首页> 外文会议>International Conference on Wireless Communications, Networking and Mobile Computing >A invulnerability assessment based on importance-degree of node for weighted network under attack with partial information
【24h】

A invulnerability assessment based on importance-degree of node for weighted network under attack with partial information

机译:基于节点重要度的加权信息攻击部分信息的无损性评估

获取原文

摘要

We study invulnerability of complex networks subject to attacks on nodes and links. For the purpose of precisely assessing invulnerability of complex networks, in this paper we proposed an invulnerability assessment on the basis of importance-degree and partial attack information by measuring two metrics of network invulnerability, robustness and efficiency. We defined the term of importance-degree to describe importance of different nodes in the networks. We form a probability model to describe the process of acquiring information under three types of attacks, random attacks, partial information attacks and intentional attacks, and simulate the process of acquiring partial information by sampling nodes in accordance with the probability model. The simulation results contain that weighted networks hold strong invulnerability to random attacks, whereas they are extremely fragile when suffering those intentional attacks; more information is exposed, less invulnerability networks display, especially complete information attacks which are the same with intentional attacks that all information of nodes or links would be acquired by assailants; the more important information is acquired, the more quickly network invulnerability decreases. This conclusion can guide people to implement corresponding protection strategy of hiding important information based on the importance-degree of nodes.
机译:我们研究受攻击的节点和链接的复杂网络的无害性。为了精确评估复杂网络的无损性,本文通过测量网络无损性,鲁棒性和效率这两个指标,在重要度和部分攻击信息的基础上提出了无损性评估。我们定义了重要性程度这一术语来描述网络中不同节点的重要性。我们形成一个概率模型来描述在三种类型的攻击(随机攻击,部分信息攻击和故意攻击)下获取信息的过程,并根据概率模型对通过采样节点获取部分信息的过程进行仿真。仿真结果表明,加权网络对随机攻击具有很强的抵抗力,而在遭受那些故意攻击时它们却非常脆弱。暴露的信息更多,网络显示的漏洞更少,尤其是完整的信息攻击,这与故意攻击相同,即攻击者将获取节点或链接的所有信息;获取的重要信息越多,网络无害性下降的速度就越快。该结论可以指导人们根据节点的重要程度,实施相应的重要信息隐藏保护策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号