Font Size: a A A

Data Link Communications Security Risk Assessment Model

Posted on:2014-01-22Degree:MasterType:Thesis
Country:ChinaCandidate:W LiFull Text:PDF
GTID:2248330395982566Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years, due to the rapid development of military information technology, the development of the data link is also growing fast. The security issues of the data link are particularly important because it is mainly used in the exchange of information on the battlefield. In addition, because the data link is often subject to threats and attacks of the enemy everywhere, there is a great risk in the communication security. The security risk assessment is the important technology in the defense of the communication security, so the security of the communication of the data link is guaranteed by the security risk assessment of the data link.The data link security risk assessment not only identifies the size of the security risks that may exist, but also can assess the harm and loss what the risk assessment information bring up. Through the security risk assessment, on the one hand we can accurately and integrally understand the security of the data link and security environment of it has been. It is useful to help the data link to take appropriate security measures to ensure the security risk can be controlled within the mobile scope, so the data link run in safety and effectively. On the other hand, through ongoing security risk assessment, the data link can help detect the ability of system security measures and the protection against security risks.According to risk assessment theories and risk security evaluation criteria, we give the quantitative risk calculation model. Based on the security situation of data link and the facing security threats, we propose Grey comprehensive evaluation method and the Bayesian network to assess the risk of the data link. We use the AHP method to establish the evaluation index system, and determine the index weight. Through the analysis on the gray system theory, we put forward the Grey comprehensive evaluation method and steps, and calculated risk value of the data link system. Then, according to Markov prediction model, we give the risk predictive value at some point in the future.We construct the bayesian network, and calculate the probability of occurrence of the risk factors. And then, we use the D-S evidence theory to fuse the data, and calculate the final probability of risk. In the end, we use the network simulation tool named OPNET to simulate the data link, and apply these methods to give the final results of the evaluation.
Keywords/Search Tags:Data link, security risk assessment, fuzzy analytjc hierarchy process, Greycomprehensive evaluation, Bayesian network
PDF Full Text Request
Related items