Title :
The vulnerability of the military SoS networks under different attack and defense strategies
Author :
Wei-Xin Jin ; Ping Song ; Guo-Zhu Liu
Author_Institution :
State Key Lab. of Complex Electromagn. Environ. Effects on Electron. & Inf. Syst., Luoyang, China
Abstract :
In recent years, research on the complex networks vulnerability attracts the attention of the academic circles and engineering institutes, and a lot of high value analysis models have been put forward which had solved many theoretical and practical problems with many cascading failures occurring frequently in practical large-scale networks. Apparently, for the complex network vulnerability assessment and analysis under the condition of large-scale attacks, the attack mode analysis, attack strategy analysis and the complex network vulnerability assessment under different attack need more concern comparing with the research on the network structure and the defense strategy. Although several typical kinds of attack mode and strategy have been proposed and their performance has been evaluated, expanding the attack mode and attack strategy, further studying on the network vulnerability change after the attacks, finding the improvement strategy and method still have a great theoretical and practical significance and value especially for the military network. Firstly this paper reviews the research status of the complex network vulnerability analysis, and then a few typical current complex network attack strategies (function) have been analyzed and pointed out their limitations; on the basis of this, complex network attack strategy, damage analysis function are constructed completely, and each sequence function (family of functions) is demonstrated in theory and simulation in detail. For different complex network topology with different defense strategies, the attacker should adopt different attack strategy to get more effectively ways to disable the network; on the contrary, in view of the different topological structure with different attack strategies of enemy, the defender should take some effective corresponding defense means which can minimize the loss at most.
Keywords :
military systems; network theory (graphs); attack mode analysis; attack strategy analysis; attack-and-defense strategy; complex network vulnerability analysis; complex network vulnerability assessment; large-scale attacks; military SoS network vulnerability; military system-of-systems; Artificial neural networks; Boolean functions; Data structures; SoS networks; attack and defense strategies; centrality; model; vulnerability;
Conference_Titel :
Service Operations and Logistics, and Informatics (SOLI), 2014 IEEE International Conference on
Conference_Location :
Qingdao
DOI :
10.1109/SOLI.2014.6960695