{"title":"不同攻防策略下军事SoS网络的脆弱性","authors":"Wei-Xin Jin, Ping Song, Guo-Zhu Liu","doi":"10.1109/SOLI.2014.6960695","DOIUrl":null,"url":null,"abstract":"In recent years, research on the complex networks vulnerability attracts the attention of the academic circles and engineering institutes, and a lot of high value analysis models have been put forward which had solved many theoretical and practical problems with many cascading failures occurring frequently in practical large-scale networks. Apparently, for the complex network vulnerability assessment and analysis under the condition of large-scale attacks, the attack mode analysis, attack strategy analysis and the complex network vulnerability assessment under different attack need more concern comparing with the research on the network structure and the defense strategy. Although several typical kinds of attack mode and strategy have been proposed and their performance has been evaluated, expanding the attack mode and attack strategy, further studying on the network vulnerability change after the attacks, finding the improvement strategy and method still have a great theoretical and practical significance and value especially for the military network. Firstly this paper reviews the research status of the complex network vulnerability analysis, and then a few typical current complex network attack strategies (function) have been analyzed and pointed out their limitations; on the basis of this, complex network attack strategy, damage analysis function are constructed completely, and each sequence function (family of functions) is demonstrated in theory and simulation in detail. For different complex network topology with different defense strategies, the attacker should adopt different attack strategy to get more effectively ways to disable the network; on the contrary, in view of the different topological structure with different attack strategies of enemy, the defender should take some effective corresponding defense means which can minimize the loss at most.","PeriodicalId":191638,"journal":{"name":"Proceedings of 2014 IEEE International Conference on Service Operations and Logistics, and Informatics","volume":"139 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The vulnerability of the military SoS networks under different attack and defense strategies\",\"authors\":\"Wei-Xin Jin, Ping Song, Guo-Zhu Liu\",\"doi\":\"10.1109/SOLI.2014.6960695\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, research on the complex networks vulnerability attracts the attention of the academic circles and engineering institutes, and a lot of high value analysis models have been put forward which had solved many theoretical and practical problems with many cascading failures occurring frequently in practical large-scale networks. Apparently, for the complex network vulnerability assessment and analysis under the condition of large-scale attacks, the attack mode analysis, attack strategy analysis and the complex network vulnerability assessment under different attack need more concern comparing with the research on the network structure and the defense strategy. Although several typical kinds of attack mode and strategy have been proposed and their performance has been evaluated, expanding the attack mode and attack strategy, further studying on the network vulnerability change after the attacks, finding the improvement strategy and method still have a great theoretical and practical significance and value especially for the military network. Firstly this paper reviews the research status of the complex network vulnerability analysis, and then a few typical current complex network attack strategies (function) have been analyzed and pointed out their limitations; on the basis of this, complex network attack strategy, damage analysis function are constructed completely, and each sequence function (family of functions) is demonstrated in theory and simulation in detail. For different complex network topology with different defense strategies, the attacker should adopt different attack strategy to get more effectively ways to disable the network; on the contrary, in view of the different topological structure with different attack strategies of enemy, the defender should take some effective corresponding defense means which can minimize the loss at most.\",\"PeriodicalId\":191638,\"journal\":{\"name\":\"Proceedings of 2014 IEEE International Conference on Service Operations and Logistics, and Informatics\",\"volume\":\"139 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of 2014 IEEE International Conference on Service Operations and Logistics, and Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SOLI.2014.6960695\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2014 IEEE International Conference on Service Operations and Logistics, and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SOLI.2014.6960695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The vulnerability of the military SoS networks under different attack and defense strategies
In recent years, research on the complex networks vulnerability attracts the attention of the academic circles and engineering institutes, and a lot of high value analysis models have been put forward which had solved many theoretical and practical problems with many cascading failures occurring frequently in practical large-scale networks. Apparently, for the complex network vulnerability assessment and analysis under the condition of large-scale attacks, the attack mode analysis, attack strategy analysis and the complex network vulnerability assessment under different attack need more concern comparing with the research on the network structure and the defense strategy. Although several typical kinds of attack mode and strategy have been proposed and their performance has been evaluated, expanding the attack mode and attack strategy, further studying on the network vulnerability change after the attacks, finding the improvement strategy and method still have a great theoretical and practical significance and value especially for the military network. Firstly this paper reviews the research status of the complex network vulnerability analysis, and then a few typical current complex network attack strategies (function) have been analyzed and pointed out their limitations; on the basis of this, complex network attack strategy, damage analysis function are constructed completely, and each sequence function (family of functions) is demonstrated in theory and simulation in detail. For different complex network topology with different defense strategies, the attacker should adopt different attack strategy to get more effectively ways to disable the network; on the contrary, in view of the different topological structure with different attack strategies of enemy, the defender should take some effective corresponding defense means which can minimize the loss at most.