A vulnerability analysis method for critical elements based on network connectivity

被引:0
|
作者
Liu S.-M. [1 ]
Yu Y. [1 ]
Guo L. [1 ]
机构
[1] College of Computer Science and Engineering, Northeastern University, Shenyang
来源
Kongzhi yu Juece/Control and Decision | 2020年 / 35卷 / 06期
关键词
Connectivity; Critical element; Disruption cost; Network security; Network vulnerability analysis;
D O I
10.13195/j.kzyjc.2018.1280
中图分类号
学科分类号
摘要
Accurately assessing the vulnerability of network systems is vital for network security planning and risk management. Existing network vulnerability analysis methods mostly focus on identifying vulnerable elements with a single feature. With the quickening of network system complexity process, the diversified vulnerability identification is particularly important. This paper innovatively proposes a vulnerability analysis method for critical elements based on network connectivity from the perspective of attackers, identifying network elements with multiple important identities and low-disruption-cost. Critical elements are identified by using local analysis measures, network connectivity is used as the measure of vulnerability to identify the minimum-cost set of critical elements that can cause a particular degradation of network connectivity. The simulation results show that the proposed scheme is more accurate in locating vulnerable elements and can provide an effective and reliable reference for the development of protection measures. © 2020, Editorial Office of Control and Decision. All right reserved.
引用
收藏
页码:1421 / 1426
页数:5
相关论文
共 15 条
  • [1] Yu B, Feng C, Zhu Q, Vulnerability analysis of China's high speed railway network, China Safety Science Journal, 27, 9, pp. 110-115, (2017)
  • [2] Yu Y, Guo L, Huang J, A cross-layer security monitoring selection algorithm based on traffic prediction, IEEE Access, 6, pp. 35382-35391, (2018)
  • [3] Yu Y, Guo L, Liu Y, An efficient SDN-based DDoS attack detection and rapid response platform in vehicular networks, IEEE Access, 6, pp. 44570-44579, (2011)
  • [4] Yu Y, Ning Z, Guo L, A secure routing scheme based on social network analysis in wireless mesh networks, Science China Information Sciences, 59, 12, pp. 143-154, (2016)
  • [5] Borgatti S P, Everett M G, A graph-theoretic perspective on centrality, Social Networks, 28, 4, pp. 466-484, (2006)
  • [6] Jiang Y S, Key node identification of navigation network based on structural centrality, Computer and Modernization, 7, pp. 108-113, (2018)
  • [7] Yu Y, Peng Y, Yu Y, A new dynamic hierarchical reputation evaluation scheme for hybrid wireless mesh networks, Computers & Electrical Engineering, 40, 2, pp. 663-672, (2014)
  • [8] Reggiani A, Nijkamp P, Lanzi D, Transport resilience and vulnerability: The role of connectivity, Transportation Research Part A, 81, pp. 4-15, (2015)
  • [9] Dinh T N, Xuan Y, Thai M T, On new approaches of assessing network vulnerability: Hardness and approximation, IEEE/ACM Transactions on Networking, 20, 2, pp. 609-619, (2012)
  • [10] Shen Y, Nguyen N P, Xuan Y, On the discovery of critical links and nodes for assessing network vulnerability, IEEE/ACM Transactions on Networking, 21, 3, pp. 963-973, (2013)