System vulnerability discovery method and system based on topology transfer relation

A technology of transitive relationship and discovery method, which is applied in the system vulnerability discovery method and system field based on topological transitive relations, which can solve problems such as difficult models, difficult to describe the depth and breadth of chain collapse, and large investment

Active Publication Date: 2018-10-16
THE QUARTERMASTER RES INST OF THE GENERAL LOGISTICS DEPT OF THE CPLA
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The research on cascading collapse behavior in traditional systems engineering theory does not reflect the remarkable characteristics of the system consisting of heterogeneous independent systems and loosely coupled integration. The collapse of many nodes cannot easily spread to associated nodes, which is not suitable for sand Heap theory, avalanche effect and other traditional methods are used to analyze
A series of analysis methods based on the static structure of the system, such as node degree and critical path, are usually limited to the local structure of the system, and the overall characteristics of the system are not well grasped. It is especially difficult to describe the depth and breadth of chain collapse, and it is not easy to describe the loosely coupled relationship of the system.
The difficulty of the model-based simulation method lies in the accuracy of modeling and abstraction. It needs to combine more background knowledge. The process is relatively complicated, and it is prone to problems such as the model is too complicated to model or too simple to omit key factors, and it takes a long time. Time and large investment, often limited in applicability and confidence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System vulnerability discovery method and system based on topology transfer relation
  • System vulnerability discovery method and system based on topology transfer relation
  • System vulnerability discovery method and system based on topology transfer relation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The following will take a typical guarantee system as an example to further describe in detail the system vulnerability discovery method based on the topology transitive relationship of the present invention. Guarantee work involves deployment, management, communication, maintenance, and material supply. Material supply may include various types of fuel, equipment, and supplies. Each component system performs its own duties to ensure the effective operation of the entire system. Each component system has a certain level of management relationship. Due to the existence of the support relationship, there are some intersecting loops in the system, forming a complex system relationship. A huge security system usually involves tens of thousands of nodes, and it is not easy to find the weak links in it.

[0060] like figure 1 and figure 2 As shown, the implementation steps of the system vulnerability discovery method based on the topology transitive relationship in this em...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system vulnerability discovery method and system based on a topology transfer relation. According to a relationship map of the number of nodes and a structure description system, simplification is conducted to form a vulnerability association map; according to a physical relation between the system nodes in the system, the transfer strength and probability of crash behaviors between the nodes are analyzed, some weak transfer relations are ignored, and a transfer relation matrix of the crash behaviors of the system is calculated; on the basis of the transfer relation matrix, key index vectors of the system are calculated; tightness indexes of an original system map are used for correcting the key indicator vectors of the system; on the basis of the key indicator vectors, hierarchical clustering and conclusion analysis are conducted on the system. The idea of combining the topology transfer relation, the coupling strength and a local structure is fully utilized,the depth and breadth of influence of key resources on the system can be fully reflected, and weak links of the system can be quickly found out.

Description

technical field [0001] The invention relates to the fields of system engineering vulnerability discovery, system importance evaluation and the like, in particular to a system vulnerability discovery method and system based on topological transfer relations. Background technique [0002] "System of Systems" refers to a large-scale system collection formed by the integration of multiple heterogeneous systems that can operate independently to accomplish specific goals. With the development of technology, the scale of the system is getting larger and larger, and more complex systems have emerged after integration on the scale of the system, which can cooperate to complete large-scale tasks that cannot be completed by individual systems. System Engineering (System of Systems Engineering) ) related theories have been widely used in aerospace, medical and health, environmental governance, weaponry and other fields. How to maximize the overall effectiveness of the system by optimizi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62
CPCG06F18/231G06F18/2415
Inventor 孙晓张静朱浩洋孙敏何焱
Owner THE QUARTERMASTER RES INST OF THE GENERAL LOGISTICS DEPT OF THE CPLA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products