CN101763467A - Method for optimizing protection capability in safety protection system - Google Patents

Method for optimizing protection capability in safety protection system Download PDF

Info

Publication number
CN101763467A
CN101763467A CN201010029039A CN201010029039A CN101763467A CN 101763467 A CN101763467 A CN 101763467A CN 201010029039 A CN201010029039 A CN 201010029039A CN 201010029039 A CN201010029039 A CN 201010029039A CN 101763467 A CN101763467 A CN 101763467A
Authority
CN
China
Prior art keywords
safety
protection system
protective capacities
protection
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201010029039A
Other languages
Chinese (zh)
Inventor
胡瑞敏
郭熹
戴晶晶
吕海涛
王亦民
陈军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University WHU
Original Assignee
Wuhan University WHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University WHU filed Critical Wuhan University WHU
Priority to CN201010029039A priority Critical patent/CN101763467A/en
Publication of CN101763467A publication Critical patent/CN101763467A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of safety protection, in particular to a method for optimizing a protection capability in a safety protection system. An optimized model of the protection capability of a safety protection system is established in an abstract graph of the safety protection system, and a protection capability value of the node is improved or reduced by adjusting protecting facilities of all nodes, thereby obtaining a maximal attack path in the safety protection system and an optimal value of the protection capability. The cost on leading an attacker to attack a protected object along the path is maximal, and an average risk value of the safety protection system is reduced to the minimum. The invention can more scientifically and effectively guide the reasonable distribution and dispatch of the protecting facilities, enable the protection capability of the whole safety protection system to be fully utilized and has great practical significance for planning and distributing the safety protection facilities.

Description

The optimization method of protective capacities in the safety-protection system
Technical field
The present invention relates to the security precautions technology field, relate in particular to the optimization method of protective capacities in a kind of safety-protection system.
Background technology
Safety precaution is the part of social public security, and with regard to risk prevention instruments, safety precaution is divided into manpower and takes precautions against (people's air defense), the in kind strick precaution (thing is anti-) and technological prevention (technical precaution).Wherein manpower strick precaution and in kind the strick precaution are traditional risk prevention instrumentses.Along with continuous progress in science and technology, technological prevention forms a kind of novel risk prevention instruments gradually.
Safety-protection system normally is made of jointly people, material object or technical precaution equipment, can be divided into a plurality of nodes.So-called node is meant the protective unit of people, protective equipment or technical precaution equipment with safe precaution ability.Security system is obtaining positive effect as the important technological platform of public safety system aspect the social security prevention and control, but has also exposed some problems: be lower than the desired protection threshold value in this zone as some node owing to protective capacities; Cause this regional risk to increase; Also some node causes this regional protective equipment a large amount of redundancies to occur because protective capacities is higher than the desired protection threshold value in this zone, has caused the serious waste of resource; In order can the safety-protection system that node is formed reasonably to be distributed and scheduling resource, need the protective capacities of safety-protection system be optimized, set up corresponding protective capacities Optimization Model, instruct the distribution and the scheduling of resource theoretically, make the average risk value of whole safety-protection system drop to minimum.
At present, research aspect the protective capacities optimization of security system both at home and abroad also lacks very much, mainly concentrate on the layout of optimization, emergency resources of optimization, the city fire resistance property of the logistics capability in the economics and optimization etc. for ability optimization aspect, proposed corresponding Optimization Model.But the discussion to optimisation strategy is less.Therefore, need the optimization method of invention security system protective capacities urgently, set up the model that the safety-protection system protective capacities is optimized.
Summary of the invention
The optimization method that the purpose of this invention is to provide protective capacities in a kind of safety-protection system, optimize the reasonable distribution and the scheduling of protective equipment by science and effective method, it is minimum that the value-at-risk of whole safety-protection system is dropped to, to improve and optimizate the protective capacities of safety-protection system.
For achieving the above object, the present invention adopts following technical scheme:
Set up the abstract graph of security system;
Set up the Optimization Model of safety-protection system protective capacities;
The Optimization Model of safety-protection system protective capacities is found the solution in calculating, and this step further comprises following substep:
1. according to the security system abstract graph,, obtain the set M of all attack paths from the point of attack to the protected object by enumeration methodology;
2. respectively below set M, utilize the Optimization Model of protective capacities, adjust the protective capacities value of node, protective capacities to safety-protection system is optimized, draw under different attack paths the maximal value of safety-protection system protective capacities, and the optimized protection ability value of each node;
3. the protective capacities value that compares the safety-protection system under all attack paths respectively, obtain the protective capacities maximal value of safety-protection system, simultaneously this path is designated as maximum attack path, when the assailant prevents protected object along this path attack, the cost maximum that need pay;
4. the weight of considering every paths equates, the objective function of different paths correspondence is weighted on average, and multi-objective optimization question is become the single goal optimization problem, and this objective function is optimized, and obtains overall optimum solution.
The described Optimization Model step of setting up the safety-protection system protective capacities comprises:
Regard whole abstract security protection network as a network chart, be designated as: D=(V, A), V represents the set of all security protection nodes in the safety-protection system, and A represents the set on all limits in the safety-protection system, for each bar limit (vi, vj) ∈ A supposes that the protective capacities value of each node is respectively: x 1, x 2... ..x n, the weight on every limit is designated as c (v i, v j) 〉=0, then the Optimization Model of safety-protection system protective capacities is:
f = max Σ ( v i , v j ) ∈ A n ∈ V c ij x n
x 1 + x 2 + . . . + x n = S 0 ≤ x 1 ≤ m 1 0 ≤ x 2 ≤ m 2 . . . . . . . . . . 0 ≤ x n ≤ m n 0 ≤ c ij ≤ 1
Wherein S is known, expression whole node protective capacities sum; m 1, m 2... ..m nBe known, represent the threshold value of the protective capacities of each node.
The present invention has the following advantages and good effect:
1) science and effectively instruct the reasonable distribution and the scheduling of protective equipment more is fully utilized the protective capacities of whole safety-protection system;
2) improved and optimizated the protective capacities of safety-protection system, the planning and the layout of security protection facility had great practice significance.
Description of drawings
Fig. 1 is the abstract graph of security system among the present invention.
Embodiment
In the Combinatorial Optimization theory, the least cost flow model is a model the most basic in the all-network flow problem.This problem can be explained like this: we will find a minimum traffic program of cost that certain goods is sent to the top out by a network from the supply place, and make it to satisfy the demand at these places, summit.In security system, exist a similar Optimization Model equally, this Optimization Model problem to be solved can be expressed as: we are by the scheduling of resource between the node, to in safety-protection system, find the attack path of a protective capacities maximum, and need make the average risk value of whole safety-protection system drop to minimum.
The optimization method of protective capacities in the safety-protection system that the present invention proposes, concrete technical scheme is for may further comprise the steps:
1, sets up the abstract graph of security system.
This method is abstracted into a security protection network chart with security system, referring to the abstract graph of security system shown in Figure 1.
Suppose in the design: the assailant is target from outside the venue with the protection object, has a paths from the position of assault to the protection object at least; All nodes all have protective capacities on the path, and the protective capacities value is to calculate by risk entropy; Every there is certain protection weight on the limit, by given in advance.Weight is big more, and representative is by the difficult more attack protected object of this paths.The assailant needs to pay certain cost by limit on the network and node.
2, set up the Optimization Model of safety-protection system protective capacities, concrete operations are as follows:
Regard whole abstract security protection network as a network chart, be designated as: D=(V, A).V represents the set of all security protection nodes in the safety-protection system.A represents the set on all limits in the safety-protection system.(vi, vj) ∈ A suppose that the protective capacities value of each node is respectively: x for each bar limit 1, x 2... ..x nThe weight on every limit is designated as c (v i, v j(brief note is c in) 〉=0 Ij).Then the Optimization Model of safety-protection system protective capacities is:
f = max Σ ( v i , v j ) n ∈ V ∈ A c ij x n
x 1 + x 2 + . . . + x n = S 0 ≤ x 1 ≤ m 1 0 ≤ x 2 ≤ m 2 . . . . . . . . . . 0 ≤ x n ≤ m n 0 ≤ c ij ≤ 1
Wherein S is known, expression whole node protective capacities sum; m 1, m 2... ..m nBe known, represent the threshold value of the protective capacities of each node.
3, calculate the Optimization Model of finding the solution the safety-protection system protective capacities, concrete substep is as follows:
1. according to the security system abstract graph,, obtain the set M of all attack paths from the point of attack to the protected object by enumeration methodology.Be designated as M={ph 1, ph 2... .ph n.Ph wherein 1, ph 2... .ph nThe expression attack path.
2. respectively below set M, utilize the Optimization Model of protective capacities, adjust the protective capacities value of node, protective capacities to safety-protection system is optimized, draw under different attack paths the maximal value of safety-protection system protective capacities, and the optimized protection ability value of each node.Because corresponding each bar attack path, the Optimization Model of protective capacities is a typical linear programming model, and finding the solution of Optimization Model can adopt simplicial method to calculate.
3. the protective capacities value that compares the safety-protection system under all attack paths respectively; obtain the protective capacities maximal value of safety-protection system; simultaneously this path is designated as maximum attack path, when the assailant prevents protected object along this path attack, the cost maximum that need pay.4. the weight of considering every paths equates, objective function to different paths correspondence is weighted on average, and multi-objective optimization question is become the single goal optimization problem, and this objective function is optimized, obtain the optimum solution of the overall situation, be the protective capacities optimal value of whole safety-protection system.Under this condition, the average risk value of safety-protection system drops to minimum.
The invention will be further described in conjunction with the accompanying drawings with specific embodiment below:
1, sets up the security system abstract graph.Referring to accompanying drawing 1, we suppose that the security system abstract graph is made up of 5 nodes, are designated as V={A respectively, B, and C, D, E}, corresponding protective capacities value calculates by the formula of risk entropy, is respectively: x 1=3.1, x 2=2.7, x 3=4.2, x 4=1.2, x 5=1.8.The weighted value on every limit provides on figure.
2, set up an Optimization Model that the safety-protection system protective capacities of 5 nodes is arranged.
f = max Σ ( v i , v j ) ∈ A n ∈ A c ij x n
x 1 + x 2 + . . . + x 5 = 13 0 ≤ x 1 ≤ 3.5 0 ≤ x 2 ≤ 2.9 0 ≤ x 3 ≤ 3.2 0 ≤ x 4 ≤ 2.3 0 ≤ x 5 ≤ 2.7 0 ≤ c ij ≤ 1
3, calculate the Optimization Model of finding the solution the safety-protection system protective capacities.
1. according to security protection network system abstract graph,, obtain the set M of all attack paths from the point of attack to the protected object by enumeration methodology.M={ph 1,ph 2,.......ph 5}。Wherein: ph 1Be S-A-C-E-T; Ph 2Be S-B-D-E-T; Ph 3Be S-A-D-E-T; Ph 4Be S-A-D-C-E-T; Ph 5Be S-B-D-C-E-T;
2. respectively below set M, utilize the Optimization Model of protective capacities, adjust the protective capacities value of node, protective capacities to safety-protection system is optimized, draw under different attack paths the maximal value of safety-protection system protective capacities, and the optimized protection ability value of each node.Calculate the maximal value of the safety-protection system protective capacities under above-mentioned 5 paths below respectively.
(1) corresponding to ph 1The Optimization Model in path
f 1=Max(0.7x 1+0.4x 3+0.3x 5)
x 1 + x 2 + . . . + x 5 = 13 0 ≤ x 1 ≤ 3.5 0 ≤ x 2 ≤ 2.9 0 ≤ x 3 ≤ 3.2 0 ≤ x 4 ≤ 2.3 0 ≤ x 5 ≤ 2.7 0 ≤ c ij ≤ 1
Above-mentioned Optimization Model belongs to typical linear programming model, utilizes simple method to find the solution and can obtain following optimum solution.Be respectively: f 1max=4.54, x 1=3.5, x 2=1.3, x 3=3.2, x 4=2.3, x 5=2.7.
(2) corresponding to ph 2The Optimization Model in path
f 2=Max(0.5x 2+0.4x 4+0.6x 5)
x 1 + x 2 + . . . + x 5 = 13 0 ≤ x 1 ≤ 3.5 0 ≤ x 2 ≤ 2.9 0 ≤ x 3 ≤ 3.2 0 ≤ x 4 ≤ 2.3 0 ≤ x 5 ≤ 2.7 0 ≤ c ij ≤ 1
Above-mentioned Optimization Model belongs to typical linear programming model, utilizes simple method to find the solution and can obtain following optimum solution.Be respectively: f 2max=3.99, x 1=3.5, x 2=2.9, x 3=1.6, x 4=2.3, x 5=2.7,
(3) corresponding to ph 3The Optimization Model in path
f 3=Max(0.7x 1+0.5x 4+0.6x 5)
x 1 + x 2 + . . . + x 5 = 13 0 ≤ x 1 ≤ 3.5 0 ≤ x 2 ≤ 2.9 0 ≤ x 3 ≤ 3.2 0 ≤ x 4 ≤ 2.3 0 ≤ x 5 ≤ 2.7 0 ≤ c ij ≤ 1
Above-mentioned Optimization Model belongs to typical linear programming model, utilizes simple method to find the solution and can obtain following optimum solution.Be respectively: f 3max=5.22, x 1=3.5, x 2=2.9, x 3=1.6, x 4=2.3, x 5=2.7,
(4) corresponding to ph 4The Optimization Model in path
f 4=Max(0.7x 1+0.5x 4+0.2x 3+0.3x 5)
x 1 + x 2 + . . . + x 5 = 13 0 ≤ x 1 ≤ 3.5 0 ≤ x 2 ≤ 2.9 0 ≤ x 3 ≤ 3.2 0 ≤ x 4 ≤ 2.3 0 ≤ x 5 ≤ 2.7 0 ≤ c ij ≤ 1
Above-mentioned Optimization Model belongs to typical linear programming model, utilizes simple method to find the solution and can obtain following optimum solution.Be respectively: f 4max=5.05, x 1=3.5, x 2=1.3, x 3=3.2, x 4=2.3, x 5=2.7
(5) corresponding to ph 5The Optimization Model in path
f 5=Max(0.5x 2+0.4x 4+0.2x 3+0.3x 5)
x 1 + x 2 + . . . + x 5 = 13 0 ≤ x 1 ≤ 3.5 0 ≤ x 2 ≤ 2.9 0 ≤ x 3 ≤ 3.2 0 ≤ x 4 ≤ 2.3 0 ≤ x 5 ≤ 2.7 0 ≤ c ij ≤ 1
Above-mentioned Optimization Model belongs to typical linear programming model, utilizes simple method to find the solution and can obtain following optimum solution.Be respectively: f 5max=3.82, x 1=1.9, x 2=2.9, x 3=3.2, x 4=2.3, x 5=2.7
3. respectively relatively at ph 1, ph 2... .ph 5The protective capacities value of safety-protection system under the path, note f Max=Max{f 1max, f 2max, f 3max, f 4max, f 5maxBeing the maximal value of security protection network protection ability, pairing that paths of this maximal value is maximum attack path, obtains f according to top computational analysis Max=5.22.
This moment, corresponding maximum attack path was ph 3
4. the weight of supposing every paths equates that after above-mentioned a plurality of target weighted means, it is as follows to change into the single goal Optimization Model:
f avg=Max(0.42x 1+0.2x 2+0.16x 3+0.32x 4+0.42x 5)
x 1 + x 2 + . . . + x 5 = 13 0 ≤ x 1 ≤ 3.5 0 ≤ x 2 ≤ 2.9 0 ≤ x 3 ≤ 3.2 0 ≤ x 4 ≤ 2.3 0 ≤ x 5 ≤ 2.7 0 ≤ c ij ≤ 1
Above-mentioned Optimization Model belongs to typical linear programming model, utilizes simple method to find the solution and can obtain following optimum solution.Be respectively: f Avg=4.176, x 1=3.5, x 2=2.9, x 3=1.6, x 4=2.3, x 5=2.7.This moment, the protective capacities optimal value of safety-protection system was 4.176, and the average risk value of safety-protection system drops to minimum.

Claims (2)

1. the optimization method of protective capacities in the safety-protection system is characterized in that, may further comprise the steps:
Set up the abstract graph of security system;
Set up the Optimization Model of safety-protection system protective capacities;
The Optimization Model of safety-protection system protective capacities is found the solution in calculating, and this step further comprises following substep:
1. according to the security system abstract graph,, obtain the set M of all attack paths from the point of attack to the protected object by enumeration methodology;
2. respectively below set M, utilize the Optimization Model of protective capacities, adjust the protective capacities value of node, protective capacities to safety-protection system is optimized, draw under different attack paths the maximal value of safety-protection system protective capacities, and the optimized protection ability value of each node;
3. the protective capacities value that compares the safety-protection system under all attack paths respectively, obtain the protective capacities maximal value of safety-protection system, simultaneously this path is designated as maximum attack path, when the assailant prevents protected object along this path attack, the cost maximum that need pay;
4. the weight of considering every paths equates, the objective function of different paths correspondence is weighted on average, and multi-objective optimization question is become the single goal optimization problem, and this objective function is optimized, and obtains overall optimum solution.
2. the optimization method of protective capacities in the safety-protection system according to claim 1 is characterized in that:
The described Optimization Model step of setting up the safety-protection system protective capacities comprises:
Regard whole abstract security protection network as a network chart, be designated as: D=(V, A), V represents the set of all security protection nodes in the safety-protection system, and A represents the set on all limits in the safety-protection system, for each bar limit (vi, vj) ∈ A supposes that the protective capacities value of each node is respectively: x 1, x 2... ..x n, the weight on every limit is designated as c (v i, v j) 〉=0, then the Optimization Model of safety-protection system protective capacities is:
f = max Σ ( v i , v j ) ∈ A n ∈ V c ij x n
x 1 + x 2 + . . . + x n = S 0 ≤ x 1 ≤ m 1 0 ≤ x 2 ≤ m 2 . . . . . . . . . . 0 ≤ x n ≤ m n 0 ≤ c ij ≤ 1
Wherein S is known, expression whole node protective capacities sum; m 1, m 2... ..m nBe known, represent the threshold value of the protective capacities of each node.
CN201010029039A 2010-01-21 2010-01-21 Method for optimizing protection capability in safety protection system Pending CN101763467A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010029039A CN101763467A (en) 2010-01-21 2010-01-21 Method for optimizing protection capability in safety protection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010029039A CN101763467A (en) 2010-01-21 2010-01-21 Method for optimizing protection capability in safety protection system

Publications (1)

Publication Number Publication Date
CN101763467A true CN101763467A (en) 2010-06-30

Family

ID=42494629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010029039A Pending CN101763467A (en) 2010-01-21 2010-01-21 Method for optimizing protection capability in safety protection system

Country Status (1)

Country Link
CN (1) CN101763467A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103329137A (en) * 2011-01-31 2013-09-25 安塞尔有限公司 Method and system for computing optimal product usage
CN103353917A (en) * 2013-04-22 2013-10-16 武汉大学 Risk assessment method and system for fixed protection object within security network
CN106446674A (en) * 2016-07-27 2017-02-22 长春理工大学 Attack prediction-based virtual machine monitoring resource allocation method in cloud computing environment

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103329137A (en) * 2011-01-31 2013-09-25 安塞尔有限公司 Method and system for computing optimal product usage
CN103329137B (en) * 2011-01-31 2016-04-13 安塞尔有限公司 For the method and system that calculation optimization product uses
CN103353917A (en) * 2013-04-22 2013-10-16 武汉大学 Risk assessment method and system for fixed protection object within security network
CN103353917B (en) * 2013-04-22 2016-03-30 武汉大学 The methods of risk assessment of safety precaution network internal fixtion protection object and system
CN106446674A (en) * 2016-07-27 2017-02-22 长春理工大学 Attack prediction-based virtual machine monitoring resource allocation method in cloud computing environment

Similar Documents

Publication Publication Date Title
Zhou et al. Adaptive traffic light control in wireless sensor network-based intelligent transportation system
Pardo et al. Standalone direct pumping photovoltaic system or energy storage in batteries for supplying irrigation networks. Cost analysis
CN104201628A (en) Power distribution line tower span panning method based on load reliability
CN102004835B (en) Optimized scheduling chart drawing method for power generation risk-oriented hydropower station
CN105676890A (en) Dynamic operation water level control method for 3D or higher cascaded reservoirs in flood season
CN102542359A (en) Method for optimizing arrangement and distribution of multi-target emergency rescue resources
CN107180313A (en) The preparation method of large reservoir reservoir refill scheme based on venture countermeasure rule
CN107025806B (en) A kind of single phase interim track robust Optimal methods
CN101763467A (en) Method for optimizing protection capability in safety protection system
CN103049671A (en) Method for drawing up multi-goal reservoir optimization scheduling graph capable of being self-adaptive to climate change
Rahi et al. Optimization of hydro power plant design by particle swarm optimization (PSO)
CN103810532A (en) Method for optimizing running state of urban drainage system
Zimoch et al. Comprehensive interpretation of safety of wide water supply systems
CN103489133A (en) Method for automatic recommendation of power transmission line lightning protection measure
CN105701561A (en) Pipe network optimization method based on water supply pipe network planning and design requirements
WO2012019837A3 (en) Method for computer-aided control of the electrical power consumption of a plurality of power consumers in an electrical power grid
CN107767014B (en) A kind of power information physics system security risk assessment and defence resource allocation methods
Landingin et al. Comparative analysis of RC irregular buildings designed according to different seismic design codes
CN104809517A (en) Building construction site security double-layer dynamic optimizing method
Du et al. Research on multi-objective emergency logistics vehicle routing problem under constraint conditions
Kyaw et al. Optimization–based solution for reducing water scarcity in the greater chao phraya river basin, thailand: through re–operating the bhumibol and sirikit reservoirs using non–linear programming solver
Ugarelli et al. Importance of investment decisions and rehabilitation approaches in an ageing wastewater pipeline network. A case study of Oslo (Norway)
Choudhury et al. Floods, fields and factories: towards resolving conflicts around the Hirakud dam
CN107705014A (en) A kind of river course Real time Flood risk Analytic Calculation Method for considering advance of freshet error
Duan et al. Research of hydraulic reliability of water supply network based on the simulation of EPANET

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20100630