计算机科学 ›› 2016, Vol. 43 ›› Issue (3): 145-150.doi: 10.11896/j.issn.1002-137X.2016.03.028

• 信息安全 • 上一篇    下一篇

基于超图的Cyber空间故障传播研究方法

王友俊,赵耘田,张红旗,张传富,杨超   

  1. 解放军信息工程大学 郑州450001河南省信息安全重点实验室 郑州450001,解放军信息工程大学 郑州450001河南省信息安全重点实验室 郑州450001,解放军信息工程大学 郑州450001河南省信息安全重点实验室 郑州450001,解放军信息工程大学 郑州450001河南省信息安全重点实验室 郑州450001,解放军信息工程大学 郑州450001河南省信息安全重点实验室 郑州450001
  • 出版日期:2018-12-01 发布日期:2018-12-01

Method for Cyberspace Failure Spreading and Diffusion Based on Hypergraph

WANG You-jun, ZHAO Yun-tian, ZHANG Hong-qi, ZHANG Chuan-fu and YANG Chao   

  • Online:2018-12-01 Published:2018-12-01

摘要: 针对现有的基于相连链路联系的故障研究方法不能准确描述Cyber空间因资源发生故障而造成的影响这个问题,提出了一种从共享任务联系的角度分析资源故障传播与扩散问题的研究方法。其基本思想是利用Petri网建模方法描述Cyber空间中任务与资源的基本关系,基于超图理论构建任务-资源模型。定义了传播能力、传播系数、扩散系数等指标来刻画故障的传播与扩散过程,采用邻接矩阵分析并推导出了这些指标的量化方法,在此基础上给出了资源故障在网络中产生的影响力的函数,最后利用案例验证了资源的故障传播和扩散过程。

关键词: Cyber空间,超图,故障传播,故障扩散,故障影响力

Abstract: Due to inaccurate evaluation of the impact on Cyberspace resource failure caused by the current link-based methods for failure spreading,a mission based method was proposed to analyze failure spreading and diffusion in Cyberspace.This article analyzed basic relations between missions and resources by utilizing the Petri net methodology,and built a task/resource model based on the hypergraph theory.This model defines concepts of spreading ability,spreading coefficient,diffusion coefficient and fault influence,which can be conducted and quantified by adjacent matrix.On this basis,the influence function of resource failure was derived.Finally,we tested process of failure spreading and diffusion in a case study.

Key words: Cyberspace,Hypergraph,Failure spreading,Failure diffusion,Failure influence

[1] Huang Zhen,Wang Cheng,Nayak A,et al.Small Cluster in Cyber Physical Systems:Network Topology,Interdependence and Cascading Failures [J].IEEE Transactions on Parallel & Distributed Systems,2015,26:2340-2351
[2] Jakobson G.Mission Cyber security situation assessment using impact dependency graphs[C]∥2011 Proceedings of the 14th International Conference on Information Fusion (FUSION).IEEE,2011:1-8
[3] Barnett A,Smith S R,Whittington R P.Using Causal Models to Manage the Cyber Threat to C2 Agility:Working with the Benefit of Hindsight[R].Defence Science and Technology L ab Porton Down(United Kingdom),2014
[4] Neuman C,Tan K.Mediating Cyber and Physical Threat Propagation in Secure Smart Grid Architectures[C]∥2011 IEEE International Conference on IEEE Smart Grid Communications (Smart Grid Comm).2011:238-243
[5] Cheng Yi,Deng Ju-lia,Li J,et al.Cyber Defense and Situational Awareness[M].Springer International Publishing,2014
[6] Halappanavar M,Choudhury S,Hogan E,et al.Towards a network-of-networks framework for cyber security[C]∥2013 IEEE International Conference on IEEE Intelligence and Security Informatics (ISI).2013:106-108
[7] Berge C.Graphes et hypergraphes[M].Dunod,Paris-Brussels-Montreal,Que.,1970
[8] Wang Zhong-tuo.Introduction to System Engineering[M].Bei-jing:Electronic Industry Press,2012(in Chinese) 王众托.系统工程引论[M].北京:电子工业出版社,2012

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!