Computer Science ›› 2015, Vol. 42 ›› Issue (8): 161-165, 202.

Previous Articles     Next Articles

Research on Invulnerability of IPv6 AS-level Internet

QIN Li, HUANG Shu-guang and CHEN Xiao   

  • Online:2018-11-14 Published:2018-11-14

Abstract: With the rapid development of Internet and the Internet of Things,it is an inevitable trend to transfer the communication protocol from IPv4 to IPv6.This paper collected the latest IPv6 AS-level Internet data from the project of CAIDA Ark(2014.6).By modeling this data based on complex network,we found that the IPv6 Internet also has small-world and scale-free properties.Furthermore,on the basis of analyzing the structure of the IPv4 Internet and the commonly measures of invulnerability,we proposed the measures of invulnerability for the IPv6 Internet and the method of how to do the invulnerability experiment.The results show that this measures can do well in describing the performance of invulnerability.Under different attack strategies,of which the attack based on the order of degree can make the largest effect of damage,we found that the IPv6 Internet has the characteristics of robustness and vulnerability.

Key words: Complex network,IPv6,AS-level Internet,Invulnerability

[1] 王大东,王洪军,王瑞,等.一种基于AS的Internet拓扑模型[J].计算机工程,2005,1(4):23-25 Wang Da-dong,Wang Hong-jun,Wang Rui,et al.A model of Internet topology based on AS[J].Computer Engineering,2005,1(4):23-25
[2] 付大愚,赵海,张君,等.AS级Internet拓扑幂率和节点时效分析[J].计算机科学,2009,6(9):21-24 Fu Da-yu,Zhao Hai,Zhang Jun,et al.AS-level Internet topology power-law and node aging analysis[J].Computer Science,2009,6(9):21-24
[3] Ellison B,Fisher A D,Linger R C,et al.Survivable network systems:an emerging discipline[R].Pittsburgh:Carnegie Mellon University,1997
[4] 谭跃进,吕欣,吴俊,等.复杂网络抗毁性研究若干问题的思考[J].系统工程理论与实践,2008,28(增刊):116-120 Tan Yue-jin,Lv Xin,Wu Jun,et al.On the invulnerability research of complex networks[J].Systems Engineering-Theory & Practice,2008,8(suppl):116-120
[5] Albert R,Jeong H,Barabási A.Error and attack tolerance of complex networks[J].Nature,2000,6(8064):378-382
[6] Albert R,Barabasi A L,et al.Statistical mechanics of complex networks [J].Revv Mod Phys,2002(74):47-97
[7] Zhou Shi,Mondragón R J.Redundancy and Robustness of the AS-level Internet topology and its models[J].Electronics Letters,2004,0(2):151-152
[8] 汪涛,吴琳丽.基于复杂网络的城市公交网络抗毁性分析[J].计算机应用研究,2010,7(11):4084-4086 Wang Tao,Wu Lin-li.Research on invulnerability of erban transit network based on complex network[J].Application Research of Computers,2010,7(11):4084-4086
[9] 谢丰,程苏琦,陈冬青,等.基于级联失效的复杂网络抗毁性[J].清华大学学报(自然科学版),2011,51(10):1342-1347 Xie Feng,Cheng Su-qi,Chen Dong-qing,et al.Cascade-based attack vulnerability in complex networks[J].Journal of Tsinghua University(Science and Technology),2011,1(10):1342-1347
[10] 曾小舟,唐笑笑,江可申.基于复杂网络理论的中国航空网络抗毁性测度分析[J].系统仿真技术,2012,8(2):111-116 Zeng Xiao-zhou,Tang Xiao-xiao,Jiang Ke-shen,et al.Measure of China airline networks invulnerability based on complex networks[J].System Simulation Technology,2012,8(2):111-116
[11] 黄仁全,李为民,董雯,等.不同攻击策略下作战体系网络抗毁性研究[J].复杂系统与复杂性科学,2012,9(3):62-69 Huang Ren-quan,Li Wei-min,Dong Wen,et al.Research on the invulnerability of combat SoS under different attack strategies[J].Complex Systems and Complexity Science,2012,9(3):62-69
[12] 种鹏云,帅斌.基于复杂网络的危险品运输网络抗毁性测度分析[J].系统工程理论与实践,2014,4(5):1059-1065 Chong Peng-yun,Shuai Bin.Model of cascading failure in hazardous materials transportation network under series of terrorist attacks[J].Systems Engineering-Theory&Practice,2014,4(4):1059-1065
[13] Watts D J,Strogatz S H.Collective dynamics of '“small-world”' networks[J].Nature,1998,3(6684):440-442
[14] Barabási A-l,Albert R.Emergence of scaling in random networks [J].Science,1999,6(5439):509-512
[15] 汪小帆,李翔,陈关荣.网络科学导论[M].北京:高等教育出版社,2012:158-159 Wang Xiao-fan,Li Xiang,Chen Guan-rong.NetWork Science:An Introduce[M].Beijing:Higher Education Press,2012:158-159
[16] 于会,刘尊,李勇军.基于多属性决策的复杂网络节点重要性综合评价方法[J].物理学报,2013,2(2):20204-9 Yu Hui,Liu Zun,Li Yong-Jun,et al.Key nodes in complex networks identified by multi-attribute decision-making method[J].Acta Physica Sinica,2013,2(2):20204-9
[17] Fruchterman T M J,Reingold E M.Graph Drawing by Force-directed Placement[J].Software-practice and Experience,1991,1(11):1129-1164
[18] Holme P,Kim B J,Yoon C N,et al.Attack vulnerability of complex networks[J].Physical Review E,2002,65(5):56-109
[19] Jeong H,Mason S,Barabási A l,et al.Lethality and centrality in protein networks[J].Nature,2001(411):41-42
[20] Qi Xing-qin,Duval R D,Christensen K,et al.Terrorist Net-works,Network Energy and Node Removal A New Measure of Centrality Based on Laplacian Energy[J].Scientific Research,2013,10(4236):19-31

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .