Computer Science ›› 2017, Vol. 44 ›› Issue (11): 168-174.doi: 10.11896/j.issn.1002-137X.2017.11.025

Previous Articles     Next Articles

Study on Invulnerability of Router-level Internet Based on MapReduce

ZHU Kai-long, LU Yu-liang and YANG Bin   

  • Online:2018-12-01 Published:2018-12-01

Abstract: We used MapReduce to study the invulnerability of router-level Internet.In order to evaluate network invulnerability,two new measures of invulnerability were proposed:network connectivity ratio and efficiency ratio.We designed the analysis algorithm of the Internet invulnerability based on MapReduce (AIIMR) using the two new mea-sures.The algorithm simulates the different attack on the Internet.The experimental results show the problem of traditional measure in measuring the router network and prove the validity of the proposed measure.The experimental results also show that the attacked router-level Internet is robust at random attack and fragile at targeted attack.Finally,the experiment proves that the proposed MapReduce algorithm effectively improves the efficiency,and has good sca-lability.

Key words: Router-level Internet,Invulnerability,Distributed computing,AIIMR

[1] HUANG A Q,CROW M L,HEYDT G T,et al.The future renewable electric energy delivery and management (FREEDM) system:the energy internet [J].Proceedings of the IEEE,2011,99(1):133-148.
[2] SU W,HUANG A Q.Proposing an electricity market frame-work for the energy internet [C]∥IEEE Power & Energy Socie-ty General Meeting.Vancouver,British Columbia,Canada,2013:1-5.
[3] HERNANDEZ B,JIMENEZ J,MARTIN M.Customer Behavior in Electronic Commerce:The Moderating Effect of E-purchasing Experience [J].Journal of Business Research,2010,63(9/10):964-971.
[4] LIU J S,ZHOU C Q,GUO L S.Application of “Internet plus” era of big data technology in military field [J].National Defense Science & Technology,2011,36(6):35-41.(in Chinese) 刘金山,周朝谦,郭连升.“互联网+”时代大数据技术在军事领域的应用[J].国防科技,2015,6(6):35-41.
[5] ALBERT R,JEONG H,BARABASI A L.Attack and errortolerance in complex networks [J].Nature,2000,406(6794):387-482.
[6] BRODER A,KUMAR R,MAGHOUL F,et al.Graph structure in the web [J].Computer Networks,2000,3(1-6):309-320.
[7] JEONG H,MASON S,BARABASI A L,et al.Lethality andcentrality in protein networks [J].Nature,2001,411(6833):41-42.
[8] DUNNE J A,WILLIAMS R J,MARTINEZ N D.Networkstructure and biodiversity loss in food webs:robustness increases with connectance [J].Ecology Letters,2002,5(4):558-567.
[9] NEWMAN M E J,FORREST S,BALTHROP J.Email net-works and the spread of computer viruses [J].Physical Review E Statistical Nonlinear & Soft Matter Physics,2002,66(3):1162-1167.
[10] ZHOU S,MONDRAGON R J.Redunadancy and Robustness of the AS-level Internet topology and its models [J].Electronics Letters,2004,40(2):151-152.
[11] WANG T,WU L L.Research on invulnerability of urban transit network based on complex network[J].Application Research of Computers,2010,27(11):4080-4086.(in Chinese) 汪涛,吴琳丽,基于复杂网络的城市公交网络抗毁性分析[J].计算机应用研究,2010,7(11):4080-4086.
[12] HOLME P,KIM B J,YOON C N,et al.Attack vulnerability of complex networks [J].Physical Review E Statistical Nonlinear &Soft Matter Physics,2002,65(5):634-649.
[13] WU J,TAN Y J.Study on measure of complex network invulnerability [J].Journal of Systems Engineering,2005,20(2):128-131.(in Chinese) 吴俊,谭跃进.复杂网络抗毁性测度研究[J].系统工程学报,2005,0(2):128-131.
[14] WU J,BARAHANA M,TAN Y J,et al.Natural connectivity of complex networks [J].Chinese Physics Letters,2010,27(7):078902.
[15] WU J,BARAHANA M,TANY J,et al.Spectral measure ofstructural robustness in complex networks [J].IEEE Transactions on Systems Man and Cybernetics Part A,2011,41(6):1244-1252.
[16] DEAN J,GHEMAWAT S.MapReduce:Simplified data proces-sing on large clusters[J].Communication of the ACM,2008,51(1):107-113.
[17] OUYANG M,FEI Q,YU M.Survey on Efficiency and Vulnerability of Complex Network [J].Computer Science,2008,35(6):1-4.(in Chinese) 欧阳敏,费奇,余明.复杂网络的功效性与脆弱性研究综述[J].计算机科学,2008,5(6):1-4.
[18] TAN Y J,WU J,DENG H Z.Progress in invulnerability of complex network [J],University of Shanghai for Science and Technology,2011,33(6):643-668.(in Chinese) 谭跃进,吴俊,邓宏钟.复杂网络抗毁性研究进展[J].上海理工大学学报,2011,3(6):643-668.
[19] DU Y H.The research of graph algorithm based on cloud computing [D].Beijing:Beijing University of Posts and Telecommunications,2011.(in Chinese) 杜雅红.基于云计算平台的图算法研究[D].北京:北京邮电大学计算机学院,2011.
[20] CAIDA.Topology:Macroscopic Internet Topology Data Kit (ArkITDK;restricted) [EB/OL].(2015-10-01) [2016-03-15] https://topo-data.caida.org.
[21] 汪小帆,李翔,陈关荣.复杂网络理论及其应用[M].北京:清华大学出版社,2006:10-11.
[22] XIE C,MAI L D,DU Z H,et al.Research and analysis of Parallel computing system speedup [J].Computer Engineering and Applications,2003,39(26):66-68.(in Chinese) 谢超,麦联叨,都志辉,等.关于并行计算系统中加速比的研究与分析[J].计算机工程与应用,2003,9(26):66-68.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .