CN109359897A - A kind of Large Physical Games radio system Information Security Risk Assessment Methods - Google Patents

A kind of Large Physical Games radio system Information Security Risk Assessment Methods Download PDF

Info

Publication number
CN109359897A
CN109359897A CN201811504960.6A CN201811504960A CN109359897A CN 109359897 A CN109359897 A CN 109359897A CN 201811504960 A CN201811504960 A CN 201811504960A CN 109359897 A CN109359897 A CN 109359897A
Authority
CN
China
Prior art keywords
event
failure
equipment
large physical
middle layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811504960.6A
Other languages
Chinese (zh)
Inventor
孙爱晶
范若璐
宋鹏磊
范九伦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Blue Sea Blue Sky Electronic Information Technology Co Ltd
Xian University of Posts and Telecommunications
Original Assignee
Xi'an Blue Sea Blue Sky Electronic Information Technology Co Ltd
Xian University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Blue Sea Blue Sky Electronic Information Technology Co Ltd, Xian University of Posts and Telecommunications filed Critical Xi'an Blue Sea Blue Sky Electronic Information Technology Co Ltd
Priority to CN201811504960.6A priority Critical patent/CN109359897A/en
Publication of CN109359897A publication Critical patent/CN109359897A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/067Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/40Business processes related to the transportation industry

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Physics & Mathematics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of Large Physical Games radio system Information Security Risk Assessment Methods, comprising: establishes Large Physical Games radio system security risk assessment dynamic fault tree model by top event of Large Physical Games radio risk case;The dynamic fault tree model is decomposed by multiple static subtrees and multiple dynamic subtrees using depth first left most ergodic algorithm search method;The dynamic subtree is solved based on Markov chain quantitative analysis method, obtains corresponding probabilistic compct of the bottom event relative to top event;The static subtree is solved based on BDD quantitative analysis method, obtains probabilistic compct of the corresponding bottom event relative to top event;Risk case is selected according to the probabilistic compct of the bottom event, to obtain corresponding risk prevention measure.Invention introduces the Quantity Analysis Theories of Dynamic fault tree, can analyze Large Physical Games radio system security risk, provide reference to carry out the security risk assessment of Large Physical Games radio system.

Description

A kind of Large Physical Games radio system Information Security Risk Assessment Methods
Technical field
The present invention relates to wireless installation Applications In Risk Technique fields more particularly to a kind of Large Physical Games radio system to believe Cease safety risk estimating method.
Background technique
Large Physical Games are primarily referred to as national all kinds of comprehensive movement meetings (such as National Games) and intercontinental, global All kinds of comprehensive movement meetings (such as Olympic Games, the Asian Games) or individual events (such as Football World Championship, Europe for having larger impact Cup).With the promotion of china's overall national strength, China has become Large Physical Games and holds most attractive country.According to 700 competitive sports nearly to the world 2007-2018 of SPORTCAL company carry out analysis and find, it is remote that China obtains race right to host Much larger than other countries, has become world's Large Physical Games and hold most countries.
Most of communication of Large Physical Games is provided by radio communication.Radio communication technology is competitive sports Timing and ranging of testing the speed, the live streaming relay of race, news report, Opening and Closing Ceremonies activity, public communication, emergency communication and transport are adjusted The smooth development of the core works such as degree provides reliable technology and Equipment Foundations, is that the venue in competition field is administered, arranges scheduling, safety The important logistic work such as prevention and control, hospitalit provides fast and reliable communication modes.In limited sky during Large Physical Games Between, time, frequency domain inner height be concentrated use in a large amount of wireless device, lead to natively very complicated urban electromagnetic environment problem More prominent, electromagnetic environment sharply deteriorates, if a Large Physical Games wireless installation system is on the hazard, it will generates A series of serious safety accidents, as the organizational scheduling system of race breaks down, the communication between race staff occurs Interrupt, there is mistake in race timing and scoring result and causes the live streaming broadcast relay system of erroneous judgement, race that paralysis etc. occurs, this can be serious Being normally carried out for race is influenced, or even the security of the lives and property of personnel on competition field can be caused to seriously endanger, race is damaged and holds The national image of side.The security risk assessment of science is carried out to Large Physical Games radio system, and effective prevention is selected to arrange It applies, Initiative Defense threat is the key that ensure Large Physical Games radio system safety.
Large Physical Games radio system security risk assessment at present is mainly obtained by way of qualitative, expert estimation It provides according to the experience of evaluator and expert to comment and risk class and is correspondingly improved opinions and suggestions.Due to big sport The disturbed condition that race wireless installation safeguard work faces becomes increasingly complex, uncertain increasing, the wind that risk occurs The tolerances of danger are lower and lower, therefore can no longer meet demand only with qualitative safety risk estimating method.In large size In the safety guarantee of competitive sports radio system, if the Evaluation of Information System Security Risk without specification, know lacking It can not calculate accurately with the ability of analysis security risk, the influence to threat, the assessment of risk is difficult to accurately, and due to Risk is very close to each other to be difficult to find material risk, these can all lead to subsequent shortage risk management appropriate.
Summary of the invention
An object of the present invention at least that, for how to overcome the above-mentioned problems of the prior art, provide one kind Large Physical Games radio system Information Security Risk Assessment Methods, can be to Large Physical Games radio system safety wind Danger analyzed, according to carried out the characteristics of its own risk item identification and classification;Introduce the quantitative analysis of Dynamic fault tree Theory establishes Large Physical Games radio system security risk assessment dynamic according to the logical relation between security risk item Fault tree models.
To achieve the goals above, the technical solution adopted by the present invention includes following aspects.
A kind of Large Physical Games radio system Information Security Risk Assessment Methods, it is described to include:
Step 101, it establishes using Large Physical Games radio risk case as the Large Physical Games radio of top event System safety hazards assess dynamic fault tree model;And the big sport is matched using depth first left most ergodic algorithm search method Thing radio system security risk assessment dynamic fault tree model is decomposed into multiple static subtrees and multiple dynamic subtrees;
Wherein, the Large Physical Games radio system security risk assessment dynamic fault tree model is with the top event For top layer, using multiple intermediate events as middle layer, using the corresponding multiple bottom events of multiple intermediate events as bottom;Extremely from bottom event Top event is connected using static logic gates or each layer event of dynamic logic goalkeeper, to obtain the multiple static subtree and multiple Dynamic subtree;
Step 102, the dynamic subtree is solved based on Markov chain quantitative analysis method, it is right in the dynamic subtree to obtain Answer probabilistic compct of the bottom event relative to top event;
Step 103, the static subtree is solved based on BDD quantitative analysis method, obtains corresponding bottom event in static subtree Probabilistic compct relative to top event;
Step 104, according to corresponded in the dynamic subtree bottom event relative to top event probabilistic compct with it is described quiet Corresponding bottom event selects the risk case in bottom event relative to the probabilistic compct of top event in state subtree, corresponding to obtain Risk prevention measure.
Preferably, in the Large Physical Games radio system Information Security Risk Assessment Methods, the intermediate event Number is 14, comprising: communication equipment fault, inartful failure, power module failure, Anneta module failure, is handed over electromagnetic interference It changes planes failure, digital micro-wave line failure, radio monitoring and direction-finding equipment fault, wireless device frequency interferences, race timing Scoring device interference, does not install lack of standardization, wireless device using intercom, equipment as requested at monitoring system operation error Parameter error.
Preferably, in the Large Physical Games radio system Information Security Risk Assessment Methods, the middle layer packet It includes: in the first middle layer and the second middle layer thereafter of the top event later layer;
Wherein, the communication equipment fault, electromagnetic interference, inartful failure are constituted among the first of top event later layer Layer;The power module failure, Anneta module failure, exchange fault, digital micro-wave line failure are to be connected to the communication The second middle layer after equipment fault;The radio monitoring and direction-finding equipment fault, wireless device frequency interferences, race timing Scoring device interference is to be connected to the second middle layer after the electromagnetic interference;The monitoring system operation error, not according to wanting Asking and installing lack of standardization, wireless device parameter error using intercom, equipment is after being connected to the inartful failure Two middle layers.
Preferably, in the Large Physical Games radio system Information Security Risk Assessment Methods, the bottom event Number is 26;
The bottom event includes: main electricity failure, the available being correspondingly connected with the second middle layer power module failure Piezoelectric voltage failure, primary antenna failure, the emergency antenna failure being correspondingly connected with the second middle layer Anneta module failure, in second The first exchange fault and second switch failure that interbed exchange fault is correspondingly connected with, with the second middle layer digital microwave line The first line failure and the second line fault that road failure is correspondingly connected with, with the second middle layer radio monitoring and direction-finding equipment fault The equipment fault of fixed station monitoring and direction-finding, the equipment fault of locomotive monitoring and direction-finding, the portable monitoring and direction-finding equipment fault being correspondingly connected with, It is correspondingly connected with the second middle layer wireless device frequency interferences illegal using the station, illegally using frequency point, wireless device Working frequency and other equipment co-channel interference interfere the human interference being correspondingly connected with the second middle layer race timing and scoring equipment Lead to that race timing and scoring unit exception, wireless device interferes race timing and scoring equipment in field, is supervised with the second middle layer The pre-games electromagnetic environment that examining system operation error is correspondingly connected with scans loophole, frequency monitoring equipment operation is made mistakes, frequency prison in match Dendrometry loses, and the non-working frequency application of intercom that is not correspondingly connected with as requested using intercom with the second middle layer, intercom are made Intercom frequency range is arbitrarily changed with personnel, it is improper to install the equipment installation position lack of standardization being correspondingly connected with the second middle layer equipment Cause equipment room frequency interferences, equipment installation position are improper to cause signal coverage areas inadequate, is set with the second middle layer radio Intercom parameter error, the wireless Mike's parameter error, race timing and scoring device parameter mistake that standby parameter error is correspondingly connected with.
Preferably, in the Large Physical Games radio system Information Security Risk Assessment Methods, the probability is important Degree is that the probability of bottom event changes, the horizontal characterization for causing top event probability to change with it.
Preferably, in the Large Physical Games radio system Information Security Risk Assessment Methods, the step 103, It specifically includes:
It is intermediate relative to its correspondence that some bottom event in the dynamic subtree is found out based on Markov chain quantitative analysis method The probabilistic compct of event;And it is found out based on Markov chain quantitative analysis method and calculates its correspondence intermediate event relative to useful The probabilistic compct of part;Some obtained bottom event is corresponded to the corresponding centre of probabilistic compct of intermediate event relative to it Probabilistic compct quadrature of the event relative to top event, can be obtained probabilistic compct of the bottom event relative to top event.
Preferably, in the Large Physical Games radio system Information Security Risk Assessment Methods, the step 104, It specifically includes:
Some bottom event, which is found out in the static subtree, based on BDD quantitative analysis method corresponds to the general of intermediate event relative to it Rate different degree;And it is found out based on BDD quantitative analysis method and calculates its probabilistic compct of correspondence intermediate event relative to top event; Some obtained bottom event is corresponded into the corresponding intermediate event of probabilistic compct of intermediate event relative to useful relative to it Probabilistic compct of the bottom event relative to top event can be obtained in the probabilistic compct quadrature of part.
In conclusion by adopting the above-described technical solution, the present invention at least has the advantages that
By being analyzed Large Physical Games radio system security risk, carried out according to the characteristics of its own The identification of risk item and classification;The Quantity Analysis Theory for introducing Dynamic fault tree, according to the logical relation between security risk item Large Physical Games radio system security risk assessment dynamic fault tree model is established, all fault modes can have been obtained Probabilistic compct with the probability of happening and each bottom event of the system failure relative to top event, gives risk prevention and builds safely View carries out the security risk assessment of Large Physical Games radio system for China and provides reference.
Detailed description of the invention
Fig. 1 is that a kind of Large Physical Games radio system Information Security Risk according to an exemplary embodiment of the present invention is commented Estimate method flow diagram;
Fig. 2 is Large Physical Games radio system security risk assessment dynamic event according to an exemplary embodiment of the present invention Hinder tree-model schematic diagram;
Fig. 3 is the state transfer schematic diagram of chain according to an exemplary embodiment of the present invention a length of 1;
Fig. 4 is the state transfer schematic diagram of chain according to an exemplary embodiment of the present invention a length of 2;
Fig. 5 is dynamic tree P4 according to an exemplary embodiment of the present invention and its Markov state transfer schematic diagram;
Fig. 6 is Static Tree P8 and its binary decision BDD schematic diagram according to an exemplary embodiment of the present invention;
Fig. 7 is Large Physical Games radio system security risk assessment device knot according to an exemplary embodiment of the present invention Structure schematic diagram.
Specific embodiment
With reference to the accompanying drawings and embodiments, the present invention will be described in further detail, so that the purpose of the present invention, technology Scheme and advantage are more clearly understood.It should be appreciated that described herein, specific examples are only used to explain the present invention, and does not have to It is of the invention in limiting.
Fig. 1 shows a kind of Large Physical Games radio system information security wind according to an exemplary embodiment of the present invention Dangerous appraisal procedure.The methods of risk assessment of the embodiment specifically includes that
Step 101, it establishes using Large Physical Games radio risk case as the Large Physical Games radio of top event System safety hazards assess dynamic fault tree model;And the big sport is matched using depth first left most ergodic algorithm search method Thing radio system security risk assessment dynamic fault tree model is decomposed into multiple static subtrees and multiple dynamic subtrees;Wherein, The Large Physical Games radio system security risk assessment dynamic fault tree model is using the top event as top layer, with multiple Intermediate event is middle layer, using the corresponding multiple bottom events of multiple intermediate events as bottom;From bottom event to top event, use is quiet State logic gate or each layer event of dynamic logic goalkeeper are connected, to obtain the multiple static subtree and multiple dynamic subtrees;
Specifically, establishing such as Fig. 2 according to the logical relation between the risk Xiang Yuqi of Large Physical Games radio system Shown in security risk dynamic fault tree model.In practical applications, the risk case in the dynamic fault tree model can To be increased according to the actual situation or be modified, and modeled in the same way.
T indicates the wireless risk top event of Large Physical Games in Fig. 2, and P1-P14 indicates 14 intermediate events, K1-K26 Indicate 26 bottom events, specific intermediate event, bottom event are referring to table one.
Table one
Further, depth first left most ergodic algorithm (Depth First Left Most, DFLM) is DFT blockization processing In most common method.The principle of the algorithm is: DFLM is carried out to fault tree, since top event as, entire model The from left to right carry out traversal search that depth-first is recalled downwards will write down step when each node is accessed in this process Number;Every adjacent node searched for a node and just turned to its right side, is visited again if its right side is returned to without node The father node for asking it, is ibid successively repeated, until all bottom events were traversed.After search, centering Between the value that is obtained with its all bottom event of event compare, if its resulting value of all bottom events is all in the first step number When between value and last time step Numerical, whole events form an independent subtree under this logic gate.The big sport Race radio system security risk assessment dynamic fault tree model is analyzed using DFLM searching method, calculates all risks The step number that event is accessed with last time for the first time, (Fig. 2 gives institute to available dynamic fault tree model as shown in Figure 2 The specific connection relationship of dynamic fault tree model is stated, from top to bottom, the connection relationship of two middle layers and its bottom event), it is described Dynamic fault tree model includes two middle layers, the top event later layer the first middle layer (P1-P3) and thereafter the Two middle layers (P4-P14).P1 is independent dynamic subtree, and P2 and P3 are independent static subtree, and P4 and P5 are minimum dynamic subtree, P6-P14 is minimum static subtree.And the top event that uses static logic gates to connect, intermediate event, bottom event is static sub Tree, the top event for using dynamic logic gate to connect, intermediate event, bottom event is dynamic subtrees;Such as: it is constituted with K1, P4, P1, T Be dynamic subtree, with K9, P8, P2, T is constituted as dynamic subtree.
Step 102, the dynamic subtree is solved based on Markov chain quantitative analysis method, it is right in the dynamic subtree to obtain Answer probabilistic compct of the bottom event relative to top event;
Specifically, being found out in dynamic subtree during some bottom event corresponds to relative to it based on Markov chain quantitative analysis method Between event probabilistic compct;And it is found out based on Markov chain quantitative analysis method and calculates its correspondence intermediate event relative to top The probabilistic compct of event;By some obtained bottom event relative to its correspond to intermediate event probabilistic compct it is corresponding in Between probabilistic compct quadrature of the event relative to top event, probabilistic compct of the bottom event relative to top event can be obtained.
The corresponding Markov state transition diagram of Dynamic fault tree is established, any primary transfer means that there are a bottom things Part failure, the end state of Markov chain is top event failure, is just considered as system if it is sequential all transfers A fault mode, such as: " C1 first fails, and fails after C2, and top event will fail " may be expressed as:Meanwhile herein In Markov process all do following hypothesis: Markov chain is homogeneous;Bottom event failure probability is constant;Intermediate thing Part and bottom event may only be discrete states, only " normal " or " failure " two kinds of basic status.
If the probability that the state j of certain time point t event occurs is Pj(t), there are the states of chain a length of 1 to shift chain T1(as schemed Shown in 3), then Pj(t) in T1On component are as follows:
Wherein λ is state transition rate, λ00> 0, λjj≥0。
The state of chain a length of 2 shifts chain T if it exists2(as shown in Figure 4), then Pj(t) in T2On component are as follows:
Wherein: λ00> 0, λii>=0, λjj≥0
The state of a length of n of chain shifts chain T if it existsn, then Pj(t) in TnOn component are as follows:
Wherein j=1,2 ... n. λkk> 0, k=0,1 ..., j-1, λjj≥0.As j=n, λnn=0, then
Wherein: λkk> 0, k=0,1 ..., j-1.
One group of differential equation usually need to be solved to the Significance Analysis of Markov model, reanalyse Markov model, System fault probability is found out, the two subtracts each other the probabilistic compct that the component can be obtained.This method is conceptive to be easily understood, but Since calculation amount is larger, the accuracy requirement of Large Physical Games wireless installation risk-assessment is comprehensively considered herein, is adopted It is calculated with the formula of approximate calculation probabilistic compct:
In formula: QiThe failure rate of system, Q when expression event i occursiThe failure of system, q when expression event i does not occuriTable Show the unreliable degree of i-th of unit.
Step 103, the static subtree is solved based on BDD quantitative analysis method, obtains corresponding bottom event in static subtree Probabilistic compct relative to top event;
Specifically, finding out in static subtree some bottom event based on BDD quantitative analysis method corresponds to intermediate event relative to it Probabilistic compct;And it is found out based on BDD quantitative analysis method and calculates its probability weight of correspondence intermediate event relative to top event It spends;By some obtained bottom event relative to its correspond to intermediate event the corresponding intermediate event of probabilistic compct relative to Probabilistic compct of the bottom event relative to top event can be obtained in the probabilistic compct quadrature of top event.
Component represented by bottom event is in position difference in system and determines that its importance is not also identical in the entire system, often A bottom event breaks down shared share in whole system as bottom event probabilistic compct.In the risk assessment of whole system Bottom event probabilistic compct provides important diagnosis basis, can more be accurately obtained the fault diagnosis result of system.With Q It (P) is top event failure function, qiFor corresponding i-th of bottom event probability of malfunction, then i-th of bottom event is relative to top event Probabilistic compct are as follows:
The probabilistic compct characterizes the water for causing top event probability to change with it when the change of the probability of bottom event It is flat.
Seek some bottom event xiRelative to the probabilistic compct of top event T, bottom event x can be first acquiredi, relative to event Hedge tree GiProbabilistic compct, then calculate and be out of order subtree GiRelative to the probabilistic compct of top event T, two will obtained As a result a result quadrature is exactly bottom event xiProbabilistic compct relative to top event T:
Step 104, according to corresponded in the dynamic subtree bottom event relative to top event probabilistic compct with it is described quiet Corresponding bottom event selects the risk case in bottom event relative to the probabilistic compct of top event in state subtree, corresponding to obtain Risk prevention measure.
Specifically, when solving probabilistic compct of whole bottom events relative to top event, according to bottom event to useful The probabilistic compct of part selects the maximum several bottom events (as risk case) of probabilistic compct.Before i.e. probabilistic compct is in Several risk cases, to obtain corresponding risk prevention measure.
In further embodiment of the present invention, the radio system during moving meeting with certain University Summer is safely Risk assessment example.It has been related to CCTV relay, Aerial Images transmission, the control of performing art team lighting sound and nothing during Games for university students A variety of wireless devices such as line microphone, wireless headset, wireless purse, security command communications system, army's wireless device make With side, it is more to cover conference media report, command scheduling, television relay, race timing and score keeping, security, emergency communication etc. Kind on-site wireless electric industry business, has used about 5500 radio frequency bands, more than 7300 transmitting equipment, 20 fixed monitoring stations, 4 Mobile monitoring laterally stands, transfers 18 motor-driven prison detection vehicles and 200 sets of detecting/monitoring equipment, implements radio monitoring accumulative 87217 Hour, frequency point 181032 are monitored, is ensured with 12127 groups frequently, is checked all kinds of radio interferences 1297 and rise.
Large Physical Games radio system security risk assessment dynamic fault tree model shown in table 1 is searched using DFLM Suo Fangfa is analyzed, and step number of all risk cases for the first time with last time access is calculated, it can be deduced that P1 is independent dynamic State subtree, P2 and P3 are independent static subtree, and P4 and P5 are minimum dynamic subtree, and P6-P14 is minimum static subtree.
By taking dynamic tree P4 as an example, the Markov state transition diagram of P4 as shown in Figure 5 is found out.It can be seen by state transition diagram Out, under the conditions of K1, the first state " 00 " of system becomes " 10 ", if in the case that K2 condition also meets, system is by " 10 " Become " Fa ";If first under the conditions of K2, after in K1 condition, then state conversion process are as follows: " 00-01-Fa ";" Fa " state description System jam.(1 indicates K1 failure, and 0 indicates that K1 is normal).
By the Markov state transition diagram of Fig. 5 it can be seen that the corresponding fault mode of sub- dynamic tree P4 are as follows:Two transfer chains are passed through by original state 00 to failure state Fa, according to the average event of power supply module for communication Hindering interval time (MTBF) is 500,000 hours, if the probability of active and standby power supply failure (K1, K2) is 2 × 10-5/ hour, system Working time is 100 hours.Calculate P1(t) chain T is shifted in state1On componentWith
Wherein λ1And λ2It is the failure rate of K1 and K2 respectively.
The probability of malfunction of submodule P4 are as follows:
The probabilistic compct for acquiring K1 and K2 based on subtree P4 is equal are as follows:
It is as shown in Figure 6 with static subtree P8 model and its binary decision diagrams (bdds):
By BDD figure it can be concluded that the cut set of submodule P6 are as follows: { K9 }, { K10 }, { K11 }.Fixed station monitoring and direction-finding equipment Average time between failures (MTBF) is 10,000 hours, and the average time between failures (MTBF) of locomotive monitoring and direction-finding equipment is 2000 hours, the average time between failures (MTBF) of portable monitoring and direction-finding equipment was 1000 hours, if fixed station monitoring and direction-finding The failure rate (K9) of equipment is 10-4/ hour, the failure rate (K10) of locomotive monitoring and direction-finding equipment are 5 × 10-4It is/hour, portable The failure rate (K11) of monitoring and direction-finding equipment is 10-3/ hour, System production time are 100 hours, then P8 radio monitoring and direction-finding The probability of equipment fault is 6.1 × 10-2
The value of K9 probabilistic compct is acquired based on subtree P8 are as follows:
The value of K10 probabilistic compct is acquired based on subtree P8 are as follows:
The value of K11 probabilistic compct is acquired based on subtree P8 are as follows:
It sets System production time finally as 100 hours, is passed through according to the average time between failures (MTBF) of equipment or expert Test or historical failure a situation arises, provide the failure rate of each bottom event, obtain the probabilistic compct of top event, assessment result is such as Shown in table 2.
The failure rate of 2 bottom event of table and probabilistic compct to top event
According to bottom event to the probabilistic compct of top event, it is in former risk cases (K11, K12, K10, K13) It is analyzed as follows:
To assets " radio detection and monitoring device ", the tender spots of system is " portable and mobile monitoring direction-finding equipment number Amount and technical staff are insufficient, equipment is backward, performance is unstable ", chief threat is that " portable and mobile monitoring direction-finding equipment failure is led Send a telegraph magnetic disturbance ".Due to monitoring lateral ability far from meet demand, radio interference can not be quickly searched, electricity is directly caused The generation of magnetic disturbance event.It is recommended that accelerating equipment and technology Facilities Construction, expand monitoring net coverage area, increases the mobile prison of dual polarization Survey station quantity purchases portable monitoring receiver and frequency spectrograph, extends monitoring frequency range, and the radio for reinforcing technical staff is dry Event emergency disposal training is disturbed, radio technology state of development is tracked, it is skilled to grasp monitoring new equipment, improve monitoring technology water It is flat.
To assets " frequency spectrum resource ", the tender spots of system is " RF resources are insufficient ", and chief threat is " illegally to make With frequency point ", due to being needed during the Games using a large amount of frequency, the unit of other frequency of use mostly direct relation city people's livelihood Living, urban safety, and illegally occupy frequency phenomena and largely exist, therefore, RF resources are very nervous, need actively It raises and science assigns.To guarantee the safe with frequency of race, it is proposed that pre-games carries out measurement of electromagnetic environment, refers to as much as possible for frequency With full and accurate technical data is provided, targetedly carries out the cleaning for illegally occupying the frequency station, made by planning of science activities frequency With solution frequency collision problem.
To assets " radio communication equipment ", the tender spots of system is " illegally using the station ", and chief threat is " illegally to make Intercom interfere race timing and scoring equipment ", due to newly set platform unit and with station unit to the station detection, pipe of putting on record Reason understanding is insufficient, the case where largely illegally setting platform occurs, becomes the main radio interference source of race.It is recommended that radio control Mechanism pre-games carries out station cleaning registration and competition field shop measurement of electromagnetic environment and test data analysis, establishes frequency and station data Database clears up the illegal station, builds good frequency environment.
Fig. 7 shows a kind of Large Physical Games radio system information security wind according to an exemplary embodiment of the present invention Danger assessment device, i.e. electronic equipment 310 (such as having the computer server that program executes function) comprising at least one Manage device 311, power supply 314, and memory 312 and input/output interface with the communication connection of at least one described processor 311 313;The memory 312 is stored with the instruction that can be executed by least one described processor 311, described instruction by it is described at least One processor 311 executes, so that at least one described processor 311 is able to carry out side disclosed in aforementioned any embodiment Method;The input/output interface 313 may include display, keyboard, mouse and USB interface, be used for inputoutput data; Power supply 314 is used to provide electric energy for electronic equipment 310.
It will be appreciated by those skilled in the art that: realize that all or part of the steps of above method embodiment can pass through program Relevant hardware is instructed to complete, program above-mentioned can store in computer-readable storage medium, which is executing When, execute step including the steps of the foregoing method embodiments;And storage medium above-mentioned includes: movable storage device, read-only memory The various media that can store program code such as (Read Only Memory, ROM), magnetic or disk.
When the above-mentioned integrated unit of the present invention be realized in the form of SFU software functional unit and as the sale of independent product or In use, also can store in a computer readable storage medium.Based on this understanding, the skill of the embodiment of the present invention Substantially the part that contributes to existing technology can be embodied in the form of software products art scheme in other words, the calculating Machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be individual Computer, server or network equipment etc.) execute all or part of each embodiment the method for the present invention.And it is aforementioned Storage medium include: the various media that can store program code such as movable storage device, ROM, magnetic or disk.
The above, the only detailed description of the specific embodiment of the invention, rather than limitation of the present invention.The relevant technologies The technical staff in field is not in the case where departing from principle and range of the invention, various replacements, modification and the improvement made It should all be included in the protection scope of the present invention.

Claims (7)

1. a kind of Large Physical Games radio system Information Security Risk Assessment Methods, which is characterized in that described to include:
Step 101, it establishes using Large Physical Games radio risk case as the Large Physical Games radio system of top event Security risk assessment dynamic fault tree model;And using depth first left most ergodic algorithm search method by the Large Physical Games without Line electrical system safety risk assessment dynamic fault tree model is decomposed into multiple static subtrees and multiple dynamic subtrees;
Wherein, the Large Physical Games radio system security risk assessment dynamic fault tree model is top with the top event Layer, using multiple intermediate events as middle layer, using the corresponding multiple bottom events of multiple intermediate events as bottom;From bottom event to useful Part is connected using static logic gates or each layer event of dynamic logic goalkeeper, to obtain the multiple static subtree and multiple dynamics Subtree;
Step 102, the dynamic subtree is solved based on Markov chain quantitative analysis method, obtains corresponding to bottom in the dynamic subtree Probabilistic compct of the event relative to top event;
Step 103, the static subtree is solved based on BDD quantitative analysis method, it is opposite obtains corresponding bottom event in static subtree In the probabilistic compct of top event;
Step 104, sub relative to the probabilistic compct of top event and the static state according to bottom event is corresponded in the dynamic subtree Corresponding bottom event selects the risk case in bottom event relative to the probabilistic compct of top event in tree, to obtain corresponding wind The dangerous precautionary measures.
2. Large Physical Games radio system Information Security Risk Assessment Methods according to claim 1, feature exist In, the intermediate event number be 14, comprising: communication equipment fault, electromagnetic interference, inartful failure, power module failure, Anneta module failure, exchange fault, digital micro-wave line failure, radio monitoring and direction-finding equipment fault, wireless device frequency Rate interference, monitoring system operation error, is not installed not using intercom, equipment at the interference of race timing and scoring equipment as requested Specification, wireless device parameter error.
3. Large Physical Games radio system Information Security Risk Assessment Methods according to claim 2, feature exist In the first middle layer and the second middle layer thereafter that, the middle layer includes: in the top event later layer;
Wherein, the communication equipment fault, electromagnetic interference, inartful failure constitute the first middle layer of top event later layer; The power module failure, Anneta module failure, exchange fault, digital micro-wave line failure are to be connected to the communication equipment The second middle layer after failure;The radio monitoring and direction-finding equipment fault, wireless device frequency interferences, race timing and scoring Equipment interference is to be connected to the second middle layer after the electromagnetic interference;The monitoring system operation error does not make as requested With intercom, equipment install lack of standardization, wireless device parameter error be after being connected to the inartful failure second in Interbed.
4. Large Physical Games radio system Information Security Risk Assessment Methods according to claim 3, feature exist In the bottom event number is 26;
The bottom event includes: the main electricity failure being correspondingly connected with the second middle layer power module failure, available electricity electricity Press failure, primary antenna failure, the emergency antenna failure being correspondingly connected with the second middle layer Anneta module failure, with the second middle layer The first exchange fault and second switch failure that exchange fault is correspondingly connected with, with the event of the second middle layer digital micro-wave line Hinder the first line failure and the second line fault being correspondingly connected with, it is corresponding with the second middle layer radio monitoring and direction-finding equipment fault The equipment fault of fixed station monitoring and direction-finding, the equipment fault of locomotive monitoring and direction-finding, the portable monitoring and direction-finding equipment fault of connection, with Two middle layer wireless device frequency interferences are correspondingly connected with illegal using the station, illegally using frequency point, wireless device work Frequency and other equipment co-channel interference, the human interference being correspondingly connected with the interference of the second middle layer race timing and scoring equipment cause Wireless device interferes race timing and scoring equipment in race timing and scoring unit exception, field, monitors system with the second middle layer The pre-games electromagnetic environment that system operation error is correspondingly connected with scans loophole, frequency monitoring equipment operation is made mistakes, frequency monitoring loses in match It loses, the non-working frequency application of intercom that is not correspondingly connected with as requested using intercom with the second middle layer, intercom user The random change intercom frequency range of member, installs that the equipment installation position lack of standardization being correspondingly connected with is improper to be caused with the second middle layer equipment Equipment room frequency interferences, equipment installation position are improper to cause signal coverage areas inadequate, joins with the second middle layer wireless device Miscount the intercom parameter error being accidentally correspondingly connected with, wireless Mike's parameter error, race timing and scoring device parameter mistake.
5. Large Physical Games radio system Information Security Risk Assessment Methods according to claim 1, feature exist In the probabilistic compct is that the probability of bottom event changes, the horizontal characterization for causing top event probability to change with it.
6. Large Physical Games radio system Information Security Risk Assessment Methods according to claim 1, feature exist In the step 103 specifically includes:
Some bottom event, which is found out in the dynamic subtree, based on Markov chain quantitative analysis method corresponds to intermediate event relative to it Probabilistic compct;And it is found out based on Markov chain quantitative analysis method and calculates its correspondence intermediate event relative to top event Probabilistic compct;Some obtained bottom event is corresponded to the corresponding intermediate event of probabilistic compct of intermediate event relative to it Relative to the probabilistic compct quadrature of top event, probabilistic compct of the bottom event relative to top event can be obtained.
7. Large Physical Games radio system Information Security Risk Assessment Methods according to claim 1, feature exist In the step 104 specifically includes:
Probability weight of some bottom event relative to its correspondence intermediate event in the static subtree is found out based on BDD quantitative analysis method It spends;And it is found out based on BDD quantitative analysis method and calculates its probabilistic compct of correspondence intermediate event relative to top event;Will Some bottom event arrived corresponds to the corresponding intermediate event of probabilistic compct of intermediate event relative to top event relative to it Probabilistic compct of the bottom event relative to top event can be obtained in probabilistic compct quadrature.
CN201811504960.6A 2018-12-10 2018-12-10 A kind of Large Physical Games radio system Information Security Risk Assessment Methods Pending CN109359897A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811504960.6A CN109359897A (en) 2018-12-10 2018-12-10 A kind of Large Physical Games radio system Information Security Risk Assessment Methods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811504960.6A CN109359897A (en) 2018-12-10 2018-12-10 A kind of Large Physical Games radio system Information Security Risk Assessment Methods

Publications (1)

Publication Number Publication Date
CN109359897A true CN109359897A (en) 2019-02-19

Family

ID=65330164

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811504960.6A Pending CN109359897A (en) 2018-12-10 2018-12-10 A kind of Large Physical Games radio system Information Security Risk Assessment Methods

Country Status (1)

Country Link
CN (1) CN109359897A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111612290A (en) * 2020-03-31 2020-09-01 深圳奇迹智慧网络有限公司 Security scheme generation method and device, computer equipment and storage medium
CN111931013A (en) * 2020-07-28 2020-11-13 中船邮轮科技发展有限公司 Logic tree-based safe port returning evaluation method, system and equipment
CN112084375A (en) * 2020-08-21 2020-12-15 华人运通(江苏)技术有限公司 Vehicle fault diagnosis method and device, terminal equipment and storage medium
CN112084374A (en) * 2020-08-21 2020-12-15 华人运通(江苏)技术有限公司 Vehicle fault diagnosis method, terminal device and storage medium
CN114205211A (en) * 2020-08-28 2022-03-18 Sap欧洲公司 System and method for fault diagnosis using fault tree
CN115222295A (en) * 2022-09-13 2022-10-21 北京奥邦体育赛事评估有限责任公司 Sports event risk prevention and control method and system based on risk level model

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105678469A (en) * 2016-01-29 2016-06-15 南京市产品质量监督检验院 Risk assessment method for relay protection equipment in intelligent substation
CN105717912A (en) * 2016-01-27 2016-06-29 西北工业大学 Reliability analysis method for electromechanical actuator based on fuzzy dynamic fault tree
CN107590010A (en) * 2017-08-31 2018-01-16 西安电子科技大学 A kind of electromagnetic compatibility Analysis on Fault Diagnosis method based on Dynamic fault tree
CN108898696A (en) * 2018-07-03 2018-11-27 中国民航大学 Aircraft power system safety analysis method based on Dynamic fault tree and markov

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105717912A (en) * 2016-01-27 2016-06-29 西北工业大学 Reliability analysis method for electromechanical actuator based on fuzzy dynamic fault tree
CN105678469A (en) * 2016-01-29 2016-06-15 南京市产品质量监督检验院 Risk assessment method for relay protection equipment in intelligent substation
CN107590010A (en) * 2017-08-31 2018-01-16 西安电子科技大学 A kind of electromagnetic compatibility Analysis on Fault Diagnosis method based on Dynamic fault tree
CN108898696A (en) * 2018-07-03 2018-11-27 中国民航大学 Aircraft power system safety analysis method based on Dynamic fault tree and markov

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
倪晓茹: "大型奥运体育场馆活动风险管理研究—以G高校奥运体育馆为例", 《北京工业大学学报(社会科学版)》 *
刘欣: "奥运场馆通信保障项目的风险管理研究", 《中国优秀硕士学位论文全文数据库经济与管理科学辑》 *
王健: "基于动态故障树的CRH2动车组制动系统可靠性分析研究", 《中国优秀硕士学位论文全文数据库工程科技II辑》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111612290A (en) * 2020-03-31 2020-09-01 深圳奇迹智慧网络有限公司 Security scheme generation method and device, computer equipment and storage medium
CN111612290B (en) * 2020-03-31 2023-04-07 深圳奇迹智慧网络有限公司 Security scheme generation method and device, computer equipment and storage medium
CN111931013A (en) * 2020-07-28 2020-11-13 中船邮轮科技发展有限公司 Logic tree-based safe port returning evaluation method, system and equipment
CN112084375A (en) * 2020-08-21 2020-12-15 华人运通(江苏)技术有限公司 Vehicle fault diagnosis method and device, terminal equipment and storage medium
CN112084374A (en) * 2020-08-21 2020-12-15 华人运通(江苏)技术有限公司 Vehicle fault diagnosis method, terminal device and storage medium
CN112084375B (en) * 2020-08-21 2023-06-16 华人运通(江苏)技术有限公司 Vehicle fault diagnosis method and device, terminal equipment and storage medium
CN112084374B (en) * 2020-08-21 2023-06-16 华人运通(江苏)技术有限公司 Vehicle fault diagnosis method, terminal equipment and storage medium
CN114205211A (en) * 2020-08-28 2022-03-18 Sap欧洲公司 System and method for fault diagnosis using fault tree
CN114205211B (en) * 2020-08-28 2023-11-07 Sap欧洲公司 System and method for fault diagnosis using fault tree
CN115222295A (en) * 2022-09-13 2022-10-21 北京奥邦体育赛事评估有限责任公司 Sports event risk prevention and control method and system based on risk level model
CN115222295B (en) * 2022-09-13 2023-06-13 北京奥邦体育赛事评估有限责任公司 Sports event risk prevention and control method and system based on risk level model

Similar Documents

Publication Publication Date Title
CN109359897A (en) A kind of Large Physical Games radio system Information Security Risk Assessment Methods
Vempaty et al. Distributed inference with Byzantine data: State-of-the-art review on data falsification attacks
Lun et al. Cyber-physical systems security: a systematic mapping study
CN107852410B (en) Dissect rogue access point
Das et al. Handbook on securing cyber-physical critical infrastructure
Chen et al. Security analysis of urban railway systems: the need for a cyber-physical perspective
Lera et al. Cybersecurity of robotics and autonomous systems: Privacy and safety
WO2019036365A1 (en) Modeling cyber-physical attack paths in the internet-of-things
CN107888574A (en) Method, server and the storage medium of Test database risk
CN110443274A (en) Method for detecting abnormality, device, computer equipment and storage medium
CN107005856A (en) System, method and apparatus for the license shared access management with distributed information storage device
CN107480533A (en) A kind of method, apparatus and device of leak reparation
CN106502815A (en) A kind of abnormal cause localization method, device and computing device
Zhang et al. Locating and protecting facilities from intentional attacks using secrecy
Dai et al. Exploring risk flow attack graph for security risk assessment
Li et al. Time series association state analysis method for attacks on the smart internet of electric vehicle charging network
Kour et al. A review on cybersecurity in railways
CN106646110A (en) Low-voltage distribution network fault positioning system based on GIS and Petri technologies
Dahan et al. Network inspection for detecting strategic attacks
CN110267268A (en) The recognition methods of pseudo-base station, apparatus and system
CN112530601A (en) Campus epidemic situation monitoring method and device, computer equipment and storage medium
Bhatia et al. Quantum computing inspired framework of student performance assessment in smart classroom
CN106302412A (en) A kind of intelligent checking system for the test of information system crushing resistance and detection method
Izrailov et al. Threats classification method for the transport infrastructure of a smart city
Peng et al. Sensing network security prevention measures of BIM smart operation and maintenance system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190219

RJ01 Rejection of invention patent application after publication