Vulnerability Assessment of Information System Based on Weighted Directional Graph and Complex Network Technology

Article Preview

Abstract:

Assessment model of the vulnerability for information system is improved by using Bayesian equilibrium algorithm. The mathematical evaluation model of combined complex network information systems is established through the combination of weighted directional algorithm, and the algorithmic routine of network vulnerability assessment is designed. In order to verify the validity and reliability of the model and the algorithm, the test platform of complex network is built, and the vulnerability of network is detected with the weighted directional method, which has got the probability distribution nephogram of network vulnerability and the curve of network performance with time changing. At the last, the effect of different nodes of the network on the vulnerability of system is calculated with directed weights. And the results shown that the attacked number of different nodes and the attacked probability have improved the credibility of information analysis, which has provided theory reference for the research of information system vulnerability.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2920-2924

Citation:

Online since:

September 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chunzi Wang, Guangqiu Huang. Network attack-defense situation awareness based on dynamic game with incomplete information. Computer Engineering, Vol. 36 (20), (2010), pp.125-127.

Google Scholar

[2] Chunzi Wang, Guangqiu Huang. Network attack-defense strategy based on rough Bayesian game. Journal of computer applications, Vol. 31 (3), (2011), pp.784-789.

DOI: 10.3724/sp.j.1087.2011.00784

Google Scholar

[3] Xiaogang Chen, Ke Sun, Jiayi Cao. Structural vulnerability analysis of large power grid based on complex network theory. Transactions of China electrotechnical society, Vol. 22 (10) , (2007), pp.138-144.

Google Scholar

[4] Yaonian Liu, Qian Mu, Kefei Kang, Yibin Lin, Jing Yu, Ying Wang. Identification of vulnerable lines in power grid based on the weighted reactance betweenness index. Power system protection and control, Vol. 39 (23) , (2011), pp.89-93.

Google Scholar

[5] Yang Zheng, Wenying Liu, Zhiwei Wen, et al. A real-time searching system for cascading failure of power grids based on small-world network. Power system technology, Vol. 34 (7), (2010), pp.58-63.

DOI: 10.1109/appeec.2010.5448455

Google Scholar

[6] Ming Ding, Pingping Han. Vulnerability assessment to small-world power grids based on weighted topological model. Proceedings of the CSEE, Vol. 28 (10), (2008), pp.20-25.

Google Scholar

[7] Guangqiu Huang, Jincheng Wang. Consistent varying-weight fuzzy Petri net attack model based on both-branch fuzzy sets. Journal of computer applications, Vol. 29 (2), (2009), pp.529-533.

DOI: 10.3724/sp.j.1087.2009.00529

Google Scholar

[8] Meng Qian, Handong Mao, Li Yao. Network security analysis model based on logic exploitation graph. Computer Engineering, Vol. 35 (9), (2009), pp.147-149.

Google Scholar

[9] Sisi Chen, Yifeng Lian, Wei Jia. Assessment methods of the vulnerability states based on Bayesian network. Journal of Graduate University of Chinese Academy of Sciences, Vol. 25 (5), (2008), pp.639-647.

Google Scholar

[10] Haixia Zhang, Purui Su, Dengguo Feng. A network security analysis model based on the increase in attack ability. Journal of computer research and development, Vol. 44 (12) , (2007), p.2012-(2019).

Google Scholar

[11] Weiming Li, Jie Lei, Jing Dong. An optimized method for real-time network security quantification. Chinese journal of computer, Vol. 32 (4), (2009), pp.794-803.

DOI: 10.3724/sp.j.1016.2009.00793

Google Scholar

[12] Mixia Liu, Yuqing Zhang, Yi Hong. Modeling and analysis of network survivability based on fuzzy inference. Journal of communications, Vol. 30 (1), (2009), pp.32-37.

Google Scholar