安全防范系統(tǒng)的風(fēng)險評估
本文選題:關(guān)鍵基礎(chǔ)設(shè)施 + 安全防范系統(tǒng); 參考:《西南大學(xué)》2017年碩士論文
【摘要】:關(guān)鍵基礎(chǔ)設(shè)施作為一個國家的根本。關(guān)鍵基礎(chǔ)設(shè)施是指具有任何在國家安全與運轉(zhuǎn)體系中扮演重要角色的系統(tǒng)或者設(shè)施。它們不僅包括電力以及水處理工廠等設(shè)施,而且還涵蓋了比如化工、金融服務(wù)、信息技術(shù)等相當(dāng)廣泛的行業(yè)與設(shè)施范疇。近年來,由于國際社會的持續(xù)動蕩,特別是像恐怖主義這樣的人為因素,對關(guān)鍵基礎(chǔ)設(shè)施的安防系統(tǒng)構(gòu)成了巨大的威脅。這迫使我們需要進一步重視相關(guān)安全防范系統(tǒng)的維護與建設(shè)。面對一個大型、復(fù)雜的安全防范系統(tǒng),我們?nèi)绾卧u估它的有效性;如何判斷系統(tǒng)中是否存在漏洞、哪些地方更加關(guān)鍵等等。這都需要我們提出一種合理、客觀的方法對一個安全防范系統(tǒng)進行建模,分析它的有效性、脆弱性以及所面臨的風(fēng)險。針對以上問題,本文在失效模式及其影響分析模型的基礎(chǔ)上,構(gòu)建了一個評估安全防范系統(tǒng)風(fēng)險的評估框架。本文的的主要流程是首先利用改進的多目標(biāo)敵對者序列圖將一個關(guān)鍵基礎(chǔ)設(shè)施的平面圖轉(zhuǎn)化為一個安防網(wǎng)絡(luò)。再利用風(fēng)險熵方法計算網(wǎng)絡(luò)中每個節(jié)點的防范效能,然后將節(jié)點上的安防效能轉(zhuǎn)化為安防網(wǎng)絡(luò)中邊的權(quán)重。接著用改進的變形蟲算法計算出到達每個目標(biāo)的最短路徑,這些最短路徑就是到達一個目標(biāo)的所有路徑中防范效能最弱的路徑。最后我們利用失效模式及其影響分析模型來計算每條路徑的風(fēng)險值,最終確定系統(tǒng)中面臨風(fēng)險值最高的目標(biāo)和路徑。在這個評估流程中,本文的主要貢獻有三點:(1)在評估安防節(jié)點的防護效能部分,不同于多數(shù)文獻使用AHP方法來確定每個指標(biāo)的權(quán)重,本文提出了有序可視圖加權(quán)平均算子來得到每個指標(biāo)的權(quán)重。該方法克服了AHP方法需要專家憑經(jīng)驗主觀輸入權(quán)重的缺點,并且解決了當(dāng)專家對指標(biāo)間的相對權(quán)重一無所知,無法使用AHP方法得到權(quán)重的情況。相對于經(jīng)典的有序加權(quán)平均算子僅考慮輸入數(shù)據(jù)序的信息,本方法還考慮了數(shù)據(jù)值本身的信息,這使得本方法更加合理。相對于AHP方法需要專家輸入每個指標(biāo)的相對權(quán)重,本方法是數(shù)據(jù)驅(qū)動、無參輸入的,加權(quán)方式更加客觀。此外,文中還用了一個應(yīng)用和一個例子來說明了本方法的有效性。(2)在將設(shè)施平面圖轉(zhuǎn)化為安防網(wǎng)絡(luò)部分,本文改進了原始的僅針對單個目標(biāo)的敵對者序列圖。在現(xiàn)實情況中,一個設(shè)施內(nèi)往往有多個目標(biāo)需要被保護。并且,當(dāng)系統(tǒng)探測到一個入侵者時,有時候我們并不知道他的目標(biāo)具體是哪一個。因此,我們有必要將只針對一個目標(biāo)分析的敵對者序列圖拓展到多個目標(biāo)。同時,在生成安防網(wǎng)絡(luò)邊上的權(quán)重的時候,不同于原始的敵對者序列圖將兩個區(qū)域間的距離設(shè)為默認值,改進的多目標(biāo)序列圖引入了條件因素。這使管理人員可以加入像路徑隱蔽性等這類其他因素,使模型的建立更加靈活。此外,因為系統(tǒng)中有多個目標(biāo),所以我們改進了原始的變形蟲算法,使之能解決單源多匯的問題,避免了多次運行最短路徑算法求解每個目標(biāo)最薄弱路徑的繁瑣和低效率。(3)在計算每條路徑面臨的風(fēng)險值部分,本文提出了一種將專家的定性評估結(jié)果轉(zhuǎn)化為定量結(jié)果的方法。該方法的主要步驟是首先用三角模糊數(shù)將此類定性的語言變量量化。再用三角模糊數(shù)的距離公式,將多個專家的評估結(jié)果聚合,得到每個目標(biāo)以三角模糊數(shù)形式表示的綜合評價值。最后利用逼近最優(yōu)解的偏好順序法得到每個模式失效的后果嚴(yán)重程度的排序值,最終得到了一個清晰的值。該方法的主要優(yōu)點是比已有的方法更加簡單。并且,本文還用了一個例子來說明了本方法的有效性。
[Abstract]:Key infrastructure is the root of a country. Key infrastructure refers to any system or facilities that play an important role in national security and operation systems. They include not only electricity and water treatment plants, but also a wide range of industries and facilities such as chemical, financial services, and information technology. In recent years, the continuing turbulence in the international community, especially the human factors such as terrorism, poses a great threat to the security system of key infrastructure. This has forced us to pay more attention to the maintenance and construction of the related security system. How to estimate its effectiveness, how to judge whether there are loopholes in the system, which is more critical, and so on. It all requires us to put forward a reasonable and objective method to model a security system and analyze its effectiveness, vulnerability and risk. In this paper, the failure mode and its impact analysis model are presented in this paper. The main flow of this paper is to transform the plane map of a key infrastructure into a security network first, and then use the risk entropy method to calculate the prevention efficiency of each node in the network. The security effectiveness of the point is transformed into the weight of the side in the security network. Then the shortest path to each target is calculated with the improved amoeba algorithm. These shortest paths are the weakest paths in all paths to a target. Finally, we use the failure mode and its impact analysis model to calculate each path. In this evaluation process, the main contribution of this paper is three points: (1) in evaluating the protection effectiveness part of the security node, different from the majority of the documents using the AHP method to determine the weight of each index, this paper proposes an ordered view weighted mean operator. To the weight of each index, the method overcomes the disadvantage that the AHP method requires the expert to enter the weight with the experience subjective input weight, and solves the situation that the expert can not use the AHP method to get the weight when the expert knows nothing about the relative weight between the indexes. Considering the information of the data value itself, this makes the method more reasonable. Relative to the AHP method, the relative weight of each index is required by experts. This method is data driven, no input, and the weighting method is more objective. In addition, an application and an example are used to illustrate the effectiveness of the method. (2) in the facility plan As part of the security network section, this article improves the original sequence diagram of an opponent for a single target. In reality, there are often multiple targets in a facility that need to be protected. And, when the system detects an intruder, sometimes we do not know what the target is. The sequence diagram of a target analysis is extended to multiple targets. At the same time, when the weight of the security network side is generated, the distance between the two regions is set as the default, and the improved multi target sequence diagram introduces the condition factors. This makes the manager join the path concealment. Other factors make the model more flexible. In addition, because there are multiple targets in the system, we have improved the original amoeba algorithm to solve the problem of single source and multiple sinks and avoid the complexity and low efficiency of the shortest path algorithm to solve the weakest path of each target. (3) calculating the wind faced by each path. The main step of this method is to quantify the qualitative language variables by trigonometric fuzzy numbers, and then use the distance formula of triangular fuzzy numbers to aggregate the evaluation results of several experts, and get each target in the form of triangular fuzzy numbers. Finally, a clear value is obtained by using the preference order method of approximating the optimal solution to the seriousness of the severity of the consequences of each pattern. The main advantage of this method is more simple than the existing method. Furthermore, a case is used to illustrate the effectiveness of the method.
【學(xué)位授予單位】:西南大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP301.6;D631.4
【相似文獻】
相關(guān)期刊論文 前10條
1 莊禮壽;安全防范系統(tǒng)工程的設(shè)計與實施[J];警察技術(shù);2000年03期
2 陳志華;;安全防范系統(tǒng)建設(shè)與運用過程中的效能評估[J];中國人民公安大學(xué)學(xué)報(自然科學(xué)版);2008年01期
3 邵永壽;;淺談安全防范系統(tǒng)(工程)的作用[J];中國安防;2009年07期
4 陳志華;;試論安全防范系統(tǒng)的效能評估[J];中國人民公安大學(xué)學(xué)報(自然科學(xué)版);2006年04期
5 史有;淺析銀行安全防范系統(tǒng)工程的初步設(shè)計與方案論證[J];農(nóng)村金融與市場經(jīng)濟;2000年03期
6 程裕沛;關(guān)于構(gòu)建現(xiàn)代化社區(qū)監(jiān)控安全防范系統(tǒng)的思考[J];上海公安高等專科學(xué)校學(xué)報;2004年03期
7 李秀林;李輝;;《安全防范系統(tǒng)運行檢驗規(guī)范》淺析[J];中國安防;2012年Z1期
8 張偉;;中國人民公安大學(xué)警務(wù)實訓(xùn)中心對安全防范系統(tǒng)的啟示[J];中國安防;2008年Z1期
9 查金豆;;論事業(yè)單位公共安全防范系統(tǒng)的現(xiàn)狀及建設(shè)方向[J];信息通信;2014年03期
10 ;洛陽規(guī)定新建筑物必須安裝安全防范系統(tǒng)[J];中國公共安全(綜合版);2008年03期
相關(guān)會議論文 前5條
1 何進波;;對高校二級安全防范系統(tǒng)的研究[A];北京市高教學(xué)會保衛(wèi)學(xué)研究會第十屆學(xué)術(shù)年會論文選集[C];2007年
2 唐穎;;安防系統(tǒng)檢測中常見問題的解決[A];江蘇省計量測試學(xué)術(shù)論文集[C];2007年
3 朱小枋;;安全防范系統(tǒng)在天津奧林匹克中心體育場中的應(yīng)用[A];第十九屆中國(天津)'2005IT、網(wǎng)絡(luò)、信息技術(shù)、電子、儀器儀表創(chuàng)新學(xué)術(shù)會議論文集[C];2005年
4 田紅艷;賈志詮;;ATM自助銀行安全防范系統(tǒng)的論述[A];第二十二屆中國(天津)'2008IT、網(wǎng)絡(luò)、信息技術(shù)、電子、儀器儀表創(chuàng)新學(xué)術(shù)會議論文集[C];2008年
5 王福邦;;校園安全防范系統(tǒng)設(shè)計方案[A];第十八屆中國(天津)’2004IT、網(wǎng)絡(luò)、信息技術(shù)、電子、儀器儀表創(chuàng)新學(xué)術(shù)會議論文集[C];2004年
相關(guān)重要報紙文章 前10條
1 劉羊e,
本文編號:2013385
本文鏈接:http://sikaile.net/falvlunwen/fanzuizhian/2013385.html