Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network N-1 security-region-boundary calculation and security evaluation method

A security evaluation and network security technology, which is applied in the field of N-1 security domain boundary calculation and security evaluation of the network, can solve the problems of large amount of calculation, inconvenient security control, and does not meet real-time online requirements, so as to improve system efficiency. , control and plan intuitive effects

Inactive Publication Date: 2014-02-26
TIANJIN UNIV
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The existing invulnerability research methods, whether simulation or analytical [1] They all focus on using a numerical value to measure the reliability of the network, and have the following defects: 1) Calculation amount and speed: simulation of each operating point and each component, the calculation amount is large, time-consuming, and does not meet the needs of real-time online; 2 ) security control: not intuitive enough, inconvenient for real-time security control
3) The effect and accuracy of safety evaluation: it can only provide binary information on safety or unsafety or the averaged overall safety index value, and the information is less; it can only be judged from a part, and cannot fully reflect the overall safety margin. Distinguishes the different network states during safe operation, so capacity allocation planning and security evaluation cannot be accurately performed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network N-1 security-region-boundary calculation and security evaluation method
  • Network N-1 security-region-boundary calculation and security evaluation method
  • Network N-1 security-region-boundary calculation and security evaluation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0043] The present invention proposes a general network-oriented security domain method, whose starting point is different from invulnerability: the method can pre-calculate the security boundary after the network topology structure is given to describe the area where the system as a whole can operate safely [2] . Using the safety domain method, for any given work point, it is possible to quickly judge whether it is safe by calculating the distance from the work point to the safety boundary, that is, the position of the work point in the safety domain, and allow the operator to obtain the overall safety measure of the system, so as to Deciding whether to implement preventive controls and the direction and intensity of controls [2] . ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network N-1 security-region-boundary calculation and security evaluation method and relates to the field of analysis of network security. The method includes: defining network operation work points, network N-1 security and network security regions. The method is a security evaluation method based on the security regions. The security evaluation method based on the security regions is capable of judging the security of a system rapidly without simulating N-1 events one by one and giving measurement of the security. The network N-1 security-region-boundary calculation and security evaluation method is widely applicable to undirected authorized networks such as power grids and communication networks and the like. The general security-region method which is applicable to general networks provides a basis for adjustment of work points and planning of topology and capacity when the general networks are subjected to random attacks. It is found that in the security-region method, a security-distance calculation result is highly identical with an anti-destroying-ability calculation result so that correctness of the security-domain method in security measurement is proved.

Description

technical field [0001] The invention relates to the field of network security analysis, in particular to a network N-1 security domain boundary calculation and security evaluation method. Background technique [0002] Safety, reliability and efficiency are the goals pursued by the system. Whether it is a computer network, power network, urban traffic network, communication network or cell metabolism system, it is necessary to maintain normal operation through redundant paths when some components fail. Therefore, security and reliability require the network to have a certain ability to complete specified functions even when some components fail due to external random disturbances or malicious attacks. Invulnerability is a typical method to evaluate this capability, which has been widely studied and applied in recent years. [0003] As an important indicator of network reliability, invulnerability research began on strategic communication networks, and after Albert's paper i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 肖峻王成山苏步芸
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products