计算机科学 ›› 2019, Vol. 46 ›› Issue (8): 138-144.doi: 10.11896/j.issn.1002-137X.2019.08.023

• 网络与通信 • 上一篇    下一篇

复杂加权供应链网络攻击策略和鲁棒性研究

赵志刚1,3, 周根贵2, 李虎雄3   

  1. (浙江工业大学计算机科学与技术学院 杭州310014)1
    (浙江工业大学经贸管理学院 杭州310014)2
    (浙江传媒学院 杭州310018)3
  • 收稿日期:2018-06-04 出版日期:2019-08-15 发布日期:2019-08-15
  • 通讯作者: 周根贵(1958-),男,博士,教授,博士生导师,主要研究方向为人工智能、供应链网络分析,E-mail:ggzhou@zjut.edu.cn
  • 作者简介:赵志刚(1976-),男,博士生,副教授,CCF会员,主要研究方向为复杂网络系统,E-mail:zhaozhig2006@126.com;李虎雄(1971-),男,博士,教授,主要研究方向为模式识别
  • 基金资助:
    国家自然科学基金(U1509220),“计算机科学与技术”一流学科(Z511B17503),浙江省基础公益研究计划项目(LGG18F030003),浙江传媒学院第14批教学改革项目(jgxm201929)

Study on Attack Strategy and Robustness of Complex Weighted Supply Chain Network

ZHAO Zhi-gang1,3, ZHOU Gen-gui2, LI Hu-xiong3   

  1. (College of Computer Science and Technology,Zhejiang University of Technology,Hangzhou 310014,China)1
    (College of Economics and Management,Zhejiang University of Technology,Hangzhou 310014,China)2
    (Communication University of Zhejiang,Hangzhou 310018,China)3
  • Received:2018-06-04 Online:2019-08-15 Published:2019-08-15

摘要: 文中研究在不同攻击策略下,如何提高复杂供应链网络的鲁棒性。首先,调整复杂加权供应链网络的优先连接参数,模拟实际网络的演化过程,分析供应链网络的度分布函数和介数分布函数,证实其具有无标度特征。随后,研究了加权供应链网络的多种攻击策略,统计了供应链网络的最大连通子图的相对规模和网络传输效率指标,并分析了网络的鲁棒性。仿真结果表明,对节点攻击策略而言,节点度攻击和混合攻击破坏性较大;对边攻击策略而言,双点介数攻击破坏性较大。改变网络的演化机制可以提高网络的鲁棒性,这为在实际工作中优化网络设计、保护网络中的少数重要节点和边、提高网络抗毁性能提供了一定的研究思路。

关键词: K-核, 复杂加权网络, 攻击, 节点强度, 介数, 鲁棒性

Abstract: This paper studied how to improve the robustness of complex supply chain network under different attack strategies.First of all,the priority connection parameters of the complex weighted supply chain network were adjusted,the evolutionary process of the actual network was simulated,supply chain network’s degree distribution function and betweenness distribution function were analyzed,and its scale-free characteristics were verified.Then,various attack strategies of weighted supply chain network were studied.The statistics on relative size of maximal connected subgraph and network efficiency index of supply chain network were conducted,and the robustness of network was analyzed.The simulation results show that the node degree attack and the blend attack are more destructive for node attack strategy,and double-point betweenness attack is more destructive for edge attack strategy.The robustness of network can be improved by changing network’s evolution mechanism,which provides certain research thoughts on how to optimize network design,protect few important nodes and edges in the network and improve network invulnerability in practical works

Key words: K-core, Attack, Betweenness, Complex weighted network, Node strength, Robustness

中图分类号: 

  • TP311
[1]JI X P,WANG B,LIU D C,et al.Improving interdependent networks robustness by adding connectivity links[J].Physica A:Statistical Mechanics and its Applications,2016,444:9-19.
[2]RUAN Y R,LAO S Y,WANG J D,et al.Algorithm of Significance Evaluation of Complex Network Nodes Based on Neighborhood Similarity[J].Chinese Journal of Physics,2017,66(3):365-373.(in Chinese) 阮逸润,老松杨,王竣德,等.基于邻域相似度的复杂网络节点重要度评估算法[J].物理学报,2017,66(3):365-373.
[3]ZHOU J,PAN J X,CHENG K Q.Research on BBV Network Model Evolution Based on New Local World[J].Computer Engineering,2010,36(19):266-268.(in Chinese) 周健,潘家鑫,程克勤.基于新局域世界的BBV网络模型演化研究[J].计算机工程,2010,36(19):266-268.
[4]MONOSTORI J.Supply Chains’ Robustness:Challenges and Opportunities[J].Procedia CIRP,2018,67:110-115.
[5]LIU H,ZHOU G G,FU P H,et al.Research on Delivery Attack Strategy Based on Supply Chain Network[J].Computer Scien-ce,2013,40(7):98-101.(in Chinese) 柳虹,周根贵,傅培华,等.基于供应链网络的传递攻击策略研究[J].计算机科学,2013,40(7):98-101.
[6]NIE T Y,GUO Z,ZHAO K,et al.The dynamic correlation between degree and betweenness of complex network under attack[J].Physica A:Statistical Mechanics and its Applications,2016,457:129-137.
[7]ZHANG Y,XIONG J,FENG C.Analysis on Robustness of Sup- ply Chain NetworkBased on Complex Network[J].Computer Simulation,2012,29(11):370-373.(in Chinese) 张怡,熊杰,冯春.基于复杂网络的供应链网络鲁棒性分析[J].计算机仿真,2012,29(11):370-373.
[8]FU C Q,WANG Y,WANG X Y,et al.Multi-node attack strategy of complex networks due to cascading breakdown[J].Chaos,Solitons and Fractals,2018,106:61-66.
[9]WANG X.Research on Agri-food Supply Chain Modeling and Network Risk Propagation Based on Complex Network [D].Changchun:Jilin University,2017.(in Chinese) 王杏.基于复杂网络的农产品供应链建模与网络风险传播研究[D].长春:吉林大学,2017.
[10]MAO K.Research on Stability and Robustness of Complex Network Structure[J].Computer Science,2015,42(4):85-88.(in Chinese) 毛凯.复杂网络结构的稳定性与鲁棒性研究[J].计算机科学,2015,42(4):85-88.
[11]CAO W B,XIONG X.Local Evolution Mechanism of Complex Supply Chain Network Based on Edge Benefit [J].Computer Application Research,2016,33(1):75-77.(in Chinese) 曹文彬,熊曦.边效益因素下复杂供应链网络局域演化机制[J].计算机应用研究,2016,33(1):75-77.
[12]LIU H,ZHOU G G,FU P H.Local Evolution Model Research of Layered Supply Chains Complex Networks [J].Computer Science,2013,40(2):270-273.(in Chinese) 柳虹,周根贵,傅培华.分层供应链复杂网络局部演化模型研究[J].计算机科学,2013,40(2):270-273.
[13]BELLINGERI M,CASSI D.Robustness of weighted networks [J].Physica A:Statistical Mechanics and its Applications,2018,489:47-55.
[14]LIN J H,GUO Q,DONG W Z,et al.Identifying the Node Spreading Influence with Largest K-core Values[J].Physics Letters A,2014,378(45):3279-3284.
[15]SAITO K,KIMURA M,OHARA K,et al.Super mediator-A New Centrality Measure of Node Importance for Information Diffusion Over Social Network[J].Information Sciences,2016,329(C):985-1000.
[16]SUN L S,HUANG Y C,CHEN Y Y,et al.Vulnerability Assessment of Urban Railtransit Based on Multi-static Weighted Method in Beijing [J].Transportation Research Part A:Policy and Practice,2018,108:12-24.
[1] 郝志荣, 陈龙, 黄嘉成.
面向文本分类的类别区分式通用对抗攻击方法
Class Discriminative Universal Adversarial Attack for Text Classification
计算机科学, 2022, 49(8): 323-329. https://doi.org/10.11896/jsjkx.220200077
[2] 周慧, 施皓晨, 屠要峰, 黄圣君.
基于主动采样的深度鲁棒神经网络学习
Robust Deep Neural Network Learning Based on Active Sampling
计算机科学, 2022, 49(7): 164-169. https://doi.org/10.11896/jsjkx.210600044
[3] 陈明鑫, 张钧波, 李天瑞.
联邦学习攻防研究综述
Survey on Attacks and Defenses in Federated Learning
计算机科学, 2022, 49(7): 310-323. https://doi.org/10.11896/jsjkx.211000079
[4] 吴子斌, 闫巧.
基于动量的映射式梯度下降算法
Projected Gradient Descent Algorithm with Momentum
计算机科学, 2022, 49(6A): 178-183. https://doi.org/10.11896/jsjkx.210500039
[5] 郭星辰, 俞一彪.
具有仿冒攻击检测的鲁棒性说话人识别
Robust Speaker Verification with Spoofing Attack Detection
计算机科学, 2022, 49(6A): 531-536. https://doi.org/10.11896/jsjkx.210500147
[6] 杨亚红, 王海瑞.
基于Renyi熵和BiGRU算法实现SDN环境下的DDoS攻击检测方法
DDoS Attack Detection Method in SDN Environment Based on Renyi Entropy and BiGRU Algorithm
计算机科学, 2022, 49(6A): 555-561. https://doi.org/10.11896/jsjkx.210800095
[7] 曹扬晨, 朱国胜, 孙文和, 吴善超.
未知网络攻击识别关键技术研究
Study on Key Technologies of Unknown Network Attack Identification
计算机科学, 2022, 49(6A): 581-587. https://doi.org/10.11896/jsjkx.210400044
[8] 梁懿雯, 杜育松.
抵御计时攻击的基于Knuth-Yao的二元离散高斯采样算法
Timing Attack Resilient Sampling Algorithms for Binary Gaussian Based on Knuth-Yao
计算机科学, 2022, 49(6A): 485-489. https://doi.org/10.11896/jsjkx.210600017
[9] 闫萌, 林英, 聂志深, 曹一凡, 皮欢, 张兰.
一种提高联邦学习模型鲁棒性的训练方法
Training Method to Improve Robustness of Federated Learning
计算机科学, 2022, 49(6A): 496-501. https://doi.org/10.11896/jsjkx.210400298
[10] 高文龙, 周天阳, 朱俊虎, 赵子恒.
基于双向蚁群算法的网络攻击路径发现方法
Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm
计算机科学, 2022, 49(6A): 516-522. https://doi.org/10.11896/jsjkx.210500072
[11] 梁珍珍, 徐明.
基于海洋水声信道的密钥协商方案
Key Agreement Scheme Based on Ocean Acoustic Channel
计算机科学, 2022, 49(6): 356-362. https://doi.org/10.11896/jsjkx.210400097
[12] 宋涛, 李秀华, 李辉, 文俊浩, 熊庆宇, 陈杰.
大数据时代下车联网安全加密认证技术研究综述
Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era
计算机科学, 2022, 49(4): 340-353. https://doi.org/10.11896/jsjkx.210400112
[13] 李鹏宇, 刘胜利, 尹小康, 刘昊晖.
面向Cisco IOS的ROP攻击检测方法
Detection Method of ROP Attack for Cisco IOS
计算机科学, 2022, 49(4): 369-375. https://doi.org/10.11896/jsjkx.210300153
[14] 张振超, 刘亚丽, 殷新春.
适用于物联网环境的无证书广义签密方案
New Certificateless Generalized Signcryption Scheme for Internet of Things Environment
计算机科学, 2022, 49(3): 329-337. https://doi.org/10.11896/jsjkx.201200256
[15] 李嘉睿, 凌晓波, 李晨曦, 李子木, 杨家海, 张蕾, 吴程楠.
基于贝叶斯攻击图的动态网络安全分析
Dynamic Network Security Analysis Based on Bayesian Attack Graphs
计算机科学, 2022, 49(3): 62-69. https://doi.org/10.11896/jsjkx.210800107
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!