计算机应用 ›› 2014, Vol. 34 ›› Issue (7): 1909-1914.DOI: 10.11772/j.issn.1001-9081.2014.07.1909

• 计算机安全 • 上一篇    下一篇

基于图相似匹配的政务网络结构一致性验证方法

曾光1,2,陈性元2,杜学绘1,2,夏春涛1,2   

  1. 1. 数学工程与先进计算国家重点实验室,郑州 450001
    2. 信息工程大学,郑州 450001;
  • 收稿日期:2014-01-02 修回日期:2014-02-21 出版日期:2014-07-01 发布日期:2014-08-01
  • 通讯作者: 曾光
  • 作者简介:曾光(1988-),男,湖南凤凰人,硕士研究生,主要研究方向:网络安全;陈性元(1963-),男,安徽无为人,教授,博士生导师,主要研究方向:信息安全; 杜学绘(1968-),女,河南新乡人,教授,博士,主要研究方向:网络安全; 夏春涛(1979-),男,河南禹州人,讲师,硕士,主要研究方向:网络安全。
  • 基金资助:

    国家973重点基础研究发展计划资助项目;国家863高技术研究发展计划

Conformance verification method for e-government network based on graph approximate matching

ZENG Guang1,2,CHEN Xingyuan1,DU Xuehui1,2,XIA Chuntao1,2   

  1. 1. Information Engineering University, Zhengzhou Henan 450001, China;
    2. State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou Henan 450001, China
  • Received:2014-01-02 Revised:2014-02-21 Online:2014-07-01 Published:2014-08-01
  • Contact: ZENG Guang

摘要:

针对政务网络结构的一致性验证问题,提出一种基于图相似匹配的政务网络结构一致性验证方法。方法首先抽象出政务网络的图模型,利用网络结构的模块化特征和顶点的k-邻近关系进行可扩展的图相似匹配,获取两图之间的所有相似结构;然后引入节点重要性贡献和路径距离衰减因素,提出一种改进的图相似性度量函数,计算网络结构之间的一致性程度。实验结果表明,该方法能够准确、有效地评估政务网络结构的一致性程度,细粒度地反映网络结构之间的相似差异情况,包括网络拓扑与系统部署存在的各种违规情况。

Abstract:

In view of the problem that verifying the conformance of e-government network structure, a conformance verification method for e-government network based on graph approximate matching was proposed. The method firstly abstracted the graph model of e-government network, then used the modular characteristic of network structure and k-hop neighboring relationship of vertices to realize extendible approximate graph matching which got all the similar structures between the two graphs. And then it proposed an improved graph similarity measure function by introducing the node importance factor and path distance attenuation factor so as to make the conformity assessment results more accurate. The experimental result shows that the method can accurately evaluate the conformance degree of e-government network structure, and fine-grainedly reflect the similarities or differences between the network structures which include all kinds of violations in the network topology and system deployment.

中图分类号: