such as uniformly distributed structure and hierarchical structure. Under the existing attacking strategies, experiments have done to analyse the vulnerability of three given structures. At last, it gets the de- scendent rate of efficiency by attacking the networks. So the aim for quantifying the discrepancy of different structures is realized.
出处 《计算机与现代化》 2009年第8期130-132,136,共4页 Computer and Modernization
关键词 脆弱性 中心节点 无标度网络 均匀结构 层次结构 效率 vulnerability central node scale-free network uniform structure hierarchy structure eftlciency
  • 相关文献

参考文献5

二级参考文献65

  • 1汪秉宏,周涛,何大韧.统计物理与复杂系统研究最近发展趋势分析[J].中国基础科学,2005,7(3):37-43. 被引量:31
  • 2Wasserman S, Faust K. Social Network Analysis: Methods and Applications[M]. Cambridge: Cambridge University Press, 1994.
  • 3Faloutsos M, Faloutsos P, Faloutsos C. On power-law relationships of the internet topology[J]. Comput. Commun. Rev., 1999,29: 251-262.
  • 4Lawrence S, Giles C L. Searching the world wide web[J]. Science, 1998, 280: 98.
  • 5Fratta L, Montanari U G. A recurisive method based on case analysis for computing network terminal reliability[J]. IEEE Trans. On Communication, 1978, 26 (8): 1166-1177.
  • 6Albert R, Jeong H, Barabasi A L. Error and attack tolerance of complex networks[J]. Nature, 2000,406: 378-382.
  • 7Albert R, Barabasi A L. Statistical mechanics of complex networks[J]. Rev. Mod. Phys., 2002, 74: 47-97.
  • 8Frank H, Frisch I. Analysis and design of survivable network[J]. IEEE Trans. on Communication Technology, 1970, COM-18(5) : 567-662.
  • 9Wilkov R S, Analysis and design of reliable computer networks[J]. IEEE Trans. on Communication, 1972, 20(3) : 660-678.
  • 10Boesch F T, Thomas R E. On graphs of in-vulnerable communication nets[J]. IEEE Trans. on Circuit Theory, 1970, CT-17(2) :183-192.

共引文献246

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部