计算机科学 ›› 2019, Vol. 46 ›› Issue (8): 138-144.doi: 10.11896/j.issn.1002-137X.2019.08.023
赵志刚1,3, 周根贵2, 李虎雄3
ZHAO Zhi-gang1,3, ZHOU Gen-gui2, LI Hu-xiong3
摘要: 文中研究在不同攻击策略下,如何提高复杂供应链网络的鲁棒性。首先,调整复杂加权供应链网络的优先连接参数,模拟实际网络的演化过程,分析供应链网络的度分布函数和介数分布函数,证实其具有无标度特征。随后,研究了加权供应链网络的多种攻击策略,统计了供应链网络的最大连通子图的相对规模和网络传输效率指标,并分析了网络的鲁棒性。仿真结果表明,对节点攻击策略而言,节点度攻击和混合攻击破坏性较大;对边攻击策略而言,双点介数攻击破坏性较大。改变网络的演化机制可以提高网络的鲁棒性,这为在实际工作中优化网络设计、保护网络中的少数重要节点和边、提高网络抗毁性能提供了一定的研究思路。
中图分类号:
[1]JI X P,WANG B,LIU D C,et al.Improving interdependent networks robustness by adding connectivity links[J].Physica A:Statistical Mechanics and its Applications,2016,444:9-19. [2]RUAN Y R,LAO S Y,WANG J D,et al.Algorithm of Significance Evaluation of Complex Network Nodes Based on Neighborhood Similarity[J].Chinese Journal of Physics,2017,66(3):365-373.(in Chinese) 阮逸润,老松杨,王竣德,等.基于邻域相似度的复杂网络节点重要度评估算法[J].物理学报,2017,66(3):365-373. [3]ZHOU J,PAN J X,CHENG K Q.Research on BBV Network Model Evolution Based on New Local World[J].Computer Engineering,2010,36(19):266-268.(in Chinese) 周健,潘家鑫,程克勤.基于新局域世界的BBV网络模型演化研究[J].计算机工程,2010,36(19):266-268. [4]MONOSTORI J.Supply Chains’ Robustness:Challenges and Opportunities[J].Procedia CIRP,2018,67:110-115. [5]LIU H,ZHOU G G,FU P H,et al.Research on Delivery Attack Strategy Based on Supply Chain Network[J].Computer Scien-ce,2013,40(7):98-101.(in Chinese) 柳虹,周根贵,傅培华,等.基于供应链网络的传递攻击策略研究[J].计算机科学,2013,40(7):98-101. [6]NIE T Y,GUO Z,ZHAO K,et al.The dynamic correlation between degree and betweenness of complex network under attack[J].Physica A:Statistical Mechanics and its Applications,2016,457:129-137. [7]ZHANG Y,XIONG J,FENG C.Analysis on Robustness of Sup- ply Chain NetworkBased on Complex Network[J].Computer Simulation,2012,29(11):370-373.(in Chinese) 张怡,熊杰,冯春.基于复杂网络的供应链网络鲁棒性分析[J].计算机仿真,2012,29(11):370-373. [8]FU C Q,WANG Y,WANG X Y,et al.Multi-node attack strategy of complex networks due to cascading breakdown[J].Chaos,Solitons and Fractals,2018,106:61-66. [9]WANG X.Research on Agri-food Supply Chain Modeling and Network Risk Propagation Based on Complex Network [D].Changchun:Jilin University,2017.(in Chinese) 王杏.基于复杂网络的农产品供应链建模与网络风险传播研究[D].长春:吉林大学,2017. [10]MAO K.Research on Stability and Robustness of Complex Network Structure[J].Computer Science,2015,42(4):85-88.(in Chinese) 毛凯.复杂网络结构的稳定性与鲁棒性研究[J].计算机科学,2015,42(4):85-88. [11]CAO W B,XIONG X.Local Evolution Mechanism of Complex Supply Chain Network Based on Edge Benefit [J].Computer Application Research,2016,33(1):75-77.(in Chinese) 曹文彬,熊曦.边效益因素下复杂供应链网络局域演化机制[J].计算机应用研究,2016,33(1):75-77. [12]LIU H,ZHOU G G,FU P H.Local Evolution Model Research of Layered Supply Chains Complex Networks [J].Computer Science,2013,40(2):270-273.(in Chinese) 柳虹,周根贵,傅培华.分层供应链复杂网络局部演化模型研究[J].计算机科学,2013,40(2):270-273. [13]BELLINGERI M,CASSI D.Robustness of weighted networks [J].Physica A:Statistical Mechanics and its Applications,2018,489:47-55. [14]LIN J H,GUO Q,DONG W Z,et al.Identifying the Node Spreading Influence with Largest K-core Values[J].Physics Letters A,2014,378(45):3279-3284. [15]SAITO K,KIMURA M,OHARA K,et al.Super mediator-A New Centrality Measure of Node Importance for Information Diffusion Over Social Network[J].Information Sciences,2016,329(C):985-1000. [16]SUN L S,HUANG Y C,CHEN Y Y,et al.Vulnerability Assessment of Urban Railtransit Based on Multi-static Weighted Method in Beijing [J].Transportation Research Part A:Policy and Practice,2018,108:12-24. |
[1] | 郝志荣, 陈龙, 黄嘉成. 面向文本分类的类别区分式通用对抗攻击方法 Class Discriminative Universal Adversarial Attack for Text Classification 计算机科学, 2022, 49(8): 323-329. https://doi.org/10.11896/jsjkx.220200077 |
[2] | 周慧, 施皓晨, 屠要峰, 黄圣君. 基于主动采样的深度鲁棒神经网络学习 Robust Deep Neural Network Learning Based on Active Sampling 计算机科学, 2022, 49(7): 164-169. https://doi.org/10.11896/jsjkx.210600044 |
[3] | 陈明鑫, 张钧波, 李天瑞. 联邦学习攻防研究综述 Survey on Attacks and Defenses in Federated Learning 计算机科学, 2022, 49(7): 310-323. https://doi.org/10.11896/jsjkx.211000079 |
[4] | 吴子斌, 闫巧. 基于动量的映射式梯度下降算法 Projected Gradient Descent Algorithm with Momentum 计算机科学, 2022, 49(6A): 178-183. https://doi.org/10.11896/jsjkx.210500039 |
[5] | 郭星辰, 俞一彪. 具有仿冒攻击检测的鲁棒性说话人识别 Robust Speaker Verification with Spoofing Attack Detection 计算机科学, 2022, 49(6A): 531-536. https://doi.org/10.11896/jsjkx.210500147 |
[6] | 杨亚红, 王海瑞. 基于Renyi熵和BiGRU算法实现SDN环境下的DDoS攻击检测方法 DDoS Attack Detection Method in SDN Environment Based on Renyi Entropy and BiGRU Algorithm 计算机科学, 2022, 49(6A): 555-561. https://doi.org/10.11896/jsjkx.210800095 |
[7] | 曹扬晨, 朱国胜, 孙文和, 吴善超. 未知网络攻击识别关键技术研究 Study on Key Technologies of Unknown Network Attack Identification 计算机科学, 2022, 49(6A): 581-587. https://doi.org/10.11896/jsjkx.210400044 |
[8] | 梁懿雯, 杜育松. 抵御计时攻击的基于Knuth-Yao的二元离散高斯采样算法 Timing Attack Resilient Sampling Algorithms for Binary Gaussian Based on Knuth-Yao 计算机科学, 2022, 49(6A): 485-489. https://doi.org/10.11896/jsjkx.210600017 |
[9] | 闫萌, 林英, 聂志深, 曹一凡, 皮欢, 张兰. 一种提高联邦学习模型鲁棒性的训练方法 Training Method to Improve Robustness of Federated Learning 计算机科学, 2022, 49(6A): 496-501. https://doi.org/10.11896/jsjkx.210400298 |
[10] | 高文龙, 周天阳, 朱俊虎, 赵子恒. 基于双向蚁群算法的网络攻击路径发现方法 Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm 计算机科学, 2022, 49(6A): 516-522. https://doi.org/10.11896/jsjkx.210500072 |
[11] | 梁珍珍, 徐明. 基于海洋水声信道的密钥协商方案 Key Agreement Scheme Based on Ocean Acoustic Channel 计算机科学, 2022, 49(6): 356-362. https://doi.org/10.11896/jsjkx.210400097 |
[12] | 宋涛, 李秀华, 李辉, 文俊浩, 熊庆宇, 陈杰. 大数据时代下车联网安全加密认证技术研究综述 Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era 计算机科学, 2022, 49(4): 340-353. https://doi.org/10.11896/jsjkx.210400112 |
[13] | 李鹏宇, 刘胜利, 尹小康, 刘昊晖. 面向Cisco IOS的ROP攻击检测方法 Detection Method of ROP Attack for Cisco IOS 计算机科学, 2022, 49(4): 369-375. https://doi.org/10.11896/jsjkx.210300153 |
[14] | 张振超, 刘亚丽, 殷新春. 适用于物联网环境的无证书广义签密方案 New Certificateless Generalized Signcryption Scheme for Internet of Things Environment 计算机科学, 2022, 49(3): 329-337. https://doi.org/10.11896/jsjkx.201200256 |
[15] | 李嘉睿, 凌晓波, 李晨曦, 李子木, 杨家海, 张蕾, 吴程楠. 基于贝叶斯攻击图的动态网络安全分析 Dynamic Network Security Analysis Based on Bayesian Attack Graphs 计算机科学, 2022, 49(3): 62-69. https://doi.org/10.11896/jsjkx.210800107 |
|