Identification method of key node in operational system-of-systems network based on kill chain

被引:1
|
作者
Wang Y. [1 ]
Shang B. [1 ,2 ]
Song B. [1 ,2 ]
Li P. [1 ]
Ke E. [1 ]
机构
[1] School of Aeronautics, Northwestern Polytechnical University, Xi'an
[2] Key Laboratory of Aircraft System of Systems Contribution and Synthetic Design, Ministry of Industry and Information Technology, Xi'an
关键词
key node; kill chain; network; operational system-of-systems (SoS); subgraph isomorphism matching;
D O I
10.12305/j.issn.1001-506X.2023.03.14
中图分类号
学科分类号
摘要
Aiming at the problem that the key equipment is difficult to identify for operational system-of-systems (SoS) due to different equipment functions, complex interaction relationship and high confrontation, the analysis idea of kill chain is introduced to solve the above problem. Firstly, the method of constructing network model of operational SoS is proposed, and the definition and basic types of kill chains are introduced. Secondly, a network state transformation method based on Monte Carlo sampling is proposed to realize the transformation of the edge weight and edge existence. According to subgraph isomorphism matching theory, a kill chain search method is presented based on the improved Ullmann algorithm. Taking the comprehensive impact on the formation of kill chains as the entry point, the node importance index R is constructed. Finally, the proposed method is used to identify the key node of an air interception mission SoS network, and the results of the existing methods are compared. The comparision results verify the rationality and effectiveness of the proposed method. © 2023 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:736 / 744
页数:8
相关论文
共 31 条
  • [1] CARES J., An information age combat model, Proc. of the 9th International Command and Control Research and Technology Symposium, (2004)
  • [2] FENG Y, LI M L, ZENG C Y, Et al., Robustness of internet of battlefield things (IoBT): a directed network perspective, Entropy, 22, 10, (2020)
  • [3] LI J C, JIANG J, YANG K W, Et al., Research on functional robustness of heterogeneous combat networks, IEEE Systems Journal, 13, 2, pp. 1487-1495, (2019)
  • [4] LIU Y, CHEN C L, ZAN X, Et al., Evaluation method for equipment importance considering bi-layer coupled complex network, Acta Armamentarii, 39, 9, pp. 1829-1840, (2018)
  • [5] WANG Z Q, PEI X B, WANG Y B, Et al., Ranking the key nodes with temporal degree deviation centrality on complex networks, Proc. of the 29th Chinese Control and Decision Conference, pp. 1484-1489, (2017)
  • [6] PITTWOOD I H, CETINKAYA E K., Modeling link weights in backbone networks, Proc. of the 9th International Workshop on Resilient Networks Design and Modeling, (2017)
  • [7] LIU F, XIAO B, HAO L., Finding key node sets in complex networks based on improved discrete fireworks algorithm, Journal of Systems Science and Complexity, 34, 3, pp. 1014-1027, (2021)
  • [8] BRIN S, PAGE L., Reprint of: the anatomy of a large-scale hypertextual web search engine, Computer Networks, 56, 18, pp. 3825-3833, (2012)
  • [9] DUAN W., Research on target value evaluation in joint operations based on hyper-network theory, (2018)
  • [10] WANG J S, WU X P, YAN B, Et al., Improved method of node importance evaluation based on node contraction in complex networks, Procedia Engineering, 15, 1, pp. 1600-1604, (2011)