期刊文献+

基于信息流的网络化C4ISR系统结构抗毁性分析方法 被引量:14

Information flow based survivability assessment method for networked C4ISR system structure
下载PDF
导出
摘要 网络化C4ISR系统规模庞大、结构复杂,系统结构成为影响网络化C4ISR系统各种特性的主要因素,特别是结构与系统抗毁性之间存在直接的因果关系。本文在分析系统结构抗毁性概念的基础上,首先提出了网络化C4ISR系统结构信息流模型;然后基于该模型提出了基于信息流的系统结构抗毁性分析方法;包括不完全信息下系统结构的攻击模型、系统完成任务能力的度量方法以及抗毁性指标计算方法;最后通过对区域联合防空指挥信息系统结构抗毁性仿真实验分析,验证了该方法的有效性。 Due to the increasing size and complexity of the networked C4ISR system,system structure has become the main factor of every kind of system characteristic,especially survivability.The definition of net-worked C4ISR system structure survivability is analyzed.On the basis of the definition,an information flow model of system structure is proposed.Then the survivability assessment method based on the model is put for-ward as well.It includes attacking models under incomplete information,the means of measuring the system ability to fulfill missions,and the algorithm of assessing system structure survivability.Finally,the method is proved effective by simulating and assessing survivability of different area joint air-defense system structures.
出处 《系统工程与电子技术》 EI CSCD 北大核心 2014年第8期1544-1550,共7页 Systems Engineering and Electronics
基金 总装预研基金项目(513060204 51306010201)资助课题
关键词 网络化C4ISR系统 信息流 系统结构 抗毁性分析 networked C4ISR system information flow system architecture survivability assessment
  • 相关文献

参考文献15

  • 1Defense Science Board. Resilient military systems and the ad- vanced cyber threat[R]. Washington, D C: Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, 2013.
  • 2Hassell S, Beraud P, Cruz A, et al. Evaluating network cyber resiliency methods using cyber threat, vulnerability and defense modeling and simulation[C]//Proc, of the Military Communi cations Conference, 2012 : 1 - 6.
  • 3Leblanc S P, Partington A, Chapman I, et al. An overview of cyber attack and computer network operations simulation[C]// Proc. of the Military Modeling & Simulation Symposium, 2011: 92-100.
  • 4EomJ H, Han YJ, ParkSH, et al. Activeeyber attack model for network system' s vulnerability assessment[C]//InJbrma- tion Science and Security, 2008:153 - 158.
  • 5蓝羽石,易侃,王珩,毛少杰,雷鸣.网络化C^4ISR系统结构时效性分析方法[J].系统工程与电子技术,2013,35(9):1908-1914. 被引量:33
  • 6Jeong H, Albert R, Barabasi A L. Error and attack tolerance ofcomplex networks[J]. Nature, 2000, 406(6) : 378- 382.
  • 7Beom J K, Petter H. Attack vulnerability of complex networks[J]. Physical Review, 2002,65(5) : 21 - 36.
  • 8Goyal S, Adrien V. Robust networks[EB/OL].[2013 -02 - 20] http://www, econ. cam. ac. uk/faculty/goyal/wp10/robustnet- works55, pdf.
  • 9Lashon B, Booker. The effects of observation errors on the at tack vulnerability of complex networks[EB/OL]. [2013 - 01 - 30] http://www, mitre, org/ work/tech papers/2012/12 4652/.
  • 10Dekker A. Simulating network robustness: two perspectives on reaIity[C]// Proc. of the Simulation Technology and Training Conference, 2004:126 - 131.

二级参考文献29

共引文献81

同被引文献161

引证文献14

二级引证文献87

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部