Font Size: a A A

Research On Differentiated Security Strategy For Topology

Posted on:2022-08-30Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y ZhangFull Text:PDF
GTID:2518306338970419Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the implementation of new technologies such as 5G and AI in commercial scenarios,market demands have placed higher requirements on transmission networks.Optical transmission networks with high speed and bandwidth have become essential elements to support the successful implementation of these new technologies.At the same time,with the continuous improvement of the network service level,the service security of the optical communication network needs to be solved urgently.Network failure and damage will have an important impact on the economy.This article attempts to explore the relationship between topology and network invulnerability from the perspective of topology.Complex networks continue to expand the boundaries of research.Network phantoms have gradually become an important part of complex network research.Biology and other disciplines are studying the characteristics of network phantoms.This paper studies the topological structure characteristics of the network phantom and the distribution of the color phantom,and finds that there is a close relationship between the invulnerability of the network and the color phantom.The color phantom is the microstructure unit of the network,and its type and concentration can represent the invulnerability of the network to a certain extent.This paper studies the relationship between the phantom structure in a complex network and the network's invulnerability,which mainly includes the following contents:First,the paper selects four actual networks in the scientific network data set,and conducts network modeling on the four actual networks.Using complex network measurement indicators such as aggregation coefficient and average shortest path,model simulations of the topological characteristics of the four networks are used to obtain basic information of the network.By fitting and analyzing the clustering coefficient and node degree distribution of the network,it is verified that the four networks have the basic characteristics of complex networks.Second,the paper analyzes the distribution of network phantoms in four actual networks.The research results show that the probability of motifs with high connectivity in the network is low.Based on multiple linear regression(Multiple Linear Regression),the influence of network phantoms on network topology security under different attack modes is studied,and the research found that the phantom structure and the position of colored nodes in the network have influence on the maximum connected subgraph and relative connection efficiency of the network.Different degrees of influence.Finally,a motif-based protection strategy and two motif-based attack strategies are proposed.In the network attack simulation experiment based on the protection strategy,the simulation results show that the motif-based protection and attack strategy have obvious advantages compared with the traditional methods.The study found that the attack strategy based on the motif degree has obvious advantages during the entire attack period,while the attack strategy based on the motif Z value has certain advantages in the early stage of the attack.As the proportion of node failures gradually increases,the attack efficiency is slightly worse than Node degree attack.In addition,it was also found that the attack effect based on the motif attack strategy has a strong correlation with the size of the network motif concentration.When a network with a higher motif concentration in the network faces a motif-based attack strategy,the network will quickly become paralyzed.
Keywords/Search Tags:Topological structure, complex network measurement, color mode, destruction resistance
PDF Full Text Request
Related items