首页 | 本学科首页   官方微博 | 高级检索  
     

基于网络模型的脆弱性的特例分析
引用本文:张婧婧,达新民.基于网络模型的脆弱性的特例分析[J].计算机与现代化,2009(8):130-132,136.
作者姓名:张婧婧  达新民
作者单位:新疆农业大学计算机与信息工程学院,新疆,乌鲁木齐,830052
摘    要:以美国劫机事件绘制的网络模型作为数据源,将其理想化为相同规模的均匀结构和层次结构,利用现有的攻击策略,针对三种不同分布的模型进行脆弱性分析实验,并根据实验得到网络被攻击前、后效率的下降比例,以此定量衡量不同网络模型的脆弱性差异.

关 键 词:脆弱性  中心节点  无标度网络  均匀结构  层次结构  效率

Special Analysis of Vulnerability Based on Network Models
ZHANG Jing-jing,DA Xin-min.Special Analysis of Vulnerability Based on Network Models[J].Computer and Modernization,2009(8):130-132,136.
Authors:ZHANG Jing-jing  DA Xin-min
Affiliation:College of Computer and Information Engineering;Xinjiang Agriculture University;Wulumuqi 830052;China
Abstract:Using the model which depicted airplane kidnappers attacks in the US as the source of data,this paper idealizes it and obtains another two structures with the same scale,such as uniformly distributed structure and hierarchical structure.Under the existing attacking strategies,experiments have done to analyse the vulnerability of three given structures.At last,it gets the descendent rate of efficiency by attacking the networks.So the aim for quantifying the discrepancy of different structures is realized.
Keywords:vulnerability  central node  scale-free network  uniform structure  hierarchy structure  efficiency
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号