Measuring and evaluating network resilience has become an important aspect since the network is vulnerable to both uncertain disturbances and malicious attacks. Networked systems are often composed of many dynamic components and change over time, which makes it difficult for existing methods to access the changeable situation of network resilience. This paper establishes a novel quantitative framework for evaluating network resilience using the Dynamic Bayesian Network. The proposed framework can be used to evaluate the network's multi-stage resilience processes when suffering various attacks and recoveries. First, we define the dynamic capacities of network components and establish the network's five core resilience capabilities to describe the resilient networking stages including preparation, resistance, adaptation, recovery, and evolution; the five core resilience capabilities consist of rapid response capability, sustained resistance capability, continuous running capability, rapid convergence capability, and dynamic evolution capability. Then, we employ a two-time slices approach based on the Dynamic Bayesian Network to quantify five crucial performances of network resilience based on core capabilities proposed above. The proposed approach can ensure the time continuity of resilience evaluation in time-varying networks. Finally, our proposed evaluation framework is applied to different attacks and recovery conditions in typical simulations and real-world network topology. Results and comparisons with extant studies indicate that the proposed method can achieve a more accurate and comprehensive evaluation and can be applied to network scenarios under various attack and recovery intensities.
翻译:网络化系统通常由许多动态组成部分组成,而且随着时间推移而变化,因此难以利用现有方法获取网络复原力的变化情况。本文件为利用动态贝叶西亚网络评估网络复原力建立了一个新的量化框架。拟议框架可用于评估网络遭受各种袭击和回收时的多阶段复原力进程。首先,我们界定网络组成部分的动态能力,并建立网络的五个核心复原力能力,以描述具有复原力的网络建设阶段,包括准备、抵抗、适应、恢复和演变;五个核心复原力能力包括快速反应能力、持续抵抗能力、持续运行能力、快速趋同能力和动态演变能力。然后,我们根据动态巴伊西亚网络采用一个两次切片办法,根据上述核心能力量化网络在遭受各种袭击和回收时的五个关键网络复原力业绩。拟议方法可以确保在时间对等网络进行复原力评价时的连续性。最后,我们拟议的评价框架将适用于典型模拟和现实世界网络网络中的不同袭击和复原条件;然后,我们采用各种成果和比较方法,根据拟议的方法,可在模拟和现实性网络中进行各种评估。