CN117294511A - Method for improving damage resistance of infrastructure network and application thereof - Google Patents
Method for improving damage resistance of infrastructure network and application thereof Download PDFInfo
- Publication number
- CN117294511A CN117294511A CN202311347567.1A CN202311347567A CN117294511A CN 117294511 A CN117294511 A CN 117294511A CN 202311347567 A CN202311347567 A CN 202311347567A CN 117294511 A CN117294511 A CN 117294511A
- Authority
- CN
- China
- Prior art keywords
- network
- nodes
- infrastructure
- infrastructure network
- edges
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 230000006378 damage Effects 0.000 title abstract description 4
- 238000010168 coupling process Methods 0.000 claims abstract description 26
- 238000005859 coupling reaction Methods 0.000 claims abstract description 26
- 230000008878 coupling Effects 0.000 claims abstract description 25
- 238000004891 communication Methods 0.000 claims abstract description 11
- 238000004088 simulation Methods 0.000 claims abstract description 9
- 230000001419 dependent effect Effects 0.000 claims abstract description 7
- 230000008569 process Effects 0.000 claims description 7
- 238000012216 screening Methods 0.000 claims 1
- 238000000053 physical method Methods 0.000 abstract 1
- 238000011161 development Methods 0.000 description 6
- 238000013461 design Methods 0.000 description 4
- 238000010276 construction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000005574 cross-species transmission Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 238000013068 supply chain management Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Algebra (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Probability & Statistics with Applications (AREA)
- Pure & Applied Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域Technical field
本发明涉及多层网络可靠性领域,尤其涉及一种提高基础设施网络抗毁性的方法及其应用。The present invention relates to the field of multi-layer network reliability, and in particular to a method for improving the invulnerability of infrastructure networks and its application.
背景技术Background technique
近年来,智慧城市建设的快速发展增加了对电力网络的需求。智慧城市中的各类智能设备、传感器和系统对稳定可靠的电力供应有了更高的要求,这就需要电力网络进行扩展和升级,以满足不断增加的电力需求。同时,智慧城市建设也推动了通信网络的发展。智能设备、传感器和系统需要高速且可靠的通信网络来进行数据传输和相互连接。因此,通信网络需要进行扩展和优化,以满足大规模智能设备的互联需求,包括增加网络带宽、改善网络覆盖范围以及提升网络的可靠性和安全性。此外,智慧城市建设还促进了电力网络和通信网络的融合。电力网络可以利用通信网络的基础设施来实现智能电网的监测和控制,以提高电力系统的效率和可持续性。同时,通信网络也可以通过与电力网络的集成,为智慧城市提供更智能化的服务和解决方案。In recent years, the rapid development of smart city construction has increased the demand for power networks. Various smart devices, sensors and systems in smart cities have higher requirements for stable and reliable power supply, which requires the power network to be expanded and upgraded to meet the increasing power demand. At the same time, smart city construction also promotes the development of communication networks. Smart devices, sensors and systems require high-speed and reliable communication networks for data transmission and interconnection. Therefore, communication networks need to be expanded and optimized to meet the interconnection needs of large-scale smart devices, including increasing network bandwidth, improving network coverage, and improving network reliability and security. In addition, smart city construction also promotes the integration of power networks and communication networks. Power networks can utilize the infrastructure of communication networks to implement smart grid monitoring and control to improve the efficiency and sustainability of the power system. At the same time, communication networks can also provide smarter services and solutions for smart cities through integration with power networks.
随着智慧城市化进程的飞速发展,电力网络与通信网络间的耦合和依赖关系逐渐加强,原有的系统边界逐渐被模糊化并打破,这使得系统间的交互逐渐频繁且复杂多变。尽管复杂网络系统间的相互耦合连通使网络系统的功能性得到了更大化地发挥,但同时系统在遭受不同程度的破坏和扰动时,相互依存关系会使得故障产生级联次联扩散,使得风险外溢,并蔓延到整个系统。一旦整个系统的连通性被破坏,将会造成无法估量的损坏。因此,在面对这些挑战时,提高网络的抗毁性具有重要的意义。如在通信网络中,这可以确保通信的可靠性和连通性,而在物流和供应链管理中,它有助于保障物流运输的顺畅性和供应链的稳定性。With the rapid development of smart urbanization, the coupling and dependence between power networks and communication networks are gradually strengthening, and the original system boundaries are gradually blurred and broken, which makes the interactions between systems increasingly frequent and complex. Although the mutual coupling and connectivity between complex network systems maximizes the functionality of the network system, at the same time, when the system suffers varying degrees of damage and disturbance, the interdependence will cause faults to cascade and spread, causing Risks spill over and spread throughout the system. Once the connectivity of the entire system is destroyed, immeasurable damage will be caused. Therefore, in the face of these challenges, it is of great significance to improve the invulnerability of the network. For example, in communication networks, this can ensure the reliability and connectivity of communication, while in logistics and supply chain management, it helps ensure the smoothness of logistics transportation and the stability of the supply chain.
综上,需要通过提高网络的抗毁性,进而增强系统的可靠性、降低风险、提高工作效率和提供持续的服务。In summary, it is necessary to enhance the reliability of the system, reduce risks, improve work efficiency and provide continuous services by improving the invulnerability of the network.
发明内容Contents of the invention
为了解决现有技术中存在的不足,本申请提出了一种提高基础设施网络抗毁性的方法及其应用,通过优化多重耦合相依关联的基础设施网络,进而提高其抗毁性、提升系统可靠性和稳定性等目的。In order to solve the deficiencies in the existing technology, this application proposes a method and its application for improving the invulnerability of infrastructure networks. By optimizing the multi-coupled and interdependent infrastructure network, the invulnerability and system reliability are improved. performance and stability purposes.
本发明所采用的技术方案如下:The technical solutions adopted by the present invention are as follows:
一种提高基础设施网络抗毁性的方法,包括如下步骤:A method to improve the invulnerability of infrastructure networks includes the following steps:
S1、构建多重耦合相依关联的基础设施网络模型;S1. Construct a multi-coupled and interdependent infrastructure network model;
S2、对S1中所构建的多重耦合相依关联的基础设施网络模型进行随机攻击模拟,并对攻击模拟后的基础设施网络模型进行分析,寻找最优集群大小s和外部支持边数量M;S2. Carry out random attack simulation on the multi-coupled and interdependent infrastructure network model constructed in S1, analyze the infrastructure network model after the attack simulation, and find the optimal cluster size s and the number of external supporting edges M;
S3、基于S2获取的最优集群大小s和外部支持边数量M,对基础设施网络模型进行优化。S3. Optimize the infrastructure network model based on the optimal cluster size s and the number of external support edges M obtained by S2.
进一步,所述基础设施网络模型表示为:Further, the infrastructure network model is expressed as:
G=(A,B,V)G=(A,B,V)
其中,A和B均为无向无权网络;网络A表示为(VA,EA),VA表示网络A中所有节点的集合,EA表示网络A中所有连边的集合;网络B表示为(VB,EB),VB表示网络中所有节点的集合,EB表示网络B中所有连边的集合;V为网络A和网络B的节点的集合;网络A的节点数为NA,网络B的节点数为NB,网络B与网络A具有相同的节点数,即NA=NB;Among them, A and B are both undirected and unweighted networks; network A is expressed as (V A , E A ), V A represents the set of all nodes in network A, and E A represents the set of all connected edges in network A; network B Expressed as (V B , E B ), V B represents the set of all nodes in the network, E B represents the set of all connected edges in network B; V is the set of nodes in network A and network B; the number of nodes in network A is N A , the number of nodes of network B is N B , network B and network A have the same number of nodes, that is, N A = N B ;
在由网络A和B组成的耦合网络中,网络A与网络B之间存在耦合连边,耦合连边具有依赖性。In a coupled network composed of networks A and B, there are coupling edges between network A and network B, and the coupling edges have dependencies.
进一步,S2的过程如下:Further, the process of S2 is as follows:
S2.1、当基础设施网络模型遭受攻击时,被攻击的节点以及耦合相连的节点也发生故障;断开所有故障节点与其邻居节点的连边,并将所有的故障节点从耦合网络及自身网络中删除;S2.1. When the infrastructure network model is attacked, the attacked node and the coupled connected nodes also fail; disconnect all faulty nodes from their neighbor nodes, and remove all faulty nodes from the coupling network and their own network. delete in;
S2.2、初始化外部支持边数量M和集群大小s,基于M和s从删除故障节点的网络A和B中分别筛选出功能性节点;S2.2. Initialize the number of external support edges M and the cluster size s, and filter out functional nodes from the networks A and B where the faulty node is deleted based on M and s;
S2.3、不断调节集群大小s和外部支持边数量M,比较不同下网络的失效速率;以降低网络的失效速率为目的,寻找最优集群大小s和外部支持边数量M。S2.3. Continuously adjust the cluster size s and the number of external support edges M, and compare the failure rates of the network under different conditions; with the purpose of reducing the failure rate of the network, find the optimal cluster size s and the number of external support edges M.
进一步,S2.2的过程如下:Further, the process of S2.2 is as follows:
针对已删除故障节点的网络A和网络B,先对剩余节点进行集群划分,且获取每个集群中的节点数量,所划分出的集群中的节点数若低于集群大小s,则删除该集群;For Network A and Network B where the faulty node has been deleted, first divide the remaining nodes into clusters and obtain the number of nodes in each cluster. If the number of nodes in the divided cluster is lower than the cluster size s, delete the cluster. ;
对于剩余集群中的节点,若剩余集群中节点对应的外部支持边数量小于M,则删除该节点;For the nodes in the remaining clusters, if the number of external supporting edges corresponding to the nodes in the remaining clusters is less than M, the node will be deleted;
最终剩余的节点为功能性节点。The final remaining nodes are functional nodes.
进一步,S3中对基础设施网络模型进行优化的方法包括:Furthermore, methods for optimizing infrastructure network models in S3 include:
基础设施网络模型的功能性节点需要至少M条外部支持边;Functional nodes of the infrastructure network model require at least M external supporting edges;
功能性节点需要在本地大于等于s集群中。Functional nodes need to be in a local cluster greater than or equal to s.
进一步,在第n步有效节点拥有M条外部支持边的比例表示如下:Furthermore, the proportion of valid nodes with M external supporting edges at the nth step is expressed as follows:
其中,分别为网络A、B在n阶段至少有M个有效支持链路的节点的比例;p为初始网络遭到攻击剩余节点比例,1-p为初始网络遭到攻击失效节点比例;/>分别表示在耦合网络中的节点在第n阶段拥有至少M个来自B和A网络的有效支持链接的概率;分别表示在耦合网络中的节点在第n阶段拥有至少M-1个来自B和A网络的有效支持链接的概率;KA、KB分别为耦合网络中网络A对网络B支持连边的平均度、耦合网络中网络B对网络A支持连边的平均度;PA(KA)、PB(KB)分别为耦合网络中网络A对网络B支持连边的度分布、网络B对网络A支持连边的度分布;/>分别为网络A、B中有效节点比例。in, They are the proportions of networks A and B that have at least M valid nodes supporting links in the n stage respectively; p is the proportion of remaining nodes in the initial network that was attacked, and 1-p is the proportion of failed nodes in the initial network that was attacked;/> respectively represent the probability that a node in the coupled network has at least M effective support links from the B and A networks in the nth stage; Respectively represent the probability that a node in the coupled network has at least M-1 effective support links from the B and A networks in the nth stage; K A and K B are respectively the average support connections from network A to network B in the coupled network. degree, the average degree of the edge supported by network B to network A in the coupled network; P A (K A ) and P B (K B ) are respectively the degree distribution of the edge supported by network A to network B in the coupled network, and the degree distribution of the edge supported by network B to network B in the coupled network. Network A supports degree distribution of connected edges;/> are the proportions of effective nodes in networks A and B respectively.
进一步,在第n步有效节点在本地网络大于等于s的集群中的比例表示如下:Furthermore, the proportion of effective nodes in the clusters where the local network is greater than or equal to s at step n is expressed as follows:
其中,分别为网络A、B在失效的第n步时功能性节点在本地大于等于s集群中的比例;/>分别为网络A、B中属于大小为s的组件的节点相对于存活节点的比例/>的比例;<kA>、<kB>分别为网络A、B的平均度;x表示为边连接状态的概率;H(x)为超越度分布的生成函数;G0(x)为网络的生成函数,G0’(1)为网络的平均度。in, Respectively, they are the proportion of functional nodes in the local cluster greater than or equal to s at the nth step of failure of networks A and B;/> are the proportions of nodes belonging to components of size s relative to surviving nodes in networks A and B respectively/> proportion; <k A >, <k B > are the average degrees of networks A and B respectively; The generating function, G 0 '(1) is the average degree of the network.
进一步,在第n步功能性节点比例表示如下:Further, the proportion of functional nodes at the nth step is expressed as follows:
其中,分别为网络A、B在失效的第n步时功能性节点在大于等于集群s中且有至少M条外部支持边的节点的比例。in, They are the proportion of functional nodes in cluster s or greater and with at least M external supporting edges in networks A and B respectively at the nth step of failure.
一种基础设施网络,采用上述方法搭建。An infrastructure network is built using the above method.
本发明的有益效果:Beneficial effects of the present invention:
(1)本发明通过模拟不同条件下多重耦合多重耦合相依关联的基础设施网络在遭受随机攻击时,剩余网络中功能性节点的比例来提高网络系统的抗毁性。(1) The present invention improves the invulnerability of the network system by simulating the proportion of functional nodes in the remaining network when a multi-coupled and multi-coupled dependent infrastructure network suffers random attacks under different conditions.
(2)本发明提出了级联故障过程、稳定状态下功能节点比例的精确分析表达式,并发现系统在初始故障后会出现突然的相变行为,并且发现当系统需要更多有效的外部支持边时,需要更多的内部连接密度来避免崩溃。本发明还基于统计物理方法对所建立的多重耦合相依关联的基础设施网络模型进行分析,以找出不同集群大小和外部支持边数量对系统抗毁性的影响,借此对基础设施网络模型进行优化,进而提高基础设施网络抗毁性。(2) The present invention proposes an accurate analytical expression for the cascading fault process and the proportion of functional nodes in the steady state, and finds that the system will have a sudden phase change behavior after the initial fault, and finds that when the system requires more effective external support edges, more internal connection density is needed to avoid collapse. The present invention also analyzes the established multi-coupled and interdependent infrastructure network model based on statistical physics methods to find out the impact of different cluster sizes and the number of external supporting edges on the system's invulnerability, thereby performing on the infrastructure network model. Optimization, thereby improving the invulnerability of infrastructure networks.
(3)本发明所提出的一种提高基础设施网络抗毁性的方法,有望为设计更具弹性的现实依赖系统提供启示。该技术的应用前景广阔,可用于提高智慧城市间网络系统的抗毁性和稳定性。(3) The method proposed by the present invention to improve the invulnerability of infrastructure networks is expected to provide inspiration for the design of more flexible realistic dependence systems. This technology has broad application prospects and can be used to improve the invulnerability and stability of smart city inter-city network systems.
附图说明Description of drawings
图1是本发明实施例提供的一种基础设施网络的抗毁性评估方法示意图。Figure 1 is a schematic diagram of an infrastructure network invulnerability assessment method provided by an embodiment of the present invention.
图2是不同M和s在初始攻击下剩余有效节点比例图。Figure 2 is a diagram of the proportion of remaining effective nodes under different M and s under the initial attack.
具体实施方式Detailed ways
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅用于解释本发明,并不用于限定本发明。In order to make the purpose, technical solutions and advantages of the present invention more clear, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention and are not intended to limit the present invention.
一种提高基础设施网络抗毁性的方法,包括如下步骤:A method to improve the invulnerability of infrastructure networks includes the following steps:
S1、构建多重耦合相依关联的基础设施网络模型,具体如下:S1. Construct a multi-coupled and interdependent infrastructure network model, as follows:
首先参照图1,基于两个网络A和B构建多重耦合相依关联的基础设施网络,基础设施网络模型表示为:First, referring to Figure 1, a multi-coupled and interdependent infrastructure network is constructed based on two networks A and B. The infrastructure network model is expressed as:
G=(A,B,V)G=(A,B,V)
其中,A和B均为无向无权网络;网络A表示为(VA,EA),VA表示网络A中所有节点的集合,EA表示网络A中所有连边的集合;网络B表示为(VB,EB),VB表示网络中所有节点的集合,EB表示网络B中所有连边的集合;V为网络A和网络B的节点的集合;网络A的节点数为NA,网络B的节点数为NB,网络B与网络A具有相同的节点数,即NA=NB。Among them, A and B are both undirected and unweighted networks; network A is expressed as (V A , E A ), V A represents the set of all nodes in network A, and E A represents the set of all connected edges in network A; network B Expressed as (V B , E B ), V B represents the set of all nodes in the network, E B represents the set of all connected edges in network B; V is the set of nodes in network A and network B; the number of nodes in network A is N A , the number of nodes of network B is N B , and network B and network A have the same number of nodes, that is, N A = N B .
在由网络A和B组成的耦合网络中,网络A与网络B之间的耦合连边用集合E表示,一条耦合连边由随机选取的一个网络A的节点和网络B中的节点连接而成,每条耦合连边只能连接网络A或B中的一个节点,耦合连边服从泊松分布;由于耦合连边具有依赖性,故如果耦合连边的一端节点发生故障,则另一端节点同时也会发生故障。In a coupled network composed of networks A and B, the coupling edge between network A and network B is represented by a set E. A coupling edge is formed by connecting a randomly selected node of network A and a node in network B. , each coupling edge can only connect one node in network A or B, and the coupling edge obeys Poisson distribution; because the coupling edge is dependent, if a node at one end of the coupling edge fails, the node at the other end will also Malfunctions can also occur.
S2、对S1中所构建的多重耦合相依关联的基础设施网络模型进行攻击模拟,并对攻击模拟后的基础设施网络模型进行分析,寻找最优集群大小s和外部支持边数量M。S2. Carry out attack simulation on the multi-coupled and interdependent infrastructure network model constructed in S1, and analyze the infrastructure network model after the attack simulation to find the optimal cluster size s and the number of external support edges M.
攻击模拟的过程如下:The process of attack simulation is as follows:
S2.1、在基础设施网络模型中,对任意网络中任意节点进行攻击,并将受到攻击而发生故障的节点进行删除。结合附图1,假设网络A中箭头指向的节点发生故障变成了故障节点,在网络A和网络B组成的耦合网络中,由于依赖特性,导致与网络A中故障节点耦合相连的网络B中对应的节点也发生故障;分别在网络A和网络B的自身网络中,断开所有故障节点与其邻居节点的连边,并将所有的故障节点从耦合网络及自身网络中删除。S2.1. In the infrastructure network model, attack any node in any network and delete the node that fails due to the attack. Combined with Figure 1, assume that the node pointed by the arrow in network A fails and becomes a faulty node. In the coupled network composed of network A and network B, due to the dependency characteristics, network B that is coupled to the faulty node in network A will The corresponding node also fails; in the own network of network A and network B respectively, disconnect all faulty nodes from their neighbor nodes, and delete all faulty nodes from the coupling network and the own network.
S2.2、从S2.1删除故障节点的网络A和B中分别筛选出功能性节点。具体如下:S2.2. Filter out functional nodes from networks A and B where the faulty node was deleted in S2.1. details as follows:
针对已删除故障节点的网络A,统计网络A自身网络中每个剩余节点在耦合网络中的度值kAi,该度值等于剩余节点处外部支持边的数量;For network A that has deleted faulty nodes, count the degree value k Ai of each remaining node in the coupled network in network A's own network. This degree value is equal to the number of external supporting edges at the remaining nodes;
针对已删除故障节点的网络B,统计网络B自身网络中每个剩余节点在耦合网络中的度值kBi,该度值等于剩余节点处外部支持边的数量;For network B that has deleted the fault node, count the degree value k Bi of each remaining node in the coupled network in network B's own network. This degree value is equal to the number of external supporting edges at the remaining nodes;
对剩余节点进行集群划分,且获取每个集群中的节点数量;设定集群中集群大小s,所划分出的集群中的节点数若低于集群大小s,则删除该集群;Divide the remaining nodes into clusters and obtain the number of nodes in each cluster; set the cluster size s in the cluster. If the number of nodes in the divided cluster is lower than the cluster size s, delete the cluster;
对于剩余集群中的节点,设定节点对应的外部支持边数量M,若剩余集群中节点对应的外部支持边数量小于M,则删除该节点。For the nodes in the remaining clusters, set the number M of external supporting edges corresponding to the nodes. If the number of external supporting edges corresponding to the nodes in the remaining clusters is less than M, delete the node.
经过上述处理后,最终剩余的节点为功能性节点。After the above processing, the final remaining nodes are functional nodes.
S2.3、调节集群大小s和外部支持边数量M,比较不同下网络的失效速率;以降低网络的失效速率为目的,寻找最优集群大小s和外部支持边数量M。S2.3. Adjust the cluster size s and the number of external support edges M, and compare the failure rates of the network under different conditions; with the purpose of reducing the failure rate of the network, find the optimal cluster size s and the number of external support edges M.
S3、基于S2获取的最优集群大小s和外部支持边数量M,对基础设施网络模型进行优化。具体地,S3. Optimize the infrastructure network model based on the optimal cluster size s and the number of external support edges M obtained by S2. specifically,
1、基础设施网络模型的功能性节点需要至少M条外部支持边,在第n步有效节点拥有M条外部支持边的比例表示如下:1. The functional nodes of the infrastructure network model require at least M external supporting edges. The proportion of effective nodes with M external supporting edges at step n is expressed as follows:
其中,分别为网络A、B在n阶段至少有M个有效支持链路的节点的比例;p为初始网络遭到攻击剩余节点比例,1-p为初始网络遭到攻击失效节点比例;/>分别表示在耦合网络中的节点在第n阶段拥有至少M个来自B和A网络的有效支持链接的概率;分别表示在耦合网络中的节点在第n阶段拥有至少M-1个来自B和A网络的有效支持链接的概率;KA、KB分别为耦合网络中网络A(B)对网络B(A)支持连边的平均度;PA(KA)、PB(KB)分别为耦合网络中网络A(B)对网络B(A)支持连边的度分布;/>分别为网络A、B中有效节点比例。in, They are the proportions of networks A and B that have at least M valid nodes supporting links in the n stage respectively; p is the proportion of remaining nodes in the initial network that was attacked, and 1-p is the proportion of failed nodes in the initial network that was attacked;/> respectively represent the probability that a node in the coupled network has at least M effective support links from the B and A networks in the nth stage; Respectively represent the probability that a node in the coupled network has at least M-1 effective support links from the B and A networks in the nth stage; K A and K B are respectively the pair of network A(B) in the coupled network against network B(A ) supports the average degree of edges; P A (K A ) and P B (K B ) are respectively the degree distribution of the edges supported by network A (B) to network B (A) in the coupled network;/> are the proportions of effective nodes in networks A and B respectively.
2,功能性节点需要在本地大于等于s集群中,在第n步有效节点在本地网络大于等于s的集群中的比例表示如下:2. Functional nodes need to be in the local cluster greater than or equal to s. The proportion of effective nodes in the cluster where the local network is greater than or equal to s at step n is expressed as follows:
其中,分别为网络A、B在失效的第n步时功能性节点在本地大于等于s集群中的比例;/>分别为网络A、B中属于大小为s的组件的节点相对于存活节点的比例/>的比例;<kA>、<kB>分别为网络A、B的平均度;x表示为边连接状态的概率;H(x)为超越度分布的生成函数;G0(x)为网络的生成函数,G0’(1)为网络的平均度。in, Respectively, they are the proportion of functional nodes in the local cluster greater than or equal to s at the nth step of failure of networks A and B;/> are the proportions of nodes belonging to components of size s relative to surviving nodes in networks A and B respectively/> proportion; <k A >, <k B > are the average degrees of networks A and B respectively; The generating function, G 0 '(1) is the average degree of the network.
3、功能性节点需要在本地网络大于等于集群s中且有至少M条外部支持边的节点;如图2所示,在第n步功能性节点比例表示如下:3. Functional nodes need to be nodes in the local network greater than or equal to cluster s and have at least M external supporting edges; as shown in Figure 2, the proportion of functional nodes in the nth step is expressed as follows:
其中,分别为网络A、B在失效的第n步时功能性节点在大于等于集群s中且有至少M条外部支持边的节点的比例。in, They are the proportion of functional nodes in cluster s or greater and with at least M external supporting edges in networks A and B respectively at the nth step of failure.
如图1(d)。通过分析整个网络故障过程,从而增加网络内部即网络间的耦合密度,以减少网络节点故障数量;并且可以确定网络的临界点,以帮助设计和优化网络结构,从而提高网络的稳定性和抗毁性。此外,识别临界点还可以帮助预测网络的失效情况,及时采取措施来避免网络的崩溃,从而保护网络的可靠性和安全性。As shown in Figure 1(d). By analyzing the entire network failure process, the coupling density within the network, that is, between networks, is increased to reduce the number of network node failures; and the critical points of the network can be determined to help design and optimize the network structure, thereby improving the stability and invulnerability of the network. sex. In addition, identifying critical points can also help predict network failures and take timely measures to avoid network collapse, thereby protecting network reliability and security.
在本案例实施中,为了提高基础设施的抗毁性,对集群s和外部支持边数量M的的选取进行了优化,这些因素与网络的失效速率密切相关。具体而言,我们观察到当集群大小s和外部支持边数量M增加时,网络的失效速率显著提高,表明了这两个参数对抗毁性的重要性。此外,我们也发现,当集群大小s和外部支持边数量M保持一定时,网络间连接密度的增加会导致失效速率减慢。这一技术的成功开发和实际应用,将为基础设施网络的保护和可持续发展提供新的有效方法,从而为社会的安全和可持续性作出了重要贡献。因此,本发明具有广泛的应用前景,将为相关领域的技术发展和社会福祉带来显著的影响。In the implementation of this case, in order to improve the invulnerability of the infrastructure, the selection of cluster s and the number of external support edges M were optimized. These factors are closely related to the failure rate of the network. Specifically, we observe that when the cluster size s and the number of external supporting edges M increase, the failure rate of the network increases significantly, indicating the importance of these two parameters for destructibility. In addition, we also found that when the cluster size s and the number of external supporting edges M remain constant, the increase in the density of connections between networks will lead to a slower failure rate. The successful development and practical application of this technology will provide new and effective methods for the protection and sustainable development of infrastructure networks, thus making an important contribution to the security and sustainability of society. Therefore, the present invention has broad application prospects and will have a significant impact on technological development and social welfare in related fields.
以上实施例仅用于说明本发明的设计思想和特点,其目的在于使本领域内的技术人员能够了解本发明的内容并据以实施,本发明的保护范围不限于上述实施例。所以,凡依据本发明所揭示的原理、设计思路所作的等同变化或修饰,均在本发明的保护范围之内。The above embodiments are only used to illustrate the design ideas and features of the present invention, and their purpose is to enable those skilled in the art to understand the content of the present invention and implement it accordingly. The protection scope of the present invention is not limited to the above embodiments. Therefore, all equivalent changes or modifications made based on the principles and design ideas disclosed in the present invention are within the protection scope of the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311347567.1A CN117294511A (en) | 2023-10-18 | 2023-10-18 | Method for improving damage resistance of infrastructure network and application thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311347567.1A CN117294511A (en) | 2023-10-18 | 2023-10-18 | Method for improving damage resistance of infrastructure network and application thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117294511A true CN117294511A (en) | 2023-12-26 |
Family
ID=89247946
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311347567.1A Pending CN117294511A (en) | 2023-10-18 | 2023-10-18 | Method for improving damage resistance of infrastructure network and application thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117294511A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118096478A (en) * | 2024-04-23 | 2024-05-28 | 深圳市城市交通规划设计研究中心股份有限公司 | Key traffic infrastructure identification method based on multidimensional index dynamic analysis |
-
2023
- 2023-10-18 CN CN202311347567.1A patent/CN117294511A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118096478A (en) * | 2024-04-23 | 2024-05-28 | 深圳市城市交通规划设计研究中心股份有限公司 | Key traffic infrastructure identification method based on multidimensional index dynamic analysis |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111950153A (en) | A power network vulnerability assessment method based on multiple attack strategies | |
CN109379220A (en) | A method of mining key node clusters in complex networks based on combinatorial optimization | |
CN105183957B (en) | A kind of robust analysis method for avionics system | |
CN110188473A (en) | A method for identifying the importance of power backbone communication network nodes | |
CN117294511A (en) | Method for improving damage resistance of infrastructure network and application thereof | |
CN112312444A (en) | Resource backup method under 5G network slice | |
CN106056466B (en) | Bulk power grid critical circuits recognition methods based on FP-growth algorithm | |
CN108965287B (en) | Virus propagation control method based on limited temporary edge deletion | |
CN104734870A (en) | Software fault spreading method based on cellular automaton | |
CN112532294B (en) | Traceability compensation robust topology control method, system, medium, device and terminal | |
CN103077325A (en) | Bad data detection method of smart power grid based on self-adaptive partition state estimation | |
CN110213087A (en) | A kind of complication system Fault Locating Method based on dynamic multilayer coupling network | |
CN105703957A (en) | Robustness calculating method of aviation electrical network system | |
CN104954164A (en) | Method for fault tolerance of data center network structure | |
CN105389434A (en) | Reliability evaluation method used for multiple fault mode cloud computing platform | |
CN110557427B (en) | Intelligent home security control method for balancing network performance and security | |
CN117876151A (en) | A method for analyzing power network fault propagation based on dynamic evolution of vulnerable community networks | |
CN115173413B (en) | A Method for Identification of Vulnerable Lines in Power Grid Based on Electrical Betweenness | |
Chen et al. | A large scale power communication network simulation system based on big graph database | |
CN111327484A (en) | An Improved Load Redistribution Method Based on the Maximum Remaining Capacity of Nodes | |
CN113282881B (en) | Electric power information physical system robustness analysis method based on reachable matrix | |
CN114697222B (en) | A Survivable Virtual Network Mapping Algorithm Based on Space-Space-Ground Fusion Network | |
CN111597397B (en) | Mining method of important node group suitable for multi-layer converged complex network | |
Yang et al. | Enhancing coupled networks robustness via removing Key fragile dependency links | |
Yang et al. | Data center networks recovery for large-scale disasters in optical cloud networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |