English | 中文

手机二维码
 
【打印本页】      【下载PDF全文】   查看/发表评论  下载PDF阅读器  关闭
←前一篇|后一篇→ 过刊浏览    高级检索
本文已被:浏览 86次   下载 75 本文二维码信息
码上扫一扫!
基于复杂网络的网络系统脆弱点发现方法研究
赵小林,徐浩,薛静峰,宋天凌,胡晶晶,闫怀志
分享到: 微信 更多
(北京理工大学 北京 中国 100081)
摘要:
利用复杂网络寻找网络系统中的脆弱点可以从网络拓扑结构的角度出发,利用节点的拓扑性质研究其脆弱性,这可以有效的解决攻击图等脆弱性评估手段无法处理规模过大的网络的问题。通过对李鹏翔等的节点删除方法进行改进,计算动态删除节点后网络平均最短路径变化,模拟网络中节点在受到攻击后无法使用,从而导致的网络整体性能的变化。使得评估时不仅考虑删除节点对网络破坏程度,同时兼顾了对网络的效率的影响,从而可以更有效的针对脆弱点布置防御措施。
关键词:  复杂网络  脆弱点  节点删除法
DOI:10.19363/J.cnki.cn10-1380/tn.2019.01.04
投稿时间:2018-09-30修订日期:2018-12-04
基金项目:本课题得到国家重点研发计划项目(No.2016YFB0800700)资助
Research on network system vulnerability detection method based on complex network
ZHAO Xiaolin,XU Hao,XUE Jingfeng,SONG Tianling,HU Jingjing,YAN Huaizhi
Beijing Institute of Technology, Beijing 100081, China
Abstract:
Using complex networks to find vulnerable points in network systems can be carried out from the perspective of the topology of the network. We can research the vulnerability of nodes based on their topological characteristics.This can effectively solve the problem that the vulnerability assessment methods such as attack graphs cannot handle large-scale networks. Through the improvement of the node deletion method of Li Pengxiang, the average shortest path change of the network after the dynamic deletion of the node is calculated,and the nodes in the simulated network cannot be used after being attacked,thereby causing the change of the overall performance of the network. The evaluation not only considers the degree of network damage caused by deleting nodes, but also takes into account the impact on the efficiency of the network, so that defensive measures can be deployed more effectively against the vulnerable points.
Key words:  complex network  vulnerable points  the node deletion method