CN109359897A - A kind of Large Physical Games radio system Information Security Risk Assessment Methods - Google Patents
A kind of Large Physical Games radio system Information Security Risk Assessment Methods Download PDFInfo
- Publication number
- CN109359897A CN109359897A CN201811504960.6A CN201811504960A CN109359897A CN 109359897 A CN109359897 A CN 109359897A CN 201811504960 A CN201811504960 A CN 201811504960A CN 109359897 A CN109359897 A CN 109359897A
- Authority
- CN
- China
- Prior art keywords
- event
- failure
- equipment
- large physical
- middle layer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 238000012502 risk assessment Methods 0.000 title claims abstract description 40
- 230000003068 static effect Effects 0.000 claims abstract description 28
- 238000004445 quantitative analysis Methods 0.000 claims abstract description 21
- 238000012544 monitoring process Methods 0.000 claims description 38
- 238000004891 communication Methods 0.000 claims description 18
- 238000009434 installation Methods 0.000 claims description 8
- 230000008859 change Effects 0.000 claims description 5
- 230000005611 electricity Effects 0.000 claims description 5
- 230000003137 locomotive effect Effects 0.000 claims description 4
- 238000012512 characterization method Methods 0.000 claims description 2
- 230000002265 prevention Effects 0.000 abstract description 7
- 238000004458 analytical method Methods 0.000 abstract description 5
- 238000010586 diagram Methods 0.000 description 12
- 238000005516 engineering process Methods 0.000 description 8
- 238000003860 storage Methods 0.000 description 7
- 238000012546 transfer Methods 0.000 description 7
- 230000007704 transition Effects 0.000 description 5
- 230000002860 competitive effect Effects 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000004140 cleaning Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000003745 diagnosis Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000007257 malfunction Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 206010033799 Paralysis Diseases 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012806 monitoring device Methods 0.000 description 1
- 230000010287 polarization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000003014 reinforcing effect Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/067—Enterprise or organisation modelling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/40—Business processes related to the transportation industry
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Tourism & Hospitality (AREA)
- Theoretical Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- General Physics & Mathematics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Game Theory and Decision Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of Large Physical Games radio system Information Security Risk Assessment Methods, comprising: establishes Large Physical Games radio system security risk assessment dynamic fault tree model by top event of Large Physical Games radio risk case;The dynamic fault tree model is decomposed by multiple static subtrees and multiple dynamic subtrees using depth first left most ergodic algorithm search method;The dynamic subtree is solved based on Markov chain quantitative analysis method, obtains corresponding probabilistic compct of the bottom event relative to top event;The static subtree is solved based on BDD quantitative analysis method, obtains probabilistic compct of the corresponding bottom event relative to top event;Risk case is selected according to the probabilistic compct of the bottom event, to obtain corresponding risk prevention measure.Invention introduces the Quantity Analysis Theories of Dynamic fault tree, can analyze Large Physical Games radio system security risk, provide reference to carry out the security risk assessment of Large Physical Games radio system.
Description
Technical field
The present invention relates to wireless installation Applications In Risk Technique fields more particularly to a kind of Large Physical Games radio system to believe
Cease safety risk estimating method.
Background technique
Large Physical Games are primarily referred to as national all kinds of comprehensive movement meetings (such as National Games) and intercontinental, global
All kinds of comprehensive movement meetings (such as Olympic Games, the Asian Games) or individual events (such as Football World Championship, Europe for having larger impact
Cup).With the promotion of china's overall national strength, China has become Large Physical Games and holds most attractive country.According to
700 competitive sports nearly to the world 2007-2018 of SPORTCAL company carry out analysis and find, it is remote that China obtains race right to host
Much larger than other countries, has become world's Large Physical Games and hold most countries.
Most of communication of Large Physical Games is provided by radio communication.Radio communication technology is competitive sports
Timing and ranging of testing the speed, the live streaming relay of race, news report, Opening and Closing Ceremonies activity, public communication, emergency communication and transport are adjusted
The smooth development of the core works such as degree provides reliable technology and Equipment Foundations, is that the venue in competition field is administered, arranges scheduling, safety
The important logistic work such as prevention and control, hospitalit provides fast and reliable communication modes.In limited sky during Large Physical Games
Between, time, frequency domain inner height be concentrated use in a large amount of wireless device, lead to natively very complicated urban electromagnetic environment problem
More prominent, electromagnetic environment sharply deteriorates, if a Large Physical Games wireless installation system is on the hazard, it will generates
A series of serious safety accidents, as the organizational scheduling system of race breaks down, the communication between race staff occurs
Interrupt, there is mistake in race timing and scoring result and causes the live streaming broadcast relay system of erroneous judgement, race that paralysis etc. occurs, this can be serious
Being normally carried out for race is influenced, or even the security of the lives and property of personnel on competition field can be caused to seriously endanger, race is damaged and holds
The national image of side.The security risk assessment of science is carried out to Large Physical Games radio system, and effective prevention is selected to arrange
It applies, Initiative Defense threat is the key that ensure Large Physical Games radio system safety.
Large Physical Games radio system security risk assessment at present is mainly obtained by way of qualitative, expert estimation
It provides according to the experience of evaluator and expert to comment and risk class and is correspondingly improved opinions and suggestions.Due to big sport
The disturbed condition that race wireless installation safeguard work faces becomes increasingly complex, uncertain increasing, the wind that risk occurs
The tolerances of danger are lower and lower, therefore can no longer meet demand only with qualitative safety risk estimating method.In large size
In the safety guarantee of competitive sports radio system, if the Evaluation of Information System Security Risk without specification, know lacking
It can not calculate accurately with the ability of analysis security risk, the influence to threat, the assessment of risk is difficult to accurately, and due to
Risk is very close to each other to be difficult to find material risk, these can all lead to subsequent shortage risk management appropriate.
Summary of the invention
An object of the present invention at least that, for how to overcome the above-mentioned problems of the prior art, provide one kind
Large Physical Games radio system Information Security Risk Assessment Methods, can be to Large Physical Games radio system safety wind
Danger analyzed, according to carried out the characteristics of its own risk item identification and classification;Introduce the quantitative analysis of Dynamic fault tree
Theory establishes Large Physical Games radio system security risk assessment dynamic according to the logical relation between security risk item
Fault tree models.
To achieve the goals above, the technical solution adopted by the present invention includes following aspects.
A kind of Large Physical Games radio system Information Security Risk Assessment Methods, it is described to include:
Step 101, it establishes using Large Physical Games radio risk case as the Large Physical Games radio of top event
System safety hazards assess dynamic fault tree model;And the big sport is matched using depth first left most ergodic algorithm search method
Thing radio system security risk assessment dynamic fault tree model is decomposed into multiple static subtrees and multiple dynamic subtrees;
Wherein, the Large Physical Games radio system security risk assessment dynamic fault tree model is with the top event
For top layer, using multiple intermediate events as middle layer, using the corresponding multiple bottom events of multiple intermediate events as bottom;Extremely from bottom event
Top event is connected using static logic gates or each layer event of dynamic logic goalkeeper, to obtain the multiple static subtree and multiple
Dynamic subtree;
Step 102, the dynamic subtree is solved based on Markov chain quantitative analysis method, it is right in the dynamic subtree to obtain
Answer probabilistic compct of the bottom event relative to top event;
Step 103, the static subtree is solved based on BDD quantitative analysis method, obtains corresponding bottom event in static subtree
Probabilistic compct relative to top event;
Step 104, according to corresponded in the dynamic subtree bottom event relative to top event probabilistic compct with it is described quiet
Corresponding bottom event selects the risk case in bottom event relative to the probabilistic compct of top event in state subtree, corresponding to obtain
Risk prevention measure.
Preferably, in the Large Physical Games radio system Information Security Risk Assessment Methods, the intermediate event
Number is 14, comprising: communication equipment fault, inartful failure, power module failure, Anneta module failure, is handed over electromagnetic interference
It changes planes failure, digital micro-wave line failure, radio monitoring and direction-finding equipment fault, wireless device frequency interferences, race timing
Scoring device interference, does not install lack of standardization, wireless device using intercom, equipment as requested at monitoring system operation error
Parameter error.
Preferably, in the Large Physical Games radio system Information Security Risk Assessment Methods, the middle layer packet
It includes: in the first middle layer and the second middle layer thereafter of the top event later layer;
Wherein, the communication equipment fault, electromagnetic interference, inartful failure are constituted among the first of top event later layer
Layer;The power module failure, Anneta module failure, exchange fault, digital micro-wave line failure are to be connected to the communication
The second middle layer after equipment fault;The radio monitoring and direction-finding equipment fault, wireless device frequency interferences, race timing
Scoring device interference is to be connected to the second middle layer after the electromagnetic interference;The monitoring system operation error, not according to wanting
Asking and installing lack of standardization, wireless device parameter error using intercom, equipment is after being connected to the inartful failure
Two middle layers.
Preferably, in the Large Physical Games radio system Information Security Risk Assessment Methods, the bottom event
Number is 26;
The bottom event includes: main electricity failure, the available being correspondingly connected with the second middle layer power module failure
Piezoelectric voltage failure, primary antenna failure, the emergency antenna failure being correspondingly connected with the second middle layer Anneta module failure, in second
The first exchange fault and second switch failure that interbed exchange fault is correspondingly connected with, with the second middle layer digital microwave line
The first line failure and the second line fault that road failure is correspondingly connected with, with the second middle layer radio monitoring and direction-finding equipment fault
The equipment fault of fixed station monitoring and direction-finding, the equipment fault of locomotive monitoring and direction-finding, the portable monitoring and direction-finding equipment fault being correspondingly connected with,
It is correspondingly connected with the second middle layer wireless device frequency interferences illegal using the station, illegally using frequency point, wireless device
Working frequency and other equipment co-channel interference interfere the human interference being correspondingly connected with the second middle layer race timing and scoring equipment
Lead to that race timing and scoring unit exception, wireless device interferes race timing and scoring equipment in field, is supervised with the second middle layer
The pre-games electromagnetic environment that examining system operation error is correspondingly connected with scans loophole, frequency monitoring equipment operation is made mistakes, frequency prison in match
Dendrometry loses, and the non-working frequency application of intercom that is not correspondingly connected with as requested using intercom with the second middle layer, intercom are made
Intercom frequency range is arbitrarily changed with personnel, it is improper to install the equipment installation position lack of standardization being correspondingly connected with the second middle layer equipment
Cause equipment room frequency interferences, equipment installation position are improper to cause signal coverage areas inadequate, is set with the second middle layer radio
Intercom parameter error, the wireless Mike's parameter error, race timing and scoring device parameter mistake that standby parameter error is correspondingly connected with.
Preferably, in the Large Physical Games radio system Information Security Risk Assessment Methods, the probability is important
Degree is that the probability of bottom event changes, the horizontal characterization for causing top event probability to change with it.
Preferably, in the Large Physical Games radio system Information Security Risk Assessment Methods, the step 103,
It specifically includes:
It is intermediate relative to its correspondence that some bottom event in the dynamic subtree is found out based on Markov chain quantitative analysis method
The probabilistic compct of event;And it is found out based on Markov chain quantitative analysis method and calculates its correspondence intermediate event relative to useful
The probabilistic compct of part;Some obtained bottom event is corresponded to the corresponding centre of probabilistic compct of intermediate event relative to it
Probabilistic compct quadrature of the event relative to top event, can be obtained probabilistic compct of the bottom event relative to top event.
Preferably, in the Large Physical Games radio system Information Security Risk Assessment Methods, the step 104,
It specifically includes:
Some bottom event, which is found out in the static subtree, based on BDD quantitative analysis method corresponds to the general of intermediate event relative to it
Rate different degree;And it is found out based on BDD quantitative analysis method and calculates its probabilistic compct of correspondence intermediate event relative to top event;
Some obtained bottom event is corresponded into the corresponding intermediate event of probabilistic compct of intermediate event relative to useful relative to it
Probabilistic compct of the bottom event relative to top event can be obtained in the probabilistic compct quadrature of part.
In conclusion by adopting the above-described technical solution, the present invention at least has the advantages that
By being analyzed Large Physical Games radio system security risk, carried out according to the characteristics of its own
The identification of risk item and classification;The Quantity Analysis Theory for introducing Dynamic fault tree, according to the logical relation between security risk item
Large Physical Games radio system security risk assessment dynamic fault tree model is established, all fault modes can have been obtained
Probabilistic compct with the probability of happening and each bottom event of the system failure relative to top event, gives risk prevention and builds safely
View carries out the security risk assessment of Large Physical Games radio system for China and provides reference.
Detailed description of the invention
Fig. 1 is that a kind of Large Physical Games radio system Information Security Risk according to an exemplary embodiment of the present invention is commented
Estimate method flow diagram;
Fig. 2 is Large Physical Games radio system security risk assessment dynamic event according to an exemplary embodiment of the present invention
Hinder tree-model schematic diagram;
Fig. 3 is the state transfer schematic diagram of chain according to an exemplary embodiment of the present invention a length of 1;
Fig. 4 is the state transfer schematic diagram of chain according to an exemplary embodiment of the present invention a length of 2;
Fig. 5 is dynamic tree P4 according to an exemplary embodiment of the present invention and its Markov state transfer schematic diagram;
Fig. 6 is Static Tree P8 and its binary decision BDD schematic diagram according to an exemplary embodiment of the present invention;
Fig. 7 is Large Physical Games radio system security risk assessment device knot according to an exemplary embodiment of the present invention
Structure schematic diagram.
Specific embodiment
With reference to the accompanying drawings and embodiments, the present invention will be described in further detail, so that the purpose of the present invention, technology
Scheme and advantage are more clearly understood.It should be appreciated that described herein, specific examples are only used to explain the present invention, and does not have to
It is of the invention in limiting.
Fig. 1 shows a kind of Large Physical Games radio system information security wind according to an exemplary embodiment of the present invention
Dangerous appraisal procedure.The methods of risk assessment of the embodiment specifically includes that
Step 101, it establishes using Large Physical Games radio risk case as the Large Physical Games radio of top event
System safety hazards assess dynamic fault tree model;And the big sport is matched using depth first left most ergodic algorithm search method
Thing radio system security risk assessment dynamic fault tree model is decomposed into multiple static subtrees and multiple dynamic subtrees;Wherein,
The Large Physical Games radio system security risk assessment dynamic fault tree model is using the top event as top layer, with multiple
Intermediate event is middle layer, using the corresponding multiple bottom events of multiple intermediate events as bottom;From bottom event to top event, use is quiet
State logic gate or each layer event of dynamic logic goalkeeper are connected, to obtain the multiple static subtree and multiple dynamic subtrees;
Specifically, establishing such as Fig. 2 according to the logical relation between the risk Xiang Yuqi of Large Physical Games radio system
Shown in security risk dynamic fault tree model.In practical applications, the risk case in the dynamic fault tree model can
To be increased according to the actual situation or be modified, and modeled in the same way.
T indicates the wireless risk top event of Large Physical Games in Fig. 2, and P1-P14 indicates 14 intermediate events, K1-K26
Indicate 26 bottom events, specific intermediate event, bottom event are referring to table one.
Table one
Further, depth first left most ergodic algorithm (Depth First Left Most, DFLM) is DFT blockization processing
In most common method.The principle of the algorithm is: DFLM is carried out to fault tree, since top event as, entire model
The from left to right carry out traversal search that depth-first is recalled downwards will write down step when each node is accessed in this process
Number;Every adjacent node searched for a node and just turned to its right side, is visited again if its right side is returned to without node
The father node for asking it, is ibid successively repeated, until all bottom events were traversed.After search, centering
Between the value that is obtained with its all bottom event of event compare, if its resulting value of all bottom events is all in the first step number
When between value and last time step Numerical, whole events form an independent subtree under this logic gate.The big sport
Race radio system security risk assessment dynamic fault tree model is analyzed using DFLM searching method, calculates all risks
The step number that event is accessed with last time for the first time, (Fig. 2 gives institute to available dynamic fault tree model as shown in Figure 2
The specific connection relationship of dynamic fault tree model is stated, from top to bottom, the connection relationship of two middle layers and its bottom event), it is described
Dynamic fault tree model includes two middle layers, the top event later layer the first middle layer (P1-P3) and thereafter the
Two middle layers (P4-P14).P1 is independent dynamic subtree, and P2 and P3 are independent static subtree, and P4 and P5 are minimum dynamic subtree,
P6-P14 is minimum static subtree.And the top event that uses static logic gates to connect, intermediate event, bottom event is static sub
Tree, the top event for using dynamic logic gate to connect, intermediate event, bottom event is dynamic subtrees;Such as: it is constituted with K1, P4, P1, T
Be dynamic subtree, with K9, P8, P2, T is constituted as dynamic subtree.
Step 102, the dynamic subtree is solved based on Markov chain quantitative analysis method, it is right in the dynamic subtree to obtain
Answer probabilistic compct of the bottom event relative to top event;
Specifically, being found out in dynamic subtree during some bottom event corresponds to relative to it based on Markov chain quantitative analysis method
Between event probabilistic compct;And it is found out based on Markov chain quantitative analysis method and calculates its correspondence intermediate event relative to top
The probabilistic compct of event;By some obtained bottom event relative to its correspond to intermediate event probabilistic compct it is corresponding in
Between probabilistic compct quadrature of the event relative to top event, probabilistic compct of the bottom event relative to top event can be obtained.
The corresponding Markov state transition diagram of Dynamic fault tree is established, any primary transfer means that there are a bottom things
Part failure, the end state of Markov chain is top event failure, is just considered as system if it is sequential all transfers
A fault mode, such as: " C1 first fails, and fails after C2, and top event will fail " may be expressed as:Meanwhile herein
In Markov process all do following hypothesis: Markov chain is homogeneous;Bottom event failure probability is constant;Intermediate thing
Part and bottom event may only be discrete states, only " normal " or " failure " two kinds of basic status.
If the probability that the state j of certain time point t event occurs is Pj(t), there are the states of chain a length of 1 to shift chain T1(as schemed
Shown in 3), then Pj(t) in T1On component are as follows:
Wherein λ is state transition rate, λ00> 0, λjj≥0。
The state of chain a length of 2 shifts chain T if it exists2(as shown in Figure 4), then Pj(t) in T2On component are as follows:
Wherein: λ00> 0, λii>=0, λjj≥0
The state of a length of n of chain shifts chain T if it existsn, then Pj(t) in TnOn component are as follows:
Wherein j=1,2 ... n. λkk> 0, k=0,1 ..., j-1, λjj≥0.As j=n, λnn=0, then
Wherein: λkk> 0, k=0,1 ..., j-1.
One group of differential equation usually need to be solved to the Significance Analysis of Markov model, reanalyse Markov model,
System fault probability is found out, the two subtracts each other the probabilistic compct that the component can be obtained.This method is conceptive to be easily understood, but
Since calculation amount is larger, the accuracy requirement of Large Physical Games wireless installation risk-assessment is comprehensively considered herein, is adopted
It is calculated with the formula of approximate calculation probabilistic compct:
In formula: QiThe failure rate of system, Q when expression event i occursiThe failure of system, q when expression event i does not occuriTable
Show the unreliable degree of i-th of unit.
Step 103, the static subtree is solved based on BDD quantitative analysis method, obtains corresponding bottom event in static subtree
Probabilistic compct relative to top event;
Specifically, finding out in static subtree some bottom event based on BDD quantitative analysis method corresponds to intermediate event relative to it
Probabilistic compct;And it is found out based on BDD quantitative analysis method and calculates its probability weight of correspondence intermediate event relative to top event
It spends;By some obtained bottom event relative to its correspond to intermediate event the corresponding intermediate event of probabilistic compct relative to
Probabilistic compct of the bottom event relative to top event can be obtained in the probabilistic compct quadrature of top event.
Component represented by bottom event is in position difference in system and determines that its importance is not also identical in the entire system, often
A bottom event breaks down shared share in whole system as bottom event probabilistic compct.In the risk assessment of whole system
Bottom event probabilistic compct provides important diagnosis basis, can more be accurately obtained the fault diagnosis result of system.With Q
It (P) is top event failure function, qiFor corresponding i-th of bottom event probability of malfunction, then i-th of bottom event is relative to top event
Probabilistic compct are as follows:
The probabilistic compct characterizes the water for causing top event probability to change with it when the change of the probability of bottom event
It is flat.
Seek some bottom event xiRelative to the probabilistic compct of top event T, bottom event x can be first acquiredi, relative to event
Hedge tree GiProbabilistic compct, then calculate and be out of order subtree GiRelative to the probabilistic compct of top event T, two will obtained
As a result a result quadrature is exactly bottom event xiProbabilistic compct relative to top event T:
Step 104, according to corresponded in the dynamic subtree bottom event relative to top event probabilistic compct with it is described quiet
Corresponding bottom event selects the risk case in bottom event relative to the probabilistic compct of top event in state subtree, corresponding to obtain
Risk prevention measure.
Specifically, when solving probabilistic compct of whole bottom events relative to top event, according to bottom event to useful
The probabilistic compct of part selects the maximum several bottom events (as risk case) of probabilistic compct.Before i.e. probabilistic compct is in
Several risk cases, to obtain corresponding risk prevention measure.
In further embodiment of the present invention, the radio system during moving meeting with certain University Summer is safely
Risk assessment example.It has been related to CCTV relay, Aerial Images transmission, the control of performing art team lighting sound and nothing during Games for university students
A variety of wireless devices such as line microphone, wireless headset, wireless purse, security command communications system, army's wireless device make
With side, it is more to cover conference media report, command scheduling, television relay, race timing and score keeping, security, emergency communication etc.
Kind on-site wireless electric industry business, has used about 5500 radio frequency bands, more than 7300 transmitting equipment, 20 fixed monitoring stations, 4
Mobile monitoring laterally stands, transfers 18 motor-driven prison detection vehicles and 200 sets of detecting/monitoring equipment, implements radio monitoring accumulative 87217
Hour, frequency point 181032 are monitored, is ensured with 12127 groups frequently, is checked all kinds of radio interferences 1297 and rise.
Large Physical Games radio system security risk assessment dynamic fault tree model shown in table 1 is searched using DFLM
Suo Fangfa is analyzed, and step number of all risk cases for the first time with last time access is calculated, it can be deduced that P1 is independent dynamic
State subtree, P2 and P3 are independent static subtree, and P4 and P5 are minimum dynamic subtree, and P6-P14 is minimum static subtree.
By taking dynamic tree P4 as an example, the Markov state transition diagram of P4 as shown in Figure 5 is found out.It can be seen by state transition diagram
Out, under the conditions of K1, the first state " 00 " of system becomes " 10 ", if in the case that K2 condition also meets, system is by " 10 "
Become " Fa ";If first under the conditions of K2, after in K1 condition, then state conversion process are as follows: " 00-01-Fa ";" Fa " state description
System jam.(1 indicates K1 failure, and 0 indicates that K1 is normal).
By the Markov state transition diagram of Fig. 5 it can be seen that the corresponding fault mode of sub- dynamic tree P4 are as follows:Two transfer chains are passed through by original state 00 to failure state Fa, according to the average event of power supply module for communication
Hindering interval time (MTBF) is 500,000 hours, if the probability of active and standby power supply failure (K1, K2) is 2 × 10-5/ hour, system
Working time is 100 hours.Calculate P1(t) chain T is shifted in state1On componentWith
Wherein λ1And λ2It is the failure rate of K1 and K2 respectively.
The probability of malfunction of submodule P4 are as follows:
The probabilistic compct for acquiring K1 and K2 based on subtree P4 is equal are as follows:
It is as shown in Figure 6 with static subtree P8 model and its binary decision diagrams (bdds):
By BDD figure it can be concluded that the cut set of submodule P6 are as follows: { K9 }, { K10 }, { K11 }.Fixed station monitoring and direction-finding equipment
Average time between failures (MTBF) is 10,000 hours, and the average time between failures (MTBF) of locomotive monitoring and direction-finding equipment is
2000 hours, the average time between failures (MTBF) of portable monitoring and direction-finding equipment was 1000 hours, if fixed station monitoring and direction-finding
The failure rate (K9) of equipment is 10-4/ hour, the failure rate (K10) of locomotive monitoring and direction-finding equipment are 5 × 10-4It is/hour, portable
The failure rate (K11) of monitoring and direction-finding equipment is 10-3/ hour, System production time are 100 hours, then P8 radio monitoring and direction-finding
The probability of equipment fault is 6.1 × 10-2。
The value of K9 probabilistic compct is acquired based on subtree P8 are as follows:
The value of K10 probabilistic compct is acquired based on subtree P8 are as follows:
The value of K11 probabilistic compct is acquired based on subtree P8 are as follows:
It sets System production time finally as 100 hours, is passed through according to the average time between failures (MTBF) of equipment or expert
Test or historical failure a situation arises, provide the failure rate of each bottom event, obtain the probabilistic compct of top event, assessment result is such as
Shown in table 2.
The failure rate of 2 bottom event of table and probabilistic compct to top event
According to bottom event to the probabilistic compct of top event, it is in former risk cases (K11, K12, K10, K13)
It is analyzed as follows:
To assets " radio detection and monitoring device ", the tender spots of system is " portable and mobile monitoring direction-finding equipment number
Amount and technical staff are insufficient, equipment is backward, performance is unstable ", chief threat is that " portable and mobile monitoring direction-finding equipment failure is led
Send a telegraph magnetic disturbance ".Due to monitoring lateral ability far from meet demand, radio interference can not be quickly searched, electricity is directly caused
The generation of magnetic disturbance event.It is recommended that accelerating equipment and technology Facilities Construction, expand monitoring net coverage area, increases the mobile prison of dual polarization
Survey station quantity purchases portable monitoring receiver and frequency spectrograph, extends monitoring frequency range, and the radio for reinforcing technical staff is dry
Event emergency disposal training is disturbed, radio technology state of development is tracked, it is skilled to grasp monitoring new equipment, improve monitoring technology water
It is flat.
To assets " frequency spectrum resource ", the tender spots of system is " RF resources are insufficient ", and chief threat is " illegally to make
With frequency point ", due to being needed during the Games using a large amount of frequency, the unit of other frequency of use mostly direct relation city people's livelihood
Living, urban safety, and illegally occupy frequency phenomena and largely exist, therefore, RF resources are very nervous, need actively
It raises and science assigns.To guarantee the safe with frequency of race, it is proposed that pre-games carries out measurement of electromagnetic environment, refers to as much as possible for frequency
With full and accurate technical data is provided, targetedly carries out the cleaning for illegally occupying the frequency station, made by planning of science activities frequency
With solution frequency collision problem.
To assets " radio communication equipment ", the tender spots of system is " illegally using the station ", and chief threat is " illegally to make
Intercom interfere race timing and scoring equipment ", due to newly set platform unit and with station unit to the station detection, pipe of putting on record
Reason understanding is insufficient, the case where largely illegally setting platform occurs, becomes the main radio interference source of race.It is recommended that radio control
Mechanism pre-games carries out station cleaning registration and competition field shop measurement of electromagnetic environment and test data analysis, establishes frequency and station data
Database clears up the illegal station, builds good frequency environment.
Fig. 7 shows a kind of Large Physical Games radio system information security wind according to an exemplary embodiment of the present invention
Danger assessment device, i.e. electronic equipment 310 (such as having the computer server that program executes function) comprising at least one
Manage device 311, power supply 314, and memory 312 and input/output interface with the communication connection of at least one described processor 311
313;The memory 312 is stored with the instruction that can be executed by least one described processor 311, described instruction by it is described at least
One processor 311 executes, so that at least one described processor 311 is able to carry out side disclosed in aforementioned any embodiment
Method;The input/output interface 313 may include display, keyboard, mouse and USB interface, be used for inputoutput data;
Power supply 314 is used to provide electric energy for electronic equipment 310.
It will be appreciated by those skilled in the art that: realize that all or part of the steps of above method embodiment can pass through program
Relevant hardware is instructed to complete, program above-mentioned can store in computer-readable storage medium, which is executing
When, execute step including the steps of the foregoing method embodiments;And storage medium above-mentioned includes: movable storage device, read-only memory
The various media that can store program code such as (Read Only Memory, ROM), magnetic or disk.
When the above-mentioned integrated unit of the present invention be realized in the form of SFU software functional unit and as the sale of independent product or
In use, also can store in a computer readable storage medium.Based on this understanding, the skill of the embodiment of the present invention
Substantially the part that contributes to existing technology can be embodied in the form of software products art scheme in other words, the calculating
Machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be individual
Computer, server or network equipment etc.) execute all or part of each embodiment the method for the present invention.And it is aforementioned
Storage medium include: the various media that can store program code such as movable storage device, ROM, magnetic or disk.
The above, the only detailed description of the specific embodiment of the invention, rather than limitation of the present invention.The relevant technologies
The technical staff in field is not in the case where departing from principle and range of the invention, various replacements, modification and the improvement made
It should all be included in the protection scope of the present invention.
Claims (7)
1. a kind of Large Physical Games radio system Information Security Risk Assessment Methods, which is characterized in that described to include:
Step 101, it establishes using Large Physical Games radio risk case as the Large Physical Games radio system of top event
Security risk assessment dynamic fault tree model;And using depth first left most ergodic algorithm search method by the Large Physical Games without
Line electrical system safety risk assessment dynamic fault tree model is decomposed into multiple static subtrees and multiple dynamic subtrees;
Wherein, the Large Physical Games radio system security risk assessment dynamic fault tree model is top with the top event
Layer, using multiple intermediate events as middle layer, using the corresponding multiple bottom events of multiple intermediate events as bottom;From bottom event to useful
Part is connected using static logic gates or each layer event of dynamic logic goalkeeper, to obtain the multiple static subtree and multiple dynamics
Subtree;
Step 102, the dynamic subtree is solved based on Markov chain quantitative analysis method, obtains corresponding to bottom in the dynamic subtree
Probabilistic compct of the event relative to top event;
Step 103, the static subtree is solved based on BDD quantitative analysis method, it is opposite obtains corresponding bottom event in static subtree
In the probabilistic compct of top event;
Step 104, sub relative to the probabilistic compct of top event and the static state according to bottom event is corresponded in the dynamic subtree
Corresponding bottom event selects the risk case in bottom event relative to the probabilistic compct of top event in tree, to obtain corresponding wind
The dangerous precautionary measures.
2. Large Physical Games radio system Information Security Risk Assessment Methods according to claim 1, feature exist
In, the intermediate event number be 14, comprising: communication equipment fault, electromagnetic interference, inartful failure, power module failure,
Anneta module failure, exchange fault, digital micro-wave line failure, radio monitoring and direction-finding equipment fault, wireless device frequency
Rate interference, monitoring system operation error, is not installed not using intercom, equipment at the interference of race timing and scoring equipment as requested
Specification, wireless device parameter error.
3. Large Physical Games radio system Information Security Risk Assessment Methods according to claim 2, feature exist
In the first middle layer and the second middle layer thereafter that, the middle layer includes: in the top event later layer;
Wherein, the communication equipment fault, electromagnetic interference, inartful failure constitute the first middle layer of top event later layer;
The power module failure, Anneta module failure, exchange fault, digital micro-wave line failure are to be connected to the communication equipment
The second middle layer after failure;The radio monitoring and direction-finding equipment fault, wireless device frequency interferences, race timing and scoring
Equipment interference is to be connected to the second middle layer after the electromagnetic interference;The monitoring system operation error does not make as requested
With intercom, equipment install lack of standardization, wireless device parameter error be after being connected to the inartful failure second in
Interbed.
4. Large Physical Games radio system Information Security Risk Assessment Methods according to claim 3, feature exist
In the bottom event number is 26;
The bottom event includes: the main electricity failure being correspondingly connected with the second middle layer power module failure, available electricity electricity
Press failure, primary antenna failure, the emergency antenna failure being correspondingly connected with the second middle layer Anneta module failure, with the second middle layer
The first exchange fault and second switch failure that exchange fault is correspondingly connected with, with the event of the second middle layer digital micro-wave line
Hinder the first line failure and the second line fault being correspondingly connected with, it is corresponding with the second middle layer radio monitoring and direction-finding equipment fault
The equipment fault of fixed station monitoring and direction-finding, the equipment fault of locomotive monitoring and direction-finding, the portable monitoring and direction-finding equipment fault of connection, with
Two middle layer wireless device frequency interferences are correspondingly connected with illegal using the station, illegally using frequency point, wireless device work
Frequency and other equipment co-channel interference, the human interference being correspondingly connected with the interference of the second middle layer race timing and scoring equipment cause
Wireless device interferes race timing and scoring equipment in race timing and scoring unit exception, field, monitors system with the second middle layer
The pre-games electromagnetic environment that system operation error is correspondingly connected with scans loophole, frequency monitoring equipment operation is made mistakes, frequency monitoring loses in match
It loses, the non-working frequency application of intercom that is not correspondingly connected with as requested using intercom with the second middle layer, intercom user
The random change intercom frequency range of member, installs that the equipment installation position lack of standardization being correspondingly connected with is improper to be caused with the second middle layer equipment
Equipment room frequency interferences, equipment installation position are improper to cause signal coverage areas inadequate, joins with the second middle layer wireless device
Miscount the intercom parameter error being accidentally correspondingly connected with, wireless Mike's parameter error, race timing and scoring device parameter mistake.
5. Large Physical Games radio system Information Security Risk Assessment Methods according to claim 1, feature exist
In the probabilistic compct is that the probability of bottom event changes, the horizontal characterization for causing top event probability to change with it.
6. Large Physical Games radio system Information Security Risk Assessment Methods according to claim 1, feature exist
In the step 103 specifically includes:
Some bottom event, which is found out in the dynamic subtree, based on Markov chain quantitative analysis method corresponds to intermediate event relative to it
Probabilistic compct;And it is found out based on Markov chain quantitative analysis method and calculates its correspondence intermediate event relative to top event
Probabilistic compct;Some obtained bottom event is corresponded to the corresponding intermediate event of probabilistic compct of intermediate event relative to it
Relative to the probabilistic compct quadrature of top event, probabilistic compct of the bottom event relative to top event can be obtained.
7. Large Physical Games radio system Information Security Risk Assessment Methods according to claim 1, feature exist
In the step 104 specifically includes:
Probability weight of some bottom event relative to its correspondence intermediate event in the static subtree is found out based on BDD quantitative analysis method
It spends;And it is found out based on BDD quantitative analysis method and calculates its probabilistic compct of correspondence intermediate event relative to top event;Will
Some bottom event arrived corresponds to the corresponding intermediate event of probabilistic compct of intermediate event relative to top event relative to it
Probabilistic compct of the bottom event relative to top event can be obtained in probabilistic compct quadrature.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811504960.6A CN109359897A (en) | 2018-12-10 | 2018-12-10 | A kind of Large Physical Games radio system Information Security Risk Assessment Methods |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811504960.6A CN109359897A (en) | 2018-12-10 | 2018-12-10 | A kind of Large Physical Games radio system Information Security Risk Assessment Methods |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109359897A true CN109359897A (en) | 2019-02-19 |
Family
ID=65330164
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811504960.6A Pending CN109359897A (en) | 2018-12-10 | 2018-12-10 | A kind of Large Physical Games radio system Information Security Risk Assessment Methods |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109359897A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111612290A (en) * | 2020-03-31 | 2020-09-01 | 深圳奇迹智慧网络有限公司 | Security scheme generation method and device, computer equipment and storage medium |
CN111931013A (en) * | 2020-07-28 | 2020-11-13 | 中船邮轮科技发展有限公司 | Logic tree-based safe port returning evaluation method, system and equipment |
CN112084375A (en) * | 2020-08-21 | 2020-12-15 | 华人运通(江苏)技术有限公司 | Vehicle fault diagnosis method and device, terminal equipment and storage medium |
CN112084374A (en) * | 2020-08-21 | 2020-12-15 | 华人运通(江苏)技术有限公司 | Vehicle fault diagnosis method, terminal device and storage medium |
CN114205211A (en) * | 2020-08-28 | 2022-03-18 | Sap欧洲公司 | System and method for fault diagnosis using fault tree |
CN115222295A (en) * | 2022-09-13 | 2022-10-21 | 北京奥邦体育赛事评估有限责任公司 | Sports event risk prevention and control method and system based on risk level model |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105678469A (en) * | 2016-01-29 | 2016-06-15 | 南京市产品质量监督检验院 | Risk assessment method for relay protection equipment in intelligent substation |
CN105717912A (en) * | 2016-01-27 | 2016-06-29 | 西北工业大学 | Reliability analysis method for electromechanical actuator based on fuzzy dynamic fault tree |
CN107590010A (en) * | 2017-08-31 | 2018-01-16 | 西安电子科技大学 | A kind of electromagnetic compatibility Analysis on Fault Diagnosis method based on Dynamic fault tree |
CN108898696A (en) * | 2018-07-03 | 2018-11-27 | 中国民航大学 | Aircraft power system safety analysis method based on Dynamic fault tree and markov |
-
2018
- 2018-12-10 CN CN201811504960.6A patent/CN109359897A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105717912A (en) * | 2016-01-27 | 2016-06-29 | 西北工业大学 | Reliability analysis method for electromechanical actuator based on fuzzy dynamic fault tree |
CN105678469A (en) * | 2016-01-29 | 2016-06-15 | 南京市产品质量监督检验院 | Risk assessment method for relay protection equipment in intelligent substation |
CN107590010A (en) * | 2017-08-31 | 2018-01-16 | 西安电子科技大学 | A kind of electromagnetic compatibility Analysis on Fault Diagnosis method based on Dynamic fault tree |
CN108898696A (en) * | 2018-07-03 | 2018-11-27 | 中国民航大学 | Aircraft power system safety analysis method based on Dynamic fault tree and markov |
Non-Patent Citations (3)
Title |
---|
倪晓茹: "大型奥运体育场馆活动风险管理研究—以G高校奥运体育馆为例", 《北京工业大学学报(社会科学版)》 * |
刘欣: "奥运场馆通信保障项目的风险管理研究", 《中国优秀硕士学位论文全文数据库经济与管理科学辑》 * |
王健: "基于动态故障树的CRH2动车组制动系统可靠性分析研究", 《中国优秀硕士学位论文全文数据库工程科技II辑》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111612290A (en) * | 2020-03-31 | 2020-09-01 | 深圳奇迹智慧网络有限公司 | Security scheme generation method and device, computer equipment and storage medium |
CN111612290B (en) * | 2020-03-31 | 2023-04-07 | 深圳奇迹智慧网络有限公司 | Security scheme generation method and device, computer equipment and storage medium |
CN111931013A (en) * | 2020-07-28 | 2020-11-13 | 中船邮轮科技发展有限公司 | Logic tree-based safe port returning evaluation method, system and equipment |
CN112084375A (en) * | 2020-08-21 | 2020-12-15 | 华人运通(江苏)技术有限公司 | Vehicle fault diagnosis method and device, terminal equipment and storage medium |
CN112084374A (en) * | 2020-08-21 | 2020-12-15 | 华人运通(江苏)技术有限公司 | Vehicle fault diagnosis method, terminal device and storage medium |
CN112084375B (en) * | 2020-08-21 | 2023-06-16 | 华人运通(江苏)技术有限公司 | Vehicle fault diagnosis method and device, terminal equipment and storage medium |
CN112084374B (en) * | 2020-08-21 | 2023-06-16 | 华人运通(江苏)技术有限公司 | Vehicle fault diagnosis method, terminal equipment and storage medium |
CN114205211A (en) * | 2020-08-28 | 2022-03-18 | Sap欧洲公司 | System and method for fault diagnosis using fault tree |
CN114205211B (en) * | 2020-08-28 | 2023-11-07 | Sap欧洲公司 | System and method for fault diagnosis using fault tree |
CN115222295A (en) * | 2022-09-13 | 2022-10-21 | 北京奥邦体育赛事评估有限责任公司 | Sports event risk prevention and control method and system based on risk level model |
CN115222295B (en) * | 2022-09-13 | 2023-06-13 | 北京奥邦体育赛事评估有限责任公司 | Sports event risk prevention and control method and system based on risk level model |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109359897A (en) | A kind of Large Physical Games radio system Information Security Risk Assessment Methods | |
Vempaty et al. | Distributed inference with Byzantine data: State-of-the-art review on data falsification attacks | |
Lun et al. | Cyber-physical systems security: a systematic mapping study | |
CN107852410B (en) | Dissect rogue access point | |
Das et al. | Handbook on securing cyber-physical critical infrastructure | |
Chen et al. | Security analysis of urban railway systems: the need for a cyber-physical perspective | |
Lera et al. | Cybersecurity of robotics and autonomous systems: Privacy and safety | |
WO2019036365A1 (en) | Modeling cyber-physical attack paths in the internet-of-things | |
CN107888574A (en) | Method, server and the storage medium of Test database risk | |
CN110443274A (en) | Method for detecting abnormality, device, computer equipment and storage medium | |
CN107005856A (en) | System, method and apparatus for the license shared access management with distributed information storage device | |
CN107480533A (en) | A kind of method, apparatus and device of leak reparation | |
CN106502815A (en) | A kind of abnormal cause localization method, device and computing device | |
Zhang et al. | Locating and protecting facilities from intentional attacks using secrecy | |
Dai et al. | Exploring risk flow attack graph for security risk assessment | |
Li et al. | Time series association state analysis method for attacks on the smart internet of electric vehicle charging network | |
Kour et al. | A review on cybersecurity in railways | |
CN106646110A (en) | Low-voltage distribution network fault positioning system based on GIS and Petri technologies | |
Dahan et al. | Network inspection for detecting strategic attacks | |
CN110267268A (en) | The recognition methods of pseudo-base station, apparatus and system | |
CN112530601A (en) | Campus epidemic situation monitoring method and device, computer equipment and storage medium | |
Bhatia et al. | Quantum computing inspired framework of student performance assessment in smart classroom | |
CN106302412A (en) | A kind of intelligent checking system for the test of information system crushing resistance and detection method | |
Izrailov et al. | Threats classification method for the transport infrastructure of a smart city | |
Peng et al. | Sensing network security prevention measures of BIM smart operation and maintenance system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190219 |
|
RJ01 | Rejection of invention patent application after publication |