Vulnerability Analysis Method of Network Routing Mechanism based on Knowledge Graph Vulnerability Analysis and Reinforcement Verification Mechanism of Network Routing Mechanism based on Knowledge Graph

被引:0
|
作者
Zhang, Yu [1 ]
Zhuang, Yi [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Nanjing 210016, Peoples R China
基金
中国国家自然科学基金;
关键词
Knowledge Graph; Routing Mechanism; Network Vulnerability Analysis; GCN; Redundant Reinforcement;
D O I
10.1145/3672919.3672927
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Aiming at the influence of space high-energy particle radiation on the reliability and security of space-based network communication mechanism, we studies the routing mechanism of space-based network, and proposes a vulnerability analysis method of network routing mechanism based on knowledge graph. Based on the constructed vulnerability knowledge graph of space-based network routing mechanism, combined with graph convolutional neural network and label propagation algorithm, we proposes KGCNLP model, which can make better use of the feature advantages of knowledge graph and has the advantages of high integrity and accuracy. In addition, based on the experimental results of the KGCNLP model, we proposes a redundant reinforcement method to realize the reinforcement of the vulnerability of the network routing mechanism. The experimental results show that the method of fault injection experiment, network routing mechanism vulnerability analysis model construction and redundancy reinforcement proposed in this paper is comprehensive and in-depth. The method of combining knowledge graph with graph convolutional neural network provides a novel and effective way to solve the reliability and security problems of space-based network communication mechanism.
引用
收藏
页码:39 / 43
页数:5
相关论文
共 50 条
  • [31] A novel network risk assessment method based on vulnerability correlation graph
    Liu Guqing
    Wang Xintong
    Yang Jungang
    Kang Jie
    2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 31 - 34
  • [32] Relation extraction for manufacturing knowledge graphs based on feature fusion of attention mechanism and graph convolution network
    Du, Kaze
    Yang, Bo
    Wang, Shilong
    Chang, Yongsheng
    Li, Song
    Yi, Gang
    KNOWLEDGE-BASED SYSTEMS, 2022, 255
  • [33] Graph Neural Network-based Vulnerability Predication
    Feng, Qi
    Feng, Chendong
    Hong, Weijiang
    2020 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2020), 2020, : 800 - 801
  • [34] Identification of Vulnerability Section in Network Based on Graph Theory
    Meng Xiangxia
    Luo Yuanxiang
    THIRD INTERNATIONAL CONFERENCE ON MODELING, SIMULATION AND OPTIMIZATION (CMSO 2010), 2010, : 31 - 34
  • [35] Knowledge Graph Completion Method Based on Interactively Connected Graph Attention Network
    Lu Y.
    Pan Z.
    Zhang Y.
    Qin J.
    Huang F.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2022, 50 (12): : 13 - 19
  • [36] Method based on GSCPN for network vulnerability analysis
    Gao, Xiang
    Zhu, Yue-Fei
    Fei, Jin-Long
    Han, Tao
    Journal of Software, 2013, 8 (08) : 2032 - 2038
  • [37] Hyperspectral Image Classification Based on Graph Transformer Network and Graph Attention Mechanism
    Zhao, Xiaofeng
    Niu, Jiahui
    Liu, Chuntong
    Ding, Yao
    Hong, Danfeng
    IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, 2022, 19
  • [38] Road Network Graph Representation for Traffic Analysis and Routing
    Bachechi, Chiara
    Po, Laura
    ADVANCES IN DATABASES AND INFORMATION SYSTEMS, ADBIS 2022, 2022, 13389 : 75 - 89
  • [39] An Efficient and Secure Fog Based Routing Mechanism in IoT Network
    Malik, Tauqeer Safdar
    Tanveer, Jawad
    Anwar, Shahid
    Mufti, Muhammad Rafiq
    Afzal, Humaira
    Kim, Ajung
    MATHEMATICS, 2023, 11 (17)
  • [40] Opportunistic Network Routing Strategy Based On Node Sleep Mechanism
    Li, Zhuoyuan
    Bao, Danjie
    Xu, Xiaodong
    Zhang, Feng
    Xu, Gang
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 1472 - 1475