Font Size: a A A

Reliability Analysis Of Network System Under Adaptive And Random Attacks

Posted on:2019-08-18Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhuFull Text:PDF
GTID:2518306116953849Subject:Statistics
Abstract/Summary:PDF Full Text Request
Adaptive attacks and random attacks are two common types of network security attacks.In network attacks,network reliability and attack resources are the two main factors for measuring network attack efficiency.The attack strategy that minimizing network survival probability under limited attack resources or successfully destroys the network but consumes the fewest resources is called the optimal strategy.This paper is based on the network structure of series connection,parallel connection,and k in n,comparing the efficiency of adaptive attack and random attack.The measure of importance is one of the effective tools for measuring the contribution rate of a component to a system's reliability in a reliability system.This paper introduces this concept to network attack research.The defender can use the importance of a node to accurately allocate defense resources to each node of the system,the attacker looks for important nodes to determine the best attack strategy.Studies have shown that in the series system with Birnbaum importance and the parallel system with degree of importance,nomatter how much the resources devoted to deecting,random attack is always better than adaptive attack.In other n take k network structure,the advantages and disadvantages of adaptive attack and random attack depend on that proportion that monitor resource consumption of the total attack resources in adaptive attack.When the ratio of the monitored resources to the total attack resources is less than a certain value,the adaptive attack is better than the random attack.When the value exceeds this value,the conclusion is opposite.In addition,this article is based on simulation and simulation method studies the pros and cons of two attacking strategies in a general complex network structure.The results show that the efficiency of the two attacking strategies mainly depends on the resources consumed by the monitoring.
Keywords/Search Tags:Random attack, Adaptive attack, Component importance, Resource allocation, System's reliability
PDF Full Text Request
Related items