A Resilience Recovery Method for Complex Traffic Network Security Based on Trend Forecasting

  • Sheng Hong*
  • , Tianyu Yue
  • , Yang You
  • , Zhengnan Lv
  • , Xu Tang
  • , Jing Hu
  • , Hongwei Yin
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Due to the rapid development of information technology, a huge and complex traffic network has been established across various sectors including aviation, aerospace, vehicles, ships, electric power, and industry. However, because of the complexity and diversity of its structure, the complex traffic network is vulnerable to be attacked and faces serious security challenges. Therefore, this paper innovatively proposes a traffic network resilience recovery method based on resilience trend forecasting. In this paper, the risk value is introduced into the analysis of network fault propagation process, and the Susceptible, Infectious, Recovered, Dead-Risk (SIRD-R) fault propagation model is established. The resilience model of traffic network, which encompasses real-time resilience and overall resilience, is constructed through the integration of network resilience bearing capacity and resilience recovery capacity. Then, the resilience of complex traffic network is forecasted by using long short-term memory network, and the resilience recovery strategy of complex traffic network based on forecasting is proposed. Finally, the effectiveness and scalability of the proposed method are demonstrated through experimental analysis conducted on a diverse range of complex traffic networks, affirming its applicability in real-world scenarios.

Original languageEnglish
Article number3715086
JournalInternational Journal of Intelligent Systems
Volume2025
Issue number1
DOIs
StatePublished - 2025

Keywords

  • complex traffic network
  • network attack
  • network resilience
  • network resilience forecasting
  • recovery strategy

Fingerprint

Dive into the research topics of 'A Resilience Recovery Method for Complex Traffic Network Security Based on Trend Forecasting'. Together they form a unique fingerprint.

Cite this