多元态军事网络空间风险传播问题仿真研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Research and simulation of risk propagation model of multiple elements military state cyberspace
  • 作者:沈迪 ; 任清华 ; 王鹏 ; 朱瑞
  • 英文作者:SHEN Di;REN Qinghua;WANG Peng;ZHU Rui;School of Information and Navigation,Air Force Engineering University;Uint 93801of the PLA;
  • 关键词:多元态 ; 军事网络空间 ; 安全风险 ; 传播模型
  • 英文关键词:multiple elements state;;military cyberspace;;risk;;propagation model
  • 中文刊名:XTYD
  • 英文刊名:Systems Engineering and Electronics
  • 机构:空军工程大学信息与导航学院;中国人民解放军93801部队;
  • 出版日期:2018-12-11 17:18
  • 出版单位:系统工程与电子技术
  • 年:2019
  • 期:v.41;No.473
  • 基金:国家自然科学基金(61573017);; 国家社会科学基金(16XGJ003,17XKS002)资助课题
  • 语种:中文;
  • 页:XTYD201902019
  • 页数:7
  • CN:02
  • ISSN:11-2422/TN
  • 分类号:142-148
摘要
随着军事信息通信技术的不断进步和联合作战军事信息系统的发展,由多种网络融合构成的多元态网络空间逐渐成为军事信息网络环境的主要呈现状态。在多元态军事信息网络空间中,不同元素节点对于安全风险的抵御能力、传播能力不同,单一的基于互联网模型的风险传播模型难以有效描述这种差异并真实反应风险传播规律。针对这一问题,构建多元态军事网络空间模型,通过改进经典的节点中心性计算方法,并设定节点传播因子和感染因子,实现对多元态军事网络空间节点的区分描述,并在此基础上仿真推演其传播规律,为军事网络空间风险的隔离与防控提供依据。
        With development of communicating technology and joint fighting military system,multiple elements state cyberspace composed by deferent sub-networks has been the main state of military information environment.In this space,the risk infectious rate,resistant ability,propagation rate are not the same among deferent element nodes,while the current simple networks model based on internet can not describe this factor efficiently.In order to solve this problem,this paper designs a multiple elements military state cyberspace model(MEMSC).The model refines the classic centrality value algorithm and defines a risk propagation factor and an infectious factor,thus the deference between MEMSC nodes in risk propagation can be described clearly.Based on the model,the rules of risk propagation are studied and simulated,and the research results can positively support cyberspace risk control and defense.
引文
[1]DEAN S.National strategy for trusted identities in cyberspace[R].Washington DC:The White House,2011.
    [2]REITINGER P.Enabling distributed security in cyberspace[R].Washington DC:The White House,2011.
    [3]方滨兴.从层次角度看网络空间安全技术的覆盖领域[J].网络与信息安全学报,2015,1(1):1-6.FANG B X.A hierarchy model on the research fields of cyberspace security technology[J].Chinese Journal of Network and Information Security,2015,1(1):1-6.
    [4]李建华.网络空间威胁情报感知、共享与分析技术综述[J].网络与信息安全学报,2016,2(2):16-29.LI J H.Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space[J].Chinese Journal of Network and Information Security,2016,2(2):16-29.
    [5]李建华,邱卫东,孟魁,等.网络空间安全一级学科内涵建设和人才培养思考[J].信息安全研究,2015,1(2):149-154.LI J H,QIU W D,MENG K,et al.Discipline construction and talents training of cyberspace security[J].Journal of Information Securyity Research,2015,1(2):149-154.
    [6]HUANG X,GAO J,BULDYREV S V,et al.Robustness of interdependent networks under targeted attack[J].Physical Review E Statistical,Nonlinear,and Soft Matter Physics,2011,83(2):065101.
    [7]GAO J,BULDYREV S V,HAVLIN S,et al.Robustness of a net-work of networks[J].Physical Review Letters,2011,107(19):195701.
    [8]GAO J,BARZEL B,BARABáSI A.Universal resilience patterns in complex networks[J].Nature,2016,530(7590):307.
    [9]FU C,WANG Y,WANG X,et al.Multi-node attack strategy of complex networks due to cascading breakdown[J].Chaos Solitons&Fractals,2018,106:61-66.
    [10]GAO Z K,YANG Y X,ZHAI L S,et al.Multivariate multiscale complex network analysis of vertical upward oil-water two-phase flow in a small diameter pipe[J].Scientific Reports,2016,6:20052.
    [11]BRITO S,SILVA L R D,TSALLIS C.Role of dimensionality in complex networks[J].Scientific Reports,2016,DOI:10.1038/srep27992.
    [12]YANG X,ZHANG W A,CHEN M Z Q,et al.Hybrid sequential fusion estimation for asynchronous sensor networkbased target tracking[J].IEEE Trans.on Control Systems Technology,2017,25(2):669-676.
    [13]KOUVARIS N E,HATA S,GUILERA A D.Pattern formation in multiplex networks[J].Scientific Reports,2016,DOI:10.1038/srep 10840
    [14]RUIZ M,ALVAREZ E,SERRANO A,et al.The convergence between wireless sensor networks and the Internet of things;challenges and perspectives:a survey[J].IEEE Latin America Transactions,2016,14(10):4249-4254.
    [15]MENICHETTI G,DALL’ASTA L,BIANCONI G.Control of Multilayer Networks[J].Scientific Reports,2016,DOI:10.1038/srep20706.
    [16]沈迪,李建华,张强,等.交织型层级复杂网[J].物理学报,2014,63(19):190201.SHEN D,LI J H,ZHANG Q,et al.Interlacing layered complex networks[J].Acta Physica Sinica,2014,63(19):190201.
    [17]ZOU S R,ZHOU T,LIU A F,et al.Topological relation of layered complex networks[J].Physics Letters A,2010,374(43):4406-4410.
    [18]HE S,LIU Y J,YE F Y,et al.Research on complex network layout algorithm based on grid point matching method[J].Journal of Complex Networks,2018,6(1):145-154.
    [19]蒋国平,宋玉蓉,巩永旺.基于复杂网络结构特征的病毒传播研究综述[J].南京邮电大学学报(自然科学版),2012,32(5):1-6.JIANG G P,SONG Y R,GONG Y W.A survey of virus propagation based on complex network structural property[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science),2012,32(5):1-6.
    [20]王亚奇,蒋国平.复杂网络中考虑不完全免疫的病毒传播研究[J].物理学报,2010,59(10):6734-6743.WANG Y Q,JIANG G P.Virus spreading on complex networks with imperfect immunization[J].Acta Physica Sinica,2010,59(10):6734-6743.
    [21]CHEN X,LIU J,BELABBAS M A,et al.Distributed evaluation and convergence of self-appraisals in social networks[J].IEEE Trans.on Automatic Control,2016,62(1):291-304.
    [22]徐兰芳,习爱民,范小峰.计算机网络病毒传播模型SIRH[J].计算机工程与科学,2009,31(1):4-6.XU L F,XI A M,FAN X F.SIRH:a computer network virus propagation model[J].Computer Engineering and Science,2009,31(1):4-6.
    [23]徐久强,王进法,张君,等.基于度相关性的风险传播模型及其分析[J].中国科学:信息科学,2014,44(6):793-810.XU J Q,WANG J F,ZHANG J,et al.Virus spreading model based on degree correlation and its analysis[J].Scientia Sinica Informationis,2014,44(6):793-810.
    [24]SHAKARAMI M R,BEIRANVAND H,BEIRANVAND A,et al.A recursive power flow method for radial distribution networks:analysis,solvability and convergence[J].International Journal of Electrical Power&Energy Systems,2017,86:71-80.
    [25]GOLOSOVSKY M,SOLOMON S.Growing complex network of citations of scientific papers:modeling and measurements[J].Physical Review,2017,95(1):012324.
    [26]关治洪,亓玉娟,姜晓伟,等.基于复杂网络的病毒传播模型及其稳定性[J].华中科技大学学报(自然科学版),2011,39(1):114-117.GUAN Z H,YUAN Y J,JIANG X W,et al.Virus propagation dynamic model and stability on complex networks[J].Journal of Huazhong University of Science and Technology(Natural Science Edition),2011,39(1):114-117.
    [27]谢丰,程苏琦,陈冬青,等.基于级联失效的复杂网络抗毁性[J].清华大学学报(自然科学版),2011,51(10):1252-1257.XIE F,CHENG S Q,CHEN D Q,et al.Cascade-based attack vulnerability in complex networks[J].Journal of Tsinghua University(Natural Science Edition),2011,51(10):1252-1257.
    [28]HU Z L,SHEN Z,TANG C B,et al.Localization of diffusion sources in complex networks with sparse observations[J].Physics Letters A,2018,382(14):931-937.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700