Evaluation of Node and Link Importance Based on Network Topology and Traffic Information

Article Preview

Abstract:

For awareness of the network situation, this paper proposes a set of indicators that can assess the importance of nodes and links combining with network topology and traffic information, their generating algorithm is given at the same time. Under the premise of determined network routing protocols, this algorithm is capable of assessing the importance of nodes and links based on the structure and operation state of network. In this way, it can show the special property of the unit position in the network, and can reflect the impact to each part due to the network state change so that network administrators can manage network reasonably.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1049-1050)

Pages:

1765-1770

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] T Bass, D Gruber; A Glimpse into the Future of ID [EB/OL]. (1999- 09).

Google Scholar

[2006] http: /www. usenix. org/publications/login/1999- 9/features/future. html.

Google Scholar

[2] T Bass; Intrusion detection systems and multi-sensor data fusion: creating cyberspace situational awareness [J]. Communications of the ACM, 2000, 43(4): 99-105.

Google Scholar

[3] Wang Huiqiang, Lai Jibao, Zhu Liang, Liang Ying; Survey of Network Situation Awareness System[J]; Journal of Computer Science , 2006, 33(10): 5-10.

DOI: 10.1109/iscis.2007.4456876

Google Scholar

[4] Liu Lei, Wang Huiqiang, Liang Ying; Evaluation method of service level network security situation based on fuzzy analytic hierarchy process[J]; Journal of Computer Applications, 2009, 29(9): 2327-2331, 2335.

DOI: 10.3724/sp.j.1087.2009.02327

Google Scholar

[5] Lai Jibao, Wang Huiqiang, Jin Shuang; Study of network security situation awareness system based on net flow; Application Research of Computers[J] 2007, 24(8): 167-169, 172.

Google Scholar

[6] Liang Ying, Wang Huiqiang, Lai Jibao; A Method of Network Security Situation Awareness Based on Rough Set Theory[J]; Journal of Computer Science; 2007, 34(8): 95-97, 147.

DOI: 10.1109/iscis.2007.4456876

Google Scholar

[7] Lai Jibao Wang Huiqiang Zhu Liang; Research on Network Security Situation Awareness Model[J]; Journal of Computer Research and Development, 2006 43(z2).

DOI: 10.1109/iscis.2007.4456876

Google Scholar

[8] Zhao Guosheng, Wang Huiqiang, Wang Jian; A situation awareness model of network security based on grey Verhulst model[J]; Journal of Harbin Institute of Technology, 2008, 40(5).

Google Scholar

[9] Y Livnat, J Agutter, S Moon, S Foresti; Visual correlation for situational awareness[J]; IEEE Symposium on Information Visualization 2005: 95- 102.

DOI: 10.1109/infvis.2005.1532134

Google Scholar

[10] Lakkaraju K, et al. NVisionIP: NetFlow Visualizations of System State for Security Situational Awareness. In: ACM CCS Workshop on Visualization and Data Mining for Computer Security(VizSEC/DMSEC)held in conjunction with the 11th ACM Conference on Computer and Communications Security, (2004).

DOI: 10.1145/1029208.1029219

Google Scholar