Font Size: a A A

Research On Key Technologies Of Vulnerability Assessment Of Physical Protection System

Posted on:2022-02-12Degree:MasterType:Thesis
Country:ChinaCandidate:L F LeiFull Text:PDF
GTID:2518306554450624Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Critical facilities and key assets face high security risks,and if they are illegally invaded,they may cause serious consequences.The vulnerability assessment of the physical protection system is to verify the protection performance of the protection system and identify the vulnerabilities of the protection system,so as to ensure the safety of the protection target.The assessment methods of physical protection systems are generally divided into two categories:qualitative analysis and quantitative analysis.Qualitative analysis is mainly based on functional tests and related specifications for expert scoring and evaluation,while quantitative analysis requires a rigorous large number of experiments to determine the effectiveness of each component of the system.The cost of quantitative analysis is higher than that of qualitative analysis.Users can choose to perform qualitative or quantitative analysis on the protection system according to actual needs.This paper studies the above two analysis methods separately,and the research content includes:(1)Aiming at the problem that the existing qualitative assessment methods can only determine the evaluation results of the system,but cannot find the vulnerabilities of the system,a fuzzy assessment of physical protection pystem(FAPPS)based on fuzzy comprehensive evaluation is proposed.This method firstly uses fuzzy comprehensive evaluation based on the analytic hierarchy process to establish the fuzzy numerical function of the evaluation result on the fuzzy factor set,and then uses the hausdorff distance to define a fuzzy differential calculation method.Finally,this method is used to calculate the fuzzy partial derivative of the evaluation function on each fuzzy factor set,and the factor set with the largest partial derivative is obtained,which is the fragile point of the system.In the vulnerability assessment of an integrated security monitoring system,the FAPPS used in this paper can more accurately find the vulnerabilities of the system than other methods,and the effectiveness of the vulnerability assessment results of FAPPS is 3 to 12 times higher than other methods.(2)In view of the lack of timeliness and effective countermeasures in the multi-path analysis of physical protection(MAPPS)method for physical protection systems,a dynamic vulnerability assessment method physical protection system(DAPPS)based on the EASI(Estimation of Adversary Sequence Interruption)model is proposed.This method takes into account the influence of internal and external factors on the protection performance of the physical protection system,and dynamically calculates the weakest path of the protection system and its interception probability according to the changes in the internal and external environment monitored by the system.When the interception probability of the protection system is lower than a given threshold,the system will automatically take one or more temporary measures.These measures can increase the probability of detection or delay time,so that the probability of interception is always higher than a given threshold,and the system's protection performance can always meet the requirements.By evaluating and calculating on the scenes and data disclosed by the Institute of the International Atomic Energy Agency,when the external environment changes,the DAPPS method used in this paper improves the protection performance provided by the MAPPS method by 5 to 25 percentage points.(3)The vulnerability assessment software platform of the physical protection system developed in this paper using the above two algorithms allows users to quickly and accurately evaluate the vulnerability of the protection system,providing an effective reference for the design,evaluation and improvement of the physical protection system.
Keywords/Search Tags:Physical protection system, Vulnerability assessment, Fuzzy comprehensive evaluation, Derivative of fuzzy equation, EASI model
PDF Full Text Request
Related items