Journal of Xidian University ›› 2022, Vol. 49 ›› Issue (2): 116-124.doi: 10.19665/j.issn1001-2400.2022.02.014
• Information and Communications Engineering • Previous Articles Next Articles
YU Changren1,2(),JIA Lianxing1(),ZHANG Bin1()
Received:
2020-08-03
Online:
2022-04-20
Published:
2022-05-31
CLC Number:
YU Changren,JIA Lianxing,ZHANG Bin. Invulnerability measurement for the C4ISR network based on information flow betweenness centrality distribution entropy[J].Journal of Xidian University, 2022, 49(2): 116-124.
"
实验步数 | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
攻击步数 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 |
信息流介数分布熵 | 3.170 | 3.176 | 3.183 | 3.189 | 3.210 | 3.231 | 3.250 | 3.271 | 3.290 | 3.309 | 3.328 | 3.346 | 3.364 |
实验步数 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | |
攻击步数 | 13 | 13 | 13 | 13 | 13 | 13 | 13 | 13 | 13 | 13 | 13 | 13 | |
信息流介数分布熵 | 3.366 | 3.368 | 3.370 | 3.382 | 3.394 | 3.405 | 3.417 | 3.428 | 3.439 | 3.450 | 3.461 | 3.470 |
[1] | SHIREY R, NATARIAN B, LUU J, et al. Blue Guardian Open Adaptable Architecture for C4ISR[C]// Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2018.Bellingham:SPIE, 2018:1-9. |
[2] | 牟能冶, 康秋萍. 基于节点重要度网络结构熵的城市快递网络抗毁性测度[J]. 综合运输, 2020, 42(3):108-113. |
MU Nengye, KANG Qiuping. Invulnerability Measurement of Urban Express Network Based on Node Importance Network Structure Entropy[J]. China Transportation Review, 2020, 42(3):108-113. | |
[3] |
ALBERT R, JEONG H, BARABASI A L. Error and Attack Tolerance of Complex Networks[J]. Nature, 2000, 406:378-382.
doi: 10.1038/35019019 |
[4] | DELLER S, TOLK A, RABADI G, et al. Improving C2 Effectiveness Based on Robust Connectivity[J]. Military Operations Research Journal, 2012, 17(1):5-16. |
[5] | CARES J R. An Information Age Combat Model[C]// 9th International Command and Control Research and Technology Symposium Southampton (ICCRTS).Washington:ICCRTS, 2004:166-167. |
[6] | 田旭光, 朱元昌, 邸彦强. 指挥控制系统网络动态抗毁性[J]. 火力与指挥控制, 2012, 37(6):88-91. |
TIAN Xuguang, ZHU Yuanchang, DI Yanqiang. Study on Dynamic Invulnerability of Command and Control Netwok[J]. Fire Control & Command Control, 2012, 37(6):88-91. | |
[7] | 吴俊, 谭索怡, 谭跃进, 等. 基于自然连通度的复杂网络抗毁性分析[J]. 复杂系统与复杂性科学, 2014, 11(1):77-86. |
WU Jun, TAN Suoyi, TAN Yuejin, et al. Analysis of Invulnerability in Complex Networks Based on Natural Connectivity[J]. Complex Systems and Complex Science, 2014, 11(1):77-86. | |
[8] | 冯树民, 麻海洲, 吕天玲, 等. 考虑攻击程度的城市轨道交通网络抗毁性分析[J]. 武汉理工大学学报:交通科学与工程版, 2019, 43(3):379-384. |
FENG Shumin, MA Haizhou, LYU Tianling, et al. Analysis on the Invulnerability of Urban Rail Transit Network Considering the Degree of Attack[J]. Journal of Wuhan University of Technology:Transportation Science & Engineering, 2019, 43(3):379-384. | |
[9] |
LIU C X, XIONG W, ZHANG Y, et al. Research on Invulnerability Technology of Node Attack in Space-Based Information Network Based on Complex Network[J]. Electronics, 2019, 8(5):507.
doi: 10.3390/electronics8050507 |
[10] | 张明智, 彭军. 网络信息体系抗毁性研究[J]. 计算机仿真, 2017, 34(8):1-5. |
ZHANG Mingzhi, PENG Jun. Research on Invulnerability of Network Information Systems of System[J]. Computer Simulation, 2017, 34(8):1-5. | |
[11] | BOYD J R. A Discourse on Winning and Losing[M]. Alabama: USA Air University Press, 2018:383. |
[12] | GHERMAN L. Defence Architecture Based on Information Age OODA Loop[J]. Review of the Air Force Academy, 2017, 35(3):111-118. |
[13] |
WANG Y M, CHEN S, PAN C S, et al. Measure of Invulnerability for Command and Control Network Based on Mission Link[J]. Information Sciences, 2018, 426(2):148-159.
doi: 10.1016/j.ins.2017.10.035 |
[14] |
GAO X, LI K Q, CHEN B. Invulnerability Measure of a Military Heterogeneous Network Based on Network Structure Entropy[J]. IEEE ACCESS, 2018, 6(3):6700-6708.
doi: 10.1109/ACCESS.2017.2769964 |
[15] | 张多平. 基于累积K-shell的指挥控制网络级联抗毁性研究[D]. 大连: 大连大学, 2018. |
[16] | 郝羽成, 李成兵, 魏磊. 考虑节点过载的复杂网络级联失效模型[J]. 系统工程与电子技术, 2018, 40(10):2282-2287. |
HAO Yucheng, LI Chengbing, WEI Lei. Cascading Failure Model of Complex Networks Considering Overloaded Nodes[J]. Systems Engineering and Electronics, 2018, 40(10):2282-2287. | |
[17] | 慕彩红, 柴文壹, 刘逸, 等. 一种改进的网络鲁棒性与有效性增强方法[J]. 西安电子科技大学学报, 2018, 45(4):6-11. |
MU Caihong, CHAI Wenyi, LIU Yi, et al. Improved Approach to Enhancingthe Robustness and Effectiveness of Networks[J]. Journal of Xidian University, 2018, 45(4):6-11. | |
[18] | WILENSKY U. (NetLogo 2020)[EB/OL].[2020-08-03].http://ccl.northwestern.edu/netlogo. |
[19] | GIT H. The NetLogo NW Extension for Network Analysis(2019)[EB/OL].[2019-12-02]. https://github.com/NetLogo/NW-Extension. |
[20] | MOHAMMAD E, ALI E, HOMAYUN M. Dijkstra Algorithm for Shortest Path Problem under Interval-Valued Pythagorean Fuzzy Environment[J]. Complex & Intelligent Systems, 2019, 5 (2):93-100. |
[21] | SHANNON C E. A Mathematical Theory of Communication[J]. Bell Systems Technical Jourhal, 1948, 27(4):623-656. |
[22] | 孙玺菁, 司守奎. 复杂网络算法与应用[M]. 北京: 国防工业出版社, 2015. |
[23] | 翟峰, 冯云, 程凯, 等. 基于信息熵的多源电力物联终端设备信任度评价方法[J]. 中国电力, 2022, 55(5):158-165. |
ZHAI Feng, FENG Yun, CHENG Kai, et al. Information Entropy-Based Multi-Source Power IoT Terminal Equipment Trust Degree Evaluation Method[J]. Electric Power, 2022, 55(5):158-165. | |
[24] |
YANG G Z, QI X G, LIU L F. Research on Network Robustness Based on Different Deliberate Attack Methods[J]. Physica A:Statistical Mechanics and its Applications, 2020, 545:123588.
doi: 10.1016/j.physa.2019.123588 |
[25] |
GUO L, MAN R X, WU Y X, et al. Anti-Injury Function of Complex Spiking Neural Networks Under Random Attack and Its Mechanism Analysis[J]. IEEE ACCESS, 2020, 8:153057-153066.
doi: 10.1109/ACCESS.2020.3017746 |
[1] | XU Hua,TIAN Youliang. Protection of privacy of the weighted social network under differential privacy [J]. Journal of Xidian University, 2022, 49(1): 17-25. |
[2] | JIANG Lin,FENG Ru,DENG Junyong,LI Yuancheng. Analysis of the relationship between the performance of the BC and the format of the graph data [J]. Journal of Xidian University, 2021, 48(6): 57-66. |
[3] | XIE Lixia,BAI Yu. Information system business affecting impact evaluation method [J]. Journal of Xidian University, 2021, 48(4): 184-191. |
[4] | HAN Zhuoxi,WANG Feng,CHEN Pei,LI Zhuolun. Fuzzy data association algorithm assisted by historical features [J]. Journal of Xidian University, 2021, 48(2): 92-98. |
[5] | YANG Hongyu,ZHANG Xugao. Network security situation adaptive prediction model [J]. Journal of Xidian University, 2020, 47(3): 14-22. |
[6] | QI Xiaogang,HU Qiuqiu,YAO Xuqing,LIU Lifang. Efficient alarm analysis approach for communication networks [J]. Journal of Xidian University, 2019, 46(4): 1-8. |
[7] | LIU Daohua, HU Xiuyun, ZHAO Yansong, CUI Yushuang. Particle swarm optimization method based on dynamic sub-swarms with entropy weight [J]. Journal of Xidian University, 2018, 45(6): 69-74. |
[8] | ZHAO Jihong;XIE Zhiyong;QU Hua;WANG Mingxin;LIU Xi. Simplified and robust algorithm for three-dimensional estimation of nodes in sensor networks [J]. Journal of Xidian University, 2018, 45(5): 108-114. |
[9] | XU Tuo;LI Jie;WANG Ying. Clustering by samples movement in the superposition information entropy field [J]. Journal of Xidian University, 2018, 45(4): 75-79+154. |
[10] | WANG Xing;HUANG Xiaoyu;LIU Xuanpu;KONG Xianguang;NIU Meng. Multi-layer incremental feature extraction method for industrial big data [J]. Journal of Xidian University, 2018, 45(4): 106-111. |
[11] | YANG Baowang. Low-rate-denial-of-service attack detection by symbolic dynamics method [J]. Journal of Xidian University, 2018, 45(1): 140-144. |
[12] | TANG Xing;QUAN Yining;DONG Ze;MIAO Qiguang. Novel algorithm for finding circles in the ego network based on entropy [J]. Journal of Xidian University, 2017, 44(3): 43-48. |
[13] | HUANG Weihua;MA Zhong;DAI Xinfa;XU Mingdi;GAO Yi;LIU Limin. Fuzzy clustering based load balancing algorithm with feature weighted [J]. Journal of Xidian University, 2017, 44(2): 127-132. |
[14] | ZHANG Yuhong;XING Mengdao. Approach to joint translational and rotational phase auto-focusing [J]. Journal of Xidian University, 2016, 43(5): 31-35. |
[15] | QIAO Quanbang;HUANG Liyu;HE Zhijie. Image reconstruction using an adaptive simultaneous algebraic reconstruction technique in computed tomography [J]. Journal of Xidian University, 2016, 43(3): 67-72. |
|