计算机科学 ›› 2013, Vol. 40 ›› Issue (7): 98-101.

• 信息安全 • 上一篇    下一篇

基于供应链网络的传递攻击策略研究

柳虹,周根贵,傅培华,毛国红   

  1. 浙江工业大学信息学院 杭州310014;浙江工商大学计算机与信息工程学院 杭州310018;浙江工业大学经贸管理学院 杭州310014;浙江工商大学计算机与信息工程学院 杭州310018;浙江工业大学信息学院 杭州310014
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金项目(71071142,8),浙江省电子商务技术科技创新团队项目(2012R10041-20)资助

Research of Transferring Attack Based on Supply Chain Network

LIU Hong,ZHOU Gen-gui,FU Pei-hua and MAO Guo-hong   

  • Online:2018-11-16 Published:2018-11-16

摘要: 为了分析突发事件对供应链网络整体功能的影响,基于复杂网络理论,考虑节点失效性能的传递性,提出了传递攻击策略,用其模拟供应链系统中的供求失效,进而分析供应链网络在受到攻击时的 脆弱性和鲁棒性。实验结果表明,传递攻击能够很好地模拟供应链网络中的供求失效,且供应链网络面对传递攻击时,网络结构表现得比较脆弱;同时也说明了该攻击策略是可行的,具有一定的现实意义。

关键词: 复杂网络,供应链,节点失效,传递攻击,脆弱性,鲁棒性 中图法分类号TP311文献标识码A

Abstract: Unexpected events have negative impacts on the whole performance of supply chain network.Based on complex networks theory,and considering the transferring characteristic of nodes’ invalidation performance,this paper put forward a transferring attack strategy to simulate supply disruption and demand disruption of supply chain system,and further analyse the frangibility and robust of supply chain network.A hypothetical supply chain network was constructed to illustrate the proposed attack strategy.The experiments’ results show that such proposed attack strategy can well simulate supply disruption and demand disruption of supply chain system,and for suffering the transferring attack,supply chain network exhibits some frangible.And it also illuminates such strategy is feasible and has some realization significance.

Key words: Complex network,Supply chain,Node invalidation,Transferring attack,Frangibility,Robust

[1] Kuhnert C,Helbing D.Scaling laws in urban supply networks[J].Physica A,2006,363(1):89-95
[2] Helbing D.Information and material flows in complex networks[J].Physica A,2006,363(1):xi-xvi
[3] Albert R,Jeong H,Barabhsi A L.The Internet’s Achilles’Heel:Error and attack tolerance of complex networks[J].Namre (London) (S0028-0836),2000,6:378-382
[4] Barabasi A L,Albert R.Emergence of Scaling in Random Networks[J].Science,1999,286(5439):509-512
[5] Thadakamlla H P,Raghavan U N,Kumara S,et al.Survivability of multiagent-based supply networks:a topological perspective[J].Intelligent Systems and Their Application,2004,19(5):24-31
[6] Latora V,Marchiori M.Vulnerability and Protection of Infra-structure Networks[J].Physical Review E,2005,1(1):015103
[7] 刘小锋,陈国华.基于复杂网络的供应链鲁棒性分析[J].东南大学学报:自然科学版,2007,6:147-150
[8] 姜洪权,高建民,陈富民,等.基于网络特性的分布式复杂机电系统脆弱性分析[J].计算机集成制造系统,2009,15(4):791-796
[9] 闫妍,刘晓,庄新田.基于复杂网络理论的供应链级联效应检测方法[J].上海交通大学学报,2010,4(3):322-325
[10] Petrovic D,Roy R,Petrovic R.supply chain modeling using fuzzysets[J].International Journal of Production Economics,1999,59(1):443-453
[11] Freeman L.A set of Measures of centrality based upon betweenness[J].Sociometry,1977,40(1):35-41
[12] Latora V A,Marchiori M.Efficient Behavior of Small-WorldNetworks[J].Phys.Rev.Lett.,2001,87(19):198701
[13] Motter A E,Lai Ying-cheng.Cascade-based attacks on complex networks [J].Phys.Rev.E,2002,66(6)

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!