复杂系统的信息脆性风险研究及在网络通信系统中的应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,随着通信网络规模迅速扩大,网络新业务的不断出现、网络拓扑结构的日益复杂化,系统环境的不确定性的增加,网络通信系统的信息脆性问题越来越引起相关专家学者的关注。
     本文以复杂系统作为研究对象,提出脆性同非线性、层次性、涌现性一样,是复杂系统的本质属性,其具体表现为系统在某种条件下的突然崩溃,把系统运行过过程中这种突然崩溃的风险称为脆性风险。本文将复杂系统这种脆性风险分析方法应用到网络通信系统中,对网络通信系统进行脆性风险研究,得出网络通信系统脆性风险分析模型。
     首先,在已建立的复杂系统脆性定义和脆性特点的基础上,将其引申到网络通信系统脆性分析中。复杂系统脆性特点是重点强调崩溃的连锁效应,即由于复杂系统中的某一子系统的崩溃,引发的连锁的崩溃效应,会使整个复杂系统崩溃。由此,以复杂系统脆性定义为基础,对网络通信系统进行脆性分析,根据信息论的信息率失真和信息传输理论可知信息率失真函数以及热力学中熵增大定理有着巧妙联系,在通信系统中建立了脆性测度函数的概念,脆性测度函数反映了信息在通信前后脆性变化情况,对导致通信系统崩溃起着重要作用。
     其次,复杂系统中信息脆性的度量既和系统自身相关,也和系统的外部环境相关。由此从复杂系统脆性风险的内因和外因两方面进行分析,建立复杂系统信息脆性风险模型,且定义和构造了脆性风险熵的概念。脆性风险熵可以衡量系统脆性风险的总体不确定性。复杂系统脆性问题的最大难点在于难以定量研究,本文从传统熵理论出发,分析脆性风险熵的一系列性质,为进一步定量研究复杂系统脆性问题打下基础。
     再次,在网络通信系统的脆性风险分析中由于系统风险的复杂性,存在着诸多不确定的影响因素,建立了基于多级模糊综合评判法的网络通信系统脆性分析模型。用Delphi法辨识出影响通信网络脆性的脆性因子,借助于层次分析法确定网络层次结构中脆性风险影响因素的崩溃系数,同时采用模糊综合评判的方法实现了系统信息脆性风险评价。
     最后,结合系统信息剩余度和信息极限熵的概念,在整个连续时间域上对一个具体通信网络脆性风险过程进行分析。分析结果指出影响通信系统脆性风险大小既和系统脆性状态(环境)关系紧密,又和系统脆性结构关系有关,从而找出相应的策略降低系统脆性风险。结果说明该方法不仅可以量化通信系统的脆性风险,而且为网络通信系统的脆性评估提供了可行性的分析方法。
In recent years, with the rapid expansion of communication network, more and more new network services are provided, the network topology is complicated day by day and the uncertainties of system environment are increasing. The information brittleness of network communication system is being paid more attention to by the experts.
     Based on complex system, the dissertation present that, brittleness is an attribute of complex system, just like non-linearity layer and emitting of complex system. It can be showed by that the system may collapse suddenly, and we name the collapse of a running system brittleness risk. Brittleness risk model of communication system has been carried out, which analysis method of brittleness risk of complex system is applied for the network communication system,
     First, the definition and characters of complex system brittleness is studied. The definition of brittleness is expanded to the field of network communication system characters. Complex system brittleness emphasize on the chain affection of collapse, which means if one of the sub-system of the network communication system collapsed, the whole complex system will collapse like domino. Based on the definition of complex brittleness, network communication system brittleness is discussed. According to this, the theory framework of study on network communication system brittleness is established. From information ratio distortion and information transmission theory, of the information theory it can be found that there are ingenious relationships between information ratio distortion function and entropy accretion theorem of energetic. The definition of brittleness measurement function, which can express the variation of brittleness from beginning of the communicating of information to end, is established in the communication system, and the brittleness has an important effect in the collapse of network communication system.
     Next, measurement of information brittleness in complex system is related with not only the system itself but also the environment outer it. Analyzing from the internal and external cause, the model of complex system brittleness risk is established, and the concept of brittleness risk entropy is defined. Brittleness risk entropy can be used for measuring the uncertainty of the whole system brittleness risk. The most difficult question is to quantitatively determine the components of complex system. In this paper, beginning from the classical entropy theory, a series of characters of brittleness risk entropy are analyzed, which laid a foundation of studying on quantitatively determine the components of complex system brittleness.
     Once more, Because there are many uncertainties factors and complexity of system risk on the analysis brittleness risk of network communication system, analysis model of communication system brittleness is established, based on Multi-layer Fuzzy Comprehensive Evaluation method. Brittleness factors which can be affecting the communication network brittleness are identified through Delphi method. Analytic Hierarchy Process (AHP) method is applied to determining the collapse coefficients of brittleness risk affecting factors in hierarchy model, and Fuzzy Comprehensive Evaluation (FCE) measuring brittleness risk of system.
     Finally, we make an analysis to a practicality of communication network system, according to the concept of information surplus degree and the maximum entropy. Thus we make the measure to drop brittleness risk of system, by the result of application that brittleness risk size of system can been affected by brittleness status and brittleness structure. This result can be concluded that these methods can not only be used for quantifying the brittleness risk of network communication system, but also providing a workable way of evaluating brittleness risk of it effectively.
引文
[1]李夏,戴汝为.系统科学与复杂性.自动化学报.1998,24(2):200-207页
    [2]维纳.控制论.郝季仁译.北京:科学出版社,1963:1-10页
    [3]钱学森,宋健.工程控制论(修订版).北京:科学出版社,1980:2-8页
    [4]尼科里斯,普里高津.探索复杂性.罗久里,陈奎宁译.成都:四川教育出版社,1986:1-23页
    [5]哈肯.高等协同学.郭治安译.北京:科学出版社,1989:1-20页
    [6]苗东升.复杂性研究的现状与展望.系统辩证学学报.2001,9(4):3-9页
    [7]P.W.爱特金著,李思一译.从有序到到混浊——介绍热力学第二定律.北京:科学技术出版社,1990年:1-20页
    [8]Ang,A.H.S.Pires,.J.A.A model for the seismic reliability assessment of electric power transmission systems.Reliability Engineering &system safety.1996,51(1):7-22P
    [9]赵光武.深入探索复杂性.系统辩证学学报.2001,9(4):1-2页
    [10]钱学森,于景元,戴汝为.一个科学的新领域——开放的复杂巨系统及其方法论.自然杂志.1990,13(3):3-10页
    [11]贝塔朗菲.一般系统论——基础、发展、应用.秋同,袁嘉新译.北京:社会科学文献出版社.1987:25-32页
    [12]Auyang,S.Y.Foundations of Complex-System Theories in Economics,Evolutionary Biology,and Statistical Physics.Cambridge University Press,New York,1998:404P
    [13]吴彤.科学哲学视野中的客观复杂性.系统辩证学学报.2001,9(4):44-47页
    [14]魏纪林,陈传德,彭攀,郭枫.我国新世纪发展的系统观.系统辩证学学报.2001,9(4):65-68页
    [15]周秋蓉.对耗散结构理论的思考.重庆师范学院学报.1995,12(2): 20-23页
    [16]何健中.耗散结构与协同学简介.气象教育与科技.1993,(1):20-24页
    [17]戴汝为,操龙:兵.一个开放的复杂巨系统.系统工程学报.2001,16(5):76-81页
    [18]Holland,J.H.Hidden Order:How Adaptation Builds Complexity.Perseus Books,Reading,Massachusetts,1995:185P
    [19]Holland,J.H.Emergence:From Class to Order.Helix Books,Reading,Massachusetts,1998:258P
    [20]庞涛.网络时代的社会变迁.中国信息导报,2000(2),13-19页
    [21]宗贵升.Internet经济的九大规律.中国科技信息.2001,3-4合刊.112-134页
    [22]中国互联网络信息中心.中国互联网络发展状况统计报告(1-9).1997.10-2002.1:208-238页
    [23]庄育飞,邓昭俊.我国Internet用户现状统计分析.中国信息导报,1999(4),150-180页
    [24]中国互联网络信息中心.我国互联网络发展的统计分析.中国信息导报.2003(2):128-134页
    [25]David F.Ferraiolo,John F.BarNey and D.Richard Kuhn.A role based access control model and reference implementation within a corporate intranet[J].ACM Transactions on Information System Security,February 1999,2(1):34-64P
    [26]John Mclean.Security Models and Information Flow[A].Proceedings of the IEEE Symposium on Security and Privacy[C].Oakland,California,IEEE Computer Society Press,1990,180-187P
    [27]Andrew C.Myers Barbara Liskov.A Decentralized model for Information Flow Control[A]Proceedings of the 16~(th) ACM Symposium on Operating Systems Principles[C].Saint-Malo,France:October 1997,129-142P
    [28]刘芳,戴葵,王志英,吴丹.信息系统安全性评估研究综述.计算机工 程与科学.2004,26(10):19-22页
    [29]肖龙,戴宗坤.信息系统资源分布模型[J].四川大学学报(自然科学版),2004,41(3):560-564页
    [30]Carl E.Landwehr,Constance L.Heitmeyer and John D.Mclean.A security model for military message systems[J].ACM Trans,Comput,Syst,1984,2(3):198-222P
    [31]Ravi S.Sandhu.Lattice-based access control models[J].IEEE Computer,November 1993,26(11):9-19P
    [32]Jonathan Moffett,Morris Sloman and Kevin Twidle.Specifying discretionary access control policy for distributed systems[J].Computer Communication.1990,13(9):571-580P
    [33]Tatyana Ryutov and Clifford Neuman.Representation and Evaluation of Security Policies for Distributed System Services[A].DARPA Information Survivability Conference and Exposition[C].Hilton Head Island,SC,2000:172-183P
    [34]C Bidan,V Issarny.Dealing with Multi-Policy Security in large Open Distributed Systems[A].In Proceedings of 5th European Symposium on Research in Computer Security[C].Louvain-La-Neuve Belgium,September 1998:51-66P
    [35]王祯学,戴宗坤,肖龙,王标.信息系统风险评估的数学方法.四川大学学报(自然科学版)2004,41(5):991-994页
    [36]胡勇,漆刚,陈麟,杨炜.信息系统风险量化评估指标体系.四川大学学报(自然科学版).2006,43(5)1048-1052页
    [37]方勇,刘嘉勇.信息系统安全导论[M].北京:电子工业出版社,2003.56-67页
    [38]肖龙,戴宗坤,杨炜.基于VPRS的信息系统风险分析.计算机应用.2005,25(7):1595-1597页
    [39]徐培德,刘明亮,董献洲.基于PRA方法的风险分析系统设计.武汉理工大学学报(信息与管理工程版).2003,25(3):134-137页
    [40]李守鹏,孙红波.信息系统安全模型研究.电子学报.2003,31(10):1491-1495页
    [41]覃爱明,符生寅,谭惠民.无线网络中的攻击检测技术研究[J].计算机工程,2002,28(8):50-52页
    [42]胡勇,方勇,肖龙等.信息系统风险分析的工程方法研究.计算机工程.2006,32(13):29-31页
    [43]汪楚娇,陆鑫炎,王拓,管晓宏.基于网络安全层次化的风险评估系统.计算机工程.2004,30(17):109-111页
    [44]宋如顺.信息系统安全风险综合分析方法[J].计算机工程.2000(12):45-48页
    [45]Reese,Ronald M.Calvano,Charles N.Hopkins,Th.Operationally oriented vulnerability requirements in the ship design process.Naval Engineers Journal.1998,110(1):19-34P
    [46]Soutter,Marc Musy,Andre.Coupling 1D Monte-Carlo simulations and geostatistics to assess groundwater vulnerability to pesticide contamination on a regional scale.Journel of Contaminant Hydrology.1998,32(1-2):25-29P
    [47]Rennaker,P.R,Richardson,S.New approach to vulnerability assessment.Journal of the American Helicoper Society.1999,44(1):38-41P
    [48]Lind,Niels C.Measure of vulnerability and damage tolerance.Reliability Engineering & System Safety.1995,48(1):1-6P
    [49]B.Bollobas,O.Riordan.Robustness and Vulnerability of Scale-free Random graphs.Internet Math.,2003,1:1-35P
    [50]WEI Qi,JIN Hongzhang,JI Ming.THE RESEARCH ON BRITTLE CATASTROPHE OF COMPLEX GIANT SYSTEM.IEEE Region 10Technical Conference on Computers,Communications,Control and Power Engineering(TENCON'02) October 28-31,2002 Beijing,CHINA
    [51]WEI Qi,JIN Hongzhang,GUO Jian,JI Ming.ANALYSIS ON THE COLLAPSE OF COMPLEX SYSTEM BASED ON THE BRITTLE CHARACTERISTIC.2002 International Symposium on Nonlinear Theory and its Applications(NOLTA 2002),October 7-11,2002
    [52]韦琦,金鸿章,姚绪梁,郭健.基于脆性的复杂系统崩溃的研究.哈尔滨工程大学学报.2003,24(2):161-165页
    [53]Qi Wei,Hongzhang Jin,Jin Guo.RESERCH ON THE COMPLEX SYSTEM BASED ON THE BRITTLE CHARACTERISTIC,Annual Conference of the Society of Instrument and Control Engineers.(SICE2003),2003,August4-6,Fukui,Japan
    [54]韦琦,金鸿章,郭健.复杂系统崩溃的脆性致因的研究.系统工程,2003,21(4):1-5页
    [55]孙庆荣,韩传峰,陈建业等.基于FAHP的黄河中下游灾害系统脆性评价.自然灾害学报.2005,14(3):105-109页
    [56]钟波,谢挺.供应链系统的脆性模型研究.中国管理科学.2005,13(10):443-446页
    [57]韦琦,金鸿章,郭健,基于脆性联系熵的复杂系统崩溃致因研究.自动化技术与应用.2003,22(4):1-4页
    [58]金鸿章,林德明,韦琦.基于复杂系统脆性的传染病扩散研究.系统工程,2004,22(10):39-42页
    [59]荣盘祥,金鸿章,韦琦,阎丽梅.基于脆性联系熵的复杂系统特性的研究.电机与控制学报.2005,9(2):111-115页
    [60]荣盘祥,金鸿章,韦琦.复杂系统的脆性与系统演化分析.电机与控制学报.2005,9(3):231-235页
    [61]Yan Limei,Jin Hong-zhang,Rong Panxiang.Brittleness Analysis of Electric Network.Dynamics of Continuous Discrete and Impulsive System-Seriesb-Applications&Algorithms.2005,71-77P
    [62]张江,应俊,王琼等.基于FAHP的电力变压器系统的脆性分析.自动化技术与应用.2004,23(7):9-12页
    [63]荣盘祥,金鸿章,韦琦.基于元胞自动机的复杂系统脆性的研究.哈尔滨工程大学学报.2006,27(2):227-231页
    [64]袁坚,任勇,山秀明.一种计算机网络的元胞自动机模型及分析.物理学 报.2000,49(3):398-402页
    [65]Qi Wei,Hongzhang Jin,Jin Guo.STUDY ON COMPLEX SYSTEM BASED ON THE BRITTLENESS.2003 IEEE International Conference on Systems,Man and Cybemetics(SMC2003),October5-8;2003,Hyatt Regency,Washington,D.C.,USA
    [66]郭健,金鸿章,韦琦.基于脆性势函数对复杂系统的脆性分析.自动化技术与应用,2003,22(7):51-57页
    [67]金鸿章,郭健,韦琦.基于尖点突变模型对复杂系统脆性问题的研究.船舶电子工程.2004,24(2):34-38页
    [68]Jin Hongzhang,Wei Qi,Guo Jian,Lin Deming.Research On the SARS Based On the Brittleness of Complex System.Proc.of IEEE Inter.Automation Conf.Hong Kong.Dec.2003,13-15P
    [69]金鸿章,郭健,韦琦,林德明,吴红梅.基于滑动t检验法的非典型性肺炎疫情的脆性分析.哈尔滨工程大学学报.2003,24(6):640-645页
    [70]Monton,V.Ward.Risk assessment methodology for network integrity.BT Technology Journal.1997,15(10):223-234P
    [71]D E Bell,L J La Padula.Secure Computer System:Unified Exposition and Multicast Interpretation[R].The Miter Corporation,Massachusetts,USA,ESD-TR-75-306,1976
    [72]W Leland,M Taqqu.On the self-similar nature of Ethernet traffic[J].IEEE/ACM Transaction on Networking,1994;2:1-15P
    [73]Istvin Csabai.1/f noise in computer network traffic[J]Journal of physics A(Mathematical and General),1994-06;27:417-421P
    [74]Anja Feldmann,Anna C Gilbert,Polly Huang et al.Dynamics of IP traffic:A study of the role of variability and the impact of control[C].In:Proceedings of the ACM/SIGCOMM.1999,12:176-181P
    [75]K Fukuda,M Takayasu,H Takayasu.Fractals[M].A Wiley-Interscience Publication.JOHN WILEY&SONS,INC.1999:117-121P
    [76]Carpignano A,Poucet A.Computer Assisted Fault Tree Construction:A Review of Methods and Concerns Reliability Engineering and System Safety,1994,44:265-278P
    [77]田玉楚,席裕庚.复杂系统与宏观信息熵方法[J].系统工程理论与实践,1995.8(8):62-68页
    [78]G.N.Sarids et al.Entropy Formulation of optimal and Adaptive Control.IEEE Trans.on AC.1988,33(8):713-721P
    [79]荣盘祥,王继尧,金鸿章.基于脆性联系熵的复杂系统特性的研究.电机与控制学报.2004,8(2):142-144页
    [80]李琦,金鸿章,林德明.基于脆性熵的系统脆性研究.自动化技术与应用.2004年第9期:16-19页
    [81]李琦,金鸿章,林德明.复杂系统的脆性模型结构.系统工程,2005年第1期:1-4页
    [82]张学文.物理场熵自发减小现象.自然杂志.1986,11(9):847-850页
    [83]范恩源.共享负熵,寻求新的有序.天津教育学院学报(自然科学版).1991(3):10-14页
    [84]冯端,冯步云.熵.北京:科学出版社.1992年:10-50页
    [85]任鲁川.灾害熵:概念引入及应用案例.自然灾害学报.2000,9(2):26-31页
    [86]A.A.Fouad,Zhou Qin,V.Vittal.System Vulnerability as a concept to Assess Power Dynamic Security.IEEE Transactions on Power Systems.1994,9(2):1009-1015P
    [87]R Albert,A.L Barabasi,Jeong H.The Internet's Achilles Heel:Error and Attack Tolerance of Complex Networks.Nature,2000,(406):378-382P
    [88]Holme P,Kim B J,Yoon C N,Han S K.Attack Vulnerability of Complex Networks.Phys.Rev.E,2002,65:56-69P
    [89]闫怀志,胡昌振,谭惠民.网络攻防对抗策略选择模糊矩阵博弈方法[J].武汉大学学报(理学版),2004,50(S1):103-106页
    [90]胡昌振.信息安全的概念及方法论探讨[J].科技导报,2004(3):18-45页
    [91]Coates A O,Hero Ⅲ,R Nowak.Internet Tomography[J].IEEE Signal Processing Magazine,2002,19(3):47-65P
    [92]V Paxson,S Floy.Wide-Area Traffic:The Failure of Poisson modeling[J].IEEE/ACM Transaction on Networking,1995,3(3):244-266P
    [93]J Beran,R Sherman,M S Taqquetal.Long-Range dependence in variable bit rate traffic[J].IEEE Transactions on communications,1995,43(2/3/4):1566-1579P
    [94]杨心强,邵军力.数据通信与计算机网络[M],北京:电子工业出版社,1998:81-88P
    [95]AKIYAMA E.,KANEKOB,K.Dynamical systems game theory and dynamics of games[J],Physical D,2000,147:221-258P
    [96]A.G.Bashkirov,A.V.Vityazev.Information entropy and power-law distributions for chaotic systems.Physica A.2000(277):136-145P
    [97]姜丹.信息论与编码[M],北京:中国科学技术大学出版社,2004:221-258P
    [98]John Mclean.Security Models,Encyclopedia of Software Engineering[M].Marciniak J(ed.).Wiley&Sons,1994:56-69页
    [99]赵佩华.熵理论的几个基本问题研究评述.系统辩证学学报.2000,8(1):85-88页
    [100]Shannon C.E.A mathematical theory of communication.Bell System Technical Journal.1948(27):379-429P,623-656P
    [101]林康镛.关于熵概念的扩充问题.青岛建筑工程学院学报.1992,13(1):73-77页
    [102]邢修三.物理熵、信息熵及其演化方程.中国科学(A辑).2001,31(1):77-84页
    [103]John Nash,贝兴亚译.非合作博弈.系统工程.1996,14(2):21-26页
    [104]赵冬梅,赵玉清,马建峰.熵权系数法应用于网络安全的模糊风险评估.计算机工程.2004,30(18):21-23页
    [105]韦琦,金鸿章,郭健,吉明.基于脆性的复杂系统研究.系统工程学报.2004,19(3):326-328页
    [106]朱其秀.关于联系数的同异反态势熵及应用.绍兴文理学院学报.2000, 20(6):87-89页
    [107]赵克勤.联系数及其应用.吉林师院学报.1996,(8):50-53页
    [108]赵克勤.集对分析(SPA)中联系数与不确定量.大自然探索.1997(2):91页
    [109]赵克勤.集对分析与熵的研究.浙江大学学报.1992(2):65-72页
    [110]黄德才,赵克勤.用联系数描述和处理网络计划中的不确定性.系统工程学报.1999,14(2):112-117页
    [111]王霞,彭晓华.集对分析中差异度系数i的取值方法及应用.天津轻工业学院学报.2002,4:56-58页
    [112]赵克勤,宣爱理.集对论——一种新的不确定性理论、方法、应用.系统工程,1996,(1):18-23页
    [113]Marco Carricato,Joseph Du.y,Vincenzo Parenti-Castelli.Catastrophe analysis of a planar system with flexural pivots.Mechanism and Machine.2002(37):693-716P
    [114]叶民强,林峰.区域人口、资源与环境公平性问题的博弈分析.上海财经大学学报.2001,3(5):10-15页
    [115]Vassalos,D.,Turan,O.,Konovessis,D.,Tuzcu,C.Comparison between prescriptive and performance-based criteria for assessing ro-ro damage survivability International Shipbuilding Progress.1998,45(444):351-382P
    [116]Anthony N.Kounadis.Dynamic buckling of simple two-bar frames using catastrophe theory.International Jounal of Non-Linear Mechanics.2002(37):1249-1259P
    [117]高辉,李慧民.模糊综合评判方法在工程质量风险分析中的应用[J].西安科技学院学报.2002(22):15-18页
    [118]张铁男,李晶蕾.对多级模糊综合评价方法的应用研究[J].哈尔滨工程大学学报.2002(3):67-72页
    [119]陈耀辉,孙春燕.模糊评价法中的最大隶属原则有效度[J].重庆学院学报师范(自然科学版).2002(1):50-54页
    [120]刘进,王永杰,张义荣等.层次分析法在网络攻击效果评估中的应用[J].计算机应用研究.2005(3):113-115页
    [121]张义荣,鲜明,王国玉.一种基于网络熵的计算机网络攻击效果定量评估方法.通信学报.2004,25(11):158-165页
    [122]张连明,陈志刚,邓晓衡.一种基于信息熵的Internet宏观行为模型研究[J].计算机工程与应用.2004(19):33-37页
    [123]钱刚,达庆利.基于系统安全工程工程能力成熟模型的信息系统风险评估.管理工程学报,2001,15(4):491-500页
    [124]Qin Zhou,J.Davidson,A.A.Fouad.Application of Artificial Neural Networks in Power System Security and Vulnerability Assessment.IEEE Transactions on Power Systems.1994,9(1):525-532P
    [125]W Leland,M Taqqu.On the self-similar nature of Ethernet traffic[J].IEEE/ACM Transaction on Networking,1994,2:1-15P
    [126]Jianbo Gao,Izhak Rubin.Multifractal Modeling of Counting Processes of Long-Range dependent Network Traffic[C].In:Proceeding SCS Advanced Simulation Technologies conference,San Diego,CA,1999-04:221-258P
    [127]田军,基于德菲尔法的专家集成模型研究,系统工程理论与实践,2004(1):62-69页

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700