Abstract
Based on SDN (Software Defined Network) theory, this paper constructs a topology modeling for deliberate attacks. Then this paper analyzes the network vulnerability anti deliberate attacks and topological characteristics and with the distribution coefficient, then proposed the flow uniformity scheme to enhance the invulnerability of complex network, and by verified by simulation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anderson, T., et al.: The NEBULA future internet architecture. In: Galis, A., Gavras, A. (eds.) FIA 2013. LNCS, vol. 7858, pp. 16–26. Springer, Heidelberg (2013)
Jacobson, V., Smetters, D.K., Thornton, J.D., et al.: Networking named content. In: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, pp. 1–12. ACM (2009)
Seskar, I., Nagaraja, K., Nelson, S., Raychaudhuri, D.: MobilityFirst future internet architecture project. In: Proceedings of the 7th Asian Internet Engineering Conference, pp. 1–3 (2011)
Anand, A., Dogar, F., Han, D., Li, B., Lim, H., Machado, M., et al.: XIA: an architecture for an evolvable and trustworthy Internet. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, pp. 14–15 (2011). CABO: Concurrent Architectures are Better than One [OL]. http://www.nets-find.net/Funded/Cabo.Php
Yap, K.-K., et al.: Blueprint for introducing innovation into wireless mobile networks. In: Proceedings of the SIGCOMM VISA Workshop, New Delhi, India (2010)
Xia, Y., Fan, J., Hill, D.: Cascading failure in Watts-Strogatz small-world networks. Physica A 389(6), 1281–1285 (2010)
Acknowledgment
This work was supported in part by the National Natural Science Foundation of China under Grant No. 61471055.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Yang, J., Song, M., Zhan, C., Wang, X., Ma, Y. (2016). Invulnerability Analysis for SDN Based on Complex Network Theory. In: Zu, Q., Hu, B. (eds) Human Centered Computing. HCC 2016. Lecture Notes in Computer Science(), vol 9567. Springer, Cham. https://doi.org/10.1007/978-3-319-31854-7_47
Download citation
DOI: https://doi.org/10.1007/978-3-319-31854-7_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31853-0
Online ISBN: 978-3-319-31854-7
eBook Packages: Computer ScienceComputer Science (R0)