Risk Assessment of Security Systems Based on Entropy Theory and Neyman-Pearson Criterion

For a security system, the risk assessment is an important metric to judge whether the protection effectiveness of a security system is good or not. In this paper, the security systems deployed in a guard field are regarded abstractly as a diagram of security network. Firstly a method about risk assessment based on entropy theory and Neyman-Pearson criterion is proposed. Secondly, the most vulnerable path formulation of a security network is described and a solution by utilizing the Dijkstra's shortest path algorithm is provided. The protection probability on the most vulnerable path is considered as the risk measure of a security network. Furthermore, we study the effects of some parameters on the risk and the breach protection probability and present simulations. Ultimately, we can gain insight about the risk of a security network.

[1]  Kjell Hausken,et al.  The timing and deterrence of terrorist attacks due to exogenous dynamics , 2012, J. Oper. Res. Soc..

[2]  J. L. Darby SEAPATH: A microcomputer code for evaluating physical security effectiveness using adversary sequence diagrams , 1986 .

[3]  Kathleen Mary Dame Kenyon,et al.  Digging Up Jericho , 1957 .

[4]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[5]  Jun Zhuang,et al.  Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[6]  A. Singer,et al.  Detection and Estimation of , 1999 .

[7]  Xiaojun Shan,et al.  Subsidizing to disrupt a terrorism supply chain—a four-player game , 2014, J. Oper. Res. Soc..

[8]  M. J. Hicks,et al.  Physical protection systems cost and performance analysis: a case study , 1999 .

[9]  Mary Lynn Garcia,et al.  The Design and Evaluation of Physical Protection Systems , 2001 .

[10]  Charles F. Hockett,et al.  A mathematical theory of communication , 1948, MOCO.

[11]  Sheldon Howard Jacobson,et al.  Probability models for access security system architectures , 1997 .

[12]  Xiaojun Shan,et al.  Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game , 2013, Eur. J. Oper. Res..

[13]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[14]  Leonard R. Doyon Stochastic modeling of facility security-systems for analytical solutions , 1981 .

[15]  Edward P. Halibozek,et al.  Introduction to Security , 1975 .

[16]  Jonathan Pollet,et al.  All hazards approach for assessing readiness of critical infrastructure , 2009, 2009 IEEE Conference on Technologies for Homeland Security.

[17]  Jun Zhuang,et al.  Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[18]  David C. Walters,et al.  Introduction to Security, Ninth Edition , 2012 .

[19]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .