Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network vulnerability identification method based on removal of timing sequence

An identification method and vulnerability technology, applied in the field of network vulnerability identification based on timing removal, can solve problems such as limited effects, achieve optimal effects, optimize deliberate attack effects, and improve early attack sensitivity

Active Publication Date: 2017-12-26
BEIHANG UNIV
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of adaptive method mainly considers the information changes of the network between the previous and next neighbor time steps. For the entire removal process, the adaptive method can only reflect local time information, so the effect is limited.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network vulnerability identification method based on removal of timing sequence
  • Network vulnerability identification method based on removal of timing sequence
  • Network vulnerability identification method based on removal of timing sequence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The present invention provides a network vulnerability identification method based on timing removal. In order to further clarify its technical means and effects, the technical method of the present invention will be described in detail below in conjunction with an ER random model network embodiment.

[0063] A network vulnerability identification method based on timing removal in the present invention, see Figure 4 As shown, its specific implementation steps are as follows:

[0064] Step 1. First, the node and edge information need to be given according to the model network. Take the ER random model network as an example (the number of nodes N=10000, the number of edges M=17482, the probability of connecting edges p=0.00035), where the ER random network represents a network composed of N nodes, any node and other nodes with probability p Generates a random model network of connected edges. For the model network, no node attribute can be set; the node number starts f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network vulnerability identification method based on removal of a timing sequence. The method comprises the following steps of 1, pre-processing network data; 2, defining a network vulnerability measurement index; 3, identifying a network key node set; and 4, optimizing a node removal timing sequence. According to the method provided by the invention, the total quantity of network attack nodes is reduced in space, sensitivity of early network attacks is improved in time, an intentional network attack effect is optimized, and thus network attack efficiency and capacity are improved in general.

Description

technical field [0001] The present invention proposes a network vulnerability identification method based on timing removal, which is used to quickly reduce network reliability and control various propagation processes on the network; the opposite angle can also be used to identify network vulnerabilities and find critical infrastructure networks (such as transportation network, power network, communication network, etc.) to reduce the vulnerability of the network, which belongs to the interdisciplinary field of reliability and network science. Background technique [0002] With the rapid development of information technology, the network, as the link of physical entity structure connection and functional interaction, is ubiquitous in real life. The spread of harmful information flow on the network will cause great damage to the network as a whole. The importance of flow control has also become increasingly prominent. In 2015, a certain company was affected by rumors on onl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1441
Inventor 钟季龙杨本浩李大庆
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products