首页 | 本学科首页   官方微博 | 高级检索  
     检索      

一种基于信息熵的体系流程脆弱性分析方法
引用本文:韦正现,宋敏,童鹏鹏,王红滨.一种基于信息熵的体系流程脆弱性分析方法[J].科技导报(北京),2019,37(13):40-46.
作者姓名:韦正现  宋敏  童鹏鹏  王红滨
作者单位:国防科技工业海洋安全体系创新中心,北京100036;青岛海洋科学与技术试点国家实验室,青岛2660011;北京外国语大学信息技术中心,北京,100089;哈尔滨工程大学计算机科学与技术学院,哈尔滨,150001
基金项目:国家自然科学基金项目(61502037,16772152);国防科技创新特区项目(18-H863-05-ZT-001-007-02)
摘    要: 体系在执行任务过程中面临来自外部、内部的各种破坏、干扰或威胁等风险,当风险发生时体系受到影响的程度表现为体系脆弱性,体系流程的脆弱性是影响体系能否完成任务的一个重要方面。提出一种基于信息熵的体系流程脆弱性分析方法:首先,面向体系面临的风险事件及其流程结构特征建立体系流程结构脆弱性分析过程;其次,将体系流程转化为有向图模型,基于信息熵构建了体系流程中各个节点的脆弱度计算模型;最后,将复杂体系流程有向图模型简化为串联、并联和混合3种基本结构,建立了3种基本结构的脆弱度计算模型,进而即可计算体系流程的脆弱度。通过案例说明了该方法的有效性。

关 键 词:信息熵  体系流程  脆弱性分析
收稿时间:2019-01-22

A method for SoS flow vulnerability analysis based on information entropy
WEI Zhengxian,SONG Min,TONG Pengpeng,WANG Hongbin.A method for SoS flow vulnerability analysis based on information entropy[J].Science & Technology Review,2019,37(13):40-46.
Authors:WEI Zhengxian  SONG Min  TONG Pengpeng  WANG Hongbin
Institution:1. Marine Security System Innovation Center of Science and Technology for National Defense, Beijing 100036, China;
2. Pilot National Laboratory for Marine Science and Technology, Qingdao 266011, China;
3. Information Technology Center, Beijing Foreign Studies University, Beijing 100089, China;
4. College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China
Abstract:When the system-of-systems (SoS) carries out its missions, it faces various risks of destruction, interference or threat from outside and inside. SoS flow vulnerability is expressed as the degree of impact of mission execution efficiency when a risk event occurs on the SoS flow. In this paper, a method for SoS flow vulnerability analysis based on information entropy is proposed. Firstly, for the risk events and flow structure characteristics, a vulnerability analysis process model is established. Secondly, the SoS flow is transformed into a directed graph model, and a vulnerability calculation model of node in the SoS flow is put forward based on information entropy. Thirdly, the directed graph model of complex SoS flow is decomposed and further simplified to three basic structures:series structure, parallel structure and combination structure, and vulnerability calculation models of these basic structures are also built. Finally, the SoS flow vulnerability can be calculated through the above process. A case study demonstrates the effectiveness of the proposed method.
Keywords:information entropy  SoS flow  vulnerability analysis  
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《科技导报(北京)》浏览原始摘要信息
点击此处可从《科技导报(北京)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号