Computer Science ›› 2022, Vol. 49 ›› Issue (11A): 210800249-6.doi: 10.11896/jsjkx.210800249

• Information Security • Previous Articles     Next Articles

Heuristic Method for Building Internet Multilayer Network Model

CHENG Qiu-yun, LIU Jing-ju, YANG Guo-zheng, LUO Zhi-hao   

  1. College of Electronic Engineering,National University of Defense Technology,Hefei 230037,China
    Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation,Hefei 230037,China
  • Online:2022-11-10 Published:2022-11-21
  • About author:CHENG Qiu-yun,born in 1998,postgraduate.Her main research interests include cyberspace security situation awareness and multilayer network.
    YANG Guo-zheng,born in 1982,assistant professor.His main research intere-sts include cyberspace security situation awareness and multilayer network.

Abstract: With the continuous expansion of network scale,the characteristics of hierarchical and modular network structures are increasingly prominent.Traditional single-layer network research paradigm has some limitations in representing the complex relationships among various network systems.The characteristic analysis and model construction of multilayer networks have gradually become an important direction of complex network research.Aiming at the characteristics of multilayer network structure presented in the application of Internet,this paper puts forward the multilayer network model for the Internet and the significance of constructing a multilayer network model in the field of Internet.By analyzing the characteristics of Internet data,this paper designs a multilayer network model covering three types of networks,namely,the Internet infrastructure layer,the business application layer,and the user account layer.This paper proposes a heuristic single-layer network generation model to solve the problem that the current network generation model based on node degree cannot describe the distribution of network cores.Based on the generation model of a single-layer network,the interlayer association method of a multilayer network is designed to realize the model construction of a multilayer network.

Key words: Internet, Heuristic, Core distribution, Multilayer network, Model construction

CLC Number: 

  • TP393
[1]BOCCALETTI S,BIANCONI G,CRIADO R,et al.The structure and dynamics of multilayer networks[J].Physics Reports,2014,544(1):1-122.
[2]KIVELA M,ARENAS A,BARTHELEMY M,et al.Multilayer Networks[J].Journal of Complex Networks,2014,2(3):203-271.
[3]ZHANG X.Advances in Multi-layer Complex Network Theory:Concepts,Theories and Data [J].Complex Systems and Complexity Science,2015,12(2):103-107.
[4]MORENO Y,PERC M.Focus on multilayer networks [J].New Journal of Physics,2020,22(1):10-201.
[5]DOMENICO M D,SOLÉ-RIBALTA A,COZZO E,et al.Mathematical Formulation of Multi-Layer Networks [J].Physical Review X,2014,3(4):4192-4195.
[6]INTERDONATO R,MAGNANI M,PERNA D,et al.Multilayer network simplification:Approaches,models and methods[J].Computer Science Review,2020,36:100-246.
[7]LU J N.From single-layer network to multi-layer network-Structure,Dynamics and Function [J].Knowledge of Modern Physics,2015,1(4):6-12.
[8]MAGNANI M,ROSSI L.The ML-Model for Multi-layer SocialNetworks[C]//International Conference on Advances in Social Networks Analysis & Mining.IEEE,2011.
[9]DING R,UJANG N,HAMID H B,et al.Application of complex networks theory in urban traffic network researches[J].Networks and Spatial Economics,2019,19(4):1281-1317.
[10]FAN D M,WANG J L.Research on the spread of rumors on multi-layer social networks [J].Journal of Anhui Agricultural University:Social Science Edition,2020,29(4):8-18.
[11]WANG X L,ZHU L N,SHI Z B.Science Technology and Engineering,2020,20(3):1243-1249.
[12]XU K J,WU J Y,YANG Y,et al.Multilayer Analysis of China’sAirline Network Structure [J].Complex Systems and Complexity Science,2020,17(2):8.
[13]WANG Y F.Research on The Characteristics of Chinese Aviation Network Based on Kernel Controllable Network Model [D].Beijing:Beijing Jiaotong University.
[14]NICOSIA V,BIANCONI G,LATORA V,et al.Growing Multiplex Networks[J].Physical Review Letters,2013,111(5):058701.
[15]NICOSIA V,BIANCONI G,LATORA V,et al.Non-lineargrowth and condensation in multiplex networks[J].Physical Review E Statistical Nonlinear & Soft Matter Physics,2014,90(4):042807.
[16]MAGNANI M,ROSSI L.Formation of multiple networks[C]//International Conference on Social Computing,Behavioral-Cultural Modeling,and Prediction.Berlin:Springer,2013:257-264.
[17]MIN B,DO YI S,LEE K M,et al.Network robustness of multiplex networks with interlayer degree correlations[J].Physical Review E,2014,89(4):042811.
[18]DE DOMENICO M,SOLÉ-RIBALTA A,OMODEI E,et al.Centrality in interconnected multilayer networks[J].arXiv:1311.2906,2013.
[19]PATRINOS A N,HAKIMI S L.Relations between graphs and integer-pair sequences[J].Discrete Mathematics,1976,15(4):347-358.
[20]BIANCONI G.Statistical Mechanics of Multiplex Ensembles:Entropy and Overlap[J].Physical Review E,2013,87(6):062806.
[1] CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112.
[2] WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9.
[3] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[4] ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743.
[5] DONG Dan-dan, SONG Kang. Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System [J]. Computer Science, 2022, 49(6): 19-24.
[6] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[7] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[8] ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337.
[9] GENG Hai-jun, WANG Wei, YIN Xia. Single Node Failure Routing Protection Algorithm Based on Hybrid Software Defined Networks [J]. Computer Science, 2022, 49(2): 329-335.
[10] YU Sai-sai, WANG Xiao-juan, ZHANG Qian-qian. Detection of Malicious Behavior in Encrypted Traffic Based on Heuristic Search Feature Selection [J]. Computer Science, 2022, 49(11A): 210800237-6.
[11] CHEN Bin, XU Huan, XI Jian-fei, LEI Mei-lian, ZHANG Rui, QIN Shi-han. Power Internet of Things Device Access Management Based on Cryptographic Accumulator [J]. Computer Science, 2022, 49(11A): 210900218-6.
[12] WANG Chen-hua, HOU Shou-lu, LIU Xiu-lei. Cost-aware IoT Data Processing in Edge-Cloud Collaborative Computing [J]. Computer Science, 2022, 49(11A): 211000101-7.
[13] ZHANG Xiao-mei, CAO Ying, LOU Ping, JIANG Xue-mei, YAN Jun-wei, LI Da. Lossless Data Compression Method Based on Edge Computing [J]. Computer Science, 2022, 49(11A): 210500195-6.
[14] LIU Wen-wen, XIONG Wei, HAN Chi. Communication Satellite Task Relaxation Scheduling Method Based on Improved Hyper-heuristic Algorithm [J]. Computer Science, 2022, 49(11A): 210900125-6.
[15] LI Dun-feng, XIAO Yao, FENG Yong. Efficient Routing Strategy for IoT Data Transaction Based on Payment Channel Network [J]. Computer Science, 2022, 49(11A): 211100010-5.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!