Font Size: a A A

Research On Software Defining Network Vulnerability Based On Coupling Preferences

Posted on:2018-09-08Degree:MasterType:Thesis
Country:ChinaCandidate:J B YangFull Text:PDF
GTID:2348330518495787Subject:Electronic Science and Technology
Abstract/Summary:PDF Full Text Request
The research on the vulnerability of SDN network from the point of coupling is mainly focused on the single layer and multi-layer of complex network. In the failure study of single layer network, we mainly include the random failure due to the aging failure of relevant network elements in the network and the pertinent failure caused by the deliberate attack on the important nodes in the network. Multi-layer network, we analyze the influence of the correlation between layers and layers on the fragility of the whole network. The research points of this paper include both the current research hotspot SDN and the vulnerability of the complex topology network formed by virtual network using SDN. The research on the complex topology network from the point of view of coupling is provided,which provides the future development of large-scale network. Valuable advice.Over the past few years, network theory has been successfully interrelated in a variety of complex systems, from biology to technology networks, social networks. However, the focus is almost exclusively on networks where all parts are considered equivalent, and all extraneous information about the existing or interacting content is ignored in the study.Only a few years ago, with the enhanced resolution of real data sets,network scientists have directly focused on real-world system multi-layer feature studies, explicitly considering network time-varying and multi-layer properties. We provide a comprehensive review of the structure and mechanics of a variety of related graphs across various parts of the network and several related hotspots.Aiming at the connectivity measure under network attack, a strong connectivity branch index of single node is proposed. By analyzing the influence factors of structural vulnerability can be seen: Random attack in the large-scale random network effect is better than the node detection rate is greater than 0 attack mode, BA network attack breadth can be fixed within a certain range of node detection and targeted attacks on the gap.
Keywords/Search Tags:sdn network, cascade effect, vulnerability, virtual mapping algorithm
PDF Full Text Request
Related items