计算机工程与应用
計算機工程與應用
계산궤공정여응용
COMPUTER ENGINEERING AND APPLICATIONS
2014年
5期
70-73,82
,共5页
郑舟毅%杜志国%王欣
鄭舟毅%杜誌國%王訢
정주의%두지국%왕흔
安全防范系统%效能评估%可视化%智能寻径
安全防範繫統%效能評估%可視化%智能尋徑
안전방범계통%효능평고%가시화%지능심경
security and protection system%effectiveness assessment%visualization%intelligent path-finding
对安全防范系统(SPS)而言,弱点评估是系统效能评估的重要组成部分。现有的弱点评估算法普遍使用的入侵序列图(ASD)模型,在准确性、可靠性和直观性上存在一定的缺陷。对现有的弱点评估算法进行改进。提出用二维地图替代入侵序列图进行系统建模;引入广义的启发式搜索算法,以满足动态效能评估的实时性要求;添加防护元件的灵敏度分析模块,使系统在进行定期维护与升级时能获得最高的成本-效益。提出的算法已经通过编程实现,并用得到的VVA-SPS(Visualized Effectiveness Assessment of Security and Protection Systems)程序针对不同防护对象进行了算法的有效性验证。
對安全防範繫統(SPS)而言,弱點評估是繫統效能評估的重要組成部分。現有的弱點評估算法普遍使用的入侵序列圖(ASD)模型,在準確性、可靠性和直觀性上存在一定的缺陷。對現有的弱點評估算法進行改進。提齣用二維地圖替代入侵序列圖進行繫統建模;引入廣義的啟髮式搜索算法,以滿足動態效能評估的實時性要求;添加防護元件的靈敏度分析模塊,使繫統在進行定期維護與升級時能穫得最高的成本-效益。提齣的算法已經通過編程實現,併用得到的VVA-SPS(Visualized Effectiveness Assessment of Security and Protection Systems)程序針對不同防護對象進行瞭算法的有效性驗證。
대안전방범계통(SPS)이언,약점평고시계통효능평고적중요조성부분。현유적약점평고산법보편사용적입침서렬도(ASD)모형,재준학성、가고성화직관성상존재일정적결함。대현유적약점평고산법진행개진。제출용이유지도체대입침서렬도진행계통건모;인입엄의적계발식수색산법,이만족동태효능평고적실시성요구;첨가방호원건적령민도분석모괴,사계통재진행정기유호여승급시능획득최고적성본-효익。제출적산법이경통과편정실현,병용득도적VVA-SPS(Visualized Effectiveness Assessment of Security and Protection Systems)정서침대불동방호대상진행료산법적유효성험증。
For security and protection system, the vulnerability assessment is an important part of the system effective-ness assessment. Existing effectiveness assessment algorithms using the Adversary Sequence Diagram(ASD)model have deficiencies in accuracy, reliability, and visibility. Some improvements in effectiveness assessment algorithm are made in this paper. The use of a 2D map as an alternative approach to model a SPS is suggested. A heuristic generalized search algorithm is introduced in order to meet the real-time requirements of dynamic performance evaluation. The update sensi-tivity analysis module of protection components is developed to get the highest cost-effectiveness in the regular mainte-nance and upgrades of SPS. The proposed algorithm is implemented to a computer program:visualized effectiveness assessment of security and protection systems. The validation verification of the program is carried out in different facili-ties for different objects of protection.