首页 | 本学科首页   官方微博 | 高级检索  
     

基于复杂网络的网络系统脆弱点发现方法研究
引用本文:赵小林,徐浩,薛静峰,宋天凌,胡晶晶,闫怀志. 基于复杂网络的网络系统脆弱点发现方法研究[J]. 信息安全学报, 2019, 4(1): 39-51
作者姓名:赵小林  徐浩  薛静峰  宋天凌  胡晶晶  闫怀志
作者单位:北京理工大学 北京 中国 100081,北京理工大学 北京 中国 100081,北京理工大学 北京 中国 100081,北京理工大学 北京 中国 100081,北京理工大学 北京 中国 100081,北京理工大学 北京 中国 100081
基金项目:本课题得到国家重点研发计划项目(No.2016YFB0800700)资助
摘    要:利用复杂网络寻找网络系统中的脆弱点可以从网络拓扑结构的角度出发,利用节点的拓扑性质研究其脆弱性,这可以有效的解决攻击图等脆弱性评估手段无法处理规模过大的网络的问题。通过对李鹏翔等的节点删除方法进行改进,计算动态删除节点后网络平均最短路径变化,模拟网络中节点在受到攻击后无法使用,从而导致的网络整体性能的变化。使得评估时不仅考虑删除节点对网络破坏程度,同时兼顾了对网络的效率的影响,从而可以更有效的针对脆弱点布置防御措施。

关 键 词:复杂网络  脆弱点  节点删除法
收稿时间:2018-09-30
修稿时间:2018-12-04

Research on network system vulnerability detection method based on complex network
ZHAO Xiaolin,XU Hao,XUE Jingfeng,SONG Tianling,HU Jingjing and YAN Huaizhi. Research on network system vulnerability detection method based on complex network[J]. Journal of Cyber Security, 2019, 4(1): 39-51
Authors:ZHAO Xiaolin  XU Hao  XUE Jingfeng  SONG Tianling  HU Jingjing  YAN Huaizhi
Affiliation:Beijing Institute of Technology, Beijing 100081, China,Beijing Institute of Technology, Beijing 100081, China,Beijing Institute of Technology, Beijing 100081, China,Beijing Institute of Technology, Beijing 100081, China,Beijing Institute of Technology, Beijing 100081, China and Beijing Institute of Technology, Beijing 100081, China
Abstract:Using complex networks to find vulnerable points in network systems can be carried out from the perspective of the topology of the network. We can research the vulnerability of nodes based on their topological characteristics.This can effectively solve the problem that the vulnerability assessment methods such as attack graphs cannot handle large-scale networks. Through the improvement of the node deletion method of Li Pengxiang, the average shortest path change of the network after the dynamic deletion of the node is calculated,and the nodes in the simulated network cannot be used after being attacked,thereby causing the change of the overall performance of the network. The evaluation not only considers the degree of network damage caused by deleting nodes, but also takes into account the impact on the efficiency of the network, so that defensive measures can be deployed more effectively against the vulnerable points.
Keywords:complex network  vulnerable points  the node deletion method
点击此处可从《信息安全学报》浏览原始摘要信息
点击此处可从《信息安全学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号