CN113591326A - Information guarantee scheme simulation evaluation method and system based on system dynamics - Google Patents
Information guarantee scheme simulation evaluation method and system based on system dynamics Download PDFInfo
- Publication number
- CN113591326A CN113591326A CN202110942613.7A CN202110942613A CN113591326A CN 113591326 A CN113591326 A CN 113591326A CN 202110942613 A CN202110942613 A CN 202110942613A CN 113591326 A CN113591326 A CN 113591326A
- Authority
- CN
- China
- Prior art keywords
- effectiveness
- index
- information
- scheme
- guarantee
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000011156 evaluation Methods 0.000 title claims abstract description 72
- 238000004088 simulation Methods 0.000 title claims abstract description 49
- 238000004364 calculation method Methods 0.000 claims abstract description 42
- 230000001364 causal effect Effects 0.000 claims abstract description 34
- 238000000034 method Methods 0.000 claims abstract description 19
- 230000000694 effects Effects 0.000 claims description 23
- 238000010586 diagram Methods 0.000 claims description 16
- 230000005484 gravity Effects 0.000 claims description 11
- 230000007423 decrease Effects 0.000 claims description 7
- 230000008859 change Effects 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 6
- 238000010276 construction Methods 0.000 claims description 4
- 230000009471 action Effects 0.000 description 24
- 230000006872 improvement Effects 0.000 description 5
- 238000002474 experimental method Methods 0.000 description 4
- 230000002776 aggregation Effects 0.000 description 3
- 238000004220 aggregation Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000012549 training Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000011002 quantification Methods 0.000 description 1
- 238000011158 quantitative evaluation Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F30/00—Computer-aided design [CAD]
- G06F30/20—Design optimisation, verification or simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- General Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Evolutionary Computation (AREA)
- Operations Research (AREA)
- Game Theory and Decision Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Geometry (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a system dynamics-based information guarantee scheme simulation evaluation method and a system, wherein the method comprises the following steps: the method comprises the steps of evaluating the effectiveness of an effectiveness index of an information guarantee scheme, determining the proportion and weight value of each key element in the effectiveness index, and constructing an effectiveness index system of the information guarantee scheme; determining the causal feedback relationship between the key elements and the effectiveness indexes in the effectiveness index system of the information guarantee scheme and drawing a causal feedback relationship graph; constructing a system dynamics model according to the causal feedback relationship between each key element and each performance index, and determining each performance index calculation equation; and setting input conditions and index weights according to the evaluation purpose, starting the system dynamics model, and performing simulation analysis through the efficiency index calculation equations.
Description
Technical Field
The invention relates to the technical field of battle scheme evaluation, in particular to a system dynamics-based information guarantee scheme simulation evaluation method and system.
Background
The information guarantee capability plays an important role in formation of the combat capability of troops based on an information system, and in a combat action, the quality of an information guarantee scheme is a key for restricting the formation of the information guarantee capability, so that the quality of the information guarantee scheme needs to be effectively evaluated in the combat action.
The information guarantee scheme is a series of measures for integrally designing and specifically arranging combat information guarantee force, resources and actions, and is a basic idea for various military action information guarantee organizations. The current analysis and evaluation of the information assurance scheme mainly face the difficulties of complex and various evaluation contents, difficult standard quantification, mixed and diversified modes and the like, and the evaluation research directly aiming at the scheme is relatively lacked. At present, a qualitative assessment method is mostly adopted for assessment of an information guarantee scheme, the method depends on military literacy and actual experience of judges, a given conclusion is often highly subjective, and the conclusion is often fuzzy; in addition, an evaluation method combining qualitative and quantitative evaluation methods, including an analytic hierarchy process, a fuzzy comprehensive evaluation method and the like, is adopted, mainly carries out static evaluation and reasoning on information guarantee capability, information guarantee resources and the like, belongs to a theoretical level, and has weak practical guidance significance.
When the information guarantee scheme is evaluated, the method generally starts from three aspects of static quality of the scheme, guidance degree of information guarantee activities and expected execution effect of the scheme, namely the 'three-property' evaluation of the integrity, feasibility and effectiveness of the scheme is carried out, wherein the effectiveness of the information guarantee scheme is based on the integrity and the feasibility and is the destination of the integrity and the feasibility, so that the effectiveness is used as a core index of the information guarantee scheme and is the key for measuring whether the scheme can actually play a role.
Disclosure of Invention
The invention aims to provide a system dynamics-based information assurance scheme simulation evaluation method and system, and aims to develop simulation research aiming at scheme effectiveness and solve the problems of high evaluation subjectivity and lack of actual data support.
The invention provides a system dynamics-based information guarantee scheme simulation evaluation method, which comprises the following steps:
s1, performing effectiveness evaluation on an effectiveness index of an information guarantee scheme, determining specific gravity and weighted value of each key element in the effectiveness index, and constructing an effectiveness index system of the information guarantee scheme;
s2, determining a causal feedback relationship between the key elements and the effectiveness indexes in the effectiveness index system of the information guarantee scheme and drawing a causal feedback relationship diagram;
s3, constructing a system dynamics model according to the causal feedback relationship between each key element and each efficiency index, and determining each efficiency index calculation equation;
and S4, setting input conditions and index weights according to the evaluation purpose, starting the system dynamics model, and carrying out simulation analysis through the efficiency index calculation equations.
The invention provides an information guarantee scheme simulation evaluation system based on system dynamics, which comprises:
an index system construction module: the system is used for evaluating the effectiveness of the effectiveness indexes of the information guarantee scheme, determining the specific gravity and the weighted value of each key element in the effectiveness indexes, and constructing an effectiveness index system of the information guarantee scheme;
a cause and effect relationship module: the system is used for determining the causal feedback relationship between the key elements and the performance indexes in the information guarantee scheme effectiveness index system and drawing a causal feedback relationship graph;
a model construction module: constructing a system dynamics model according to the causal feedback relationship between each key element and each performance index, and determining each performance index calculation equation;
a simulation analysis module: and setting input conditions and index weights according to the evaluation purpose, starting the system dynamics model, and performing simulation analysis through the efficiency index calculation equations.
The embodiment of the invention also provides information security scheme simulation evaluation equipment based on system dynamics, which comprises: the simulation evaluation system comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the computer program realizes the steps of the simulation evaluation method of the information security scheme when being executed by the processor.
The embodiment of the invention also provides a computer readable storage medium, wherein an implementation program for information transmission is stored on the computer readable storage medium, and the program is executed by a processor to implement the steps of the information security scheme simulation evaluation method.
By adopting the embodiment of the invention, the problems of overhigh subjectivity and lack of actual data support in evaluation can be avoided, and more objective and accurate quantitative description is provided for the effectiveness of the information guarantee scheme; the method designs a complete and clear information guarantee scheme effectiveness evaluation step, and improves the information guarantee scheme evaluation efficiency in the combat training process.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of a method for simulation evaluation of an information security scheme based on system dynamics according to an embodiment of the present invention;
FIG. 2 is a causal feedback diagram of critical elements of an embodiment of the present invention versus performance indicators;
FIG. 3 is a flow diagram of a scenario evaluation simulation in a system dynamics model according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of the experimental results of simulation experiment b-1 according to the embodiment of the present invention;
FIG. 5 is a schematic diagram of an experiment result comparing performance indexes of improving the local with overall information security performance of improving the local in a simulation experiment b-1 according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of an experimental result of a simulation experiment b-1 according to an embodiment of the present invention, which independently and substantially improves each performance index of our party, and ensures the performance to 3 according to the overall information;
FIG. 7 is a schematic diagram of an information security scheme simulation evaluation system based on system dynamics according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of an information security scheme simulation evaluation device based on system dynamics according to an embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", "clockwise", "counterclockwise", and the like, indicate orientations and positional relationships based on those shown in the drawings, and are used only for convenience of description and simplicity of description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be considered as limiting the present invention.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, features defined as "first", "second", may explicitly or implicitly include one or more of the described features. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise. Furthermore, the terms "mounted," "connected," and "connected" are to be construed broadly and may, for example, be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Method embodiment
The command control of the army based on the novel command information system is one of key factors for overcoming enemy defeats in the information war, and therefore, the effective operation supporting the novel command information system is the core target of information guarantee action. The evaluation of the effectiveness of the information security scheme can be realized by investigating the performance of the security actions based on the scheme on the supporting core target.
According to an embodiment of the present invention, there is provided a system dynamics-based information security scheme simulation evaluation method, fig. 1 is a flowchart of the system dynamics-based information security scheme simulation evaluation method according to the embodiment of the present invention, and as shown in fig. 1, the information security scheme simulation evaluation method according to the embodiment of the present invention specifically includes:
s1, performing effectiveness evaluation on an effectiveness index of an information guarantee scheme, determining specific gravity and weighted value of each key element in the effectiveness index, and constructing an effectiveness index system of the information guarantee scheme;
wherein, the performance index includes: network support security (network capability), command system security (system capability), network service security (application capability), security protection security (security capability), and data information security (data capability).
And for the effectiveness evaluation of each performance index, constructing a lower-level evaluation index for aggregation evaluation by adopting a mode of extracting similar key elements, and neglecting other factors which have small influence on the overall evaluation during evaluation. In this embodiment, a basic action flow of "information situation acquisition-situation judgment-planning decision-action implementation and control" of the information security system is analyzed, and key elements extracted from the basic action flow are shown in table 1:
TABLE 1
Inviting military experts and related industry personnel to determine the specific gravity and weight values of various key elements in table 1 for the main content of the project to be evaluated, as shown in table 2:
TABLE 2
S2, determining a causal feedback relationship between the key elements and the effectiveness indexes in the effectiveness index system of the information guarantee scheme and drawing a causal feedback relationship diagram;
fig. 2 is a causal feedback relationship diagram of each key element on the performance index, and includes the influence of the enemy on the performance index of the information security activity intervention capability of our party, where a negative arrow indicates negative feedback to generate negative influence, and a positive arrow indicates positive feedback to generate positive influence, that is, the enemy negatively influences the performance index of our party on the information security activity intervention capability of our party, and the key element positively influences the performance index of our party.
S3, constructing a system dynamics model according to the causal feedback relationship between each key element and each efficiency index, and determining each efficiency index calculation equation;
further, a corresponding system flow graph is drawn according to qualitative causal feedback relationships, as shown in fig. 3, wherein the main feedback relationships conform to the basic rules of information security actions.
A system dynamics model is constructed, and information guarantee efficiency is calculated through each efficiency index calculation equation in the model, specifically:
the network support guarantee efficiency calculation equation is shown in formula 1:
the command system assurance effectiveness calculation equation is shown in formula 2:
the network service guarantee efficiency calculation equation is shown in formula 3:
the safety protection guarantee effectiveness calculation equation is shown in formula 4
the data information security effectiveness calculation equation is shown in equation 5
the calculation equation of the information guarantee activity intervention efficiency of the enemy to the party is shown as formula 6:
the information security effectiveness calculation equation is shown in equation 7:
s4, setting input conditions and index weights according to evaluation purposes, starting the system dynamics model, and carrying out simulation analysis through the efficiency index calculation equations;
specifically, different model input conditions are designed according to the system dynamics model, the model is started, and key elements for controlling the effectiveness of the information guarantee scheme are searched by observing the influence (the increase or decrease of the effectiveness value and the change range of the effectiveness value) of different inputs on the information guarantee effectiveness value of the party.
When using the system dynamics model, it is assumed that: the friend or foe confrontation is mainly based on the expansion of the information system confrontation, and does not relate to other actions; the battlefield environment has the same influence on both parties, and key elements are not extracted independently for modeling; both personnel carry out actions based on the information guarantee scheme, and the quality of the personnel is not used as a modeling element.
The specific simulation experiment design can be carried out according to the following modes:
the running time of the experimental simulation is set to be 20h, and the simulation step length is 1 h. The experiment is basically conceived to verify that the informatization capabilities of the enemy and the my are equivalent, and under the condition of strong enemy intervention, different information guarantee action performance conditions are explored to search key elements influencing the effectiveness of the information guarantee scheme to be tested. The experimental specific design is shown in table 3:
TABLE 3
The result of the observation experiment b-1 is shown in fig. 4, and analysis shows that under the condition of strong enemy intervention, the overall efficiency of information guarantee of our party in the scheme to be tested begins to remarkably decline after 14 hours, which indicates that the information guarantee system of our party can still effectively work in a short time under the intervention of the strong enemy, but cannot continuously provide guarantee capability.
Under the current scheme, it is tried to improve each performance index of our party, and compared with improving the overall information guarantee performance of our party, the result is shown in fig. 5, where the curves in the graph respectively correspond to from 1 to 6: the application capacity, the security protection capacity, the data capacity, the network capacity, the system capacity and the overall information guarantee efficiency are observed, and the curve in the graph is observed, so that any local capacity is independently improved, the effective exertion of the overall information guarantee efficiency under the battlefield confrontation condition cannot be guaranteed, and the overall efficiency can still slide down greatly after 14 hours. However, the initial value of the overall efficiency is improved, although the absolute value is not as high as the level of the strong enemy, the improvement of the overall guaranteed efficiency appears after 14 h. Experiments show that in terms of the current information guarantee scheme, the improvement of the capacity of a certain aspect is enhanced independently, and the comprehensive improvement of the overall guarantee level is not better than the comprehensive improvement of the overall guarantee level, so that the guarantee efficiency can be more effectively exerted.
An attempt is made to individually and greatly improve each performance index of our party and the overall performance guarantee capability to 3, and the experimental curve shown in fig. 6 is observed again, where the curves from 1 to 6 correspond to: the application capacity, the security protection capacity, the data capacity, the network capacity, the system capacity and the overall information guarantee efficiency are improved independently, the overall information guarantee efficiency of the local can be improved gradually along with the advance of time until the information guarantee situation is reversed at a certain moment, and the effect of improving the system capacity is optimal. And the application capability and the data capability cannot be improved to the same effect.
According to the experimental result, the security, network and system capabilities are used as the bottom layer supporting capability in the information guarantee efficiency performance in the current scheme, and the whole efficiency can be effectively exerted. Under the condition of informatization combat, information security actions are developed based on a system, so that the improvement of the system capacity can play a key role in the performance of the overall action efficiency. The data and network application service capability belongs to the capability of a relatively high layer, and the exertion of the capability of the data and network application service capability needs to be based on other underlying capabilities, so that the influence on the overall exertion is relatively low.
By adopting the embodiment of the invention, the established information guarantee scheme effectiveness index system and the key element weight are determined to fully utilize the industry knowledge of corresponding experts, and meanwhile, the corresponding index system can be verified and optimized through system dynamics model simulation, so that the problems of overhigh subjectivity and lack of actual data support in evaluation are avoided, and more objective and accurate quantitative description is provided for the effectiveness of the information guarantee scheme; and a complete information guarantee scheme effectiveness evaluation step is designed, and the information guarantee scheme evaluation efficiency in the combat training process is improved.
System embodiment
According to an embodiment of the present invention, there is provided an information security scheme simulation evaluation system based on system dynamics, fig. 7 is a schematic diagram of an information security scheme simulation evaluation system based on system dynamics according to an embodiment of the present invention, as shown in fig. 7, the information security scheme simulation evaluation system according to an embodiment of the present invention specifically includes:
index system building block 70: the system is used for evaluating the effectiveness of the effectiveness indexes of the information guarantee scheme, determining the specific gravity and the weighted value of each key element in the effectiveness indexes, and constructing an effectiveness index system of the information guarantee scheme;
the cause and effect relationship module 72: the system is used for determining the causal feedback relationship between the key elements and the performance indexes in the information guarantee scheme effectiveness index system and drawing a causal feedback relationship graph;
model building module 74: constructing a system dynamics model according to the causal feedback relationship between each key element and each performance index, and determining each performance index calculation equation;
simulation analysis module 76: setting input conditions and index weights according to evaluation purposes, starting the system dynamics model, and performing simulation analysis through the efficiency index calculation equations;
the simulation analysis module is specifically configured to: and analyzing the influence of the index weights of different schemes on the information guarantee total effect value through a system dynamics model, wherein the influence comprises the increase and decrease of the effect value and the change amplitude of the effect value.
The embodiment of the present invention is a system embodiment corresponding to the above method embodiment, and specific operations of each module may be understood with reference to the description of the method embodiment, which is not described herein again.
Apparatus embodiment one
An embodiment of the present invention provides a system dynamics-based information security scheme simulation evaluation device, as shown in fig. 8, including: a memory 80, a processor 82 and a computer program stored on the memory 80 and executable on the processor 82, which computer program, when executed by the processor 82, performs the following method steps:
s1, performing effectiveness evaluation on an effectiveness index of an information guarantee scheme, determining specific gravity and weighted value of each key element in the effectiveness index, and constructing an effectiveness index system of the information guarantee scheme;
wherein, the performance index includes: network support security (network capability), command system security (system capability), network service security (application capability), security protection security (security capability), and data information security (data capability).
And for the effectiveness evaluation of each performance index, constructing a lower-level evaluation index for aggregation evaluation by adopting a mode of extracting similar key elements, and neglecting other factors which have small influence on the overall evaluation during evaluation. In this embodiment, a basic action flow of "information situation acquisition-situation judgment-decision planning-action implementation and control" of an information support system-supported army synthetic travel is analyzed, and key elements extracted from the basic action flow are shown in table 1:
TABLE 1
Inviting military experts and related industry personnel to determine the specific gravity and weight values of various key elements in table 1 for the main content of the project to be evaluated, as shown in table 2:
TABLE 2
S2, determining a causal feedback relationship between the key elements and the effectiveness indexes in the effectiveness index system of the information guarantee scheme and drawing a causal feedback relationship diagram;
fig. 2 is a causal feedback relationship diagram of each key element on the performance index, and includes the influence of the enemy on the performance index of the information security activity intervention capability of our party, where a negative arrow indicates negative feedback to generate negative influence, and a positive arrow indicates positive feedback to generate positive influence, that is, the enemy negatively influences the performance index of our party on the information security activity intervention capability of our party, and the key element positively influences the performance index of our party.
S3, constructing a system dynamics model according to the causal feedback relationship between each key element and each efficiency index, and determining each efficiency index calculation equation;
further, a corresponding system flow graph is drawn according to qualitative causal feedback relationships, as shown in fig. 3, wherein the main feedback relationships conform to the basic rules of information security actions.
A system dynamics model is constructed, and information guarantee efficiency is calculated through each efficiency index calculation equation in the model, specifically:
the network support guarantee efficiency calculation equation is shown in formula 1:
the command system assurance effectiveness calculation equation is shown in formula 2:
the network service guarantee efficiency calculation equation is shown in formula 3:
the safety protection guarantee effectiveness calculation equation is shown in formula 4
the data information security effectiveness calculation equation is shown in equation 5
the calculation equation of the information guarantee activity intervention efficiency of the enemy to the party is shown as formula 6:
the information security effectiveness calculation equation is shown in equation 7:
s4, setting input conditions and index weights according to evaluation purposes, starting the system dynamics model, and carrying out simulation analysis through the efficiency index calculation equations;
specifically, different model input conditions are designed according to the system dynamics model, the model is started, and key elements for controlling the effectiveness of the information guarantee scheme are searched by observing the influence (the increase or decrease of the effectiveness value and the change range of the effectiveness value) of different inputs on the information guarantee effectiveness value of the party.
When using the system dynamics model, it is assumed that: the friend or foe confrontation is mainly based on the expansion of the information system confrontation, and does not relate to other actions; the battlefield environment has the same influence on both parties, and key elements are not extracted independently for modeling; both personnel carry out actions based on the information guarantee scheme, and the quality of the personnel is not used as a modeling element.
Device embodiment II
The embodiment of the invention provides a computer readable storage medium, wherein an implementation program for information transmission is stored on the computer readable storage medium, and when being executed by a processor 82, the implementation program realizes the following method steps:
s1, performing effectiveness evaluation on an effectiveness index of an information guarantee scheme, determining specific gravity and weighted value of each key element in the effectiveness index, and constructing an effectiveness index system of the information guarantee scheme;
wherein, the performance index includes: network support security (network capability), command system security (system capability), network service security (application capability), security protection security (security capability), and data information security (data capability).
And for the effectiveness evaluation of each performance index, constructing a lower-level evaluation index for aggregation evaluation by adopting a mode of extracting similar key elements, and neglecting other factors which have small influence on the overall evaluation during evaluation. In this embodiment, a basic action flow of "information situation acquisition-situation judgment-decision planning-action implementation and control" of an information support system-supported army synthetic travel is analyzed, and key elements extracted from the basic action flow are shown in table 1:
TABLE 1
Inviting military experts and related industry personnel to determine the specific gravity and weight values of various key elements in table 1 for the main content of the project to be evaluated, as shown in table 2:
TABLE 2
S2, determining a causal feedback relationship between the key elements and the effectiveness indexes in the effectiveness index system of the information guarantee scheme and drawing a causal feedback relationship diagram;
fig. 2 is a causal feedback relationship diagram of each key element on the performance index, and includes the influence of the enemy on the performance index of the information security activity intervention capability of our party, where a negative arrow indicates negative feedback to generate negative influence, and a positive arrow indicates positive feedback to generate positive influence, that is, the enemy negatively influences the performance index of our party on the information security activity intervention capability of our party, and the key element positively influences the performance index of our party.
S3, constructing a system dynamics model according to the causal feedback relationship between each key element and each efficiency index, and determining each efficiency index calculation equation;
further, a corresponding system flow graph is drawn according to qualitative causal feedback relationships, as shown in fig. 3, wherein the main feedback relationships conform to the basic rules of information security actions.
A system dynamics model is constructed, and information guarantee efficiency is calculated through each efficiency index calculation equation in the model, specifically:
the network support guarantee efficiency calculation equation is shown in formula 1:
the command system assurance effectiveness calculation equation is shown in formula 2:
the network service guarantee efficiency calculation equation is shown in formula 3:
the safety protection guarantee effectiveness calculation equation is shown in formula 4
the data information security effectiveness calculation equation is shown in equation 5
the calculation equation of the information guarantee activity intervention efficiency of the enemy to the party is shown as formula 6:
the information security effectiveness calculation equation is shown in equation 7:
s4, setting input conditions and index weights according to evaluation purposes, starting the system dynamics model, and carrying out simulation analysis through the efficiency index calculation equations;
specifically, different model input conditions are designed according to the system dynamics model, the model is started, and key elements for controlling the effectiveness of the information guarantee scheme are searched by observing the influence (the increase or decrease of the effectiveness value and the change range of the effectiveness value) of different inputs on the information guarantee effectiveness value of the party.
When using the system dynamics model, it is assumed that: the friend or foe confrontation is mainly based on the expansion of the information system confrontation, and does not relate to other actions; the battlefield environment has the same influence on both parties, and key elements are not extracted independently for modeling; both personnel carry out actions based on the information guarantee scheme, and the quality of the personnel is not used as a modeling element.
The computer-readable storage medium of this embodiment includes, but is not limited to: ROM, RAM, magnetic or optical disks, and the like.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (8)
1. An information security scheme simulation evaluation method based on system dynamics is characterized by comprising the following steps:
s1, performing effectiveness evaluation on an effectiveness index of an information guarantee scheme, determining specific gravity and weighted value of each key element in the effectiveness index, and constructing an effectiveness index system of the information guarantee scheme;
s2, determining a causal feedback relationship between the key elements and the effectiveness indexes in the effectiveness index system of the information guarantee scheme and drawing a causal feedback relationship diagram;
s3, constructing a system dynamics model according to the causal feedback relationship between each key element and each efficiency index, and determining each efficiency index calculation equation;
and S4, setting input conditions and index weights according to the evaluation purpose, starting the system dynamics model, and carrying out simulation analysis through the efficiency index calculation equations.
2. The method of claim 1, wherein the performance metric comprises: the system comprises network support guarantee, command system guarantee, network service guarantee, safety protection guarantee and data information guarantee.
3. The method according to claim 1, wherein step S4 further comprises: determining the influence of different scheme index weights on the total effectiveness value of the information guarantee, analyzing to obtain key elements influencing the effectiveness of the information guarantee scheme, and adjusting and optimizing the information guarantee scheme.
4. The method of claim 3, wherein the influencing of the information assurance total performance value at step S4 comprises: the effect value increases, decreases and the change amplitude thereof.
5. An information security scheme simulation evaluation system based on system dynamics is characterized by comprising:
an index system construction module: the system is used for evaluating the effectiveness of the effectiveness indexes of the information guarantee scheme, determining the specific gravity and the weighted value of each key element in the effectiveness indexes, and constructing an effectiveness index system of the information guarantee scheme;
a cause and effect relationship module: the system is used for determining the causal feedback relationship between the key elements and the performance indexes in the information guarantee scheme effectiveness index system and drawing a causal feedback relationship graph;
a model construction module: constructing a system dynamics model according to the causal feedback relationship between each key element and each performance index, and determining each performance index calculation equation;
a simulation analysis module: and setting input conditions and index weights according to the evaluation purpose, starting the system dynamics model, and performing simulation analysis through the efficiency index calculation equations.
6. The system of claim 5, wherein the simulation analysis module is specifically configured to: and analyzing the influence of the index weights of different schemes on the information guarantee total effect value through a system dynamics model, wherein the influence comprises the increase and decrease of the effect value and the change amplitude of the effect value.
7. An information security scheme simulation evaluation device based on system dynamics is characterized by comprising: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the simulation evaluation method according to any of claims 1 to 4.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon an implementation program of information transfer, which when executed by a processor implements the steps of the simulation evaluation method according to any of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110942613.7A CN113591326A (en) | 2021-08-17 | 2021-08-17 | Information guarantee scheme simulation evaluation method and system based on system dynamics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110942613.7A CN113591326A (en) | 2021-08-17 | 2021-08-17 | Information guarantee scheme simulation evaluation method and system based on system dynamics |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113591326A true CN113591326A (en) | 2021-11-02 |
Family
ID=78258442
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110942613.7A Pending CN113591326A (en) | 2021-08-17 | 2021-08-17 | Information guarantee scheme simulation evaluation method and system based on system dynamics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113591326A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114548731A (en) * | 2022-02-17 | 2022-05-27 | 北京市科学技术研究院城市安全与环境科学研究所 | Security system efficiency evaluation method, system and equipment based on system dynamics |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008102624A (en) * | 2006-10-17 | 2008-05-01 | Toshiba Corp | Evaluation method of command control system, and simulation system using the same |
CN105825022A (en) * | 2016-03-24 | 2016-08-03 | 中国人民解放军装甲兵工程学院 | Multi-Agent-based dynamic equipment security system efficiency evaluation method and system |
US20190164243A1 (en) * | 2017-11-27 | 2019-05-30 | Korea Invention Promotion Association | Method and system on evaluating patent using structural equation model |
CN110119904A (en) * | 2019-05-22 | 2019-08-13 | 中国人民解放军海军工程大学 | A kind of Warships Equipment Maintenance Evaluation in Support Ability method and system |
-
2021
- 2021-08-17 CN CN202110942613.7A patent/CN113591326A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008102624A (en) * | 2006-10-17 | 2008-05-01 | Toshiba Corp | Evaluation method of command control system, and simulation system using the same |
CN105825022A (en) * | 2016-03-24 | 2016-08-03 | 中国人民解放军装甲兵工程学院 | Multi-Agent-based dynamic equipment security system efficiency evaluation method and system |
US20190164243A1 (en) * | 2017-11-27 | 2019-05-30 | Korea Invention Promotion Association | Method and system on evaluating patent using structural equation model |
CN110119904A (en) * | 2019-05-22 | 2019-08-13 | 中国人民解放军海军工程大学 | A kind of Warships Equipment Maintenance Evaluation in Support Ability method and system |
Non-Patent Citations (1)
Title |
---|
哈军贤;王劲松;: "基于系统动力学的网络空间作战指挥效能评估", 指挥控制与仿真, no. 03, 15 June 2016 (2016-06-15), pages 70 - 75 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114548731A (en) * | 2022-02-17 | 2022-05-27 | 北京市科学技术研究院城市安全与环境科学研究所 | Security system efficiency evaluation method, system and equipment based on system dynamics |
CN114548731B (en) * | 2022-02-17 | 2023-10-17 | 北京市科学技术研究院城市安全与环境科学研究所 | Security system efficiency evaluation method, system and equipment based on system dynamics |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108615122A (en) | A kind of air-defense anti-missile system combat capability assessment method | |
CN108364138B (en) | Weapon equipment development planning modeling and solving method based on countermeasure visual angle | |
CN115310345B (en) | Intelligent algorithm evaluation method and device based on artificial potential field | |
CN113591326A (en) | Information guarantee scheme simulation evaluation method and system based on system dynamics | |
CN114021188A (en) | Method and device for interactive security verification of federated learning protocol and electronic equipment | |
Bas et al. | Peaceful uncertainty: When power shocks do not create commitment problems | |
CN116187207A (en) | Land battle equipment system simulation evaluation method, device and storage medium | |
CN109325301A (en) | Weapon Equipment System efficiency fast Optimization | |
CN112632765A (en) | Combat capability assessment method combining weighted sum method and SEM method | |
CN114722585A (en) | Data processing method and device for scheme deduction analysis | |
Hu et al. | ACEPSO: A multiple adaptive co-evolved particle swarm optimization for solving engineering problems | |
Dağıstanlı | Induced Generalized Intuitionistic Fuzzy OWA Operator on GRA Method for Evaluation of Self-Propelled Artillery System: Ammunition Based Computer Assisted Military Experiment | |
CN113177583A (en) | Aerial target clustering method | |
CN115580426B (en) | Threat detection method, system, memory and equipment for 5G power business system | |
CN113837644B (en) | Equipment combat effectiveness and contribution rate integrated evaluation method based on grey correlation | |
CN112884361A (en) | Multi-scenario equipment combination method, system, computer device and storage medium | |
Liu et al. | Research on multi-UAV collaborative electronic countermeasures effectiveness method based on CRITIC weighting and improved gray correlation analysis | |
CN118395758B (en) | Cross-domain killing chain construction method, device and equipment based on meta-path | |
Minguela-Castro et al. | Automated Support for Battle Decision Making | |
CN109686400A (en) | A kind of enrichment degree method of inspection, device and readable medium, storage control | |
Eridon et al. | Ballistic Validation Test Statistics and Confidence Levels | |
McLaughlan et al. | Influencing massive multi-agent systems via viral trait spreading | |
Ozdemirel et al. | Semi-dynamic modelling of heterogeneous land combat | |
CN117575137A (en) | Method, device, equipment and storage medium for evaluating effectiveness of combat equipment system | |
Li et al. | Multi-aircraft cooperative target allocation in BVR air combat using cultural-genetic algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |