全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于风险熵和Neyman-Pearson准则的安防网络风险评估研究

DOI: 10.3724/SP.J.1004.2014.02737, PP. 2737-2746

Keywords: 安全防范系统,风险熵,Neyman-Pearson准则,风险评估,防护最薄弱路径

Full-Text   Cite this paper   Add to My Lib

Abstract:

?为应对严峻复杂的安全形势,我国通过构建安全防范系统实现对公共安全的防护.安全防范系统是由人和安防设备组成的复杂系统,安全防范系统风险评估是判断其防护效能好坏的重要度量标准.本文将部署在一个区域的安全防范系统抽象看成由多个安防节点组成的网络,根据熵理论和Neyman-Pearson准则,提出一种利用防护最薄弱路径定量度量安全防范系统风险的模型,并给出安全防范网络防护最弱路径的表达式,以及基于Dijkstra最短路径算法求解防护最薄弱路径的方法.最后本文研究模型参数和安全防范系统部署的数量与安全防范网络的风险之间的关系,给出相应的仿真结果,并进行实际应用场景的风险评估实验.实验结果表明,本文提出的模型可以定量评估多节点的安全防范系统的风险,提高评估结果的科学性.

References

[1]  Li Ben-Xian, Li Meng-Jun. The simulation of fear diffusion based on parallel system under the paroxysmal terrorism incident circumstance. Computer Engineering and Application, 2012, 38(8): 1321-1328 (李本先, 李孟军. 基于平行系统的恐怖突发事件下恐惧传播的仿真研究. 自动化学报, 2012, 38(8): 1321-1328)
[2]  Sendi A S, Jabbarifar M, Shajari M, Dagenais M. FEMRA: fuzzy expert model for risk assessment. In: Proceedings of the 5th Inter National Conference on Internet Monitoring and Protection. Barcelona: IEEE, 2010. 48-52
[3]  Wu Qiong, Yan Li-Li. The risk evaluation research of enterprise security and protection systems. Security Science and Technology, 2010, 9(10): 10-14 (吴穹, 闫黎黎. 企业安全防范系统风险评价模式研究. 安防科技, 2010, 9(10): 10-14)
[4]  Doyon L R. Stochastic modeling of facility security-systems for analytical solutions. Computers and Industrial Engineering, 1981, 5(2): 127-138
[5]  Hicks M J, Snell M S, Sandoval J S, Potter C S. Physical protection systems cost and performance analysis: a case study. Aerospace and Electronic Systems Magazine, 1999, 14(4): 9-13
[6]  Garcia M L. Vulnerability Assessment of Physical Protection Systems. Boston: Butterworth-Heinemann, 2005. 123-144
[7]  Xu P, Su X, Wu J, Sun X, Zhang Y, Deng Y. Risk analysis of physical protection system based on evidence theory. Journal of Information and Computational Science, 2010, 7: 2871-2878
[8]  Dai J J, Hu R M, Chen J, Cai Q. Benefit-cost analysis of security systems for multiple protected assets based on information entropy. Entropy, 2012, 14(3): 571-580
[9]  Shannon C E. A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review, 2001, 5(1): 3-55
[10]  Zheng Zhou-Yi, Du Zhi-Guo, Wang Xin. Visual implementation for vulnerability assessment algorithm of security and protection systems. Computer Engineering and Application, 2014, 50(5): 70-73 (郑舟毅, 杜志国, 王欣. 安防系统弱点评估算法的可视化实现. 计算机工程与应用, 2014, 50(5): 70-73)
[11]  Guo Xi, Hu Rui-Min. The effectiveness evaluation for security system based on risk entropy model and Bayesian network theory. In: Proceedings of the 2010 IEEE International Carnahan Conference Security Technology ICCST. San Jose, CAL: IEEE, 2010. 57-65
[12]  Zhu Zong-Lin, Guo Shi-Min. Research for automatic control equipment system Synthetical evaluation. Acta Automatica Sinica, 1999, 25(2): 59-63(朱宗林, 郭世民. 自动控制装置系统综合评估研究. 自动化学报, 1999, 25(2): 59-63)
[13]  Huang Min, Yang Hong-Mei, Wang Xing-Wei. Genetic algorithm and fuzzy synthetic evaluation based risk programming for virtual enterprise. Acta Automatica Sinica, 2004, 30(3): 449-454(黄敏, 杨红梅, 王兴伟. 基于遗传算法和模糊综合评价的虚拟企业风险规划. 自动化学报, 2004, 30(3): 449-454)
[14]  Xu Tian-Kun, Liang Qing-Huai, Ren Xing-Chen. Risk assessment of metro DC750V power supply system operation based on fault tree model. Journal of Beijing Jiaotong University, 2012, (6): 57-62
[15]  Hug G, Giampapa J A. Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Transactions on Smart Grid, 2012, 3(3): 1362-1370
[16]  Garcia M L. The Design and Evaluation of Physical Protection Systems. Boston: Butterworth-Heinemann, 2001. 135-149
[17]  Fischer R J, Halibozek E P, Walters D C. Introduction to Security. Boston: Butterworth-Heinemann, 2012.
[18]  Xie Lei, Feng Hao, Zhang Jian-Ming. A new approach to performance assessment based on initial closed-system. Acta Automatica Sinica, 2013, 39(5): 649-653 (谢磊, 冯皓, 张建明. 一种基于初始闭环系统的性能评估方法. 自动化学报, 2013, 39(5): 649-653)
[19]  Clausius R. The Mechanical Theory of Heat: with Its Applications to the Steam-Engine and to the Physical Properties of Bodies. London: John van Voorst, 1867

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133