Strategies for network security

来源 :Science China(Information Sciences) | 被引量 : 0次 | 上传用户:zkx713583
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Security of networks has become an increasingly important issue in the highly connected world.Security depends on attacks. Typical attacks include both cascading failure of virus spreading and of information propagation and physical attacks of removal of nodes or edges. Numerous experiments have shown that none of the existing models construct secure networks, and that the universal properties of power law and small world phenomenon of networks seem unavoidable obstacles for security of networks against attacks. Here, we propose a new strategy of attacks, the attack of rules of evolution of networks. By using the strategy, we proposed a new model of networks which generates provably secure networks. It was shown both analytically and numerically that the best strategy is to attack on the rules of the evolution of networks, that the second best strategy is the attack by cascading failure models, that the third best strategy is the physical attack of removal of nodes or edges, and that the least desirable strategy is the physical attack of deleting structures of the networks. The results characterize and classify the strategies for network security, providing a foundation for a security theory of networks. Equally important, our results demonstrate that security can be achieved provably by structures of networks, that there is a tradeoff between the roles of structures and of thresholds in security engineering,and that power law and small world property are never obstacles of security of networks. Our model explores a number of new principles of networks, including some topological principles, probabilistic principles, and combinatorial principles. The new principles build the foundation for new strategies for enhancing security of networks, and for new protocols of communications and security of the Internet and computer networks etc. We anticipate that our theory can be used in analyzing security of real systems in economy, society and technology. Security of networks has become an increasingly important issue in the highly connected world. Security profiles on the highly connected world. Security profiles on both highly secure the existing models construct secure networks, and that the universal properties of power law and small world phenomenon of networks seem unavoidable obstacles for security of networks against attacks. Here, we propose a new strategy of attacks, the attack of rules of evolution of networks. By using the strategy, we proposed a new model of networks which generates provably secure networks. It was shown both analytically and numerically that the best strategy is to attack on the rules of the evolution of networks, that the second best strategy is the attack by cascading failure models, that the third best strategy is the physical attack of removal of nodes or edges, and that t he least desirable strategy is the physical attack of deleting structures of the networks. The results characterize and classify the strategies for network security, providing a foundation for a security theory of networks. Equally important, our results demonstrate that security can be achieved provably by structures of networks, that there is a tradeoff between the roles of structures and of thresholds in security engineering, and that power law and small world property are never obstacles of security of networks. Our model explores a number of new principals of networks, including some topological principles, probabilistic principles, and combinatorial principles. The new principles build the foundation for new strategies for enhancing security of networks, and for new protocols of communications and security of the Internet and computer networks etc. We anticipate that that theory can be used in analyzing security of real systems in economy, society and technology.
其他文献
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
由广东珠江冰箱厂、广州日用电器研究所和西安交通大学三方联合研究的HFC—134a替代CFC—12制冷工质及降低50%CFC—11发泡剂的电冰箱,经一年来的试验研究和试产,获得成功,于1
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
A programmable hybrid binary image processor based on morphological trans-formations is proposed and its possible applications are discussed.Using liquid-cryst
电化学属于基础理论,它是高考的热点,再现率达100%.从近年高考题来看,电化学侧重考查工作原理及应用、电极判断、电极反应和总反应的书写、电流(或电子流动)方向、离子移动方向、金属的腐蚀与防护、相关计算等.本文就高考电化学常见考点介绍如下:考点一 、一座“盐桥”连接“两池”形成回路电化学装置中都有两个电极,分别发生氧化反应与还原反应.若两个电极插在同一电解质溶液的容器内,则由于阴阳离子的移动速率不同
The enhancement of phase-conjugnte wave in cerium-doped bismuth germanatecrystal(Ce:BGO) was investigated.The result indicated that the phase congugate mirror(
在偌大的世界里,一定有你看不清摸不透的问题,你想知道答案,你想寻求共鸣,来参加女性天地的微调查(http://sina.com.cn/nxtdbjb)吧。或许你也有疑问,那么可以将问题私信至女性天地微调查,我们为你寻找不一样的答案。    微幻想    人类登陆了月球,又探测了火星。如果某个夜晚,你在街上遇见了外星访客,你会跟它说啥?  ★Sing:亲人啊,我等你们等得好苦啊!  ★安妮:降落的时
日本三菱重工生产的 MGL、MGXE系列直燃型吸收式冷温水机组以燃气或燃油作燃料,夏季制冷,冬季制热。直燃式吸收式冷温水机组集锅炉和制冷机于一体,省去了设计锅炉房和采暖热
目的:探讨人脑胶质瘤中βcatenin的表达及与细胞增殖的相关性。方法:用免疫组化法观察了47例胶质瘤标本βcatenin、cyclinD1、增殖细胞核抗原(PCNA)的表达,并分析其相关性。
瓦楞纸箱上纸板预印的发展是时新的80年代一件自然的事。由于百货商店备有许多货物而销售人员正在削减,商人们急需要引人注目的包装和足够的推销复制品以吸引顾客。纸板上预