Skip to main content

Invulnerability Analysis for SDN Based on Complex Network Theory

  • Conference paper
  • First Online:
Human Centered Computing (HCC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9567))

Included in the following conference series:

  • 1595 Accesses

Abstract

Based on SDN (Software Defined Network) theory, this paper constructs a topology modeling for deliberate attacks. Then this paper analyzes the network vulnerability anti deliberate attacks and topological characteristics and with the distribution coefficient, then proposed the flow uniformity scheme to enhance the invulnerability of complex network, and by verified by simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anderson, T., et al.: The NEBULA future internet architecture. In: Galis, A., Gavras, A. (eds.) FIA 2013. LNCS, vol. 7858, pp. 16–26. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  2. Jacobson, V., Smetters, D.K., Thornton, J.D., et al.: Networking named content. In: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, pp. 1–12. ACM (2009)

    Google Scholar 

  3. Seskar, I., Nagaraja, K., Nelson, S., Raychaudhuri, D.: MobilityFirst future internet architecture project. In: Proceedings of the 7th Asian Internet Engineering Conference, pp. 1–3 (2011)

    Google Scholar 

  4. Anand, A., Dogar, F., Han, D., Li, B., Lim, H., Machado, M., et al.: XIA: an architecture for an evolvable and trustworthy Internet. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, pp. 14–15 (2011). CABO: Concurrent Architectures are Better than One [OL]. http://www.nets-find.net/Funded/Cabo.Php

  5. Yap, K.-K., et al.: Blueprint for introducing innovation into wireless mobile networks. In: Proceedings of the SIGCOMM VISA Workshop, New Delhi, India (2010)

    Google Scholar 

  6. Xia, Y., Fan, J., Hill, D.: Cascading failure in Watts-Strogatz small-world networks. Physica A 389(6), 1281–1285 (2010)

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported in part by the National Natural Science Foundation of China under Grant No. 61471055.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinbao Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Yang, J., Song, M., Zhan, C., Wang, X., Ma, Y. (2016). Invulnerability Analysis for SDN Based on Complex Network Theory. In: Zu, Q., Hu, B. (eds) Human Centered Computing. HCC 2016. Lecture Notes in Computer Science(), vol 9567. Springer, Cham. https://doi.org/10.1007/978-3-319-31854-7_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31854-7_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31853-0

  • Online ISBN: 978-3-319-31854-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics