HOME JOURNALS CONTACT

Information Technology Journal

Year: 2013 | Volume: 12 | Issue: 22 | Page No.: 6623-6626
DOI: 10.3923/itj.2013.6623.6626
Study on Node Importance of Networks Security Defense Based on Complex Network
Zhao Dongmei, Liu Jinxing and Zhang Yanxue

Abstract: How to find the key nodes in the networks is critical to distribute the limited networks security resource for the key part in the networks, so that the key parts of the networks can operate effectively under the attack of the network threat. In this study, we divide the network into nodes and edges according to the graph theory and study the node importance of the networks by means of the complex network. First, the topological model of the network is modeled by means of complex networks theory under the base of analyzing the connection feature and the function of the network firstly and then some characteristics of the networks are presented, such as the information distribution amount, distribution efficiency and the information control capability; finally, an evaluating algorithm of node importance for the networks is proposed based on the relation, function of the nodes and the properties of the network. The simulation result shows that the method of node importance proposed in this study is effective and therefore a reference can provided for making network defense decision.

Fulltext PDF

How to cite this article
Zhao Dongmei, Liu Jinxing and Zhang Yanxue, 2013. Study on Node Importance of Networks Security Defense Based on Complex Network. Information Technology Journal, 12: 6623-6626.

Keywords: Node importance, network defense decision and information security

REFERENCES

  • Alberts, D.S., J.J. Garstka and F.P. Stein, 2000. Network Centric Warfare: Developing and Leveraging Information Superiority. 2nd Edn., CCRP Publication, Washington, DC., USA


  • Defense Science Board, 2007. Information management for net-centric operations. Report of the Defense Science Board, Washington, DC., USA. http://www.acq.osd.mil/dsb/reports/ADA467538.pdf.


  • Burke, D.A., 1999. Towards a game theory model of information warfare. Technical Report: AFIT/GSS/LAL/99D-1. Air Force Institute of Technology.


  • Chen, Y., A.Q. Hu and J. Hu, 2004. A method for finding the most vital node in communication networks. High Technol. Let., 1: 573-575.


  • Gallos, L.K., R. Cohen, P. Argyrakis, A. Bunde and S. Havlin, 2005. Stability and topology of scale-free networks under attack and defense strategies. Phys. Rev. Lett., Vol. 94.
    CrossRef    


  • Latora, V. and M. Marchiori, 2007. A measure of centrality based on network efficiency. New J. Phys., Vol. 9.
    CrossRef    


  • Li, M.L., J.G. Long and D.Q. Zhang, 2010. Analysis of node's importance of combat system based on theory of complex networks. Command Control Simulation, 32: 15-17 (In Chinese).


  • Ma, X.L., K.X. Sun and H.X. Wang, 2010. Research on network topology of command and control organization based on theory of complex networks. Fire Control Command Control, 35: 69-71.
    Direct Link    


  • Poulin, R., M.C. Boily and B.R. Masse, 2000. Dynamical systems to define centrality in social networks. Social Networks, 22: 187-220.
    CrossRef    


  • Strogatz, S.H., 2001. Exploring complex networks. Nature, 410: 268-276.
    CrossRef    Direct Link    


  • Trencansky, I. and R. Cervenka, 2005. Agent Modeling Language (AML): A comprehensive approach to modeling MAS. Informatica, 29: 391-400.
    Direct Link    


  • Wang, L., Y. Liu, X. Gu, Y. Wang and J. Jia, 2010. Skeleton-network reconfiguration based on node importance and line betweenness. Autom. Electric Power Syst., 34: 29-33.
    Direct Link    

  • © Science Alert. All Rights Reserved