Zhao Dongmei
College of Information Technology, Hebei Normal University, Shijiazhuang, 050024, China
Liu Jinxing
Department of Airborne Weapon, The First Aeronautics College of PLAAF, XinYang, 464000, China
Zhang Yanxue
College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang, 050024, China
ABSTRACT
How to find the key nodes in the networks is critical to distribute the limited networks security resource for the key part in the networks, so that the key parts of the networks can operate effectively under the attack of the network threat. In this study, we divide the network into nodes and edges according to the graph theory and study the node importance of the networks by means of the complex network. First, the topological model of the network is modeled by means of complex networks theory under the base of analyzing the connection feature and the function of the network firstly and then some characteristics of the networks are presented, such as the information distribution amount, distribution efficiency and the information control capability; finally, an evaluating algorithm of node importance for the networks is proposed based on the relation, function of the nodes and the properties of the network. The simulation result shows that the method of node importance proposed in this study is effective and therefore a reference can provided for making network defense decision.
PDF References Citation
How to cite this article
Zhao Dongmei, Liu Jinxing and Zhang Yanxue, 2013. Study on Node Importance of Networks Security Defense Based on Complex Network. Information Technology Journal, 12: 6623-6626.
DOI: 10.3923/itj.2013.6623.6626
URL: https://scialert.net/abstract/?doi=itj.2013.6623.6626
DOI: 10.3923/itj.2013.6623.6626
URL: https://scialert.net/abstract/?doi=itj.2013.6623.6626
REFERENCES
- Gallos, L.K., R. Cohen, P. Argyrakis, A. Bunde and S. Havlin, 2005. Stability and topology of scale-free networks under attack and defense strategies. Phys. Rev. Lett., Vol. 94.
CrossRefDirect Link - Latora, V. and M. Marchiori, 2007. A measure of centrality based on network efficiency. New J. Phys., Vol. 9.
CrossRef - Ma, X.L., K.X. Sun and H.X. Wang, 2010. Research on network topology of command and control organization based on theory of complex networks. Fire Control Command Control, 35: 69-71.
Direct Link - Poulin, R., M.C. Boily and B.R. Masse, 2000. Dynamical systems to define centrality in social networks. Social Networks, 22: 187-220.
CrossRef - Trencansky, I. and R. Cervenka, 2005. Agent Modeling Language (AML): A comprehensive approach to modeling MAS. Informatica, 29: 391-400.
Direct Link - Wang, L., Y. Liu, X. Gu, Y. Wang and J. Jia, 2010. Skeleton-network reconfiguration based on node importance and line betweenness. Autom. Electric Power Syst., 34: 29-33.
Direct Link