monetary policy, short-term debt for long-term investment, credit maturity structure

Identification of network vulnerability is one of the important means of cyberspace operation, management and security. As a typical case of network vulnerability, network cascading failures are often found in infrastructure networks such as the power grid system, communication network and road traf...

Full description

Bibliographic Details
Main Authors: Hangyu Hu, Fan Wu, Xiaowei Xie, Qiang Wei, Xuemeng Zhai, Guangmin Hu
Format: Article
Language:English
Published: AIMS Press 2023-01-01
Series:Electronic Research Archive
Subjects:
Online Access:https://www.aimspress.com/article/doi/10.3934/era.2023077?viewType=HTML
_version_ 1797833710909784064
author Hangyu Hu
Fan Wu
Xiaowei Xie
Qiang Wei
Xuemeng Zhai
Guangmin Hu
author_facet Hangyu Hu
Fan Wu
Xiaowei Xie
Qiang Wei
Xuemeng Zhai
Guangmin Hu
author_sort Hangyu Hu
collection DOAJ
description Identification of network vulnerability is one of the important means of cyberspace operation, management and security. As a typical case of network vulnerability, network cascading failures are often found in infrastructure networks such as the power grid system, communication network and road traffic, where the failure of a few nodes may cause devastating disasters to the whole complex system. Therefore, it is very important to identify the critical nodes in the network cascading failure and understand the internal laws of cascading failure in complex systems so as to fully grasp the vulnerability of complex systems and develop a network management strategy. The existing models for cascading failure analysis mainly evaluate the criticality of nodes by quantifying their importance in the network structure. However, they ignore the important load, node capacity and other attributes in the cascading failure model. In order to address those limitations, this paper proposes a novel critical node identification method in the load network from the perspective of a network adversarial attack. On the basis of obtaining a relatively complete topology, first, the network attack can be modeled as a cascading failure problem for the load network. Then, the concept of load percolation is proposed according to the percolation theory, which is used to construct the load percolation model in the cascading failure problem. After that, the identification method of critical nodes is developed based on the load percolation, which accurately identifies the vulnerable nodes. The experimental results show that the load percolation parameter can discover the affected nodes more accurately, and the final effect is better than those of the existing methods.
first_indexed 2024-04-09T14:27:26Z
format Article
id doaj.art-aad33cb425ca439aa602503af50a4059
institution Directory Open Access Journal
issn 2688-1594
language English
last_indexed 2024-04-09T14:27:26Z
publishDate 2023-01-01
publisher AIMS Press
record_format Article
series Electronic Research Archive
spelling doaj.art-aad33cb425ca439aa602503af50a40592023-05-04T01:50:31ZengAIMS PressElectronic Research Archive2688-15942023-01-013131524154210.3934/era.2023077monetary policy, short-term debt for long-term investment, credit maturity structureHangyu Hu0Fan Wu 1Xiaowei Xie2Qiang Wei3Xuemeng Zhai4Guangmin Hu5School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaIdentification of network vulnerability is one of the important means of cyberspace operation, management and security. As a typical case of network vulnerability, network cascading failures are often found in infrastructure networks such as the power grid system, communication network and road traffic, where the failure of a few nodes may cause devastating disasters to the whole complex system. Therefore, it is very important to identify the critical nodes in the network cascading failure and understand the internal laws of cascading failure in complex systems so as to fully grasp the vulnerability of complex systems and develop a network management strategy. The existing models for cascading failure analysis mainly evaluate the criticality of nodes by quantifying their importance in the network structure. However, they ignore the important load, node capacity and other attributes in the cascading failure model. In order to address those limitations, this paper proposes a novel critical node identification method in the load network from the perspective of a network adversarial attack. On the basis of obtaining a relatively complete topology, first, the network attack can be modeled as a cascading failure problem for the load network. Then, the concept of load percolation is proposed according to the percolation theory, which is used to construct the load percolation model in the cascading failure problem. After that, the identification method of critical nodes is developed based on the load percolation, which accurately identifies the vulnerable nodes. The experimental results show that the load percolation parameter can discover the affected nodes more accurately, and the final effect is better than those of the existing methods.https://www.aimspress.com/article/doi/10.3934/era.2023077?viewType=HTMLnetwork vulnerability identificationnetwork cascading failurecritical node identificationpercolation theorynetwork management
spellingShingle Hangyu Hu
Fan Wu
Xiaowei Xie
Qiang Wei
Xuemeng Zhai
Guangmin Hu
monetary policy, short-term debt for long-term investment, credit maturity structure
Electronic Research Archive
network vulnerability identification
network cascading failure
critical node identification
percolation theory
network management
title monetary policy, short-term debt for long-term investment, credit maturity structure
title_full monetary policy, short-term debt for long-term investment, credit maturity structure
title_fullStr monetary policy, short-term debt for long-term investment, credit maturity structure
title_full_unstemmed monetary policy, short-term debt for long-term investment, credit maturity structure
title_short monetary policy, short-term debt for long-term investment, credit maturity structure
title_sort monetary policy short term debt for long term investment credit maturity structure
topic network vulnerability identification
network cascading failure
critical node identification
percolation theory
network management
url https://www.aimspress.com/article/doi/10.3934/era.2023077?viewType=HTML
work_keys_str_mv AT hangyuhu monetarypolicyshorttermdebtforlongterminvestmentcreditmaturitystructure
AT fanwu monetarypolicyshorttermdebtforlongterminvestmentcreditmaturitystructure
AT xiaoweixie monetarypolicyshorttermdebtforlongterminvestmentcreditmaturitystructure
AT qiangwei monetarypolicyshorttermdebtforlongterminvestmentcreditmaturitystructure
AT xuemengzhai monetarypolicyshorttermdebtforlongterminvestmentcreditmaturitystructure
AT guangminhu monetarypolicyshorttermdebtforlongterminvestmentcreditmaturitystructure