计算机与现代化 ›› 2009, Vol. 8 ›› Issue (8): 130-132,.doi: 10.3969/j.issn.1006-2475.2009.08.036

• 信息安全 • 上一篇    下一篇

基于网络模型的脆弱性的特例分析

张婧婧,达新民   

  1. 新疆农业大学计算机与信息工程学院,新疆 乌鲁木齐830052
  • 收稿日期:2009-04-10 修回日期:1900-01-01 出版日期:2009-08-21 发布日期:2009-08-21

Special Analysis of Vulnerability Based on Network Models

ZHANG Jing-jing,DA Xin-min   

  1. College of Computer and Information Engineering, Xinjiang Agriculture University,Wulumuqi 830052, China
  • Received:2009-04-10 Revised:1900-01-01 Online:2009-08-21 Published:2009-08-21

摘要: 以美国劫机事件绘制的网络模型作为数据源,将其理想化为相同规模的均匀结构和层次结构,利用现有的攻击策略,针对三种不同分布的模型进行脆弱性分析实验,并根据实验得到网络被攻击前、后效率的下降比例,以此定量衡量不同网络模型的脆弱性差异。

关键词: 脆弱性, 中心节点, 无标度网络, 均匀结构, 层次结构, 效率

Abstract: Using the model which depicted airplane kidnappers attacks in the US as the source of data, this paper idealizes it and obtains another two structures with the same scale, such as uniformly distributed structure and hierarchical structure. Under the existing attacking strategies, experiments have done to analyse the vulnerability of three given structures. At last, it gets the descendent rate of efficiency by attacking the networks. So the aim for quantifying the discrepancy of different structures is realized.

Key words: vulnerability, central node, scalefree network, uniform structure, hierarchy structure, efficiency

中图分类号: