Font Size: a A A

Research On Exploratory Evaluation Method Of Information System Security Protection Capability

Posted on:2018-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:Q J ChenFull Text:PDF
GTID:2348330563951202Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
The evaluation of military information system security protection capability is an effective way to improve the advantage of its defense terminal.Aiming at the problems that the current evaluation methods of the protection capability can not give a macro understanding of the problems given by a large number of uncertain factors,and can not give specific suggestions through the macro understanding of the problem,an exploratory evaluation method of information system security protection capability is put forward by introducing the exploratory analysis to improve the defense terminal advantage of military information system.And the main tasks are as follows.1.In view of the present situation that there is no universally applicable theoretical system and methodology framework for the exploratory evaluation of the protection capability,an exploratory evaluation framework for protection capability is designed by introducing the exploratory analysis,the related elements in the framework are also discussed,and the main problems to be solved in the exploratory evaluation are defined based on the analysis of the existing problems in the evaluation of protection capability.The design of exploratory evaluation framework can provide the clear ideas and methods for further research.2.Aiming at the needs that the analysis modeling is easy to use and can be extended and analyzed,the DAR analysis framework,the analysis framework of exception response and the conceptual framework of emergence analysis are presented based on the exploratory evaluation framework,and the DAR function module model,exception response analysis model,and emergence analysis model are constructed by using CPN.It provides the model resource and simulation analysis method for the subsequent exploratory evaluation of protection capability.3.Aiming at the needs of agility,traceability,and explanation for exploratory evaluation,the principle and process of exploratory evaluation of protection capability are presented from the analysis of the uncertainty of protection capability.Then the factor space and the domain space in different granularity levels are constructed by using granular computing theory,and an exploratory evaluation scheme based on granular computing is proposed.It provides the theoretical support and feasible scheme for the follow-up evaluation of protection capability.4.The exploratory factors acquisition,exploratory space construction and result space acquisition technologies in exploratory evaluation scheme are studied.Firstly,aiming at the problems of exploratory space explosion and exploratory space description,the exploratory factor is obtained by using the branch and bound method,and the specification is given.Then,in order to meet the needs of both the coverage of all the scenes and the efficient exploration efficiency,the method of exploratory space construction is proposed by using the experimental design theory.Thirdly,aiming at the problem of measuring the protection capability,a measurement model based on risk entropy is proposed,and aiming at the problem of obtaining the evaluation value of protection capability,the risk entropy calculation method of exploratory factor based on simulation and the evaluation model based on state classification are proposed.The research of the three key technologies provides the method support and technical guarantee for the exploratory evaluation of protection capability.On the basis of the above research,a military information system is taken as an example,and the proposed method applied to modeling and evaluation process are analyzed.The results show that the proposed method can provide the reference basis for improvement of the defense terminal advantage,and has a certain value in military application.
Keywords/Search Tags:information system security protection capability, exploratory evaluation, exploratory analysis, Colored Petri-Net, granular computing
PDF Full Text Request
Related items