Software architecture security evaluation method based on theory of evidence combination

A technology of software architecture and architecture, applied to systems based on fuzzy logic, based on specific mathematical models, electrical components, etc., can solve problems such as difficult software dynamic security assessment

Active Publication Date: 2017-05-10
BEIHANG UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] In order to solve the problem that the traditional software system is difficult to use the software architecture to perform dynamic security assessment on the software when the traditional software system is working in the design and modeling phase, the present invention proposes a software architecture security assessment method based on evidence synthesis theory;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software architecture security evaluation method based on theory of evidence combination
  • Software architecture security evaluation method based on theory of evidence combination
  • Software architecture security evaluation method based on theory of evidence combination

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0178] Taking a flight control system as an example, the architecture model is as follows: Figure 5 As shown, among them, "flight control console" Operating) is the man-machine interface of the flight control system, which has the function of setting the working state of the system by the driver and indicating the working state of the system. The system is composed of stability augmentation / control stability augmentation subsystems (pcs, lcs), automatic flight subsystem (ap_manage) and automatic trim subsystem (pap), and the stability augmentation / control stability augmentation subsystem is a three-redundant configuration (rm); At the same time, the system also has a line control subsystem, mainly the flight status selector (CDS); and several main modules of the system bit.

[0179] Step 1. For a certain software system, use modules to construct the architecture model of the software system;

[0180] In the present invention, the above several modules are regarded as the com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software architecture security evaluation method based on the theory of evidence combination and belongs to the technical field of software security evaluation. The method comprises: firstly constructing the architecture model of a certain software system, performing fuzzy mathematic expression on security elements relating to components; obtaining the transition probability of the components and the transition probability of a running path in the whole system by using a software architecture analysis method; performing security combination on the components by using the Dempster-Shafer (D-S) theory of evidence combination and in combination with the using weight of the software running path to obtain the security level evaluation result of each component, thereby calculating the security level evaluation result of the running path and the security level evaluation result of the system. The method realizes dynamic security analysis and evaluation of the software system by using the bottom-up software engineering analysis method.

Description

technical field [0001] The invention belongs to the technical field of software safety evaluation, and relates to a software system structure safety evaluation method based on evidence synthesis theory. Background technique [0002] In recent years, with the development of computer technology more and more widely, software has been widely used in safety-critical systems in the field of avionics. More and more functions are transferred to software to replace mechanical systems, so software is becoming more and more complex, resulting in high requirements for safety. For a long time, due to the failure of safety-critical system software, the loss of life and property, and even serious disasters have been caused, and environmental cases have emerged in an endless stream. According to the traditional software security assessment method, the software security assessment is carried out in the later stage of software analysis. If there is a problem in the software security demonst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06N7/00G06N7/02
CPCG06N7/02G06N7/01
Inventor 凌冬怡王世海刘斌
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products