Protection Intensity Evaluation for a Security System Based on Entropy Theory

The protection effectiveness is an important metric to judge whether a security system is good or not. In this paper, a security system deployed in a guard field is regarded abstractly as a security network. A quantitative protection effectiveness evaluation method based on entropy theory is introduced. We propose the protection intensity model, which can be used to calculate the protection intensity of a stationary or moving object provided by a security system or a security network. Using the protection intensity model, an algorithm, specifically for finding the minimal protection intensity paths of a field deployed multiple security system, is also put forward. The minimal protection intensity paths can be considered as the effectiveness measure of security networks. Finally, we present the simulation of the methods and models in this paper.

[1]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[2]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[3]  J. L. Darby SEAPATH: A microcomputer code for evaluating physical security effectiveness using adversary sequence diagrams , 1986 .

[4]  Jun Zhuang,et al.  Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[5]  Jun Zhuang,et al.  Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[6]  Rudolf Clausius,et al.  The Mechanical Theory of Heat: With Its Applications to the Steam-Engine and to the Physical Properties of Bodies , 2015 .

[7]  Edward P. Halibozek,et al.  Introduction to Security , 1975 .

[8]  Sheldon Howard Jacobson,et al.  Probability models for access security system architectures , 1997 .

[9]  Xiaojun Shan,et al.  Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game , 2013, Eur. J. Oper. Res..

[10]  S. Sandler Chemical and engineering thermodynamics , 1977 .

[11]  W. J. Schneider,et al.  Countermeasures development in the physical security design process: an anti-terrorist perspective , 1989, Proceedings. International Carnahan Conference on Security Technology.

[12]  Kjell Hausken,et al.  The timing and deterrence of terrorist attacks due to exogenous dynamics , 2012, J. Oper. Res. Soc..

[13]  H. A. Bennett,et al.  Evaluation methodology for fixed-site physical protection systems. [Safeguards Upgrade Rule] , 1980 .

[14]  Jonathan Pollet,et al.  All hazards approach for assessing readiness of critical infrastructure , 2009, 2009 IEEE Conference on Technologies for Homeland Security.

[15]  Jun Zhuang,et al.  Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[16]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[17]  Leonard R. Doyon Stochastic modeling of facility security-systems for analytical solutions , 1981 .

[18]  Sheldon Howard Jacobson,et al.  A Detection Theoretic approach to Modeling Aviation Security Problems using the Knapsack Problem , 2001 .

[19]  Mary Lynn Garcia,et al.  The Design and Evaluation of Physical Protection Systems , 2001 .

[20]  Claude E. Shannon,et al.  The mathematical theory of communication , 1950 .

[21]  Kathleen Mary Dame Kenyon,et al.  Digging Up Jericho , 1957 .

[22]  M. J. Hicks,et al.  Physical protection systems cost and performance analysis: a case study , 1999 .