专题:体系工程

一种基于信息熵的体系流程脆弱性分析方法

  • 韦正现 ,
  • 宋敏 ,
  • 童鹏鹏 ,
  • 王红滨
展开
  • 1. 国防科技工业海洋安全体系创新中心, 北京 100036;
    2. 青岛海洋科学与技术试点国家实验室, 青岛 2660011;
    3. 北京外国语大学信息技术中心, 北京 100089;
    4. 哈尔滨工程大学计算机科学与技术学院, 哈尔滨 150001
韦正现,研究员,研究方向系统工程、体系工程和人工智能等,电子信箱:weizhengxian@sina.com

收稿日期: 2019-01-22

  修回日期: 2019-05-15

  网络出版日期: 2019-09-05

基金资助

国家自然科学基金项目(61502037,16772152);国防科技创新特区项目(18-H863-05-ZT-001-007-02)

A method for SoS flow vulnerability analysis based on information entropy

  • WEI Zhengxian ,
  • SONG Min ,
  • TONG Pengpeng ,
  • WANG Hongbin
Expand
  • 1. Marine Security System Innovation Center of Science and Technology for National Defense, Beijing 100036, China;
    2. Pilot National Laboratory for Marine Science and Technology, Qingdao 266011, China;
    3. Information Technology Center, Beijing Foreign Studies University, Beijing 100089, China;
    4. College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China

Received date: 2019-01-22

  Revised date: 2019-05-15

  Online published: 2019-09-05

摘要

体系在执行任务过程中面临来自外部、内部的各种破坏、干扰或威胁等风险,当风险发生时体系受到影响的程度表现为体系脆弱性,体系流程的脆弱性是影响体系能否完成任务的一个重要方面。提出一种基于信息熵的体系流程脆弱性分析方法:首先,面向体系面临的风险事件及其流程结构特征建立体系流程结构脆弱性分析过程;其次,将体系流程转化为有向图模型,基于信息熵构建了体系流程中各个节点的脆弱度计算模型;最后,将复杂体系流程有向图模型简化为串联、并联和混合3种基本结构,建立了3种基本结构的脆弱度计算模型,进而即可计算体系流程的脆弱度。通过案例说明了该方法的有效性。

本文引用格式

韦正现 , 宋敏 , 童鹏鹏 , 王红滨 . 一种基于信息熵的体系流程脆弱性分析方法[J]. 科技导报, 2019 , 37(13) : 40 -46 . DOI: 10.3981/j.issn.1000-7857.2019.13.005

Abstract

When the system-of-systems (SoS) carries out its missions, it faces various risks of destruction, interference or threat from outside and inside. SoS flow vulnerability is expressed as the degree of impact of mission execution efficiency when a risk event occurs on the SoS flow. In this paper, a method for SoS flow vulnerability analysis based on information entropy is proposed. Firstly, for the risk events and flow structure characteristics, a vulnerability analysis process model is established. Secondly, the SoS flow is transformed into a directed graph model, and a vulnerability calculation model of node in the SoS flow is put forward based on information entropy. Thirdly, the directed graph model of complex SoS flow is decomposed and further simplified to three basic structures:series structure, parallel structure and combination structure, and vulnerability calculation models of these basic structures are also built. Finally, the SoS flow vulnerability can be calculated through the above process. A case study demonstrates the effectiveness of the proposed method.

参考文献

[1] Lane J A, Valerdi R. Synthesizing SoS concepts for use in cost modeling[J]. Systems Engineering, 2007, 10(4):297-308.
[2] Manthorpe Jr W H. The emerging joint system of systems:A systems engineering challenge and opportunity for APL[J]. John Hopkins APL Technical Digest, 1996, 17(3):305-313.
[3] Pei R S. Systems-of-systems integration (SoSI)-A smart way of acquiring army C4I2WS systems[C]//Proceedings of the Summer Computer Simulation Conference. New York:ACM, 2000:574-579.
[4] Sage A P, Cuppan C D. On the systems engineering and management of systems-of-systems and federations of systems[J]. Information, Knowledge, Systems Management, 2001, 2(4):325-345.
[5] Maier M W. Architecting principles for systems-of-systems[J]. System Engineering, 1998, 1(4):267-284.
[6] Sullivan M J, Oppenheim J, Ahearn M, et al. Defense acquisitions:DoD management approach and processes not-well suited to supports development of global information grid:GAO-06-211[R]. Washington DC:Government Accountability Office, 2006.
[7] 邢栩嘉, 林闯, 蒋屹新. 计算机系统脆弱性评估研究[J]. 计算机学报, 2004, 27(1):1-11. Xing Xujia, Lin Chuang, Jiang Yixin. A survey of computer vulnerability assessment[J]. Chinese Journal of Computers, 2004, 27(1):1-11.
[8] 程正刚, 房鑫炎, 俞国勤, 等. 电力应急体系的脆弱性评价研究[J]. 电力系统保护与控制, 2010, 38(19):51-54. Cheng Zhenggang, Fang Xinyan, Yu Guoqin, et al. Research of vulnerability assessment of power emergency system[J]. Power System Protection and Control, 2010, 38(19):51-54.
[9] 唐士晟, 李小平. 铁路交通事故应急救援体系脆弱性评价方法研究[J]. 铁道学报, 2013, 35(7):14-20. Tang Shisheng, Li Xiaoping. Study on method for assessment of vulnerability of railway emergency rescue system[J]. Journal of The China Railway Society, 2013, 35(7):14-20.
[10] 丁明, 过羿, 张晶晶, 等. 基于效用风险熵权模糊综合评判的复杂电网节点脆弱性评估[J]. 电工技术学报, 2015, 30(3):214-223. Ding Ming, Guo Yi, Zhang Jingjing, et al. Node vulnerability assessment for complex power grids based on effect risk entropy-weighted fuzzy comprehensive evaluation[J]. Transactions of China Electrotechnical Society, 2015, 30(3):214-223.
[11] 张桦, 魏本刚, 李可军, 等. 基于变压器马尔可夫状态评估模型和熵权模糊评价方法的风险评估技术研究[J]. 电力系统保护与控制, 2016, 44(5):134-140. Zhang Hua, Wei Bengang, Li Kejun, et al. Research on risk assessment technology based on Markov state evaluation model for power transformer and entropy-weighted fuzzy comprehensive evaluation[J]. Power System Protection and Control, 2016, 44(5):134-140.
[12] 宁淑婷. 基于二级模糊综合评判的建筑物和桥梁打击效果评估研究[D]. 西安:西安电子科技大学, 2012. Ning Shuting. Battle damage assessment of building and bridges based on two-level fuzzy comprehensive evaluation[D]. Xi'an:Xidian University, 2012.
文章导航

/