Proceedings of the 2nd International Conference on Teaching and Computational Science

Risk Evaluation for Security Network Based on Protection Model and Risk Entropy

Authors
Haitao Lv, Ruimin Hu
Corresponding Author
Haitao Lv
Available Online May 2014.
DOI
10.2991/ictcs-14.2014.39How to use a DOI?
Keywords
Security Network; Risk Entropy; Protection Model; Risk Evaluation
Abstract

A security network is considered as a diagram of security systems deployed in different places in a guard zone. For a security network, its risk is an important metric to judge whether its protection effectiveness is good or not. How to evaluate the risk of a security network In this paper, the protection coverage area of a security system is considered. We put forward the protection model that can be used to determine the protection coverage of a security system and define the protection probability on a grid-modeled field. According to the Shannon Information Theory, we propose the risk entropy, which can be used to quantitatively evaluate the risk of arbitrary position in an area. We use Dijkstra's shortest path algorithm to find the weakest protection path. The protection probability on the weakest protection path is considered as the risk measure.

Copyright
© 2014, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Conference on Teaching and Computational Science
Series
Advances in Intelligent Systems Research
Publication Date
May 2014
ISBN
978-94-62520-21-9
ISSN
1951-6851
DOI
10.2991/ictcs-14.2014.39How to use a DOI?
Copyright
© 2014, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Haitao Lv
AU  - Ruimin Hu
PY  - 2014/05
DA  - 2014/05
TI  - Risk Evaluation for Security Network Based on Protection Model and Risk Entropy
BT  - Proceedings of the 2nd International Conference on Teaching and Computational Science
PB  - Atlantis Press
SP  - 146
EP  - 149
SN  - 1951-6851
UR  - https://doi.org/10.2991/ictcs-14.2014.39
DO  - 10.2991/ictcs-14.2014.39
ID  - Lv2014/05
ER  -