摘要: 随着互联网和物联网的飞速发展,通信协议从IPv4过渡到IPv6已是必然趋势。采集了CAIDA Ark项目的最新数据(时间为2014年6月),通过对IPv6 AS级Internet建模,验证了该网络所具有的小世界和无标度特性。在分析Internet结构及常用抗毁性测度的基础上,提出了IPv6 AS级Internet的抗毁性测度指标和抗毁性实验方法。实验结果表明,在不同的攻击策略下,网络具有鲁棒且脆弱的特性,在遭到基于度的蓄意攻击时,网络抗毁性最差,同时也表明构建的抗毁性测度可以很好地表征Internet的抗毁性水平。
[1] 王大东,王洪军,王瑞,等.一种基于AS的Internet拓扑模型[J].计算机工程,2005,1(4):23-25 Wang Da-dong,Wang Hong-jun,Wang Rui,et al.A model of Internet topology based on AS[J].Computer Engineering,2005,1(4):23-25 [2] 付大愚,赵海,张君,等.AS级Internet拓扑幂率和节点时效分析[J].计算机科学,2009,6(9):21-24 Fu Da-yu,Zhao Hai,Zhang Jun,et al.AS-level Internet topology power-law and node aging analysis[J].Computer Science,2009,6(9):21-24 [3] Ellison B,Fisher A D,Linger R C,et al.Survivable network systems:an emerging discipline[R].Pittsburgh:Carnegie Mellon University,1997 [4] 谭跃进,吕欣,吴俊,等.复杂网络抗毁性研究若干问题的思考[J].系统工程理论与实践,2008,28(增刊):116-120 Tan Yue-jin,Lv Xin,Wu Jun,et al.On the invulnerability research of complex networks[J].Systems Engineering-Theory & Practice,2008,8(suppl):116-120 [5] Albert R,Jeong H,Barabási A.Error and attack tolerance of complex networks[J].Nature,2000,6(8064):378-382 [6] Albert R,Barabasi A L,et al.Statistical mechanics of complex networks [J].Revv Mod Phys,2002(74):47-97 [7] Zhou Shi,Mondragón R J.Redundancy and Robustness of the AS-level Internet topology and its models[J].Electronics Letters,2004,0(2):151-152 [8] 汪涛,吴琳丽.基于复杂网络的城市公交网络抗毁性分析[J].计算机应用研究,2010,7(11):4084-4086 Wang Tao,Wu Lin-li.Research on invulnerability of erban transit network based on complex network[J].Application Research of Computers,2010,7(11):4084-4086 [9] 谢丰,程苏琦,陈冬青,等.基于级联失效的复杂网络抗毁性[J].清华大学学报(自然科学版),2011,51(10):1342-1347 Xie Feng,Cheng Su-qi,Chen Dong-qing,et al.Cascade-based attack vulnerability in complex networks[J].Journal of Tsinghua University(Science and Technology),2011,1(10):1342-1347 [10] 曾小舟,唐笑笑,江可申.基于复杂网络理论的中国航空网络抗毁性测度分析[J].系统仿真技术,2012,8(2):111-116 Zeng Xiao-zhou,Tang Xiao-xiao,Jiang Ke-shen,et al.Measure of China airline networks invulnerability based on complex networks[J].System Simulation Technology,2012,8(2):111-116 [11] 黄仁全,李为民,董雯,等.不同攻击策略下作战体系网络抗毁性研究[J].复杂系统与复杂性科学,2012,9(3):62-69 Huang Ren-quan,Li Wei-min,Dong Wen,et al.Research on the invulnerability of combat SoS under different attack strategies[J].Complex Systems and Complexity Science,2012,9(3):62-69 [12] 种鹏云,帅斌.基于复杂网络的危险品运输网络抗毁性测度分析[J].系统工程理论与实践,2014,4(5):1059-1065 Chong Peng-yun,Shuai Bin.Model of cascading failure in hazardous materials transportation network under series of terrorist attacks[J].Systems Engineering-Theory&Practice,2014,4(4):1059-1065 [13] Watts D J,Strogatz S H.Collective dynamics of '“small-world”' networks[J].Nature,1998,3(6684):440-442 [14] Barabási A-l,Albert R.Emergence of scaling in random networks [J].Science,1999,6(5439):509-512 [15] 汪小帆,李翔,陈关荣.网络科学导论[M].北京:高等教育出版社,2012:158-159 Wang Xiao-fan,Li Xiang,Chen Guan-rong.NetWork Science:An Introduce[M].Beijing:Higher Education Press,2012:158-159 [16] 于会,刘尊,李勇军.基于多属性决策的复杂网络节点重要性综合评价方法[J].物理学报,2013,2(2):20204-9 Yu Hui,Liu Zun,Li Yong-Jun,et al.Key nodes in complex networks identified by multi-attribute decision-making method[J].Acta Physica Sinica,2013,2(2):20204-9 [17] Fruchterman T M J,Reingold E M.Graph Drawing by Force-directed Placement[J].Software-practice and Experience,1991,1(11):1129-1164 [18] Holme P,Kim B J,Yoon C N,et al.Attack vulnerability of complex networks[J].Physical Review E,2002,65(5):56-109 [19] Jeong H,Mason S,Barabási A l,et al.Lethality and centrality in protein networks[J].Nature,2001(411):41-42 [20] Qi Xing-qin,Duval R D,Christensen K,et al.Terrorist Net-works,Network Energy and Node Removal A New Measure of Centrality Based on Laplacian Energy[J].Scientific Research,2013,10(4236):19-31 |
No related articles found! |
|