Please wait a minute...
文章检索
复杂系统与复杂性科学  2016, Vol. 13 Issue (2): 14-21    DOI: 10.13306/j.1672-3813.2016.02.002
  本期目录 | 过刊浏览 | 高级检索 |
面向流量的海底光纤系统脆弱性分析方法
吴元立1,2, 司光亚1a, 罗批1a, 荣明1a
1.国防大学a.信息作战与指挥训练教研部; b.研究生院,北京 100091;
2.总参总医院信息中心,北京 100091
Vulnerability Analysis Method for Global Undersea Cable Infrastructure Based on Network Traffic
WU Yuanli1,2, SI Guangya1a, LUO Pi1a, RONG Ming1a
1.a.The Department of Information Operation& Command Training; b.The graduate School, NDU of PLA, Beijing 100091, China;
2.The Department of Information, The 309 Hospital of PLA, Beijing 100091, China
全文: PDF(1399 KB)  
输出: BibTeX | EndNote (RIS)      
摘要 选择网络流量传输成本作为海底光纤系统的脆弱性测度指标,提出了一种基于双层优化模型的海底光纤系统脆弱性分析方法,能够识别出特定毁伤预算下的脆弱点,并能对受损情况下重新分布的网络流量进行量化分析。最后,通过某假设地区的两大海底光纤系统验证了方法的有效性,探讨了动态脆弱性的一些特征并给出了相应的保护策略。
服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
吴元立
司光亚
罗批
荣明
关键词 脆弱性分析海底光纤互联网基础设施多商品网络流    
Abstract:This paper chooses network traffic as the vulnerability metric for global undersea cable infrastructure and proposes a vulnerability analysis method based on bi-level optimization theory which can identify the most vulnerable parts of the system under specific damage budget and take quantitative analysis for the rerouted traffic because of the damaged parts. Finally, the vulnerability analysis method is verified with two undersea cable systems in a certain hypothesis region, and characteristics of the dynamic vulnerability and corresponding protection strategy are discussed.
Key wordsvulnerability analyze    undersea cable system    internet infrastructure    multi-commodity flow
收稿日期: 2015-05-02      出版日期: 2025-02-25
ZTFLH:  TP393.4  
  TP393.08  
基金资助:国家自然科学基金资助项目(U1435218,61273189,61403401,61174035)
作者简介: 吴元立(1985-),男,辽宁辽阳人,博士研究生,工程师,主要研究方向为战争模拟、网络建模仿真。
引用本文:   
吴元立, 司光亚, 罗批, 荣明. 面向流量的海底光纤系统脆弱性分析方法[J]. 复杂系统与复杂性科学, 2016, 13(2): 14-21.
WU Yuanli, SI Guangya, LUO Pi, RONG Ming. Vulnerability Analysis Method for Global Undersea Cable Infrastructure Based on Network Traffic[J]. Complex Systems and Complexity Science, 2016, 13(2): 14-21.
链接本文:  
https://fzkx.qdu.edu.cn/CN/10.13306/j.1672-3813.2016.02.002      或      https://fzkx.qdu.edu.cn/CN/Y2016/V13/I2/14
[1] International Cable Protection Committee. About submarine telecommunications cables[DB/OL].[2015-03-06].http://www.iscpc.org/.
[2] International Cable Protection Committee. Submarine cable network security[DB/OL].[2015-03-06].http://www.iscpc.org/.
[3] Omer M, Nilchiani R, Mostashari A. Measuring the Resilience of the Global Internet Infrastructure System[C]//The 3rd Annual IEEE International Systems Conference. Vancouver, Canada: IEEE, 2009:156-162.
[4] Crain J K. Assessing resilience in the global undersea cable infrastructure[D].California: Naval Post Graduate School, 2012.
[5] Albert R, Jeong H, Barabási A-L. Error and attack tolerance of complex networks[J].Nature, 2000, 406(6794): 378-382.
[6] Yan G, Eidenbenz S, Thulasidasan S, et al. Criticality analysis of Internet infrastructure[J].Computer Networks, 2010, 54(7): 1169-1182.
[7] Cetinkaya E K, Broyles D, Dandekar A, et al. Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: a simulation-based approach[J].Telecommunication Systems, 2013, 52(2): 751-766.
[8] Cetinkaya E K, Broyles D, Dandekar A, et al. A comprehensive framework to simulate network attacks and challenges[C]//Proceedings of the 2nd IEEE/IFIP international workshop on reliable networks design and modeling (RNDM). Moscow, Russia: IEEE, 2010: 538-544.
[9] Brown G, Carlyle M, Salmerón J, et al. Defending critical infrastructure[J].Interfaces, 2006, 36(6): 530-544.
[10] Chang H, Roughan M, Uhlig S, et al. The many facets of Internet topology and traffic[J].Networks and Heterogeneous Media, 2006, 1(4): 569-600.
[11] Leland W E, Taqqu M S, Willinger W, et al. On the self-similar nature of Ethernet traffic[C]//ACM SIGCOMM Computer Communication Review. San Francisco, Calif: ACM, 1993: 183-193.
[12] James Cook University. Internet accounting system[DB/OL].[2014-12-30].http://www.jcu.edu.au/internetaccounting/traffic/.
[13] Federation of American Scientists. Al qaeda training manual. federation of American scientists[DB/OL].[2015-03-06].Http://www.fas.org/irp/world/.2006.8.1.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed