Strategies for network security  

Strategies for network security

在线阅读下载全文

作  者:LI AngSheng LI XueChen PAN YiCheng ZHANG Wei 

机构地区:[1]State Key Laboratory of Computer Science Institute of Software,Chinese Academy of Sciences [2]Beijing No.4 High School [3]University of Chinese Academy of Sciences

出  处:《Science China(Information Sciences)》2015年第1期117-130,共14页中国科学(信息科学)(英文版)

基  金:supported by the Hundred-Talent Program of the Chinese Academy of Sciences;supported by the Grand Project "Network Algorithms and Digital Information" of the Institute of Software;the Chinese Academy of Sciences;the National Natural Science Foundation of China (Grant No. 61161130530);the National Basic Research Program of China (973) (Grant No. 2014CB340302)

摘  要:Security of networks has become an increasingly important issue in the highly connected world.Security depends on attacks. Typical attacks include both cascading failure of virus spreading and of information propagation and physical attacks of removal of nodes or edges. Numerous experiments have shown that none of the existing models construct secure networks, and that the universal properties of power law and small world phenomenon of networks seem unavoidable obstacles for security of networks against attacks. Here, we propose a new strategy of attacks, the attack of rules of evolution of networks. By using the strategy, we proposed a new model of networks which generates provably secure networks. It was shown both analytically and numerically that the best strategy is to attack on the rules of the evolution of networks, that the second best strategy is the attack by cascading failure models, that the third best strategy is the physical attack of removal of nodes or edges, and that the least desirable strategy is the physical attack of deleting structures of the networks. The results characterize and classify the strategies for network security, providing a foundation for a security theory of networks. Equally important, our results demonstrate that security can be achieved provably by structures of networks, that there is a tradeoff between the roles of structures and of thresholds in security engineering,and that power law and small world property are never obstacles of security of networks. Our model explores a number of new principles of networks, including some topological principles, probabilistic principles, and combinatorial principles. The new principles build the foundation for new strategies for enhancing security of networks, and for new protocols of communications and security of the Internet and computer networks etc. We anticipate that our theory can be used in analyzing security of real systems in economy, society and technology.Security of networks has become an increasingly important issue in the highly connected world.Security depends on attacks. Typical attacks include both cascading failure of virus spreading and of information propagation and physical attacks of removal of nodes or edges. Numerous experiments have shown that none of the existing models construct secure networks, and that the universal properties of power law and small world phenomenon of networks seem unavoidable obstacles for security of networks against attacks. Here, we propose a new strategy of attacks, the attack of rules of evolution of networks. By using the strategy, we proposed a new model of networks which generates provably secure networks. It was shown both analytically and numerically that the best strategy is to attack on the rules of the evolution of networks, that the second best strategy is the attack by cascading failure models, that the third best strategy is the physical attack of removal of nodes or edges, and that the least desirable strategy is the physical attack of deleting structures of the networks. The results characterize and classify the strategies for network security, providing a foundation for a security theory of networks. Equally important, our results demonstrate that security can be achieved provably by structures of networks, that there is a tradeoff between the roles of structures and of thresholds in security engineering,and that power law and small world property are never obstacles of security of networks. Our model explores a number of new principles of networks, including some topological principles, probabilistic principles, and combinatorial principles. The new principles build the foundation for new strategies for enhancing security of networks, and for new protocols of communications and security of the Internet and computer networks etc. We anticipate that our theory can be used in analyzing security of real systems in economy, society and technology.

关 键 词:complex networks security of networks strategy for network security cascading failure model of networks 

分 类 号:TP393.08[自动化与计算机技术—计算机应用技术] O224[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象