{"title":"Key Node Recognition Based on Community Discovery","authors":"Xinran Zhu, W. Liu, Zeyu Gu, Zihao Liu","doi":"10.1145/3603781.3603935","DOIUrl":null,"url":null,"abstract":"The network topology is difficult to reflect the service relationship between the device nodes, and cannot provide critical service nodes for DDos attacks. This paper introduces a Key Node recognition algorithm based on community discovery. The algorithm judges the ownership of the service community through the service mapping relationship between network nodes, and finds the key nodes of network services and the subordinate relationship between nodes. The algorithm finds the network core service node through the dual-connected core graph and node mapping degree. Then it expands the community according to the mapping relationship, and divide the boundary nodes into the community. In simulation experiments, the effectiveness of the algorithm is demonstrated by simulating denial of service attacks, which can provide correlation between node services.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3603781.3603935","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The network topology is difficult to reflect the service relationship between the device nodes, and cannot provide critical service nodes for DDos attacks. This paper introduces a Key Node recognition algorithm based on community discovery. The algorithm judges the ownership of the service community through the service mapping relationship between network nodes, and finds the key nodes of network services and the subordinate relationship between nodes. The algorithm finds the network core service node through the dual-connected core graph and node mapping degree. Then it expands the community according to the mapping relationship, and divide the boundary nodes into the community. In simulation experiments, the effectiveness of the algorithm is demonstrated by simulating denial of service attacks, which can provide correlation between node services.