{"title":"数据网络安全缺陷分析及方法研究","authors":"Kang-ming JIANG, Xiao-yun ZHANG, Shao-rui LIN","doi":"10.1016/S1005-8885(13)60232-0","DOIUrl":null,"url":null,"abstract":"<div><p>This paper cascades crash analysis and NS2 simulation analysis to study the network system hidden. It is combined with the theory of complex systems from the nodes and links in the network system vulnerability analysis. Firstly, we abstract complex network systems to the node and link network topology. And then we remove key nodes and link vulnerability analysis center between lines metrics to analyze the effect of the network functionality caused by node crashes or link crashes. Secondly, we construct a cascade collapse model, using NS2 simulation to study outside deliberate attack and simulation system failure analysis; and give the embodiment of cascading breakdown on the network function.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 131-135"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60232-0","citationCount":"0","resultStr":"{\"title\":\"Safety defect analysis and method study of data network\",\"authors\":\"Kang-ming JIANG, Xiao-yun ZHANG, Shao-rui LIN\",\"doi\":\"10.1016/S1005-8885(13)60232-0\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>This paper cascades crash analysis and NS2 simulation analysis to study the network system hidden. It is combined with the theory of complex systems from the nodes and links in the network system vulnerability analysis. Firstly, we abstract complex network systems to the node and link network topology. And then we remove key nodes and link vulnerability analysis center between lines metrics to analyze the effect of the network functionality caused by node crashes or link crashes. Secondly, we construct a cascade collapse model, using NS2 simulation to study outside deliberate attack and simulation system failure analysis; and give the embodiment of cascading breakdown on the network function.</p></div>\",\"PeriodicalId\":35359,\"journal\":{\"name\":\"Journal of China Universities of Posts and Telecommunications\",\"volume\":\"20 \",\"pages\":\"Pages 131-135\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60232-0\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of China Universities of Posts and Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1005888513602320\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of China Universities of Posts and Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1005888513602320","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
Safety defect analysis and method study of data network
This paper cascades crash analysis and NS2 simulation analysis to study the network system hidden. It is combined with the theory of complex systems from the nodes and links in the network system vulnerability analysis. Firstly, we abstract complex network systems to the node and link network topology. And then we remove key nodes and link vulnerability analysis center between lines metrics to analyze the effect of the network functionality caused by node crashes or link crashes. Secondly, we construct a cascade collapse model, using NS2 simulation to study outside deliberate attack and simulation system failure analysis; and give the embodiment of cascading breakdown on the network function.