Computer Science ›› 2019, Vol. 46 ›› Issue (8): 138-144.doi: 10.11896/j.issn.1002-137X.2019.08.023

• Network & Communication • Previous Articles     Next Articles

Study on Attack Strategy and Robustness of Complex Weighted Supply Chain Network

ZHAO Zhi-gang1,3, ZHOU Gen-gui2, LI Hu-xiong3   

  1. (College of Computer Science and Technology,Zhejiang University of Technology,Hangzhou 310014,China)1
    (College of Economics and Management,Zhejiang University of Technology,Hangzhou 310014,China)2
    (Communication University of Zhejiang,Hangzhou 310018,China)3
  • Received:2018-06-04 Online:2019-08-15 Published:2019-08-15

Abstract: This paper studied how to improve the robustness of complex supply chain network under different attack strategies.First of all,the priority connection parameters of the complex weighted supply chain network were adjusted,the evolutionary process of the actual network was simulated,supply chain network’s degree distribution function and betweenness distribution function were analyzed,and its scale-free characteristics were verified.Then,various attack strategies of weighted supply chain network were studied.The statistics on relative size of maximal connected subgraph and network efficiency index of supply chain network were conducted,and the robustness of network was analyzed.The simulation results show that the node degree attack and the blend attack are more destructive for node attack strategy,and double-point betweenness attack is more destructive for edge attack strategy.The robustness of network can be improved by changing network’s evolution mechanism,which provides certain research thoughts on how to optimize network design,protect few important nodes and edges in the network and improve network invulnerability in practical works

Key words: K-core, Attack, Betweenness, Complex weighted network, Node strength, Robustness

CLC Number: 

  • TP311
[1]JI X P,WANG B,LIU D C,et al.Improving interdependent networks robustness by adding connectivity links[J].Physica A:Statistical Mechanics and its Applications,2016,444:9-19.
[2]RUAN Y R,LAO S Y,WANG J D,et al.Algorithm of Significance Evaluation of Complex Network Nodes Based on Neighborhood Similarity[J].Chinese Journal of Physics,2017,66(3):365-373.(in Chinese) 阮逸润,老松杨,王竣德,等.基于邻域相似度的复杂网络节点重要度评估算法[J].物理学报,2017,66(3):365-373.
[3]ZHOU J,PAN J X,CHENG K Q.Research on BBV Network Model Evolution Based on New Local World[J].Computer Engineering,2010,36(19):266-268.(in Chinese) 周健,潘家鑫,程克勤.基于新局域世界的BBV网络模型演化研究[J].计算机工程,2010,36(19):266-268.
[4]MONOSTORI J.Supply Chains’ Robustness:Challenges and Opportunities[J].Procedia CIRP,2018,67:110-115.
[5]LIU H,ZHOU G G,FU P H,et al.Research on Delivery Attack Strategy Based on Supply Chain Network[J].Computer Scien-ce,2013,40(7):98-101.(in Chinese) 柳虹,周根贵,傅培华,等.基于供应链网络的传递攻击策略研究[J].计算机科学,2013,40(7):98-101.
[6]NIE T Y,GUO Z,ZHAO K,et al.The dynamic correlation between degree and betweenness of complex network under attack[J].Physica A:Statistical Mechanics and its Applications,2016,457:129-137.
[7]ZHANG Y,XIONG J,FENG C.Analysis on Robustness of Sup- ply Chain NetworkBased on Complex Network[J].Computer Simulation,2012,29(11):370-373.(in Chinese) 张怡,熊杰,冯春.基于复杂网络的供应链网络鲁棒性分析[J].计算机仿真,2012,29(11):370-373.
[8]FU C Q,WANG Y,WANG X Y,et al.Multi-node attack strategy of complex networks due to cascading breakdown[J].Chaos,Solitons and Fractals,2018,106:61-66.
[9]WANG X.Research on Agri-food Supply Chain Modeling and Network Risk Propagation Based on Complex Network [D].Changchun:Jilin University,2017.(in Chinese) 王杏.基于复杂网络的农产品供应链建模与网络风险传播研究[D].长春:吉林大学,2017.
[10]MAO K.Research on Stability and Robustness of Complex Network Structure[J].Computer Science,2015,42(4):85-88.(in Chinese) 毛凯.复杂网络结构的稳定性与鲁棒性研究[J].计算机科学,2015,42(4):85-88.
[11]CAO W B,XIONG X.Local Evolution Mechanism of Complex Supply Chain Network Based on Edge Benefit [J].Computer Application Research,2016,33(1):75-77.(in Chinese) 曹文彬,熊曦.边效益因素下复杂供应链网络局域演化机制[J].计算机应用研究,2016,33(1):75-77.
[12]LIU H,ZHOU G G,FU P H.Local Evolution Model Research of Layered Supply Chains Complex Networks [J].Computer Science,2013,40(2):270-273.(in Chinese) 柳虹,周根贵,傅培华.分层供应链复杂网络局部演化模型研究[J].计算机科学,2013,40(2):270-273.
[13]BELLINGERI M,CASSI D.Robustness of weighted networks [J].Physica A:Statistical Mechanics and its Applications,2018,489:47-55.
[14]LIN J H,GUO Q,DONG W Z,et al.Identifying the Node Spreading Influence with Largest K-core Values[J].Physics Letters A,2014,378(45):3279-3284.
[15]SAITO K,KIMURA M,OHARA K,et al.Super mediator-A New Centrality Measure of Node Importance for Information Diffusion Over Social Network[J].Information Sciences,2016,329(C):985-1000.
[16]SUN L S,HUANG Y C,CHEN Y Y,et al.Vulnerability Assessment of Urban Railtransit Based on Multi-static Weighted Method in Beijing [J].Transportation Research Part A:Policy and Practice,2018,108:12-24.
[1] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[2] ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169.
[3] CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323.
[4] WU Zi-bin, YAN Qiao. Projected Gradient Descent Algorithm with Momentum [J]. Computer Science, 2022, 49(6A): 178-183.
[5] GUO Xing-chen, YU Yi-biao. Robust Speaker Verification with Spoofing Attack Detection [J]. Computer Science, 2022, 49(6A): 531-536.
[6] YANG Ya-hong, WANG Hai-rui. DDoS Attack Detection Method in SDN Environment Based on Renyi Entropy and BiGRU Algorithm [J]. Computer Science, 2022, 49(6A): 555-561.
[7] CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587.
[8] LIANG Yi-wen, DU Yu-song. Timing Attack Resilient Sampling Algorithms for Binary Gaussian Based on Knuth-Yao [J]. Computer Science, 2022, 49(6A): 485-489.
[9] YAN Meng, LIN Ying, NIE Zhi-shen, CAO Yi-fan, PI Huan, ZHANG Lan. Training Method to Improve Robustness of Federated Learning [J]. Computer Science, 2022, 49(6A): 496-501.
[10] GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522.
[11] LIANG Zhen-zhen, XU Ming. Key Agreement Scheme Based on Ocean Acoustic Channel [J]. Computer Science, 2022, 49(6): 356-362.
[12] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[13] LI Peng-yu, LIU Sheng-li, YIN Xiao-kang, LIU Hao-hui. Detection Method of ROP Attack for Cisco IOS [J]. Computer Science, 2022, 49(4): 369-375.
[14] LI Jia-rui, LING Xiao-bo, LI Chen-xi, LI Zi-mu, YANG Jia-hai, ZHANG Lei, WU Cheng-nan. Dynamic Network Security Analysis Based on Bayesian Attack Graphs [J]. Computer Science, 2022, 49(3): 62-69.
[15] ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!