Research on Software Network Key Nodes Mining Methods Based on Complex Network

Chun Shan*, Peng Wang, Changzhen Hu, Xianwei Gao, Shanshan Mei

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Complex software system will bring a lot of software security problems, it is very meaningful to know how to more accurately abstract the software network model from the software system and efficiently find the key nodes in the software network. This research takes open source software as the research object, constructs a directed network model of software system, proposes a new weight calculation method, adds weights to the model to form a directed weighted network, and then regards the software network as a complex network. The defect mining and defect propagation cost are two node mining methods related to the weight and degree of the node. At the same time, the PageRank algorithm is improved to mine the key nodes. Finally, the robustness of the software system execution network model is carried out by different attack methods. The evaluation, through experimental verification and comparison, shows that the mining method proposed in this study can more accurately and efficiently mine key nodes in the software system.

Original languageEnglish
Title of host publicationTrusted Computing and Information Security - 13th Chinese Conference, CTCIS 2019, Revised Selected Papers
EditorsWeili Han, Liehuang Zhu, Fei Yan
PublisherSpringer
Pages193-205
Number of pages13
ISBN (Print)9789811534171
DOIs
Publication statusPublished - 2020
Event13th Chinese Conference on Trusted Computing and Information Security, CTCIS 2019 - Shanghai, China
Duration: 24 Oct 201927 Oct 2019

Publication series

NameCommunications in Computer and Information Science
Volume1149 CCIS
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Conference

Conference13th Chinese Conference on Trusted Computing and Information Security, CTCIS 2019
Country/TerritoryChina
CityShanghai
Period24/10/1927/10/19

Keywords

  • Defect probability
  • Defect propagation cost
  • Improved PageRank algorithm
  • Key nodes
  • Software security

Fingerprint

Dive into the research topics of 'Research on Software Network Key Nodes Mining Methods Based on Complex Network'. Together they form a unique fingerprint.

Cite this