期刊文献+

Cyber攻击关键基础设施级联失效建模与仿真

Modeling & Simulating Cascading Failure of Critical Infrastructures Based on Cyber-Attack
下载PDF
导出
摘要 从Cyber攻击关键基础设施级联失效建模与仿真研究出发,提出了关键基础设施的关联关系网络和交联特性模型,建立了基于Agent的级联失效模型,给出了关联网络生成算法,实现了基于OpenGL的三维关联网络。在仿真Cyber攻击下通过Agent实体间负载的自动分配,形成自下而上的演化过程,反映了整个网络级联失效的涌现效果。对Cyber空间关键基础设施的保护有一定的参考意义。 According to the research on modeling & simulating cascading failure of critical infrastructures based on cyber-attack,models of associated relation and interaction characteristic among critical infrastructures were advanced.Cascading Failure model based on agent and creating algorithm of associated network were put forward,and three-dimensional network was realized.Under the Simulating cyber-attack,an evolvement process from bottom-up was formed by load auto distribution among agents.Emergent effect of the cascading failure in the network was represented.The research has some referenced value on protecting the critical infrastructure in cyberspace.
出处 《系统仿真学报》 CAS CSCD 北大核心 2013年第S1期297-300,共4页 Journal of System Simulation
基金 国家自然科学基金项目(61174035 71073172) 全军军事类研究生资助课题(2012JY002-027)
关键词 关键基础设施 级联失效 建模 仿真 critical infrastructure cascading failure modeling simulation
  • 相关文献

参考文献4

  • 1吴俊,谭跃进,邓宏钟,迟妍.考虑级联失效的复杂负载网络节点重要度评估[J].小型微型计算机系统,2007,28(4):627-630. 被引量:41
  • 2Andjelka Kelic,Drake E Warren,Laurence R Phillips.Cyber andPhisical Infrastructure Interdependencies[]..2008 被引量:1
  • 3Dean A Jones,Mark A Turnquist.Simulation of ImperfectInformation in Vulnerability Modeling for Infrastructure Facilities[].Proceedings of the Winter Simulation Conference.2005 被引量:1
  • 4Albert-Laszlo Barabasi,Reka Albert.Emergence of scaling in random networks[].Science.1999 被引量:1

二级参考文献15

  • 1Albert R,Barabási A L.Statistical mechanics of complex networks[J].Rev.Mod.Phys,2002,74(1):47-51. 被引量:1
  • 2Albert R,Jeong H Barabási A L.Error and attack tolerance of complex networks[J].Nature,2000,406(6794):378-382. 被引量:1
  • 3Ball M O,Golden B L,Vohra R V.Finding the most vital arcs in a network[J].Oper.Res.Letters,1989,8(2):73-76. 被引量:1
  • 4Malik K,Mittal A K,Gupta S K.The k most vital arcs in the shortest path problem[J].Oper.Res.Letters,1989,8(4):223-227. 被引量:1
  • 5Corley H W,Sha D Y.Most vital links and nodes in weighted networks[J].Oper.Res.Letters,1982,1:157-160. 被引量:1
  • 6Chen Yong,Hu Ai-qun,Hu Jun,et al.A method for finding the most vital node in communication networks[J].High Technology Letters,2004,14(1):21-24. 被引量:1
  • 7Wu Jun,Tan Yue-jin.Finding the most vital node by node contraction in communication networks[C].In:Proceeding of IEEE ICCCAS 2005.Hong Kong,2005,1283-1286. 被引量:1
  • 8Motter A E,Lai Y C.Cascade-based attacks on complex networks[J].Phys.Rev.E,2002,66(8):65-102. 被引量:1
  • 9Zhao L,Kwangho P,Lai Y C.Attack vulnerability of scale-free networks due to cascading breakeown[J].Phys.Rev.E,2004,70(3):35-101. 被引量:1
  • 10Pastor-Satorras R,Vazquez A,Vespignani A.Dynamical and correlation properties of the internet[J].Phys.Rev.Lett.,2001,87(25):258-701. 被引量:1

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部