Yun-ming Wang, Duoping Zhang, Chengsheng Pan, Bo Chen
{"title":"基于网络不脆弱性熵的指挥控制网络不脆弱性测度","authors":"Yun-ming Wang, Duoping Zhang, Chengsheng Pan, Bo Chen","doi":"10.1109/CCSSE.2016.7784363","DOIUrl":null,"url":null,"abstract":"The factors such as hardware malfunction and invasion, can lead to the nodes and edges failure of Command and Control (C2) network, which divide the original connected network topology, even result in global network damage. To assess the invulnerability of the C2 network dynamically, this study has proposed a measurement of invulnerability for C2 network based on network invulnerability entropy, established an invulnerability entropy model based on the degree of network invulnerability, and put forward node criticality based on Level Flow Betweenness (LFB) and edge criticality based on information transfer efficiency, respectively. Simulation results showed that this measurement of invulnerability is highly sensitive and accurate, able to better reflects the invulnerability and provide a theoretical basis for design and optimization the structure of C2 network.","PeriodicalId":136809,"journal":{"name":"2016 2nd International Conference on Control Science and Systems Engineering (ICCSSE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Measure of invulnerability for command and control network based on network invulnerability entropy\",\"authors\":\"Yun-ming Wang, Duoping Zhang, Chengsheng Pan, Bo Chen\",\"doi\":\"10.1109/CCSSE.2016.7784363\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The factors such as hardware malfunction and invasion, can lead to the nodes and edges failure of Command and Control (C2) network, which divide the original connected network topology, even result in global network damage. To assess the invulnerability of the C2 network dynamically, this study has proposed a measurement of invulnerability for C2 network based on network invulnerability entropy, established an invulnerability entropy model based on the degree of network invulnerability, and put forward node criticality based on Level Flow Betweenness (LFB) and edge criticality based on information transfer efficiency, respectively. Simulation results showed that this measurement of invulnerability is highly sensitive and accurate, able to better reflects the invulnerability and provide a theoretical basis for design and optimization the structure of C2 network.\",\"PeriodicalId\":136809,\"journal\":{\"name\":\"2016 2nd International Conference on Control Science and Systems Engineering (ICCSSE)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd International Conference on Control Science and Systems Engineering (ICCSSE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCSSE.2016.7784363\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Control Science and Systems Engineering (ICCSSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCSSE.2016.7784363","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Measure of invulnerability for command and control network based on network invulnerability entropy
The factors such as hardware malfunction and invasion, can lead to the nodes and edges failure of Command and Control (C2) network, which divide the original connected network topology, even result in global network damage. To assess the invulnerability of the C2 network dynamically, this study has proposed a measurement of invulnerability for C2 network based on network invulnerability entropy, established an invulnerability entropy model based on the degree of network invulnerability, and put forward node criticality based on Level Flow Betweenness (LFB) and edge criticality based on information transfer efficiency, respectively. Simulation results showed that this measurement of invulnerability is highly sensitive and accurate, able to better reflects the invulnerability and provide a theoretical basis for design and optimization the structure of C2 network.