-
There models of complex information system security risk propagation are proposed in this paper based on cellular automata, and the probabilistic behaviors of security risk propagation in complex information systems are investigated by running the proposed models on nearest-neighbor coupled network, Erdos-Renyi random graph network, Watts-Strogatz small world network and Barabasi-Albert power law network respectively. Analysis and simulations show that the proposed models describe the behaviors of security risk propagation in the above four kinds of networks perfectly. By researching on the propagation threshold of security risks in four kinds of network topology and comparing with the existing research result, the correctness of the models is verified. The relationship between the heterogeneity of degree distribution and the value of the propagation threshold is analyzed and verified in this paper. Through the research on the evolutionary trends of security risk propagation, the relationship between the heterogeneity of degree distribution and the influence sphere and speed of security risk propagation is analyzed and verified as well. Meanwhile, the relationship between the heterogeneity of degree distribution and the effect of the immune mechanism on controlling security risk propagation is pointed out. Furthermore, the result of simulations describes the negative exponent relationship between security risk extinction rate and the propagation rate. The key factors affecting the security risk propagation are analyzed in this paper, providing the guidance for the control of security risk propagation in complex information systems.
-
Keywords:
- complex information system /
- complex network /
- security risk propagation /
- cellular automata
[1] Feng D, Zhang Y, Zhang Y Q 2004 J. Commun. 25 10 (in Chinese) [冯登国, 张阳, 张玉清 2004 通信学报 25 10]
[2] Zhang Y Z, Fang B X, Chi Y, Yun X C 2007 J. Software 18 137 (in Chinese) [张永铮, 方滨兴, 迟悦, 云晓春 2007 软件学报 18 137]
[3] Kephart J O, White S R, Chess D M 1993 IEEE Spectrum 30 20
[4] Okamura H, Kobayashi H, Dohi T 2005 Proceedings of the 16th IEEE International Symposium on Sof tware Reliability Engineering Chicago, IL, USA, November 8-11, 2005 p149
[5] Zou C C, Towsley D, Gong W B 2007 IEEE Trans. Depend. Secure Comput. 4 105
[6] Zou C C, Gong W, Towsley D 2002 Proceedings of the 9th ACM Conference on Computer and Communications Security Washington, DC, USA, November 18-22, 2002 p10
[7] Song Y R, Jiang G P 2009 Acta Phys. Sin. 58 5911 (in Chinese) [宋玉荣, 蒋国平2009 物理学报 58 5911]
[8] Wang Y Q, Jiang G P 2010 Acta Phys. Sin. 59 6724 (in Chinese) [王亚奇, 蒋国平2010 物理学报 59 6724]
[9] Wang Y Q, Jiang G P 2011 Acta Phys. Sin. 60 080510 (in Chinese) [王亚奇, 蒋国平2011 物理学报 60 080510]
[10] Jin Z, Liu Q X, Mainul H 2007 Chin. Phys. 16 1267
[11] Fuentes M A, Kuperman M N 1999 Physica A 267 471
[12] Sirakoulis G C, Karafyllidis I, Thanailakis A 2000 Ecol. Model. 133 209
[13] White S H, del Rey A M, Sanchez G R 2009 Appl. Math. Sci. 3 959
[14] Gagliardi H, Alves D 2010 Math. Popul. Stud. 17 79
[15] Shan X M, Liu F, Ren Y 2002 Acta Phys. Sin. 51 1175 (in Chinese) [山秀明, 刘锋, 任勇2002 物理学报 51 1175]
[16] Kong L J, Liu M R, L X Y 2001 Acta Phys. Sin. 50 1255 (in Chinese) [孔令江, 刘慕仁, 吕晓阳 2001 物理学报 50 1255]
[17] Dai S Q, Dong L Y, Xue Y 2001 Acta Phys. Sin. 50 445 (in Chinese) [戴世强, 董力耘, 薛郁2001 物理学报 50 445]
[18] Erdos P, Rnyi A 1960 Publ. Math. Inst. Hung. Acad. Sci. 5 17
[19] Watts D J, Strogatz S H 1998 Nature 393 409
[20] Barabsi A L, Albert R 1999 Science 286 509
[21] Pastor-Satorras R, Vespignani A 2002 Phys. Rev. E 65 035108
[22] Chakrabarti D, Wang Y, Wang C 2007 ACM Trans. Inform. Syst. Secur. 10 1
[23] Erdos P, Rnyi A 1960 Publ. Math. Inst. Hung. Acad. Sci. 5 17
[24] Pastor-Satorras R, Vespignani A 2001 Phys. Rev. E 63 066117
-
[1] Feng D, Zhang Y, Zhang Y Q 2004 J. Commun. 25 10 (in Chinese) [冯登国, 张阳, 张玉清 2004 通信学报 25 10]
[2] Zhang Y Z, Fang B X, Chi Y, Yun X C 2007 J. Software 18 137 (in Chinese) [张永铮, 方滨兴, 迟悦, 云晓春 2007 软件学报 18 137]
[3] Kephart J O, White S R, Chess D M 1993 IEEE Spectrum 30 20
[4] Okamura H, Kobayashi H, Dohi T 2005 Proceedings of the 16th IEEE International Symposium on Sof tware Reliability Engineering Chicago, IL, USA, November 8-11, 2005 p149
[5] Zou C C, Towsley D, Gong W B 2007 IEEE Trans. Depend. Secure Comput. 4 105
[6] Zou C C, Gong W, Towsley D 2002 Proceedings of the 9th ACM Conference on Computer and Communications Security Washington, DC, USA, November 18-22, 2002 p10
[7] Song Y R, Jiang G P 2009 Acta Phys. Sin. 58 5911 (in Chinese) [宋玉荣, 蒋国平2009 物理学报 58 5911]
[8] Wang Y Q, Jiang G P 2010 Acta Phys. Sin. 59 6724 (in Chinese) [王亚奇, 蒋国平2010 物理学报 59 6724]
[9] Wang Y Q, Jiang G P 2011 Acta Phys. Sin. 60 080510 (in Chinese) [王亚奇, 蒋国平2011 物理学报 60 080510]
[10] Jin Z, Liu Q X, Mainul H 2007 Chin. Phys. 16 1267
[11] Fuentes M A, Kuperman M N 1999 Physica A 267 471
[12] Sirakoulis G C, Karafyllidis I, Thanailakis A 2000 Ecol. Model. 133 209
[13] White S H, del Rey A M, Sanchez G R 2009 Appl. Math. Sci. 3 959
[14] Gagliardi H, Alves D 2010 Math. Popul. Stud. 17 79
[15] Shan X M, Liu F, Ren Y 2002 Acta Phys. Sin. 51 1175 (in Chinese) [山秀明, 刘锋, 任勇2002 物理学报 51 1175]
[16] Kong L J, Liu M R, L X Y 2001 Acta Phys. Sin. 50 1255 (in Chinese) [孔令江, 刘慕仁, 吕晓阳 2001 物理学报 50 1255]
[17] Dai S Q, Dong L Y, Xue Y 2001 Acta Phys. Sin. 50 445 (in Chinese) [戴世强, 董力耘, 薛郁2001 物理学报 50 445]
[18] Erdos P, Rnyi A 1960 Publ. Math. Inst. Hung. Acad. Sci. 5 17
[19] Watts D J, Strogatz S H 1998 Nature 393 409
[20] Barabsi A L, Albert R 1999 Science 286 509
[21] Pastor-Satorras R, Vespignani A 2002 Phys. Rev. E 65 035108
[22] Chakrabarti D, Wang Y, Wang C 2007 ACM Trans. Inform. Syst. Secur. 10 1
[23] Erdos P, Rnyi A 1960 Publ. Math. Inst. Hung. Acad. Sci. 5 17
[24] Pastor-Satorras R, Vespignani A 2001 Phys. Rev. E 63 066117
Catalog
Metrics
- Abstract views: 7352
- PDF Downloads: 1085
- Cited By: 0