Vulnerability Analysis Method of Network Routing Mechanism based on Knowledge Graph Vulnerability Analysis and Reinforcement Verification Mechanism of Network Routing Mechanism based on Knowledge Graph

被引:0
|
作者
Zhang, Yu [1 ]
Zhuang, Yi [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Nanjing 210016, Peoples R China
基金
中国国家自然科学基金;
关键词
Knowledge Graph; Routing Mechanism; Network Vulnerability Analysis; GCN; Redundant Reinforcement;
D O I
10.1145/3672919.3672927
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Aiming at the influence of space high-energy particle radiation on the reliability and security of space-based network communication mechanism, we studies the routing mechanism of space-based network, and proposes a vulnerability analysis method of network routing mechanism based on knowledge graph. Based on the constructed vulnerability knowledge graph of space-based network routing mechanism, combined with graph convolutional neural network and label propagation algorithm, we proposes KGCNLP model, which can make better use of the feature advantages of knowledge graph and has the advantages of high integrity and accuracy. In addition, based on the experimental results of the KGCNLP model, we proposes a redundant reinforcement method to realize the reinforcement of the vulnerability of the network routing mechanism. The experimental results show that the method of fault injection experiment, network routing mechanism vulnerability analysis model construction and redundancy reinforcement proposed in this paper is comprehensive and in-depth. The method of combining knowledge graph with graph convolutional neural network provides a novel and effective way to solve the reliability and security problems of space-based network communication mechanism.
引用
收藏
页码:39 / 43
页数:5
相关论文
共 50 条
  • [41] The secure routing mechanism for DHT-based overlay network
    Kwon, Hyeokchan
    Koh, Sunkee
    Nah, Jaehoon
    Jang, Jongsoo
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1300 - 1303
  • [42] Perceptive Network Model Based on Immune Algorithm Routing Mechanism
    Wu Zhiyi
    Mao Xiaohong
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS & STATISTICS, 2015, 53 (02): : 13 - 19
  • [43] Routing mechanism based on friend groups in mobile social network
    Chen, Qi
    Wang, Xingwei
    Wang, Xueyi
    Huang, Min
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2017, 47 : 53 - 58
  • [44] Research on Automatic Vulnerability Mining Model Based on Knowledge Graph
    Chen, Ze
    Zuo, Xiaojun
    Hou, Botao
    Dong, Na
    Chang, Jie
    INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2020, 29 (7-8)
  • [45] A Protocol Vulnerability Analysis Method Based on Logical Attack Graph
    Zhang, Chunrui
    Wang, Shen
    Zhan, Dechen
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 309 - 317
  • [46] Vulnerability Analysis and Verification for LTE Initial Synchronization Mechanism
    Li, Xiaona
    Xie, Xue
    Zeng, Juan
    Wang, Yongming
    2015 36TH IEEE SARNOFF SYMPOSIUM, 2015, : 150 - 154
  • [47] Knowledge graph completion based on graph contrastive attention network
    Liu D.
    Fang Q.
    Zhang X.
    Hu J.
    Qian S.
    Xu C.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (08): : 1428 - 1435
  • [48] Knowledge Graph Based Question Routing for Community Question Answering
    Liu, Zhu
    Li, Kan
    Qu, Dacheng
    NEURAL INFORMATION PROCESSING, ICONIP 2017, PT V, 2017, 10638 : 721 - 730
  • [49] A network accountability based verification mechanism for detecting inter-domain routing path inconsistency
    Jiang, Jian
    Li, Wei
    Luo, Junzhou
    Tan, Jing
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (06) : 1671 - 1683
  • [50] A Novel Cascading Faults Graph Based Transmission Network Vulnerability Assessment Method
    Wei, Xiaoguang
    Zhao, Junbo
    Huang, Tao
    Bompard, Ettore
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (03) : 2995 - 3000