A security assessment method for software architecture based on evidence synthesis theory

A software architecture and architecture technology, applied in fuzzy logic-based systems, based on specific mathematical patterns, electrical components, etc., can solve problems such as dynamic security assessment of difficult software

Active Publication Date: 2019-02-15
BEIHANG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] In order to solve the problem that the traditional software system is difficult to use the software architecture to perform dynamic security assessment on the software when the traditional software system is working in the design and modeling phase, the present invention proposes a software architecture security assessment method based on evidence synthesis theory;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security assessment method for software architecture based on evidence synthesis theory
  • A security assessment method for software architecture based on evidence synthesis theory
  • A security assessment method for software architecture based on evidence synthesis theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0178] Taking a flight control system as an example, the architecture model is as follows: Figure 5 As shown, among them, "flight control console" Operating) is the man-machine interface of the flight control system, which has the function of setting the working state of the system by the driver and indicating the working state of the system. The system is composed of stability augmentation / control stability augmentation subsystems (pcs, lcs), automatic flight subsystem (ap_manage) and automatic trim subsystem (pap), and the stability augmentation / control stability augmentation subsystem is a three-redundant configuration (rm); At the same time, the system also has a line control subsystem, mainly the flight status selector (CDS); and several main modules of the system bit.

[0179] Step 1. For a certain software system, use modules to construct the architecture model of the software system;

[0180] In the present invention, the above several modules are regarded as the com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software system structure safety evaluation method based on evidence synthesis theory, which belongs to the technical field of software safety evaluation; firstly, the system structure model of the certain software system is constructed, and the safety elements involved in the components are fuzzy-mathematicalized Then use the software architecture analysis method to obtain the transition probability of the component and the transition probability of the operation path in the whole system, and then use the Dempster-Shafer (D-S) evidence synthesis theory, combined with the use weight of the software operation path, to calculate the components Perform safety synthesis to obtain the safety level evaluation results of each component, thereby calculating the safety level evaluation results of the running path and the system safety level evaluation results; the present invention uses a bottom-up software engineering analysis method to realize the software system Dynamic security analysis and evaluation.

Description

technical field [0001] The invention belongs to the technical field of software safety evaluation, and relates to a software system structure safety evaluation method based on evidence synthesis theory. Background technique [0002] In recent years, with the development of computer technology more and more widely, software has been widely used in safety-critical systems in the field of avionics. More and more functions are transferred to software to replace mechanical systems, so software is becoming more and more complex, resulting in high requirements for safety. For a long time, due to the failure of safety-critical system software, the loss of life and property, and even serious disasters have been caused, and environmental cases have emerged in an endless stream. According to the traditional software security assessment method, the software security assessment is carried out in the later stage of software analysis. If there is a problem in the software security demonst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06N7/00G06N7/02
CPCG06N7/02G06N7/01
Inventor 凌冬怡王世海刘斌
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products