CN107294782B - Complex network path attack method based on multi-hop - Google Patents

Complex network path attack method based on multi-hop Download PDF

Info

Publication number
CN107294782B
CN107294782B CN201710522188.XA CN201710522188A CN107294782B CN 107294782 B CN107294782 B CN 107294782B CN 201710522188 A CN201710522188 A CN 201710522188A CN 107294782 B CN107294782 B CN 107294782B
Authority
CN
China
Prior art keywords
path
node
attack
network
specified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710522188.XA
Other languages
Chinese (zh)
Other versions
CN107294782A (en
Inventor
曾勇
何一
刘志宏
蒋忠元
马建峰
周灵杰
高燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Electronic Science and Technology
Original Assignee
Xian University of Electronic Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Electronic Science and Technology filed Critical Xian University of Electronic Science and Technology
Priority to CN201710522188.XA priority Critical patent/CN107294782B/en
Publication of CN107294782A publication Critical patent/CN107294782A/en
Application granted granted Critical
Publication of CN107294782B publication Critical patent/CN107294782B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/20Hop count for routing purposes, e.g. TTL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The invention proposes a kind of complex network path attack method based on multi-hop, for solving the technical problem that maximal connected subgraphs size variation is slow, attack effect is poor present in existing route degree centrality attack method, step is realized are as follows: define path center formula CPl, specify the path length to attacking network;Hop count l when specified attack;Obtain the set of paths that all length in network is specified path length;Calculate the path center that hop count is specified in each path in set of paths;It specifies the maximum path of path center of hop count to attack in path each in set of paths, obtains rest network;Calculate rest network maximal connected subgraphs size;Maximal connected subgraphs size is obtained under specified hop count with the variation of number of times of attack;Maximal connected subgraphs size is obtained under different hop counts with the variation of number of times of attack.The present invention can make network maximal connected subgraphs size acute variation under identical number of times of attack, and bigger destruction is caused to network, and attack effect is good.

Description

Complex network path attack method based on multi-hop
Technical field
The invention belongs to complex network technical fields, are related to a kind of complex network path attack method, and in particular to a kind of Complex network path attack method based on multi-hop, can be used for efficiently attacking complex network, examines complex network Robustness.
Background technique
Real-life many systems can be described as complex network, and the network system of various complexity penetrates into The every aspect of life.Complex network describes the relationship between things, such as internet, electric power networks, transportation network.By these Individual in system indicates that the relationship between individual is indicated with side, to be abstracted as complex network with point.
The final goal of complex network research is that the high system of robustness is designed for daily life.But these systems pass through It often can be by some attacks for unintentionally destroying even malice, such as power failure, the city of network attack, electric power networks in internet The traffic jam in city.In complex network, these destroy and attack the certain nodes that can be considered as by network or side from network In the attack left out.Understand the attack method in complex network, people can be allowed to design these systems using better method Obtain more firm and safety.
Currently, researchers have furtherd investigate the attack method in complex network.Wherein, center sexual assault is spent Method is widely paid close attention to only needing the local topology information of network when its attack.There is generation in degree centrality attack method Table is node degree centrality attack method and the path degree centrality attack method that is made of node and side.
The method that node center is measured in node degree centrality attack method is the degree for calculating the node, attack process Are as follows: calculate the degree of all nodes in network;Attack maximum node is spent: deletion of node and its all even sides are remained Co-net network;Calculate the maximal connected subgraphs size of rest network;It repeats the above process until node is not present in network, obtains most Big connected subgraph size with number of times of attack variation.In node degree centrality attack method, the degree of node the big then can be preferential It is attacked, i.e. the neighbor node of node is more, then it is assumed that the node is more important, and when attack will preferentially be selected.
By the description of node degree centrality attack method it is found that hub node and its surroundings nodes in network, due to its neighbour It is more to occupy node, degree is big, and when attack will be preferred, that is, attacking can always carry out around hub node and its surroundings nodes. When this kind of node is attacked, the influence to network connectivty is little, maximal connected subgraphs size variation very little, attack effect Difference.
The method that path center is measured in the degree centrality attack method of path is the degree for calculating the path, that is, calculates the road The neighbor node number of diameter.Its attack process are as follows: the specified path length to attacking network;Obtaining all length in network is to refer to Determine the set of paths of path length;Calculate each path degree centrality in set of paths;To path degree centrality each in set of paths Maximum path is attacked: being deleted the side in path, is obtained rest network;The maximal connected subgraphs for calculating rest network are big It is small;It repeats the above process until the set of paths that length is specified path length is not present in network, obtains maximal connected subgraphs Size with number of times of attack variation.In the degree centrality attack method of path, the degree in path the big, can preferentially be attacked, i.e. road The neighbor node of diameter is more, then it is assumed that the path is more important, and when attack will preferentially be selected.
By the description of path degree centrality attack method it is found that those in network contain the path of hub node due to it Neighbor node is more, and degree is big, attack when can be preferred, that is, attack always can around itself have the path of hub node into Row.When this class.path is attacked, residue of network organization part still keeps good connectivity, and maximal connected subgraphs size variation is not Obviously, attack effect is poor.
Summary of the invention
It is an object of the invention to overcome the problems of the above-mentioned prior art, a kind of complex web based on multi-hop is proposed Network path attack method, it is slow for solving maximal connected subgraphs size variation present in existing route degree centrality attack method Slowly, the technical problem of attack effect difference.
To achieve the above object, the technical solution adopted by the present invention includes the following steps:
(1) path center formula CP is definedl, while the specified path length to attacking network;
(2) hop count l when attack is specified;
(3) set of paths that all length in network is specified path length is obtained:
(3a) judges that each node whether there is away from it as the node of specified path length in network, if so, executing step (3b) is otherwise executed step (7);
The node pair that (3b) saves each node and constitute away from it for the node of specified path length, and record each node Node between, each node to the node to intermediate node and each of which node to the node to intermediate section The company side of point constitutes set of paths;
(4) path center that hop count is specified in each path in set of paths is calculated:
(4a) judges that each path in set of paths whether there is away from it for the node for specifying hop count, if so, executing step Suddenly (4b) is otherwise executed step (7);
(4b) utilizes path center formula CPl, calculate the path center that each path specifies hop count;
(5) it specifies the maximum path of path center of hop count to attack in path each in set of paths: deleting path Side in the maximum path of centrality, obtains rest network;
(6) the maximal connected subgraphs size of rest network is calculated;
(7) maximal connected subgraphs size is obtained under specified hop count with the variation of number of times of attack: rest network is repeated Step (3)~(6), until the node or the road set of paths Zhong Meitiao away from it for specified path length is not present in each node Until diameter is all not present away from the node that it is specified hop count, maximal connected subgraphs size is obtained under specified hop count with number of times of attack Variation;
(8) maximal connected subgraphs size is obtained under different hop counts with the variation of number of times of attack: being enabled l=l+1, is repeated step Suddenly (2)~(7), it is that the node of specified hop count is that each path when attacking first time in set of paths, which is all not present away from it, Only, maximal connected subgraphs size is obtained under different hop counts with the variation of number of times of attack.
Compared with the prior art, the invention has the following advantages:
The present invention calculates path center using the method for multi-hop, so that will preferentially attack direct or indirect connection when attack Itself path phase comprising hub node is preferentially attacked in the path of multiple hub node sections, with path degree centrality attack method Than, under identical number of times of attack, network maximal connected subgraphs size variation can be made more violent, bigger destruction is caused to network, Effectively improve the effect of attack.
Detailed description of the invention
Fig. 1 is implementation process block diagram of the present invention;
Fig. 2 is that the present invention is tested most in Polbooks network with existing route degree centrality attack method Big connected subgraph size with number of times of attack situation of change effect contrast figure.
Specific embodiment
Below in conjunction with the drawings and specific embodiments, present invention is further described in detail.
Complex network in the present embodiment is by taking Polbooks network as an example.
Referring to Fig.1, the complex network path attack method based on multi-hop, includes the following steps:
Step 1 defines path center formula CPl, while the specified path length to attacking network:
Define path center formula CPl, expression formula are as follows:
Wherein, l is hop count, kjIndicate the degree of node j,Indicate the whole nodes for being l with path P distance.
In addition, since attack method of the invention is attack for particular path length, it is therefore desirable to it is specified to The path length of attack.The length should not be arranged too much, and the path that this will lead to the length in network is seldom, and attack process is very It will terminate fastly, be unfavorable for examining attack effect.The path length of Polbooks network to be attacked is set in the present embodiment 4。
Hop count l when step 2, specified attack:
Hop count l, l=1 when initial when specified attack.
Step 3 obtains the set of paths that all length in network is specified path length:
Step 3a), judge in network that each node whether there is away from it as the node of specified path length, if so, execution Step 3b), otherwise, execute step 7:
Judge that each node in current Polbooks network whether there is away from it apart from the node for 4, if so, executing step Rapid 3b), continue the attack under the specified hop count;Otherwise, show that the path that length is 4 is not present in current Polbooks network, Attack under the specified hop count terminates, and executes step 7, obtains this in Polbooks network and specifies maximal connected subgraphs under hop count big The small variation with number of times of attack.
Step 3b), the node pair that saves each node and constituted away from it for the node of specified path length, and record each Node between node pair, each node to the node to intermediate node and each of which node to the node to centre Node company side constitute set of paths:
For there is the node for being 4 away from certain nodal distance in step 3a), the node for saving the node and being 4 away from its distance The node pair of composition, and record the node between each node pair, each node to the node to intermediate node and its every A node constitutes set of paths to company side of the node to intermediate node, finally obtains in current Polbooks network and owns The set of paths that length is 4.
Step 4 calculates the path center that hop count is specified in each path in set of paths:
Step 4a), judge that each path in set of paths whether there is away from it for the node of specified hop count, if so, holding Row step 4b), otherwise, execute step 7:
Judging that each path in all length is 4 in current Polbooks network set of paths whether there is away from it is The node of specified hop count, if so, executing step 4b), continue the attack under the specified hop count;Otherwise, show current Polbooks It is the node for specifying hop count that all paths, which are all not present away from it, in the set of paths that all length is 4 in network, then the specified jump Attack under several terminates, and executes step 7, obtains under the specified hop count in Polbooks network maximal connected subgraphs size with attack The variation of number.
Step 4b), utilize path center formula CPl, calculate the path center that each path specifies hop count:
For there is the path away from the node that distance in set of paths is specified hop count in step 4a), path center is utilized Property formula CPlThe centrality for calculating its specified hop count, obtaining existing in current Plobooks network away from path is specified hop count The path center in the path of node.
Step 5 specifies the maximum path of path center of hop count to attack in path each in set of paths: deleting road Side in the maximum path of diameter centrality, obtains rest network:
The current maximum path of Plobooks network path centrality is selected to be attacked, when attack will be on the path Edge contract, node retain, the remaining Polbooks network after being attacked.
Step 6, the maximal connected subgraphs size for calculating rest network:
Every time after attack, needs to calculate the maximal connected subgraphs size of remaining Polbooks network, saved, so as to step The Polbooks network maximal connected subgraphs size under specified hop count is obtained in rapid 7 with the variation of number of times of attack, finally in step 8 In obtain the Polbooks network maximal connected subgraphs size under different hop counts with the variation of number of times of attack.The present invention uses range First search algorithm calculates the largest connected size of network, specifically: the size of connected subgraph where calculating it to each node, so The maximal connected subgraphs size of selection maximum value whole network the most afterwards.
Step 7 obtains under specified hop count maximal connected subgraphs size with the variation of number of times of attack: repeating to hold to rest network Row step 3~6, until each node is not present away from each path in its node or set of paths for specified path length All there is no until away from the node that it be specified hop count, obtain specifying under hop count maximal connected subgraphs size with the change of number of times of attack Change:
The experimentation under specified hop count is repeated, when the node for being 4 away from its distance is not present in node each in step 3a) Or step 4a) each path in set of paths is when being all not present away from the node that it is specified hop count, attacking under the specified hop count Hit stopping.Obtain under specified hop count that maximal connected subgraphs size is continued to execute with the variation of number of times of attack in Polbooks network Step 8.
Step 8 obtains under different hop counts maximal connected subgraphs size with the variation of number of times of attack: enabling l=l+1, repetition is held Row step 2~7, it is that the node of specified hop count is that each path when attacking first time in set of paths, which is all not present away from it, Only, maximal connected subgraphs size is obtained under different hop counts with the variation of number of times of attack:
Change specified hop count, enable l=l+1, repeat the experimentation under specified hop count, the step 4a when attacking first time) Stopping when away from the node that it is specified hop count is all not present in each path in set of paths, because when l increases again, in network not Have path and exist be away from it specified hop count node, obtain in Polbooks network maximal connected subgraphs size under difference hop counts With the variation of number of times of attack.
Below in conjunction with emulation experiment, elaborate to technical effect of the invention.
1, simulated conditions and content
The present invention in Ubuntu operating system using C++ program, in Polbooks network simulate the present invention with it is existing The attack process of path degree centrality attack method, both obtains maximal connected subgraphs size with number of times of attack situation of change, As a result as shown in Figure 2.Abscissa t indicates number of times of attack in figure, and ordinate S indicates maximal connected subgraphs size.When experiment, wait attack The path length for hitting network is set as 4, and the value of hop count l is 1~4 in the present invention.
2, analysis of simulation result
Referring to Fig. 2, star-like line is maximal connected subgraphs size in path degree center thrust method with number of times of attack in figure Variation;Figure intermediate cam shape line respectively indicate in text invention when hop count l value is 1,2,3,4 maximal connected subgraphs size with The variation of number of times of attack.From Fig. 2 it is observed that maximal connected subgraphs size is all with the increasing of number of times of attack in two kinds of attack methods Add and reduces.But the invention enables network maximal connected subgraphs size variations to become apparent from, this shows that the present invention is better than based on road The degree centrality attack method of diameter, can cause bigger destruction to network.
Embodiment described above only illustrates advantage of the present invention compared to tradition based on path degree center thrust method, and Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention Protect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (2)

1. a kind of complex network path attack method based on multi-hop, which comprises the steps of:
(1) path center formula CP is definedl, while the specified path length to attacking network;
(2) value range for specifying hop count l, l when attack is 1~4;
(3) set of paths that all length in network is specified path length is obtained:
(3a) judges that each node whether there is away from it as the node of specified path length in network, if so, step (3b) is executed, Otherwise, step (7) are executed;
The node pair that (3b) saves each node and constitute away from it for the node of specified path length, and each node is recorded to it Between node, each node to the node to intermediate node and each of which node to the node to intermediate node Even side constitutes set of paths;
(4) path center that hop count is specified in each path in set of paths is calculated:
(4a) judges that each path whether there is away from the arbitrary node in each path as the section of specified hop count l in set of paths Point otherwise, executes step (7) if so, executing step (4b);(4b) utilizes path center formula CPl, calculate each path The path center of specified hop count;
(5) it specifies the maximum path of path center of hop count to attack in path each in set of paths: deleting path center Side in the maximum path of property, obtains rest network;
(6) the maximal connected subgraphs size of rest network is calculated;
(7) maximal connected subgraphs size is obtained under specified hop count with the variation of number of times of attack: step is repeated to rest network (3)~(6), until each node is not present away from each path in its node or set of paths for specified path length Until away from the node that it is specified hop count, maximal connected subgraphs size is obtained under specified hop count with the change of number of times of attack Change;
(8) maximal connected subgraphs size is obtained under different hop counts with the variation of number of times of attack: being enabled l=l+1, is repeated step (2)~(7), it is that the node of specified hop count is that each path when attacking first time in set of paths, which is all not present away from it, Only, maximal connected subgraphs size is obtained under different hop counts with the variation of number of times of attack.
2. the complex network path attack method according to claim 1 based on multi-hop, which is characterized in that in step (1) The path center formula, expression formula are as follows:
Wherein, l is hop count, kjIndicate the degree of node j,Indicate the whole nodes for being l with path P distance.
CN201710522188.XA 2017-06-30 2017-06-30 Complex network path attack method based on multi-hop Active CN107294782B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710522188.XA CN107294782B (en) 2017-06-30 2017-06-30 Complex network path attack method based on multi-hop

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710522188.XA CN107294782B (en) 2017-06-30 2017-06-30 Complex network path attack method based on multi-hop

Publications (2)

Publication Number Publication Date
CN107294782A CN107294782A (en) 2017-10-24
CN107294782B true CN107294782B (en) 2019-11-01

Family

ID=60099116

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710522188.XA Active CN107294782B (en) 2017-06-30 2017-06-30 Complex network path attack method based on multi-hop

Country Status (1)

Country Link
CN (1) CN107294782B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114428962B (en) * 2022-01-28 2023-03-31 北京灰度科技有限公司 Vulnerability risk priority processing method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090035230A (en) * 2007-10-05 2009-04-09 이화여자대학교 산학협력단 Sensor network system and method for detecting attack thereof
US8411684B1 (en) * 2009-10-26 2013-04-02 Mcafee, Inc. System, method, and computer program product for determining a hop count between network devices utilizing a binary search
CN103200096A (en) * 2013-03-13 2013-07-10 南京理工大学 Heuristic routing method avoiding key nodes in complex network
CN103957544A (en) * 2014-04-22 2014-07-30 电子科技大学 Method for improving survivability of wireless sensor network
CN106789253A (en) * 2016-12-23 2017-05-31 西安电子科技大学 A kind of elasticity of complex information network evaluates and optimizes method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090035230A (en) * 2007-10-05 2009-04-09 이화여자대학교 산학협력단 Sensor network system and method for detecting attack thereof
US8411684B1 (en) * 2009-10-26 2013-04-02 Mcafee, Inc. System, method, and computer program product for determining a hop count between network devices utilizing a binary search
CN103200096A (en) * 2013-03-13 2013-07-10 南京理工大学 Heuristic routing method avoiding key nodes in complex network
CN103957544A (en) * 2014-04-22 2014-07-30 电子科技大学 Method for improving survivability of wireless sensor network
CN106789253A (en) * 2016-12-23 2017-05-31 西安电子科技大学 A kind of elasticity of complex information network evaluates and optimizes method

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Error and attack tolerance of complex networks;Reka Albert等;《Nature》;20000831;全文 *
Iterative path attacks on networks;Cunlai Pu等;《Physics Letters A》;20150831;全文 *
基于节点中心性度量的内容中心网络缓存机制;蔡岳平;《通信学报》;20170625;全文 *
计算机网络脆弱性评估方法研究;贾炜;《中国博士学位论文全文数据库信息科技辑》;20130131;全文 *

Also Published As

Publication number Publication date
CN107294782A (en) 2017-10-24

Similar Documents

Publication Publication Date Title
Wang et al. The evolution of the Internet of Things (IoT) over the past 20 years
Zhu et al. Revealing cascading failure vulnerability in power grids using risk-graph
Yi et al. A denial of service attack in advanced metering infrastructure network
Qin et al. DDoS attack detection using flow entropy and clustering technique
CN103500307A (en) Mobile internet malignant application software detection method based on behavior model
CN103268449B (en) A kind of high speed detection method and system of mobile phone malicious code
CN107294782B (en) Complex network path attack method based on multi-hop
CN109218276A (en) A kind of network attack drawing generating method and system
Zhang et al. Effective strategy of adding links for improving network transport efficiency on complex networks
Wenli et al. Identifying node importance based on information entropy in complex networks
Hong et al. Efficient calculation of the robustness measure R for complex networks
CN105245362A (en) SDN (Software Defined Network) environment important node information acquisition method
CN105791300B (en) Single packet source tracing method based on tracking trace importance assessment
Zhang et al. On continuously matching of evolving graph patterns
Zhou et al. Dependency-based targeted attacks in interdependent networks
CN104732547A (en) Graph isomorphism judgment method based on high-order power adjacency matrix hash comparison
CN104680263B (en) Electric power transportation network Topology Structure Design method based on particle cluster algorithm
Zheng et al. Defense technology of wormhole attacks based on node connectivity
Min et al. Searching for influencers in big-data complex networks
Li et al. Role of structural holes in containing spreading processes
CN104298872A (en) Weak clearing strategy oriented to power grid stability analysis algorithm
CN102025739B (en) Multidimensional protocol identification method based on host behavior
CN109905404A (en) A kind of method of RPL Routing Protocol Rank attack detecting and isolation based on trust under environment of internet of things
CN114547915B (en) Power grid target node identification method, device, equipment and storage medium
Wang et al. Relative entropy of k-order edge capacity for nodes similarity analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant