Computer Science ›› 2016, Vol. 43 ›› Issue (8): 26-29.doi: 10.11896/j.issn.1002-137X.2016.08.005

Previous Articles     Next Articles

Multilayer Topology Structural Vulnerability Analysis Algorithm for Large-scale Distributed System

KUANG Xiao-hui, LI Jin and ZHAO Gang   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Structural vulnerability is a typical type of vulnerabilities on large-scale distributed system.Aiming at the complex relation between entities and redundancy mechanism in large-scale distributed system,a new multi-topology model was proposed.Based on entity topology model structural vulnerability analysis algorithm,a new LDS low layer structural vulnerability analysis algorithm was put forward.The algorithm was verified by implementation and evaluation.

Key words: Structural vulnerability,Multi-topology module,Vulnerability analysis

[1] Helsinger A,Ferguson W,Lazarus R.Exploring large-scale,distributed system behavior with a focus on information assurance[C]∥IEEE Computer Society.2001:1273-1286
[2] Qiang W Z,Zou D Q,Jin H.Research on Privacy Preservation Mechanism for Credentials and Policies in Grid Computing Environment[J].Journal of Computer Research & Development,2007,4(1):11-19(in Chinese) 羌卫中,邹德清,金海.网格环境中证书和策略的隐私保护机制研究[J].计算机研究与发展,2007,44(1):11-19
[3] Lu Z,Yu Y,et al.A theory of structural vulnerability [J].Structural Engineer,1999,77(18):17-24
[4] Agarwal J,Blockley D I,Woodman N J.Vulnerability of 3Dtrusses[J].Structural Safety,2001,23(3):203-220
[5] Albert R,Albert I,Nakarado G L.Structural vulnerability of the North American power grid[J].Phys.Rev.E Statistical Nonlinear & Soft Matter Physics,2004,9(2):292-313
[6] Rosas-Casals M,Valverde S,Solé R.Topological vulnerability of the European power grid under errors and attacks[J].International Journal of Bifurcations and Chaos,2007,17(7):2465-2475
[7] Jenelius E,Petersen T,Mattson L.Importance and exposure in road network vulnerability analysis [J].Transportation Research,2008,40:537-560
[8] DallAsta L,Barrat A,Barth′elemy M,et al.Vulnerability ofweighted networks [J].J.Stat.Mech,2006,5(4):04006
[9] Wang S,Hong L,Chen X.Vulnerability analysis of interdepen-dent infrastructure systems:A methodological framework[J].Physical A:Stat.Mech.Its Appl.,2012,391(11):3323-3335
[10] Yan J,He H,Sun Y.Integrated security analysis on cascading failure in complex networks[J].IEEE Trans.Inf.Forensics Security,2014,9(3):451-463
[11] Koc Y,Raman A,Warnier M,et al.Structural Vulnerability Analysis of Electric Power Distribution Grids[J].arXiv preprint arXiv:1506.08641,2015
[12] Farago A.A graph theoretic model for complex network failure scenarios[C]∥INFORMS.2006
[13] Kurant M,Thiran P.Survivable Mapping Algorithm by RingTrimming (SMART) for large IP-over-WDM networks[C]∥Proceedings of BroadNets.San Jose,California,USA,2004:25-29
[14] Zhou Z,Lin T,Thulasiraman K,et al.Cross-Layer NetworkSurvivability Under Multiple Cross-Layer Metrics[J].Journal of Optical Communications and Networking,2015,7(6):540-553
[15] Zhao Gang,Kuang Xiao-hui,Li Jin,et al.A Structural Vulnerability Analysis Algorithm for Large-Scale Distributed System[J].Journal of Computer Research & Development,2011,8(5):906-912(in Chinese) 赵刚,况晓辉,李津,等.一种基于权值的大规模分布式系统结构脆弱性分析算法[J].计算机研究与发展,2011,48(5):906-912

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!