Vulnerability Analysis Method for Global Undersea Cable Infrastructure Based on Network Traffic
WU Yuanli1,2, SI Guangya1a, LUO Pi1a, RONG Ming1a
1.a.The Department of Information Operation& Command Training; b.The graduate School, NDU of PLA, Beijing 100091, China; 2.The Department of Information, The 309 Hospital of PLA, Beijing 100091, China
Abstract:This paper chooses network traffic as the vulnerability metric for global undersea cable infrastructure and proposes a vulnerability analysis method based on bi-level optimization theory which can identify the most vulnerable parts of the system under specific damage budget and take quantitative analysis for the rerouted traffic because of the damaged parts. Finally, the vulnerability analysis method is verified with two undersea cable systems in a certain hypothesis region, and characteristics of the dynamic vulnerability and corresponding protection strategy are discussed.
吴元立, 司光亚, 罗批, 荣明. 面向流量的海底光纤系统脆弱性分析方法[J]. 复杂系统与复杂性科学, 2016, 13(2): 14-21.
WU Yuanli, SI Guangya, LUO Pi, RONG Ming. Vulnerability Analysis Method for Global Undersea Cable Infrastructure Based on Network Traffic[J]. Complex Systems and Complexity Science, 2016, 13(2): 14-21.
[1] International Cable Protection Committee. About submarine telecommunications cables[DB/OL].[2015-03-06].http://www.iscpc.org/. [2] International Cable Protection Committee. Submarine cable network security[DB/OL].[2015-03-06].http://www.iscpc.org/. [3] Omer M, Nilchiani R, Mostashari A. Measuring the Resilience of the Global Internet Infrastructure System[C]//The 3rd Annual IEEE International Systems Conference. Vancouver, Canada: IEEE, 2009:156-162. [4] Crain J K. Assessing resilience in the global undersea cable infrastructure[D].California: Naval Post Graduate School, 2012. [5] Albert R, Jeong H, Barabási A-L. Error and attack tolerance of complex networks[J].Nature, 2000, 406(6794): 378-382. [6] Yan G, Eidenbenz S, Thulasidasan S, et al. Criticality analysis of Internet infrastructure[J].Computer Networks, 2010, 54(7): 1169-1182. [7] Cetinkaya E K, Broyles D, Dandekar A, et al. Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: a simulation-based approach[J].Telecommunication Systems, 2013, 52(2): 751-766. [8] Cetinkaya E K, Broyles D, Dandekar A, et al. A comprehensive framework to simulate network attacks and challenges[C]//Proceedings of the 2nd IEEE/IFIP international workshop on reliable networks design and modeling (RNDM). Moscow, Russia: IEEE, 2010: 538-544. [9] Brown G, Carlyle M, Salmerón J, et al. Defending critical infrastructure[J].Interfaces, 2006, 36(6): 530-544. [10] Chang H, Roughan M, Uhlig S, et al. The many facets of Internet topology and traffic[J].Networks and Heterogeneous Media, 2006, 1(4): 569-600. [11] Leland W E, Taqqu M S, Willinger W, et al. On the self-similar nature of Ethernet traffic[C]//ACM SIGCOMM Computer Communication Review. San Francisco, Calif: ACM, 1993: 183-193. [12] James Cook University. Internet accounting system[DB/OL].[2014-12-30].http://www.jcu.edu.au/internetaccounting/traffic/. [13] Federation of American Scientists. Al qaeda training manual. federation of American scientists[DB/OL].[2015-03-06].Http://www.fas.org/irp/world/.2006.8.1.