CN113591326A - Information guarantee scheme simulation evaluation method and system based on system dynamics - Google Patents

Information guarantee scheme simulation evaluation method and system based on system dynamics Download PDF

Info

Publication number
CN113591326A
CN113591326A CN202110942613.7A CN202110942613A CN113591326A CN 113591326 A CN113591326 A CN 113591326A CN 202110942613 A CN202110942613 A CN 202110942613A CN 113591326 A CN113591326 A CN 113591326A
Authority
CN
China
Prior art keywords
effectiveness
index
information
scheme
guarantee
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110942613.7A
Other languages
Chinese (zh)
Inventor
卢建平
黄蔚
夏榕泽
孙强
冯鑫
程史靓
韩欢
周静
石昌友
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Army Engineering University of PLA
Original Assignee
Army Engineering University of PLA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Army Engineering University of PLA filed Critical Army Engineering University of PLA
Priority to CN202110942613.7A priority Critical patent/CN113591326A/en
Publication of CN113591326A publication Critical patent/CN113591326A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Evolutionary Computation (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Geometry (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a system dynamics-based information guarantee scheme simulation evaluation method and a system, wherein the method comprises the following steps: the method comprises the steps of evaluating the effectiveness of an effectiveness index of an information guarantee scheme, determining the proportion and weight value of each key element in the effectiveness index, and constructing an effectiveness index system of the information guarantee scheme; determining the causal feedback relationship between the key elements and the effectiveness indexes in the effectiveness index system of the information guarantee scheme and drawing a causal feedback relationship graph; constructing a system dynamics model according to the causal feedback relationship between each key element and each performance index, and determining each performance index calculation equation; and setting input conditions and index weights according to the evaluation purpose, starting the system dynamics model, and performing simulation analysis through the efficiency index calculation equations.

Description

Information guarantee scheme simulation evaluation method and system based on system dynamics
Technical Field
The invention relates to the technical field of battle scheme evaluation, in particular to a system dynamics-based information guarantee scheme simulation evaluation method and system.
Background
The information guarantee capability plays an important role in formation of the combat capability of troops based on an information system, and in a combat action, the quality of an information guarantee scheme is a key for restricting the formation of the information guarantee capability, so that the quality of the information guarantee scheme needs to be effectively evaluated in the combat action.
The information guarantee scheme is a series of measures for integrally designing and specifically arranging combat information guarantee force, resources and actions, and is a basic idea for various military action information guarantee organizations. The current analysis and evaluation of the information assurance scheme mainly face the difficulties of complex and various evaluation contents, difficult standard quantification, mixed and diversified modes and the like, and the evaluation research directly aiming at the scheme is relatively lacked. At present, a qualitative assessment method is mostly adopted for assessment of an information guarantee scheme, the method depends on military literacy and actual experience of judges, a given conclusion is often highly subjective, and the conclusion is often fuzzy; in addition, an evaluation method combining qualitative and quantitative evaluation methods, including an analytic hierarchy process, a fuzzy comprehensive evaluation method and the like, is adopted, mainly carries out static evaluation and reasoning on information guarantee capability, information guarantee resources and the like, belongs to a theoretical level, and has weak practical guidance significance.
When the information guarantee scheme is evaluated, the method generally starts from three aspects of static quality of the scheme, guidance degree of information guarantee activities and expected execution effect of the scheme, namely the 'three-property' evaluation of the integrity, feasibility and effectiveness of the scheme is carried out, wherein the effectiveness of the information guarantee scheme is based on the integrity and the feasibility and is the destination of the integrity and the feasibility, so that the effectiveness is used as a core index of the information guarantee scheme and is the key for measuring whether the scheme can actually play a role.
Disclosure of Invention
The invention aims to provide a system dynamics-based information assurance scheme simulation evaluation method and system, and aims to develop simulation research aiming at scheme effectiveness and solve the problems of high evaluation subjectivity and lack of actual data support.
The invention provides a system dynamics-based information guarantee scheme simulation evaluation method, which comprises the following steps:
s1, performing effectiveness evaluation on an effectiveness index of an information guarantee scheme, determining specific gravity and weighted value of each key element in the effectiveness index, and constructing an effectiveness index system of the information guarantee scheme;
s2, determining a causal feedback relationship between the key elements and the effectiveness indexes in the effectiveness index system of the information guarantee scheme and drawing a causal feedback relationship diagram;
s3, constructing a system dynamics model according to the causal feedback relationship between each key element and each efficiency index, and determining each efficiency index calculation equation;
and S4, setting input conditions and index weights according to the evaluation purpose, starting the system dynamics model, and carrying out simulation analysis through the efficiency index calculation equations.
The invention provides an information guarantee scheme simulation evaluation system based on system dynamics, which comprises:
an index system construction module: the system is used for evaluating the effectiveness of the effectiveness indexes of the information guarantee scheme, determining the specific gravity and the weighted value of each key element in the effectiveness indexes, and constructing an effectiveness index system of the information guarantee scheme;
a cause and effect relationship module: the system is used for determining the causal feedback relationship between the key elements and the performance indexes in the information guarantee scheme effectiveness index system and drawing a causal feedback relationship graph;
a model construction module: constructing a system dynamics model according to the causal feedback relationship between each key element and each performance index, and determining each performance index calculation equation;
a simulation analysis module: and setting input conditions and index weights according to the evaluation purpose, starting the system dynamics model, and performing simulation analysis through the efficiency index calculation equations.
The embodiment of the invention also provides information security scheme simulation evaluation equipment based on system dynamics, which comprises: the simulation evaluation system comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the computer program realizes the steps of the simulation evaluation method of the information security scheme when being executed by the processor.
The embodiment of the invention also provides a computer readable storage medium, wherein an implementation program for information transmission is stored on the computer readable storage medium, and the program is executed by a processor to implement the steps of the information security scheme simulation evaluation method.
By adopting the embodiment of the invention, the problems of overhigh subjectivity and lack of actual data support in evaluation can be avoided, and more objective and accurate quantitative description is provided for the effectiveness of the information guarantee scheme; the method designs a complete and clear information guarantee scheme effectiveness evaluation step, and improves the information guarantee scheme evaluation efficiency in the combat training process.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of a method for simulation evaluation of an information security scheme based on system dynamics according to an embodiment of the present invention;
FIG. 2 is a causal feedback diagram of critical elements of an embodiment of the present invention versus performance indicators;
FIG. 3 is a flow diagram of a scenario evaluation simulation in a system dynamics model according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of the experimental results of simulation experiment b-1 according to the embodiment of the present invention;
FIG. 5 is a schematic diagram of an experiment result comparing performance indexes of improving the local with overall information security performance of improving the local in a simulation experiment b-1 according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of an experimental result of a simulation experiment b-1 according to an embodiment of the present invention, which independently and substantially improves each performance index of our party, and ensures the performance to 3 according to the overall information;
FIG. 7 is a schematic diagram of an information security scheme simulation evaluation system based on system dynamics according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of an information security scheme simulation evaluation device based on system dynamics according to an embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", "clockwise", "counterclockwise", and the like, indicate orientations and positional relationships based on those shown in the drawings, and are used only for convenience of description and simplicity of description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be considered as limiting the present invention.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, features defined as "first", "second", may explicitly or implicitly include one or more of the described features. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise. Furthermore, the terms "mounted," "connected," and "connected" are to be construed broadly and may, for example, be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Method embodiment
The command control of the army based on the novel command information system is one of key factors for overcoming enemy defeats in the information war, and therefore, the effective operation supporting the novel command information system is the core target of information guarantee action. The evaluation of the effectiveness of the information security scheme can be realized by investigating the performance of the security actions based on the scheme on the supporting core target.
According to an embodiment of the present invention, there is provided a system dynamics-based information security scheme simulation evaluation method, fig. 1 is a flowchart of the system dynamics-based information security scheme simulation evaluation method according to the embodiment of the present invention, and as shown in fig. 1, the information security scheme simulation evaluation method according to the embodiment of the present invention specifically includes:
s1, performing effectiveness evaluation on an effectiveness index of an information guarantee scheme, determining specific gravity and weighted value of each key element in the effectiveness index, and constructing an effectiveness index system of the information guarantee scheme;
wherein, the performance index includes: network support security (network capability), command system security (system capability), network service security (application capability), security protection security (security capability), and data information security (data capability).
And for the effectiveness evaluation of each performance index, constructing a lower-level evaluation index for aggregation evaluation by adopting a mode of extracting similar key elements, and neglecting other factors which have small influence on the overall evaluation during evaluation. In this embodiment, a basic action flow of "information situation acquisition-situation judgment-planning decision-action implementation and control" of the information security system is analyzed, and key elements extracted from the basic action flow are shown in table 1:
TABLE 1
Figure BDA0003215448270000061
Inviting military experts and related industry personnel to determine the specific gravity and weight values of various key elements in table 1 for the main content of the project to be evaluated, as shown in table 2:
TABLE 2
Figure BDA0003215448270000062
Figure BDA0003215448270000071
S2, determining a causal feedback relationship between the key elements and the effectiveness indexes in the effectiveness index system of the information guarantee scheme and drawing a causal feedback relationship diagram;
fig. 2 is a causal feedback relationship diagram of each key element on the performance index, and includes the influence of the enemy on the performance index of the information security activity intervention capability of our party, where a negative arrow indicates negative feedback to generate negative influence, and a positive arrow indicates positive feedback to generate positive influence, that is, the enemy negatively influences the performance index of our party on the information security activity intervention capability of our party, and the key element positively influences the performance index of our party.
S3, constructing a system dynamics model according to the causal feedback relationship between each key element and each efficiency index, and determining each efficiency index calculation equation;
further, a corresponding system flow graph is drawn according to qualitative causal feedback relationships, as shown in fig. 3, wherein the main feedback relationships conform to the basic rules of information security actions.
A system dynamics model is constructed, and information guarantee efficiency is calculated through each efficiency index calculation equation in the model, specifically:
the network support guarantee efficiency calculation equation is shown in formula 1:
Figure BDA0003215448270000072
Figure BDA0003215448270000081
wherein,
Figure BDA0003215448270000082
Figure BDA0003215448270000083
the command system assurance effectiveness calculation equation is shown in formula 2:
Figure BDA0003215448270000084
wherein,
Figure BDA0003215448270000085
Figure BDA0003215448270000086
the network service guarantee efficiency calculation equation is shown in formula 3:
Figure BDA0003215448270000087
wherein,
Figure BDA0003215448270000088
Figure BDA0003215448270000089
the safety protection guarantee effectiveness calculation equation is shown in formula 4
Figure BDA00032154482700000810
Wherein,
Figure BDA00032154482700000811
Figure BDA00032154482700000812
Figure BDA0003215448270000091
the data information security effectiveness calculation equation is shown in equation 5
Figure BDA0003215448270000092
Wherein,
Figure BDA0003215448270000093
Figure BDA0003215448270000094
the calculation equation of the information guarantee activity intervention efficiency of the enemy to the party is shown as formula 6:
Figure BDA0003215448270000095
wherein,
Figure BDA0003215448270000096
Figure BDA0003215448270000097
the information security effectiveness calculation equation is shown in equation 7:
Figure BDA0003215448270000098
wherein,
Figure BDA0003215448270000099
Figure BDA00032154482700000910
s4, setting input conditions and index weights according to evaluation purposes, starting the system dynamics model, and carrying out simulation analysis through the efficiency index calculation equations;
specifically, different model input conditions are designed according to the system dynamics model, the model is started, and key elements for controlling the effectiveness of the information guarantee scheme are searched by observing the influence (the increase or decrease of the effectiveness value and the change range of the effectiveness value) of different inputs on the information guarantee effectiveness value of the party.
When using the system dynamics model, it is assumed that: the friend or foe confrontation is mainly based on the expansion of the information system confrontation, and does not relate to other actions; the battlefield environment has the same influence on both parties, and key elements are not extracted independently for modeling; both personnel carry out actions based on the information guarantee scheme, and the quality of the personnel is not used as a modeling element.
The specific simulation experiment design can be carried out according to the following modes:
the running time of the experimental simulation is set to be 20h, and the simulation step length is 1 h. The experiment is basically conceived to verify that the informatization capabilities of the enemy and the my are equivalent, and under the condition of strong enemy intervention, different information guarantee action performance conditions are explored to search key elements influencing the effectiveness of the information guarantee scheme to be tested. The experimental specific design is shown in table 3:
TABLE 3
Figure BDA0003215448270000101
The result of the observation experiment b-1 is shown in fig. 4, and analysis shows that under the condition of strong enemy intervention, the overall efficiency of information guarantee of our party in the scheme to be tested begins to remarkably decline after 14 hours, which indicates that the information guarantee system of our party can still effectively work in a short time under the intervention of the strong enemy, but cannot continuously provide guarantee capability.
Under the current scheme, it is tried to improve each performance index of our party, and compared with improving the overall information guarantee performance of our party, the result is shown in fig. 5, where the curves in the graph respectively correspond to from 1 to 6: the application capacity, the security protection capacity, the data capacity, the network capacity, the system capacity and the overall information guarantee efficiency are observed, and the curve in the graph is observed, so that any local capacity is independently improved, the effective exertion of the overall information guarantee efficiency under the battlefield confrontation condition cannot be guaranteed, and the overall efficiency can still slide down greatly after 14 hours. However, the initial value of the overall efficiency is improved, although the absolute value is not as high as the level of the strong enemy, the improvement of the overall guaranteed efficiency appears after 14 h. Experiments show that in terms of the current information guarantee scheme, the improvement of the capacity of a certain aspect is enhanced independently, and the comprehensive improvement of the overall guarantee level is not better than the comprehensive improvement of the overall guarantee level, so that the guarantee efficiency can be more effectively exerted.
An attempt is made to individually and greatly improve each performance index of our party and the overall performance guarantee capability to 3, and the experimental curve shown in fig. 6 is observed again, where the curves from 1 to 6 correspond to: the application capacity, the security protection capacity, the data capacity, the network capacity, the system capacity and the overall information guarantee efficiency are improved independently, the overall information guarantee efficiency of the local can be improved gradually along with the advance of time until the information guarantee situation is reversed at a certain moment, and the effect of improving the system capacity is optimal. And the application capability and the data capability cannot be improved to the same effect.
According to the experimental result, the security, network and system capabilities are used as the bottom layer supporting capability in the information guarantee efficiency performance in the current scheme, and the whole efficiency can be effectively exerted. Under the condition of informatization combat, information security actions are developed based on a system, so that the improvement of the system capacity can play a key role in the performance of the overall action efficiency. The data and network application service capability belongs to the capability of a relatively high layer, and the exertion of the capability of the data and network application service capability needs to be based on other underlying capabilities, so that the influence on the overall exertion is relatively low.
By adopting the embodiment of the invention, the established information guarantee scheme effectiveness index system and the key element weight are determined to fully utilize the industry knowledge of corresponding experts, and meanwhile, the corresponding index system can be verified and optimized through system dynamics model simulation, so that the problems of overhigh subjectivity and lack of actual data support in evaluation are avoided, and more objective and accurate quantitative description is provided for the effectiveness of the information guarantee scheme; and a complete information guarantee scheme effectiveness evaluation step is designed, and the information guarantee scheme evaluation efficiency in the combat training process is improved.
System embodiment
According to an embodiment of the present invention, there is provided an information security scheme simulation evaluation system based on system dynamics, fig. 7 is a schematic diagram of an information security scheme simulation evaluation system based on system dynamics according to an embodiment of the present invention, as shown in fig. 7, the information security scheme simulation evaluation system according to an embodiment of the present invention specifically includes:
index system building block 70: the system is used for evaluating the effectiveness of the effectiveness indexes of the information guarantee scheme, determining the specific gravity and the weighted value of each key element in the effectiveness indexes, and constructing an effectiveness index system of the information guarantee scheme;
the cause and effect relationship module 72: the system is used for determining the causal feedback relationship between the key elements and the performance indexes in the information guarantee scheme effectiveness index system and drawing a causal feedback relationship graph;
model building module 74: constructing a system dynamics model according to the causal feedback relationship between each key element and each performance index, and determining each performance index calculation equation;
simulation analysis module 76: setting input conditions and index weights according to evaluation purposes, starting the system dynamics model, and performing simulation analysis through the efficiency index calculation equations;
the simulation analysis module is specifically configured to: and analyzing the influence of the index weights of different schemes on the information guarantee total effect value through a system dynamics model, wherein the influence comprises the increase and decrease of the effect value and the change amplitude of the effect value.
The embodiment of the present invention is a system embodiment corresponding to the above method embodiment, and specific operations of each module may be understood with reference to the description of the method embodiment, which is not described herein again.
Apparatus embodiment one
An embodiment of the present invention provides a system dynamics-based information security scheme simulation evaluation device, as shown in fig. 8, including: a memory 80, a processor 82 and a computer program stored on the memory 80 and executable on the processor 82, which computer program, when executed by the processor 82, performs the following method steps:
s1, performing effectiveness evaluation on an effectiveness index of an information guarantee scheme, determining specific gravity and weighted value of each key element in the effectiveness index, and constructing an effectiveness index system of the information guarantee scheme;
wherein, the performance index includes: network support security (network capability), command system security (system capability), network service security (application capability), security protection security (security capability), and data information security (data capability).
And for the effectiveness evaluation of each performance index, constructing a lower-level evaluation index for aggregation evaluation by adopting a mode of extracting similar key elements, and neglecting other factors which have small influence on the overall evaluation during evaluation. In this embodiment, a basic action flow of "information situation acquisition-situation judgment-decision planning-action implementation and control" of an information support system-supported army synthetic travel is analyzed, and key elements extracted from the basic action flow are shown in table 1:
TABLE 1
Figure BDA0003215448270000131
Inviting military experts and related industry personnel to determine the specific gravity and weight values of various key elements in table 1 for the main content of the project to be evaluated, as shown in table 2:
TABLE 2
Figure BDA0003215448270000132
Figure BDA0003215448270000141
S2, determining a causal feedback relationship between the key elements and the effectiveness indexes in the effectiveness index system of the information guarantee scheme and drawing a causal feedback relationship diagram;
fig. 2 is a causal feedback relationship diagram of each key element on the performance index, and includes the influence of the enemy on the performance index of the information security activity intervention capability of our party, where a negative arrow indicates negative feedback to generate negative influence, and a positive arrow indicates positive feedback to generate positive influence, that is, the enemy negatively influences the performance index of our party on the information security activity intervention capability of our party, and the key element positively influences the performance index of our party.
S3, constructing a system dynamics model according to the causal feedback relationship between each key element and each efficiency index, and determining each efficiency index calculation equation;
further, a corresponding system flow graph is drawn according to qualitative causal feedback relationships, as shown in fig. 3, wherein the main feedback relationships conform to the basic rules of information security actions.
A system dynamics model is constructed, and information guarantee efficiency is calculated through each efficiency index calculation equation in the model, specifically:
the network support guarantee efficiency calculation equation is shown in formula 1:
Figure BDA0003215448270000151
wherein,
Figure BDA0003215448270000152
Figure BDA0003215448270000153
the command system assurance effectiveness calculation equation is shown in formula 2:
Figure BDA0003215448270000154
wherein,
Figure BDA0003215448270000155
Figure BDA0003215448270000156
the network service guarantee efficiency calculation equation is shown in formula 3:
Figure BDA0003215448270000157
wherein,
Figure BDA0003215448270000158
Figure BDA0003215448270000159
the safety protection guarantee effectiveness calculation equation is shown in formula 4
Figure BDA00032154482700001510
Wherein,
Figure BDA0003215448270000161
Figure BDA0003215448270000162
the data information security effectiveness calculation equation is shown in equation 5
Figure BDA0003215448270000163
Wherein,
Figure BDA0003215448270000164
Figure BDA0003215448270000165
the calculation equation of the information guarantee activity intervention efficiency of the enemy to the party is shown as formula 6:
Figure BDA0003215448270000166
wherein,
Figure BDA0003215448270000167
Figure BDA0003215448270000168
the information security effectiveness calculation equation is shown in equation 7:
Figure BDA0003215448270000169
wherein,
Figure BDA00032154482700001610
Figure BDA00032154482700001611
s4, setting input conditions and index weights according to evaluation purposes, starting the system dynamics model, and carrying out simulation analysis through the efficiency index calculation equations;
specifically, different model input conditions are designed according to the system dynamics model, the model is started, and key elements for controlling the effectiveness of the information guarantee scheme are searched by observing the influence (the increase or decrease of the effectiveness value and the change range of the effectiveness value) of different inputs on the information guarantee effectiveness value of the party.
When using the system dynamics model, it is assumed that: the friend or foe confrontation is mainly based on the expansion of the information system confrontation, and does not relate to other actions; the battlefield environment has the same influence on both parties, and key elements are not extracted independently for modeling; both personnel carry out actions based on the information guarantee scheme, and the quality of the personnel is not used as a modeling element.
Device embodiment II
The embodiment of the invention provides a computer readable storage medium, wherein an implementation program for information transmission is stored on the computer readable storage medium, and when being executed by a processor 82, the implementation program realizes the following method steps:
s1, performing effectiveness evaluation on an effectiveness index of an information guarantee scheme, determining specific gravity and weighted value of each key element in the effectiveness index, and constructing an effectiveness index system of the information guarantee scheme;
wherein, the performance index includes: network support security (network capability), command system security (system capability), network service security (application capability), security protection security (security capability), and data information security (data capability).
And for the effectiveness evaluation of each performance index, constructing a lower-level evaluation index for aggregation evaluation by adopting a mode of extracting similar key elements, and neglecting other factors which have small influence on the overall evaluation during evaluation. In this embodiment, a basic action flow of "information situation acquisition-situation judgment-decision planning-action implementation and control" of an information support system-supported army synthetic travel is analyzed, and key elements extracted from the basic action flow are shown in table 1:
TABLE 1
Figure BDA0003215448270000171
Figure BDA0003215448270000181
Inviting military experts and related industry personnel to determine the specific gravity and weight values of various key elements in table 1 for the main content of the project to be evaluated, as shown in table 2:
TABLE 2
Figure BDA0003215448270000182
Figure BDA0003215448270000191
S2, determining a causal feedback relationship between the key elements and the effectiveness indexes in the effectiveness index system of the information guarantee scheme and drawing a causal feedback relationship diagram;
fig. 2 is a causal feedback relationship diagram of each key element on the performance index, and includes the influence of the enemy on the performance index of the information security activity intervention capability of our party, where a negative arrow indicates negative feedback to generate negative influence, and a positive arrow indicates positive feedback to generate positive influence, that is, the enemy negatively influences the performance index of our party on the information security activity intervention capability of our party, and the key element positively influences the performance index of our party.
S3, constructing a system dynamics model according to the causal feedback relationship between each key element and each efficiency index, and determining each efficiency index calculation equation;
further, a corresponding system flow graph is drawn according to qualitative causal feedback relationships, as shown in fig. 3, wherein the main feedback relationships conform to the basic rules of information security actions.
A system dynamics model is constructed, and information guarantee efficiency is calculated through each efficiency index calculation equation in the model, specifically:
the network support guarantee efficiency calculation equation is shown in formula 1:
Figure BDA0003215448270000192
wherein,
Figure BDA0003215448270000193
Figure BDA0003215448270000194
the command system assurance effectiveness calculation equation is shown in formula 2:
Figure BDA0003215448270000201
wherein,
Figure BDA0003215448270000202
Figure BDA0003215448270000203
the network service guarantee efficiency calculation equation is shown in formula 3:
Figure BDA0003215448270000204
wherein,
Figure BDA0003215448270000205
Figure BDA0003215448270000206
the safety protection guarantee effectiveness calculation equation is shown in formula 4
Figure BDA0003215448270000207
Wherein,
Figure BDA0003215448270000208
Figure BDA0003215448270000209
the data information security effectiveness calculation equation is shown in equation 5
Figure BDA00032154482700002010
Wherein,
Figure BDA00032154482700002011
Figure BDA00032154482700002012
Figure BDA0003215448270000211
the calculation equation of the information guarantee activity intervention efficiency of the enemy to the party is shown as formula 6:
Figure BDA0003215448270000212
wherein,
Figure BDA0003215448270000213
Figure BDA0003215448270000214
the information security effectiveness calculation equation is shown in equation 7:
Figure BDA0003215448270000215
wherein,
Figure BDA0003215448270000216
Figure BDA0003215448270000217
s4, setting input conditions and index weights according to evaluation purposes, starting the system dynamics model, and carrying out simulation analysis through the efficiency index calculation equations;
specifically, different model input conditions are designed according to the system dynamics model, the model is started, and key elements for controlling the effectiveness of the information guarantee scheme are searched by observing the influence (the increase or decrease of the effectiveness value and the change range of the effectiveness value) of different inputs on the information guarantee effectiveness value of the party.
When using the system dynamics model, it is assumed that: the friend or foe confrontation is mainly based on the expansion of the information system confrontation, and does not relate to other actions; the battlefield environment has the same influence on both parties, and key elements are not extracted independently for modeling; both personnel carry out actions based on the information guarantee scheme, and the quality of the personnel is not used as a modeling element.
The computer-readable storage medium of this embodiment includes, but is not limited to: ROM, RAM, magnetic or optical disks, and the like.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (8)

1. An information security scheme simulation evaluation method based on system dynamics is characterized by comprising the following steps:
s1, performing effectiveness evaluation on an effectiveness index of an information guarantee scheme, determining specific gravity and weighted value of each key element in the effectiveness index, and constructing an effectiveness index system of the information guarantee scheme;
s2, determining a causal feedback relationship between the key elements and the effectiveness indexes in the effectiveness index system of the information guarantee scheme and drawing a causal feedback relationship diagram;
s3, constructing a system dynamics model according to the causal feedback relationship between each key element and each efficiency index, and determining each efficiency index calculation equation;
and S4, setting input conditions and index weights according to the evaluation purpose, starting the system dynamics model, and carrying out simulation analysis through the efficiency index calculation equations.
2. The method of claim 1, wherein the performance metric comprises: the system comprises network support guarantee, command system guarantee, network service guarantee, safety protection guarantee and data information guarantee.
3. The method according to claim 1, wherein step S4 further comprises: determining the influence of different scheme index weights on the total effectiveness value of the information guarantee, analyzing to obtain key elements influencing the effectiveness of the information guarantee scheme, and adjusting and optimizing the information guarantee scheme.
4. The method of claim 3, wherein the influencing of the information assurance total performance value at step S4 comprises: the effect value increases, decreases and the change amplitude thereof.
5. An information security scheme simulation evaluation system based on system dynamics is characterized by comprising:
an index system construction module: the system is used for evaluating the effectiveness of the effectiveness indexes of the information guarantee scheme, determining the specific gravity and the weighted value of each key element in the effectiveness indexes, and constructing an effectiveness index system of the information guarantee scheme;
a cause and effect relationship module: the system is used for determining the causal feedback relationship between the key elements and the performance indexes in the information guarantee scheme effectiveness index system and drawing a causal feedback relationship graph;
a model construction module: constructing a system dynamics model according to the causal feedback relationship between each key element and each performance index, and determining each performance index calculation equation;
a simulation analysis module: and setting input conditions and index weights according to the evaluation purpose, starting the system dynamics model, and performing simulation analysis through the efficiency index calculation equations.
6. The system of claim 5, wherein the simulation analysis module is specifically configured to: and analyzing the influence of the index weights of different schemes on the information guarantee total effect value through a system dynamics model, wherein the influence comprises the increase and decrease of the effect value and the change amplitude of the effect value.
7. An information security scheme simulation evaluation device based on system dynamics is characterized by comprising: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the simulation evaluation method according to any of claims 1 to 4.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon an implementation program of information transfer, which when executed by a processor implements the steps of the simulation evaluation method according to any of claims 1 to 4.
CN202110942613.7A 2021-08-17 2021-08-17 Information guarantee scheme simulation evaluation method and system based on system dynamics Pending CN113591326A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110942613.7A CN113591326A (en) 2021-08-17 2021-08-17 Information guarantee scheme simulation evaluation method and system based on system dynamics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110942613.7A CN113591326A (en) 2021-08-17 2021-08-17 Information guarantee scheme simulation evaluation method and system based on system dynamics

Publications (1)

Publication Number Publication Date
CN113591326A true CN113591326A (en) 2021-11-02

Family

ID=78258442

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110942613.7A Pending CN113591326A (en) 2021-08-17 2021-08-17 Information guarantee scheme simulation evaluation method and system based on system dynamics

Country Status (1)

Country Link
CN (1) CN113591326A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114548731A (en) * 2022-02-17 2022-05-27 北京市科学技术研究院城市安全与环境科学研究所 Security system efficiency evaluation method, system and equipment based on system dynamics

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008102624A (en) * 2006-10-17 2008-05-01 Toshiba Corp Evaluation method of command control system, and simulation system using the same
CN105825022A (en) * 2016-03-24 2016-08-03 中国人民解放军装甲兵工程学院 Multi-Agent-based dynamic equipment security system efficiency evaluation method and system
US20190164243A1 (en) * 2017-11-27 2019-05-30 Korea Invention Promotion Association Method and system on evaluating patent using structural equation model
CN110119904A (en) * 2019-05-22 2019-08-13 中国人民解放军海军工程大学 A kind of Warships Equipment Maintenance Evaluation in Support Ability method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008102624A (en) * 2006-10-17 2008-05-01 Toshiba Corp Evaluation method of command control system, and simulation system using the same
CN105825022A (en) * 2016-03-24 2016-08-03 中国人民解放军装甲兵工程学院 Multi-Agent-based dynamic equipment security system efficiency evaluation method and system
US20190164243A1 (en) * 2017-11-27 2019-05-30 Korea Invention Promotion Association Method and system on evaluating patent using structural equation model
CN110119904A (en) * 2019-05-22 2019-08-13 中国人民解放军海军工程大学 A kind of Warships Equipment Maintenance Evaluation in Support Ability method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
哈军贤;王劲松;: "基于系统动力学的网络空间作战指挥效能评估", 指挥控制与仿真, no. 03, 15 June 2016 (2016-06-15), pages 70 - 75 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114548731A (en) * 2022-02-17 2022-05-27 北京市科学技术研究院城市安全与环境科学研究所 Security system efficiency evaluation method, system and equipment based on system dynamics
CN114548731B (en) * 2022-02-17 2023-10-17 北京市科学技术研究院城市安全与环境科学研究所 Security system efficiency evaluation method, system and equipment based on system dynamics

Similar Documents

Publication Publication Date Title
CN108615122A (en) A kind of air-defense anti-missile system combat capability assessment method
CN108364138B (en) Weapon equipment development planning modeling and solving method based on countermeasure visual angle
CN115310345B (en) Intelligent algorithm evaluation method and device based on artificial potential field
CN113591326A (en) Information guarantee scheme simulation evaluation method and system based on system dynamics
CN114021188A (en) Method and device for interactive security verification of federated learning protocol and electronic equipment
Bas et al. Peaceful uncertainty: When power shocks do not create commitment problems
CN116187207A (en) Land battle equipment system simulation evaluation method, device and storage medium
CN109325301A (en) Weapon Equipment System efficiency fast Optimization
CN112632765A (en) Combat capability assessment method combining weighted sum method and SEM method
CN114722585A (en) Data processing method and device for scheme deduction analysis
Hu et al. ACEPSO: A multiple adaptive co-evolved particle swarm optimization for solving engineering problems
Dağıstanlı Induced Generalized Intuitionistic Fuzzy OWA Operator on GRA Method for Evaluation of Self-Propelled Artillery System: Ammunition Based Computer Assisted Military Experiment
CN113177583A (en) Aerial target clustering method
CN115580426B (en) Threat detection method, system, memory and equipment for 5G power business system
CN113837644B (en) Equipment combat effectiveness and contribution rate integrated evaluation method based on grey correlation
CN112884361A (en) Multi-scenario equipment combination method, system, computer device and storage medium
Liu et al. Research on multi-UAV collaborative electronic countermeasures effectiveness method based on CRITIC weighting and improved gray correlation analysis
CN118395758B (en) Cross-domain killing chain construction method, device and equipment based on meta-path
Minguela-Castro et al. Automated Support for Battle Decision Making
CN109686400A (en) A kind of enrichment degree method of inspection, device and readable medium, storage control
Eridon et al. Ballistic Validation Test Statistics and Confidence Levels
McLaughlan et al. Influencing massive multi-agent systems via viral trait spreading
Ozdemirel et al. Semi-dynamic modelling of heterogeneous land combat
CN117575137A (en) Method, device, equipment and storage medium for evaluating effectiveness of combat equipment system
Li et al. Multi-aircraft cooperative target allocation in BVR air combat using cultural-genetic algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination