Journal on Communications ›› 2021, Vol. 42 ›› Issue (11): 145-158.doi: 10.11959/j.issn.1000-436x.2021179
• Papers • Previous Articles Next Articles
Changqing AN1,2, Yujia LIU1, Hui WANG1, Zhiyan ZHENG1, Tao YU1, Jilong WANG1,2,3
Revised:
2021-08-23
Online:
2021-11-25
Published:
2021-11-01
Supported by:
CLC Number:
Changqing AN, Yujia LIU, Hui WANG, Zhiyan ZHENG, Tao YU, Jilong WANG. Research on the invulnerability of regional network based on topology analysis[J]. Journal on Communications, 2021, 42(11): 145-158.
"
区域 | AS数量/个 | AS链接数量/个 | 区域 | AS数量/个 | AS链接数量/个 |
US | 2 119 | 21 680 | NO | 62 | 236 |
BR | 807 | 13 134 | IN | 77 | 232 |
GB | 457 | 8 608 | KR | 61 | 213 |
DE | 477 | 7 922 | TH | 97 | 202 |
RU | 1 087 | 7 920 | LU | 40 | 170 |
NL | 346 | 6 392 | MY | 56 | 163 |
FR | 345 | 4 898 | BG | 71 | 149 |
ZA | 309 | 3 776 | CN | 67 | 148 |
IT | 237 | 3 603 | DK | 50 | 138 |
CH | 172 | 2 710 | MX | 40 | 113 |
AU | 317 | 2 187 | AR | 46 | 101 |
PL | 496 | 1 576 | PH | 45 | 95 |
CA | 273 | 1 573 | BD | 40 | 81 |
JP | 255 | 1 200 | CO | 25 | 79 |
UA | 401 | 1 194 | TR | 34 | 73 |
SG | 108 | 1 027 | FI | 32 | 72 |
AT | 125 | 891 | SK | 36 | 68 |
RO | 114 | 868 | NG | 29 | 63 |
SE | 144 | 765 | KH | 24 | 60 |
ES | 122 | 586 | CL | 23 | 49 |
CZ | 142 | 565 | IR | 34 | 48 |
IE | 63 | 311 | LV | 31 | 47 |
NZ | 97 | 309 | PT | 21 | 46 |
ID | 112 | 242 | HU | 28 | 46 |
"
区域 | |Mb| | |Mb-Lb| | |Mb& Lb| | |Lb-Mb| |
US | 518 | 188 | 330 | 67 |
DE | 210 | 38 | 172 | 40 |
GB | 198 | 52 | 146 | 47 |
RU | 166 | 19 | 147 | 9 |
FR | 117 | 23 | 94 | 20 |
NL | 112 | 29 | 83 | 34 |
UA | 105 | 3 | 102 | 11 |
BR | 104 | 3 | 101 | 11 |
CA | 99 | 6 | 93 | 15 |
CH | 70 | 6 | 64 | 12 |
IT | 67 | 1 | 66 | 10 |
AT | 59 | 12 | 47 | 11 |
PL | 58 | 6 | 52 | 6 |
AU | 56 | 8 | 48 | 16 |
ID | 48 | 3 | 45 | 3 |
SG | 48 | 10 | 38 | 30 |
JP | 47 | 4 | 43 | 12 |
BG | 47 | 4 | 43 | 7 |
RO | 42 | 11 | 31 | 8 |
SE | 39 | 6 | 33 | 11 |
IN | 39 | 5 | 34 | 7 |
CZ | 38 | 3 | 35 | 10 |
ZA | 36 | 3 | 33 | 11 |
ES | 34 | 3 | 31 | 13 |
CN | 28 | 6 | 22 | 5 |
NZ | 26 | 3 | 23 | 4 |
TH | 25 | 0 | 25 | 2 |
LU | 19 | 3 | 16 | 3 |
AR | 19 | 3 | 16 | 3 |
MX | 19 | 0 | 19 | 5 |
PH | 18 | 0 | 18 | 2 |
NO | 17 | 4 | 13 | 2 |
MY | 17 | 1 | 16 | 3 |
DK | 16 | 1 | 15 | 8 |
IE | 16 | 0 | 16 | 11 |
BD | 15 | 0 | 15 | 0 |
SK | 15 | 1 | 14 | 1 |
HU | 15 | 3 | 12 | 2 |
KR | 14 | 0 | 14 | 3 |
CL | 12 | 1 | 11 | 2 |
LV | 12 | 0 | 12 | 3 |
FI | 11 | 2 | 9 | 3 |
IR | 10 | 0 | 10 | 1 |
PT | 9 | 0 | 9 | 3 |
NG | 9 | 2 | 7 | 0 |
TR | 9 | 1 | 8 | 2 |
KH | 9 | 0 | 9 | 0 |
CO | 7 | 2 | 5 | 2 |
[1] | KOZOWSK A . Comparative analysis of cyberattacks on Estonia,Georgia and Kyrgyzstan[J]. European Scientific Journal, 2014,10(7): 237-245. |
[2] | OGUN M . Terrorist use of cyberspace and cyber terrorism:New challenges and responses[M]. IOS Press, 2015. |
[3] | DAINOTTI A , AMMANN R , ABEN E ,et al. Extracting benefit from harm:using malware pollution to analyze the impact of political and geophysical events on the Internet[J]. Computer Communication Review:A Quarterly Publication of the Special Interest Group on Data Communication, 2012,42(1): 32-39. |
[4] | DAINOTTI A , . Lessons learned by “measuring” the internet during/after the sandy storm[C]// Invited talk at FCC Workshop on Network Resiliency, 2013. |
[5] | ALBERT R , JEONG H , BARABASI A L . Error and attack tolerance of complex networks[J]. Nature, 2000,406(6794): 378-382. |
[6] | BAUMANN A , FABIAN B . How robust is the Internet? – insights from graph analysis[C]// Lecture Notes in Computer Science. Berlin:Springer, 2015: 247-254. |
[7] | WU J , ZHANG Y , MAO Z M ,et al. Internet routing resilience to failures:analysis and implications[C]// Proceedings of the 2007 ACM CoNEXT Conference on - CoNEXT '07. New York:ACM Press, 2007: 1-12. |
[8] | DOLEV D , JAMIN S , MOKRYN O ,et al. Internet resiliency to attacks and failures under BGP policy routing[J]. Computer Networks, 2006,50(16): 3183-3196. |
[9] | DOMBROWSKI S , ERMAKOVA T , FABIAN B . Graph-based analysis of cloud connectivity at the internet protocol level[J]. International Journal of Communication Networks and Distributed Systems, 2019,23(1): 117. |
[10] | OMER M , NILCHIANI R , MOSTASHARI A . Measuring the resilience of the global Internet infrastructure system[C]// Proceedings of 2009 3rd Annual IEEE Systems Conference. Piscataway:IEEE Press, 2009: 156-162. |
[11] | LEYBA K G , EDWARDS B , FREEMAN C ,et al. Borders and gateways:measuring and analyzing national as chokepoints[C]// Proceedings of Proceedings of the Conference on Computing & Sustainable Societies - COMPASS 19. New York:ACM Press, 2019: 184-194. |
[12] | FONTUGNE R , SHAH A , ABEN E . The (thin) bridges of AS connectivity:measuring dependency using AS hegemony[C]// Passive and Active Measurement. Berlin:Springer, 2018: 216-227. |
[13] | 吴喜之 . 统计学:从数据到结论[M]. 北京: 中国统计出版社, 2009. |
WU X Z . Statistics:from data to conclusion[M]. Beijing: China Statistics Press, 2009. | |
[14] | WOLFE A W . Social network analysis:methods and applications[J]. American Ethnologist, 1997,24(1): 219-220. |
[15] | BONACICH P . Factoring and weighting approaches to status scores and clique identification[J]. The Journal of Mathematical Sociology, 1972,2(1): 113-120. |
[16] | 许进 . 系统核与核度理论及其应用[M]. 西安: 西安电子科技大学出版社, 1994. |
XU J . System kernel and kernel degree theory and its application[M]. Xi’an: Xidian University Press, 1994. | |
[17] | 王梓行, 姜大立, 漆磊 ,等. 基于冗余度的复杂网络抗毁性及节点重要度评估模型[J]. 复杂系统与复杂性科学, 2020,17(3): 78-85. |
WANG Z H , JIANG D L , QI L ,et al. Complex network invulnerability and node importance evaluation model based on redundancy[J]. Complex Systems and Complexity Science, 2020,17(3): 78-85. | |
[18] | 章永来, 周耀鉴 . 聚类算法综述[J]. 计算机应用, 2019,39(7): 1869-1882. |
ZHANG Y L , ZHOU Y J . Review of clustering algorithms[J]. Journal of Computer Applications, 2019,39(7): 1869-1882. | |
[19] | GILL P , SCHAPIRA M , GOLDBERG S . Modeling on quicksand[J]. ACM SIGCOMM Computer Communication Review, 2012,42(1): 40-46. |
[20] | JIN Z T , SHI X G , YANG Y ,et al. TopoScope:recover AS relation ships from fragmentary observations[C]// Proceedings of the ACM Internet Measurement Conference. New York:ACM Press, 2020: 266-280. |
[21] | KARLIN J , FORREST S , REXFORD J . Nation-state routing:censorship,wiretapping,and BGP[R]. 2009. |
[22] | GAO L X . On inferring autonomous system relationships in the Internet[J]. IEEE/ACM Transactions on Networking, 2001,9(6): 733-745. |
[23] | DIMITROPOULOS X , KRIOUKOV D , HUFFAKER B ,et al. Inferring AS relationships:dead end or lively beginning?[C]// Experimental and Efficient Algorithms. Berlin:Springer, 2005: 113-125. |
[24] | JIN Y , SCOTT C , DHAMDHERE A ,et al. Stable and practical AS relationship inference with problink[C]// 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). Berkeley:USENIX Association, 2019: 581-598. |
[25] | NAAB J , SATTLER P , JELTEN J ,et al. Prefix top lists:gaining insights with prefixes from domain-based top lists on DNS deployment[C]// Proceedings of Proceedings of the Internet Measurement Conference. New York:ACM Press, 2019: 351-357. |
[26] | LI W T . Zipf's Law everywhere[J]. Glottometrics, 2002,5: 14-21. |
[27] | KRASHAKOV S A , TESLYUK A B , SHCHUR L N . On the universality of rank distributions of website popularity[J]. Computer Networks, 2006,50(11): 1769-1780. |
[1] | Jingbo LI, Li MA, Yang LI, Yingxun FU, Dongchao MA. Optimized design of sensing transmission and computing collaborative industrial Internet [J]. Journal on Communications, 2023, 44(6): 12-22. |
[2] | Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG. Research and implementation of reputation-based inter-domain routing selection mechanism [J]. Journal on Communications, 2023, 44(6): 47-56. |
[3] | Yuancheng LI, Yongtai QIN. Deep reinforcement learning based algorithm for real-time QoS optimization of software-defined security middle platform [J]. Journal on Communications, 2023, 44(5): 181-192. |
[4] | Yingze LIU, Yuanbo GUO, Chen FANG, Yongfei LI, Qingli CHEN. Intelligent planning method for cyber defense strategies based on bounded rationality [J]. Journal on Communications, 2023, 44(5): 52-63. |
[5] | Renchao XIE, Wen WEN, Qinqin TANG, Yunlong LIU, Gaochang XIE, Tao HUANG. Survey on rail transit mobile edge computing network security [J]. Journal on Communications, 2023, 44(4): 201-215. |
[6] | Zhiyong LUO, Yu ZHANG, Qing WANG, Weiwei SONG. Study of SDN intrusion intent identification algorithm based on Bayesian attack graph [J]. Journal on Communications, 2023, 44(4): 216-225. |
[7] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[8] | Jian SHU, Jiawei SHI, Linlan LIU, Al-Kali Manar. Topology prediction for opportunistic network based on spatiotemporal convolution [J]. Journal on Communications, 2023, 44(3): 145-156. |
[9] | Haiyan KANG, Molan LONG. Research on network attack analysis method based on attack graph of absorbing Markov chain [J]. Journal on Communications, 2023, 44(2): 122-135. |
[10] | Caixia LIU, Xinsheng JI, Jiangxing WU. Endogenous security common problems and solutions of the mobile communication networks [J]. Journal on Communications, 2022, 43(9): 70-79. |
[11] | Runhua SHI, Hui YU, Weiyang KE, Xiaotong XU. Quantum anonymous one-vote veto protocol based on BB84 states [J]. Journal on Communications, 2022, 43(8): 109-120. |
[12] | Weiyu CHEN, Junshan LUO, Fanggang WANG, Haiyang DING, Shilian WANG, Guojiang XIA. Survey of capacity limits and implementation techniques in wireless covert communication [J]. Journal on Communications, 2022, 43(8): 203-218. |
[13] | Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU. Fusion of Focal Loss’s cyber threat intelligence entity extraction [J]. Journal on Communications, 2022, 43(7): 85-92. |
[14] | Yanfei SUN, Jiazheng YIN, Jin QI, Xiaoxuan HU, Mengting CHEN, Zhenjiang DONG. Topology control based on dynamic graph embedding in Internet of vehicles [J]. Journal on Communications, 2022, 43(6): 133-142. |
[15] | Hongbin LUO, Shan ZHANG, Zhiyuan WANG. Architecture and mechanisms for secure and efficient internetworking of heterogeneous network [J]. Journal on Communications, 2022, 43(4): 36-49. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|