Computer Science ›› 2014, Vol. 41 ›› Issue (7): 194-199.doi: 10.11896/j.issn.1002-137X.2014.07.041

Previous Articles     Next Articles

Risk Assessment Methods of Complex Network Based on GTST-MLD

LU Zhi-gang,LIU Jun-rong and LIU Bao-xu   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Aiming at the broblems that complex information systems have the high complexity,mutual influence and interdependence,and the existing risk assessment methods are difficult to adapt to large-scale network security risk assessment and application needs of practice,we researched risk factor analysis method and the overall risk assessment methods of complex information system based on GTST-MLD,including the study of complex systems model of accidents interdependencies,risk factors model and risk conduction analysis,which improves risk assessment capabilities and level of analysis for complex information system.The results prove that the model consolidates the security features of complex information system,such as objectives,functions,structure,behavior and so on,achieves security analysis at a higher level system functions,and provides a reliable means of quantitative analysis for complex information system risk assessment.

Key words: Complex network,Information security,Risk assessment,Interdependencies,Risk conduction

[1] C&A Systems Security:The COBRA Risk Consultant MethodologyTM,July 1999
[2] NIST:Automated Security Self-Evaluation Tool(ASSET).http://csrc.nist.gov/asset
[3] Landherr A,Friedl B,Heidemann J.A critical review of centrality measures in social networks[J].Business&Information Systems Engineering,2010,2(6):371-385
[4] Kermarrec A,Merrer E L,Sericola B,et al.Second order centrality:Distributed assessment of nodes criticity in complex networks[J].Computer Communications,2011,4(5):619-628
[5] 谭跃进,吴俊,邓宏钟.复杂网络中节点重要度评估的节点收缩方法[J].系统工程理论与实践,2006,6(11):79-83
[6] 吴俊,谭跃进,邓宏钟,等.考虑级联失效的复杂网络节点重要度评估[J].小型微型计算机系统,2007,4(4):627-630
[7] 张琨,李配配,等.基于PageRank的有向加权复杂网络节点重要性评估方法[J].南京航空航天大学学报,2013,5(3):429-434
[8] Page L,Brin S,MotwaniR,et al.The PageRank citation ranking:bringing order to the Web[EB/OL].http://ilpubs.stanford.edu:8090/422/,2012-05-13
[9] Barrat A,Barthelemy M,Vespignani A.Modeling the evolution of weighted networks[J].Physical Review E,2004,0(6):1-12
[10] Chvátal V.Tough graphs and Hamiltonian circuits[J].Discrete Mathematics,1973,5(3):215-228
[11] Peng Y,Chen C,Koh K.On the edge-toughness of a graph(I)[J].Southeast AsianMath.Bull,1988,12:109-122
[12] Cunningham W H.Optimal attack and reinforcement of a network[J].Journal of the ACM(JACM),1985,32(3):549-561
[13] Zerkle D,Levitt K.Netkuang-a multi-host configuration vulnerabilitychecker[C]∥Proc.of the 6th USENIX Security Symposium.1996
[14] Albert R,Jeong H,Barabási A L.Error and attack tolerance of complexnetworks[J].Nature,2000,406(6794):378-382
[15] Cohen R,Erez K,Ben-Avraham D,et al.Resilience of the Internet torandom breakdowns[J].Physical Review Letters,2000,85(21):4626-4628
[16] Buldyrev S V,Parshani R,Gerald S,et al.Catastrophic cascadeof failures in interdependent networks[J].Nature,2010,464(7291):1025-1028
[17] Motter A E,Lai Y C.Cascade-based attacks on complex networks[J].Physical Review E,2002,66(6):65-102
[18] Wu J-J,Gao Z-Y,Sun H-J.Cascade and breakdown in scale-free networkswith community structure[J].Physical Review E,2006,74(6):66-111
[19] Wang J-W,Rong L-L.Cascade-based attack vulnerability on the US powergrid[J].Safety Science,2009,47(10):1332-1336
[20] Sun H,Zhao H,Wu J.A robust matching model of capacity to defensecascading failure on complex networks[J].Physica A:Statistical Mechanics and Its Applications,2008,387(25):6431-6435
[21] Lehmann J,Bernasconi J.Stochastic load-redistribution model for cascading failure propagation[J].Physical Review E,2010,81(3):31-129
[22] Zheng J F,Gao Z Y,Zhao X M.Clustering and congestioneffects oncascading failures of scale-free networks[J].EPL,2007,79:58002
[23] Holme P,Kim B J.Vertex overload breakdown in evolving networks[J].Physical Review E,2002,65(6):66-109
[24] 程耀东,刘宝旭,孙功星,等.高能物理与云计算[J].核电子学与探测技术,2011,31(11):1189-1194

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!