An Approach to Risk Assessment and Threat Prediction for Complex Object Security Based on a Predicative Self-Configuring Neural System
Author:
Korneev Nikolai Vladimirovich,Korneeva Julia Vasilievna,Yurkevichyus Stasis Petrasovich,Bakhturin Gennady Ivanovich
Abstract
We identified a set of methods for solving risk assessment problems by forecasting an incident of complex object security based on incident monitoring. The solving problem approach includes the following steps: building and training a classification model using the C4.5 algorithm, a decision tree creation, risk assessment system development, and incident prediction. The last system is a predicative self-configuring neural system that includes a SCNN (self-configuring neural network), an RNN (recurrent neural network), and a predicative model that allows for determining the risk and forecasting the probability of an incident for an object. We proposed and developed: a mathematical model of a neural system; a SCNN architecture, where, for the first time, the fundamental problem of teaching a perceptron SCNN was solved without a teacher by adapting thresholds of activation functions of RNN neurons and a special learning algorithm; and a predicative model that includes a fuzzy output system with a membership function of current incidents of the considered object, which belongs to three fuzzy sets, namely “low risk”, “medium risk”, and “high risk”. For the first time, we gave the definition of the base class of an object’s prediction and SCNN, and the fundamental problem of teaching a perceptron SCNN was solved without a teacher. We propose an approach to neural system implementation for multiple incidents of complex object security. The results of experimental studies of the forecasting error at the level of 2.41% were obtained.
Subject
Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)
Reference62 articles.
1. Intelligent complex security management system FEC for the Industry 5.0;Korneev,2020
2. Global Energy Review 2020https://iea.blob.core.windows.net/assets/7e802f6a-0b30-4714-abb1-46f21a7a9530/Global_Energy_Review_2020.pdf
3. Design and Evaluation of Physical Protection Systems;Garcia,2008
4. CTPED and Traditional Security Countermeasures: 150 Things You Should Know;Fennelly,2018
5. CIM-based information model for power grid enterprise asset management and its application;Cao;Autom. Electr. Power Syst.,2012
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献