基于優(yōu)化理論的復(fù)雜網(wǎng)絡(luò)節(jié)點(diǎn)攻擊策略
doi: 10.11999/JEIT160396
基金項(xiàng)目:
國家自然科學(xué)基金(61573017)
Node Attack Strategy of Complex Networks Based on Optimization Theory
Funds:
The National Natural Science Foundation of China (61573017)
-
摘要: 該文在分析傳統(tǒng)復(fù)雜網(wǎng)絡(luò)節(jié)點(diǎn)攻擊策略不足的基礎(chǔ)上提出一種新的攻擊策略,該策略的思路是將節(jié)點(diǎn)攻擊序列的構(gòu)造問題視為一個優(yōu)化問題而非傳統(tǒng)的評估問題。為了實(shí)現(xiàn)該策略,設(shè)計了復(fù)雜網(wǎng)絡(luò)抗毀性測度用以衡量節(jié)點(diǎn)攻擊序列的攻擊效果,建立了以最大化攻擊效果為目標(biāo)的節(jié)點(diǎn)攻擊序列構(gòu)造模型,提出了基于禁忌搜索的模型求解算法。在真實(shí)網(wǎng)絡(luò)和模擬網(wǎng)絡(luò)上的實(shí)驗(yàn)結(jié)果表明,新策略比其它復(fù)雜網(wǎng)絡(luò)節(jié)點(diǎn)攻擊策略更為有效和優(yōu)越。
-
關(guān)鍵詞:
- 復(fù)雜網(wǎng)絡(luò) /
- 攻擊策略 /
- 抗毀性測度 /
- 優(yōu)化模型 /
- 禁忌搜索
Abstract: This study proposes a new node attack strategy of complex networks by analyzing the disadvantages of traditional strategies. The idea of the new strategy is to treat the construction problem of node attack sequence as an optimal problem rather than an evaluation problem. To achieve this strategy, the study designs a survivability index of complex networks to measure the attack effect created by a node attack sequence, then establishes a construction model of node attack sequence with the goal to maximize attack effect, and further brings forward an algorithm based on tabu search to solve the model. Experiment results from real networks and simulated networks show that the new strategy is more effective than others.-
Key words:
- Complex networks /
- Attack strategy /
- Survivability measurement /
- Optimization model /
- Tabu search
-
JIANG Y and WANG Y B. Analysis of attack and defense strategies on complex networks[C]. Proceedings of International Conference on Sensor Network Security Technology and Privacy Communication System, Harbin, China, 2013: 58-62. ALBERT R, JEONG H, and BARABASI A L. Error and attack tolerance of complex networks[J]. Nature, 2000, 406: 378-382. doi: 10.1038/35019019. HOLME P, KIM B J, YOON C N, et al. Attack vulnerability of complex networks[J]. Physical Review E, 2002, 65(5): 056109. doi: 10.1103/PhysRevE.65.056109. BELLINGERI M, CASSI D, and VINCENZI S. Efficiency of attack strategies on complex model and real-world networks [J]. Physica A, 2014, 414: 174-180. doi: 10.1016/j.physa.2014. 06.079. NIE T Y, GUO Z, ZHAO K, et al. New attack strategies for complex networks[J]. Physica A, 2015, 424: 248-253. doi: 10.1016/j.physa.2015.01.004. 聶廷遠(yuǎn), 郭征, 李坤龍. 復(fù)雜網(wǎng)絡(luò)的攻擊策略研究[J]. 計算機(jī)仿真, 2015, 32(7): 286-289. doi: 10.3969/j.issn.1006-9348. 2015.07.063. NIE Tingyuan, GUO Zheng, and LI Kunlong. A study of attack strategies for complex networks[J]. Computer Simulation, 2015, 32(7): 286-289. doi: 10.3969/j.issn.1006- 9348.2015.07.063. XIAO S and XIAO G. On intentional attacks and protections in complex communication networks[C]. Proceedings of IEEE Global Telecommunications Conference, San Francisco, CA, USA, 2006: 1-5. 李濤, 裴文江. 針對重疊社團(tuán)結(jié)構(gòu)的復(fù)雜網(wǎng)絡(luò)多靶向攻擊策略[J]. 北京郵電大學(xué)學(xué)報, 2010, 33(3): 34-39. doi: 10.3969/ j.issn.1007-5321.2010.03.007. LI Tao and PEI Wenjiang. Multi-targets attack strategy based on the overlapping community structure of complex networks[J]. Journal of Beijing University of Posts and Telecommunications, 2010, 33(3): 34-39. doi: 10.3969/j.issn. 1007-5321.2010.03.007. WANG H, HUANG J Y, XU X M, et al. Damage attack on complex networks[J]. Physica A, 2014, 408: 134-148. doi: 10. 1016/j.physa.2014.04.001. ANURAG S, RAHUL K, and YATINDRA N S. Impact of structural centrality based attacks in complex networks[J]. Acta Physica Polonica B, 2015, 46(2): 305-324. doi: 10.5506/ APhysPolB.46.305. DENG Y, WU J, and TAN Y J. Optimal attack strategy of complex networks based on tabu search[J]. Physica A, 2016, 442: 74-81. doi: 10.1016/j.physa.2015.08.043. HERRNANN H J, SCHNEIDER C M, MOREIRA A A, et al. Onion-like network topology enhances robustness against malicious attacks[J]. Journal of Statistical Mechanics: Theory and Experiment, 2011, 1: P01027. doi: 10.1088/1742-5468/ 2011/01/P01027. SCHNEIDER C M, MOREIRA A A, ANDRADE J S, et al. Mitigation of malicious attacks on networks[J]. Proceedings of the National Academy of Sciences, of the United States of America 2011, 108(10): 3838-3841. doi: 10.1073/pnas. 1009440108. LOUZADA V H P, DAOLIO F, HERRMANN H J, et al. Smart rewiring for network robustness[J]. Journal of Complex Networks, 2013, 1(2): 150-159. doi: 10.1093/comnet/xxx000. BURKE E K and KENDALL G. Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques[M]. New York: Springer, 2005: 165. LATORA V and MARCHIORI M. Efficient behavior of small-world networks[J]. Physical Review Letters, 2001, 87(19): 198701. doi: 10.1103/PhysRevLett.87.198701. 陳勇, 胡愛群, 胡嘯. 通信網(wǎng)中節(jié)點(diǎn)重要性的評價方法[J].通信學(xué)報, 2004, 25(8): 129-135. doi: 10.3321/ j.issn:1000-436X. 2004.08.018. CHEN Yong, HU Aiqun, and HU Xiao. Evaluation method for node importance in communication networks[J]. Journal on Communications, 2004, 25(8): 129-135. doi: 10.3321/j.issn: 1000-436X.2004.08.018. 于會, 劉尊, 李勇軍. 基于多屬性決策的復(fù)雜網(wǎng)絡(luò)節(jié)點(diǎn)重要性綜合評價方法[J]. 物理學(xué)報, 2013, 62(2): 1-9. doi: 10.7498/ aps.62.020204. YU Hui, LIU Zun, and LI Yongjun. Key nodes in complex networks identified by multi-attribute decision-making method[J]. Acta Physica Sinica, 2013, 62(2): 1-9. doi: 10.7498 /aps.62.020204. 秦李, 楊子龍, 黃曙光. 復(fù)雜網(wǎng)絡(luò)的節(jié)點(diǎn)重要性綜合評價[J]. 計算機(jī)科學(xué), 2015, 42(2): 60-64. doi: 10. 11896/j.issn.1002- 137X.2015.2.013. QIN Li, YANG Zilong, and HUANG Shuguang. Synthesis evaluation method for node importance in complex networks [J]. Computer Science, 2015, 42(2): 60-64. doi: 10.11896/ j.issn.1002-137X.2015.2.013. PAGE L and PERRY J. Reliability polynomials and links importance in networks[J]. IEEE Transactions on Reliability, 1994, 43(1): 51-58. doi: QK.IEL.1994.0000024.0007056. 00285108. -
計量
- 文章訪問數(shù): 1939
- HTML全文瀏覽量: 262
- PDF下載量: 580
- 被引次數(shù): 0