计算机与现代化
計算機與現代化
계산궤여현대화
COMPUTER AND MODERNIZATION
2009年
8期
130-132,136
,共4页
脆弱性%中心节点%无标度网络%均匀结构%层次结构%效率
脆弱性%中心節點%無標度網絡%均勻結構%層次結構%效率
취약성%중심절점%무표도망락%균균결구%층차결구%효솔
vulnerability%central node%scale-free network%uniform structure%hierarchy structure%efficiency
以美国劫机事件绘制的网络模型作为数据源,将其理想化为相同规模的均匀结构和层次结构,利用现有的攻击策略,针对三种不同分布的模型进行脆弱性分析实验,并根据实验得到网络被攻击前、后效率的下降比例,以此定量衡量不同网络模型的脆弱性差异.
以美國劫機事件繪製的網絡模型作為數據源,將其理想化為相同規模的均勻結構和層次結構,利用現有的攻擊策略,針對三種不同分佈的模型進行脆弱性分析實驗,併根據實驗得到網絡被攻擊前、後效率的下降比例,以此定量衡量不同網絡模型的脆弱性差異.
이미국겁궤사건회제적망락모형작위수거원,장기이상화위상동규모적균균결구화층차결구,이용현유적공격책략,침대삼충불동분포적모형진행취약성분석실험,병근거실험득도망락피공격전、후효솔적하강비례,이차정량형량불동망락모형적취약성차이.
Using the model which depicted airplane kidnappers attacks in the US as the source of data, this paper idealizes it and obtains another two structures with the same scale, such as uniformly distributed structure and hierarchical structure. Under the existing attacking strategies, experiments have done to analyse the vulnerability of three given structures. At last, it gets the descendent rate of efficiency by attacking the networks. So the aim for quantifying the discrepancy of different structures is realized.