Nothing Special   »   [go: up one dir, main page]

计算机科学 ›› 2015, Vol. 42 ›› Issue (8): 161-165.

• 信息安全 • 上一篇    下一篇

IPv6 AS级Internet抗毁性研究

秦李,黄曙光,陈 骁   

  1. 电子工程学院研究生管理大队 合肥230037,电子工程学院网络系 合肥230037,电子工程学院研究生管理大队 合肥230037
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受安徽省自然科学基金(1208085QF107)资助

Research on Invulnerability of IPv6 AS-level Internet

QIN Li, HUANG Shu-guang and CHEN Xiao   

  • Online:2018-11-14 Published:2018-11-14

摘要: 随着互联网和物联网的飞速发展,通信协议从IPv4过渡到IPv6已是必然趋势。采集了CAIDA Ark项目的最新数据(时间为2014年6月),通过对IPv6 AS级Internet建模,验证了该网络所具有的小世界和无标度特性。在分析Internet结构及常用抗毁性测度的基础上,提出了IPv6 AS级Internet的抗毁性测度指标和抗毁性实验方法。实验结果表明,在不同的攻击策略下,网络具有鲁棒且脆弱的特性,在遭到基于度的蓄意攻击时,网络抗毁性最差,同时也表明构建的抗毁性测度可以很好地表征Internet的抗毁性水平。

关键词: 复杂网络,IPv6,AS级Internet,抗毁性

Abstract: With the rapid development of Internet and the Internet of Things,it is an inevitable trend to transfer the communication protocol from IPv4 to IPv6.This paper collected the latest IPv6 AS-level Internet data from the project of CAIDA Ark(2014.6).By modeling this data based on complex network,we found that the IPv6 Internet also has small-world and scale-free properties.Furthermore,on the basis of analyzing the structure of the IPv4 Internet and the commonly measures of invulnerability,we proposed the measures of invulnerability for the IPv6 Internet and the method of how to do the invulnerability experiment.The results show that this measures can do well in describing the performance of invulnerability.Under different attack strategies,of which the attack based on the order of degree can make the largest effect of damage,we found that the IPv6 Internet has the characteristics of robustness and vulnerability.

Key words: Complex network,IPv6,AS-level Internet,Invulnerability

[1] 王大东,王洪军,王瑞,等.一种基于AS的Internet拓扑模型[J].计算机工程,2005,1(4):23-25 Wang Da-dong,Wang Hong-jun,Wang Rui,et al.A model of Internet topology based on AS[J].Computer Engineering,2005,1(4):23-25
[2] 付大愚,赵海,张君,等.AS级Internet拓扑幂率和节点时效分析[J].计算机科学,2009,6(9):21-24 Fu Da-yu,Zhao Hai,Zhang Jun,et al.AS-level Internet topology power-law and node aging analysis[J].Computer Science,2009,6(9):21-24
[3] Ellison B,Fisher A D,Linger R C,et al.Survivable network systems:an emerging discipline[R].Pittsburgh:Carnegie Mellon University,1997
[4] 谭跃进,吕欣,吴俊,等.复杂网络抗毁性研究若干问题的思考[J].系统工程理论与实践,2008,28(增刊):116-120 Tan Yue-jin,Lv Xin,Wu Jun,et al.On the invulnerability research of complex networks[J].Systems Engineering-Theory & Practice,2008,8(suppl):116-120
[5] Albert R,Jeong H,Barabási A.Error and attack tolerance of complex networks[J].Nature,2000,6(8064):378-382
[6] Albert R,Barabasi A L,et al.Statistical mechanics of complex networks [J].Revv Mod Phys,2002(74):47-97
[7] Zhou Shi,Mondragón R J.Redundancy and Robustness of the AS-level Internet topology and its models[J].Electronics Letters,2004,0(2):151-152
[8] 汪涛,吴琳丽.基于复杂网络的城市公交网络抗毁性分析[J].计算机应用研究,2010,7(11):4084-4086 Wang Tao,Wu Lin-li.Research on invulnerability of erban transit network based on complex network[J].Application Research of Computers,2010,7(11):4084-4086
[9] 谢丰,程苏琦,陈冬青,等.基于级联失效的复杂网络抗毁性[J].清华大学学报(自然科学版),2011,51(10):1342-1347 Xie Feng,Cheng Su-qi,Chen Dong-qing,et al.Cascade-based attack vulnerability in complex networks[J].Journal of Tsinghua University(Science and Technology),2011,1(10):1342-1347
[10] 曾小舟,唐笑笑,江可申.基于复杂网络理论的中国航空网络抗毁性测度分析[J].系统仿真技术,2012,8(2):111-116 Zeng Xiao-zhou,Tang Xiao-xiao,Jiang Ke-shen,et al.Measure of China airline networks invulnerability based on complex networks[J].System Simulation Technology,2012,8(2):111-116
[11] 黄仁全,李为民,董雯,等.不同攻击策略下作战体系网络抗毁性研究[J].复杂系统与复杂性科学,2012,9(3):62-69 Huang Ren-quan,Li Wei-min,Dong Wen,et al.Research on the invulnerability of combat SoS under different attack strategies[J].Complex Systems and Complexity Science,2012,9(3):62-69
[12] 种鹏云,帅斌.基于复杂网络的危险品运输网络抗毁性测度分析[J].系统工程理论与实践,2014,4(5):1059-1065 Chong Peng-yun,Shuai Bin.Model of cascading failure in hazardous materials transportation network under series of terrorist attacks[J].Systems Engineering-Theory&Practice,2014,4(4):1059-1065
[13] Watts D J,Strogatz S H.Collective dynamics of '“small-world”' networks[J].Nature,1998,3(6684):440-442
[14] Barabási A-l,Albert R.Emergence of scaling in random networks [J].Science,1999,6(5439):509-512
[15] 汪小帆,李翔,陈关荣.网络科学导论[M].北京:高等教育出版社,2012:158-159 Wang Xiao-fan,Li Xiang,Chen Guan-rong.NetWork Science:An Introduce[M].Beijing:Higher Education Press,2012:158-159
[16] 于会,刘尊,李勇军.基于多属性决策的复杂网络节点重要性综合评价方法[J].物理学报,2013,2(2):20204-9 Yu Hui,Liu Zun,Li Yong-Jun,et al.Key nodes in complex networks identified by multi-attribute decision-making method[J].Acta Physica Sinica,2013,2(2):20204-9
[17] Fruchterman T M J,Reingold E M.Graph Drawing by Force-directed Placement[J].Software-practice and Experience,1991,1(11):1129-1164
[18] Holme P,Kim B J,Yoon C N,et al.Attack vulnerability of complex networks[J].Physical Review E,2002,65(5):56-109
[19] Jeong H,Mason S,Barabási A l,et al.Lethality and centrality in protein networks[J].Nature,2001(411):41-42
[20] Qi Xing-qin,Duval R D,Christensen K,et al.Terrorist Net-works,Network Energy and Node Removal A New Measure of Centrality Based on Laplacian Energy[J].Scientific Research,2013,10(4236):19-31

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!