ptum-efficient-shielding-of-large-scale-network-through-pruned-tree-cut-mapping.pdf原版完整文件.docx
《ptum-efficient-shielding-of-large-scale-network-through-pruned-tree-cut-mapping.pdf原版完整文件.docx》由会员分享,可在线阅读,更多相关《ptum-efficient-shielding-of-large-scale-network-through-pruned-tree-cut-mapping.pdf原版完整文件.docx(20页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Contents lists available at ScienceDirectReliability Engineering and System Safetyjournal homepage: Reliability Engineering and System Safety 232 (2023) 109082PTUM: Efficient shielding of large-scale network through pruned tree-cut mappingWei Wei, Yuting Liu, Weidong Yang Key Laboratory of Grain Inf
2、ormation Processing and Control (Henan University of Technology), Ministry of Education, Zhengzhou 450001, China Henan Key Laboratory of Grain Photoelectric Detection and Control, Henan University of Technology, Zhengzhou 450001, ChinaA R T I C L E I N F OA B S T R A C TKeywords:Network robustness P
3、runed tree-cut mapping ShieldingLarge-scale network ConnectivityAs one realistic way to improve the robustness of network, the protection of critical links will help build resilient link structure to defend against random link failure, especially in sparse network where few simultaneous broken links
4、 can divide it into disconnected parts. There are several ways to select the set of links to shield, where selecting links by graph cuts is a practical one. However, due to the computational complexity of cut enumeration, the existing algorithms cannot handle large-scale networks in acceptable time.
5、 Fortunately, between the pruned trees and cuts, we found an efficient mapping schema to enumerate small cuts, which can help select the candidate links quickly in large-scale sparse network, and the link set will be further refined to find the set with minimal shielding cost. The experimental resul
6、ts show that compared with the existing optimal algorithm, the acceleration ratio of 5 orders of magnitude can be obtained easily with little excess cost, and the shielding solution can protect more than 99.9% vulnerable node pairs. Furthermore, the time can be reduced to tens of seconds by parallel
7、ization for the ready-to-parallelize algorithm.1. IntroductionThe failure of communication network can severely affect their availability, and thus can severely affect the performance of services and applications built upon the network. Network robustness can be regarded as its ability to cope with
8、the various types of failures that can occur in the network, such as intended attacks or natural disasters. It is important to improve the network robustness to prevent these types of attacks and disasters from disconnecting the network. Significant research has been conducted in these areas, the st
9、udy can help produce useful tools in the characterization and utilization of complex inter- connected systems such as infrastructure, communication and social networks, while the gaps in the surveying literature still exist 1.There are already plenty of metrics used for network robustness as- sessme
10、nt 2, while some indirect metrics can affect robustness in spe- cific scenarios, such as the inter-network assortativity 3. A straight- forward way to enhance robustness is through improving these metrics, where the widely optimized metric is R 2. The largest component of a network, known as the lar
11、gest connected component (LCC), is a useful indicator of the network status. By iteratively deleting the highest- degree nodes, the average ratio of LCC size among all the iterations can be defined as the metric R. 4 developed a deep learning policy that aims to improve the resilience of the Interne
12、t of Things (IoT) network topology. It was implemented by adopting a R-improving reinforcement method that can be used to prevent cyber-attacks. 5 proposed a This paper was supported by the National Natural and Science Foundation of China (62172141, 62006071, 61772173, 61973104, 61803146), Natural s
13、cience project of Zhengzhou science and Technology Bureau (21ZZXTCX20), Henan Excellent Young Scientists Fund (212300410036), the Key Laboratory of Grain Information Processing and Control (Henan University of Technology), the Ministry of Education (KFJJ2022002), Backbone Teacher Training Program of
14、 Henan University of Technology (2012012), Young Backbone Teacher Training Program of Henan Higher Education (2018GGJS066, 2019GGJS089), Plan For Scientific Innovation Talent of Henan University of Technology (2018RCJH07, 2018QNJH26), Doctor Foundation of Henan University of Technology (2017025), Na
15、tural Science Foundation of the Henan Province (152102210068), National Key Research and Development Program of China (2017YFD0401001), Program for Science and Technology Innovation Talents in Universities of Henan Province (19HASTIT027, 21HASTIT029), the Innovative Funds Plans of Henan University o
16、f Technology (2020ZKCJ06), the Cultivation Program of Young Backbone Teachers in Henan University of Technology (21420080). Correspondence to: College of Information Science and Engineering, Henan University of Technology, No.100, Lianhua Street, New and High-tech Zone, Zhengzhou, 450001, China.E-ma
17、il addresses: weiwei_ise (W. Wei), yuting (Y. Liu), yangweidong (W. Yang).https:/doi.org/10.1016/j.ress.2022.109082Received 26 July 2022; Received in revised form 7 December 2022; Accepted 28 December 2022Available online 30 December 20220951-8320/ 2022 Elsevier Ltd. All rights reserved.W. Wei et al
18、.Reliability Engineering and System Safety 232 (2023) 10908214novel method that can be used to predict the robustness of a sys- tem against various attacks, the proposed robust optimization method considers the multiple factors that affect system performance. Despite the advantages of single metric-
19、based algorithms in optimizing the robustness of networks, they may not handle complex attack scenarios effectively, where the improvement of robustness needs to be applied to multiple targets. Accordingly, a new approach to evaluate robustness using complex networks was developed 6, which combined
20、a vector- guided multi-objective algorithm with a network property parameter. The proposed algorithm for analyzing network data was validated against a state-of-the-art method, and the results indicated that the algorithm significantly improved computational efficiency.There is also research to opti
21、mize the robustness for specific types of networks in given scenarios. 7 proposed framework for robustness enhancement of cyberphysical systems in different failure scenarios. The key node protection strategy and weak interdependency adjust- ment strategies can help alleviate or even mitigate the im
22、pacts of different kinds of failures, and the network robustness can be improved significantly. 8 proposed to improve the robustness of large networks by exploiting the communities in complex representations. The pro- posed method would allow them to perform comprehensive analysis of networks with t
23、housands of nodes. Urban transportation systems were tested using the community-based framework, and the results demon- strated the scalability and efficiency of the method. An integrated framework was proposed in 9 to assess network robustness. It is found in the framework that failures can be more
24、 quickly introduced by the betweenness-based attacks. The robustness enhancement strategies under different failures were proposed and analyzed accordingly. The robustness measurement and enhancement were also investigated in the two-layer maintenance support service network 10. Based on the propose
25、d robustness measurement, two strategies were proposed along with the way to select optimal one. The numerical results were provided to validate the effectiveness. The ability to withstand per- turbations in scale-free networks can be captured by the cascading failure model, accordingly 11 presented
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ptum efficient shielding of large scale network through pruned tree cut mapping pdf 原版 完整 文件
链接地址:https://www.taowenge.com/p-100682363.html
限制150内