Computer and Modernization ›› 2009, Vol. 8 ›› Issue (8): 130-132,.doi: 10.3969/j.issn.1006-2475.2009.08.036

• 信息安全 • Previous Articles     Next Articles

Special Analysis of Vulnerability Based on Network Models

ZHANG Jing-jing,DA Xin-min   

  1. College of Computer and Information Engineering, Xinjiang Agriculture University,Wulumuqi 830052, China
  • Received:2009-04-10 Revised:1900-01-01 Online:2009-08-21 Published:2009-08-21

Abstract: Using the model which depicted airplane kidnappers attacks in the US as the source of data, this paper idealizes it and obtains another two structures with the same scale, such as uniformly distributed structure and hierarchical structure. Under the existing attacking strategies, experiments have done to analyse the vulnerability of three given structures. At last, it gets the descendent rate of efficiency by attacking the networks. So the aim for quantifying the discrepancy of different structures is realized.

Key words: vulnerability, central node, scalefree network, uniform structure, hierarchy structure, efficiency

CLC Number: