Font Size: a A A

Geared To The Needs Of Key Nodes Of Complex Network Defense And Protection Strategy Research

Posted on:2014-02-21Degree:MasterType:Thesis
Country:ChinaCandidate:C S TianFull Text:PDF
GTID:2240330395483420Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, many scientists who come from different fields have focus on the research of complex networks. The study of complex networks has tremendous potential value. However, the vulnerability of complex networks becomes a major flaw in its practical application. Especially when confronting a variety of complex attacks, such as random attacks, deliberate attacks, coordinated attacks, distributed attacks and so on. The security of complex networks increasingly suffers serious threat. The defense and protection strategies for complex networks are one of the important and difficult problems.This paper starts from the basic theoretical study of complex networks, briefly introduces the statistical parameters, basic models and critical node identification algorithms of complex networks, and outlines some typical defense and protection strategies. In the light of the fact that attacking the critical nodes causes serious damage to the network, this paper proposes the defense and protection strategies based on critical nodes, researches mainly on three aspects.Firstly, in order to achieve the best defense and protection, this paper consults probabilistic risk analysis model and utilize the Lagrange multiplier method to optimize the allocation of limited defense resources on critical nodes. Secondly, to control the congestion and defense high load attacks against critical nodes, the route optimization strategy based on the critical nodes is researched. This method makes the network load distribution more balanced, effectively prevents the attack of high load. Finally, the strategy for the critical nodes to add the protection links is proposed. We establish the critical balance rings and critical chains around the critical nodes so as to improve the robustness of complex networks and the ability of the network against deliberate attacks.At last, a simulation platform is designed and achieved, The chapter5gives a brief description of the simulation platform, introduces the design of critical modules in detail. This paper also verifies the effectiveness and feasibility of the defense and protection strategies researched in the paper through many comparative experiments and results analysis.
Keywords/Search Tags:Complex Network, Critical Node, Defense Resources, Route Optimization, Balance Ring
PDF Full Text Request
Related items