Font Size: a A A

Research Of System Vulnerability Analysis Based On Complex Network

Posted on:2013-07-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2248330371467113Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of social networks, the network structure is more and more complex and large. This is a huge challenge for network security protection. How to reduce the system vulnerabilities during the early design of the network system and find the potential threat in the complex network system which is a difficult problem that the system se-curity engineer must resolved.In this paper, the complex networks and complex system theory is used to analyze the macroscopic properties of the network system, the vulnerable nodes and edges in the network and the cascade collapse phe-nomenon of network system. With the three aspects network system risk analysis, the relations hidden in network structure properties and system vulnerabilities will be summed. First, the network topology will be ab-stracted only with the nodes and edges, then analyze the nodes degree distribution and the rich club phenomenon with closeness, betweenness, clustering coefficient and so on in the network factors. Second, according to the principle of the network system random failure and intentional at-tack, the system random failure and intentional attack is simulated to an-alyze the fault-tolerance and anti-aggressive of the network and find weak nodes and links in the system. Finally, a network system cascade collapse model is created to analyze the cascade collapse caused by the system random failure and intentional attack in the network, and then the rela-tionship between different network topology and the failure spread in network is summed. During the network system vulnerability research, three demo networks is the China Education and Research Network (CERNET), the American Automatic Switched Optical Network (ASON) of United States 360 Networks Corporation and the Electric Power Dis-patching private network of Henan province. These three networks have the different network topologies structure and properties, so the research method is universal and then summarizes the relationship between the properties of different network topologies structure and network system vulnerabilities.Through the three aspects of analysis of network system topologies structure and system vulnerabilities, and used the degrees-clustering co-efficient of indicators to assess the role of a few high-degree nodes, avoided the one-sided of measure anti-aggressive of network system only with nodes degree distribution. With the concept of entropy from be-tweenness and closeness to assess the uniformity of scale-free network architecture, summarized the relationship between homogeneous network and heterogeneous network with system fault tolerance and an-ti-aggressive.
Keywords/Search Tags:System Vulnerability, Complex Network Theory, Net-work Security, Cascade Collapse
PDF Full Text Request
Related items