Research on the invulnerability of regional network based on topology analysis
To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2021-11-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021179/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539198135304192 |
---|---|
author | Changqing AN Yujia LIU Hui WANG Zhiyan ZHENG Tao YU Jilong WANG |
author_facet | Changqing AN Yujia LIU Hui WANG Zhiyan ZHENG Tao YU Jilong WANG |
author_sort | Changqing AN |
collection | DOAJ |
description | To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given. |
format | Article |
id | doaj-art-63d78f31706149a4810636554cd7118e |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2021-11-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-63d78f31706149a4810636554cd7118e2025-01-14T07:23:09ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2021-11-014214515859746098Research on the invulnerability of regional network based on topology analysisChangqing ANYujia LIUHui WANGZhiyan ZHENGTao YUJilong WANGTo measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021179/regiontopologyinvulnerabilitysecuritysignificant difference |
spellingShingle | Changqing AN Yujia LIU Hui WANG Zhiyan ZHENG Tao YU Jilong WANG Research on the invulnerability of regional network based on topology analysis Tongxin xuebao region topology invulnerability security significant difference |
title | Research on the invulnerability of regional network based on topology analysis |
title_full | Research on the invulnerability of regional network based on topology analysis |
title_fullStr | Research on the invulnerability of regional network based on topology analysis |
title_full_unstemmed | Research on the invulnerability of regional network based on topology analysis |
title_short | Research on the invulnerability of regional network based on topology analysis |
title_sort | research on the invulnerability of regional network based on topology analysis |
topic | region topology invulnerability security significant difference |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021179/ |
work_keys_str_mv | AT changqingan researchontheinvulnerabilityofregionalnetworkbasedontopologyanalysis AT yujialiu researchontheinvulnerabilityofregionalnetworkbasedontopologyanalysis AT huiwang researchontheinvulnerabilityofregionalnetworkbasedontopologyanalysis AT zhiyanzheng researchontheinvulnerabilityofregionalnetworkbasedontopologyanalysis AT taoyu researchontheinvulnerabilityofregionalnetworkbasedontopologyanalysis AT jilongwang researchontheinvulnerabilityofregionalnetworkbasedontopologyanalysis |