monetary policy, short-term debt for long-term investment, credit maturity structure
Identification of network vulnerability is one of the important means of cyberspace operation, management and security. As a typical case of network vulnerability, network cascading failures are often found in infrastructure networks such as the power grid system, communication network and road traf...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
AIMS Press
2023-01-01
|
Series: | Electronic Research Archive |
Subjects: | |
Online Access: | https://www.aimspress.com/article/doi/10.3934/era.2023077?viewType=HTML |
_version_ | 1797833710909784064 |
---|---|
author | Hangyu Hu Fan Wu Xiaowei Xie Qiang Wei Xuemeng Zhai Guangmin Hu |
author_facet | Hangyu Hu Fan Wu Xiaowei Xie Qiang Wei Xuemeng Zhai Guangmin Hu |
author_sort | Hangyu Hu |
collection | DOAJ |
description | Identification of network vulnerability is one of the important means of cyberspace operation, management and security. As a typical case of network vulnerability, network cascading failures are often found in infrastructure networks such as the power grid system, communication network and road traffic, where the failure of a few nodes may cause devastating disasters to the whole complex system. Therefore, it is very important to identify the critical nodes in the network cascading failure and understand the internal laws of cascading failure in complex systems so as to fully grasp the vulnerability of complex systems and develop a network management strategy. The existing models for cascading failure analysis mainly evaluate the criticality of nodes by quantifying their importance in the network structure. However, they ignore the important load, node capacity and other attributes in the cascading failure model. In order to address those limitations, this paper proposes a novel critical node identification method in the load network from the perspective of a network adversarial attack. On the basis of obtaining a relatively complete topology, first, the network attack can be modeled as a cascading failure problem for the load network. Then, the concept of load percolation is proposed according to the percolation theory, which is used to construct the load percolation model in the cascading failure problem. After that, the identification method of critical nodes is developed based on the load percolation, which accurately identifies the vulnerable nodes. The experimental results show that the load percolation parameter can discover the affected nodes more accurately, and the final effect is better than those of the existing methods. |
first_indexed | 2024-04-09T14:27:26Z |
format | Article |
id | doaj.art-aad33cb425ca439aa602503af50a4059 |
institution | Directory Open Access Journal |
issn | 2688-1594 |
language | English |
last_indexed | 2024-04-09T14:27:26Z |
publishDate | 2023-01-01 |
publisher | AIMS Press |
record_format | Article |
series | Electronic Research Archive |
spelling | doaj.art-aad33cb425ca439aa602503af50a40592023-05-04T01:50:31ZengAIMS PressElectronic Research Archive2688-15942023-01-013131524154210.3934/era.2023077monetary policy, short-term debt for long-term investment, credit maturity structureHangyu Hu0Fan Wu 1Xiaowei Xie2Qiang Wei3Xuemeng Zhai4Guangmin Hu5School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaSchool of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, ChinaIdentification of network vulnerability is one of the important means of cyberspace operation, management and security. As a typical case of network vulnerability, network cascading failures are often found in infrastructure networks such as the power grid system, communication network and road traffic, where the failure of a few nodes may cause devastating disasters to the whole complex system. Therefore, it is very important to identify the critical nodes in the network cascading failure and understand the internal laws of cascading failure in complex systems so as to fully grasp the vulnerability of complex systems and develop a network management strategy. The existing models for cascading failure analysis mainly evaluate the criticality of nodes by quantifying their importance in the network structure. However, they ignore the important load, node capacity and other attributes in the cascading failure model. In order to address those limitations, this paper proposes a novel critical node identification method in the load network from the perspective of a network adversarial attack. On the basis of obtaining a relatively complete topology, first, the network attack can be modeled as a cascading failure problem for the load network. Then, the concept of load percolation is proposed according to the percolation theory, which is used to construct the load percolation model in the cascading failure problem. After that, the identification method of critical nodes is developed based on the load percolation, which accurately identifies the vulnerable nodes. The experimental results show that the load percolation parameter can discover the affected nodes more accurately, and the final effect is better than those of the existing methods.https://www.aimspress.com/article/doi/10.3934/era.2023077?viewType=HTMLnetwork vulnerability identificationnetwork cascading failurecritical node identificationpercolation theorynetwork management |
spellingShingle | Hangyu Hu Fan Wu Xiaowei Xie Qiang Wei Xuemeng Zhai Guangmin Hu monetary policy, short-term debt for long-term investment, credit maturity structure Electronic Research Archive network vulnerability identification network cascading failure critical node identification percolation theory network management |
title | monetary policy, short-term debt for long-term investment, credit maturity structure |
title_full | monetary policy, short-term debt for long-term investment, credit maturity structure |
title_fullStr | monetary policy, short-term debt for long-term investment, credit maturity structure |
title_full_unstemmed | monetary policy, short-term debt for long-term investment, credit maturity structure |
title_short | monetary policy, short-term debt for long-term investment, credit maturity structure |
title_sort | monetary policy short term debt for long term investment credit maturity structure |
topic | network vulnerability identification network cascading failure critical node identification percolation theory network management |
url | https://www.aimspress.com/article/doi/10.3934/era.2023077?viewType=HTML |
work_keys_str_mv | AT hangyuhu monetarypolicyshorttermdebtforlongterminvestmentcreditmaturitystructure AT fanwu monetarypolicyshorttermdebtforlongterminvestmentcreditmaturitystructure AT xiaoweixie monetarypolicyshorttermdebtforlongterminvestmentcreditmaturitystructure AT qiangwei monetarypolicyshorttermdebtforlongterminvestmentcreditmaturitystructure AT xuemengzhai monetarypolicyshorttermdebtforlongterminvestmentcreditmaturitystructure AT guangminhu monetarypolicyshorttermdebtforlongterminvestmentcreditmaturitystructure |