Development of a structural graph object apparatus as a means of developing models for studying computer network survivability
DOI:
https://doi.org/10.15587/1729-4061.2014.28025Keywords:
telecommunication systems, computer networks, survivability, structural graph objects, threats, destructive effectAbstract
The paper introduces a new concept of structural graph object. The structural graph object is a generalization of the well-known concept of graph. The generalization is made in such a way that the connection may be not only between the graph nodes, but also between nodes and branches, as well as between subgraphs of the graph. The generalization makes it possible to form a computer network model that includes all possible threats (attack, failure or emergency) in the network operation, both natural and human-related factors. In contrast to the existing models, this model allows making a comprehensive analysis of the computer network survivability, taking into account hardware, software, informational and organizational aspects of survivability. These directions make the contribution to the concept of computer network survivability and should be considered together. This will make the operation of computer networks more reliable and stable.
References
1. Dodonov, A. G., Lande, D. V. (2011). Zhivuchest informatsionnyih sistem. K.: Nauk. dumka, 256.
2. Gromov, Yu. Yu., Drachev, V. О., Nabatov, К. А., Ivanova О. G. (2007). Sintez i analiz zhivuchesti setevyih sistem. M.: Mashinostroenie-1, 152.
3. Stekolnikov, Yu. I. (2002). Zhivuchest sistem. SPb: Politehnika, 155.
4. Barabash, O.V. (2004). Postroenie funktsionalno ustoychivyih raspredelennyih informatsionnyih sistem. Kiev: Nats. Akadkmiya oboronyi Ukrainyi, 226.
5. Heegaard, P. E., Trivedi, K. S. (2009). Network survivability modeling. Computer Networks., 53 (8), 1215–1234. doi: 10.1016/j.comnet.2009.02.014
6. Sterbenz, J. P. G., Hutchison, D., Çetinkaya, E. K., Jabbar, A., Rohrer, J. P., Schöller, M., Smith P. (2010). Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Computer Networks., 54 (8), 1245–1265. doi: 10.1016/j.comnet.2010.03.0057. Huang, S., Xu, Y., Zhang, L. (2008). Study of network survivability based on multi-path routing mechanism. Science in China Series F: Information Sciences. 51 (11), 1898–1907. doi: 10.1007/s11432-008-0155-58. Wang, C., Ming, L., Zhao, J., Wang, D. (2011). A General Framework for Network Survivability Testing and Evaluation. Journal of Networks, 6 (6), 831–841. doi: 10.4304/jnw.6.6.831-841
9. Lin, F. Y.-S., Wang, Y.-S., Chung , H.-Y., Pan J.-L. (2012). Maximization of Network Survivability under Malicious and Epidemic Attacks. Presented at 26th International Conference on Advanced Information Networking and Applications Workshops. Japan. doi: 10.1109/WAINA.2012.1010. Zaychenko, O. Yu. (2001). AnalIz pokaznikIv zhivuchostI merezh z tehnologIeyu ATM. NaukovI vIstI NTUU «KPI», 3, 14–21.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 Віктор Євгенович Бондаренко
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.