...
首页> 外文期刊>Networking, IEEE/ACM Transactions on >On New Approaches of Assessing Network Vulnerability: Hardness and Approximation
【24h】

On New Approaches of Assessing Network Vulnerability: Hardness and Approximation

机译:评估网络漏洞的新方法:硬度和近似

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Society relies heavily on its networked physical infrastructure and information systems. Accurately assessing the vulnerability of these systems against disruptive events is vital for planning and risk management. Existing approaches to vulnerability assessments of large-scale systems mainly focus on investigating inhomogeneous properties of the underlying graph elements. These measures and the associated heuristic solutions are limited in evaluating the vulnerability of large-scale network topologies. Furthermore, these approaches often fail to provide performance guarantees of the proposed solutions. In this paper, we propose a vulnerability measure, pairwise connectivity, and use it to formulate network vulnerability assessment as a graph-theoretical optimization problem, referred to as -disruptor. The objective is to identify the minimum set of critical network elements, namely nodes and edges, whose removal results in a specific degradation of the network global pairwise connectivity. We prove the NP-completeness and inapproximability of this problem and propose an pseudo-approximation algorithm to computing the set of critical nodes and an pseudo-approximation algorithm for computing the set of critical edges. The results of an extensive simulation-based experiment show the feasibility of our proposed vulnerability assessment framework and the efficiency of the proposed approximation algorithms in comparison to other approaches.
机译:社会严重依赖其联网的物理基础架构和信息系统。准确评估这些系统针对破坏性事件的脆弱性对于计划和风险管理至关重要。大型系统脆弱性评估的现有方法主要集中在调查基础图形元素的不均匀特性。这些措施和相关的启发式解决方案在评估大规模网络拓扑的脆弱性方面受到限制。此外,这些方法经常不能为所提出的解决方案提供性能保证。在本文中,我们提出了一种脆弱性度量,即成对连通性,并使用它来将网络脆弱性评估表述为一种图形理论优化问题,称为-disruptor。目的是确定关键网络元素的最小集合,即节点和边缘,将其删除会导致网络全局成对连接的特定降级。我们证明了该问题的NP完备性和不可逼近性,并提出了一种用于计算关键节点集的伪逼近算法和一种用于计算关键边集的伪逼近算法。大量基于仿真的实验结果表明,与其他方法相比,我们提出的漏洞评估框架的可行性以及提出的近似算法的效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号