CN114548731B - Security system efficiency evaluation method, system and equipment based on system dynamics - Google Patents

Security system efficiency evaluation method, system and equipment based on system dynamics Download PDF

Info

Publication number
CN114548731B
CN114548731B CN202210145074.9A CN202210145074A CN114548731B CN 114548731 B CN114548731 B CN 114548731B CN 202210145074 A CN202210145074 A CN 202210145074A CN 114548731 B CN114548731 B CN 114548731B
Authority
CN
China
Prior art keywords
representing
security
cost
protection
input data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210145074.9A
Other languages
Chinese (zh)
Other versions
CN114548731A (en
Inventor
钱重阳
姚晓晖
李季梅
李海鹏
宁利君
焦心怡
倪慧荟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Urban Safety and Environmental Science of Beijing Academy of Science and Technology
Original Assignee
Institute of Urban Safety and Environmental Science of Beijing Academy of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Urban Safety and Environmental Science of Beijing Academy of Science and Technology filed Critical Institute of Urban Safety and Environmental Science of Beijing Academy of Science and Technology
Priority to CN202210145074.9A priority Critical patent/CN114548731B/en
Publication of CN114548731A publication Critical patent/CN114548731A/en
Application granted granted Critical
Publication of CN114548731B publication Critical patent/CN114548731B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Game Theory and Decision Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Alarm Systems (AREA)

Abstract

The invention belongs to the field of security systems and data analysis, in particular relates to a security system efficiency evaluation method, system and equipment based on system dynamics, and aims to solve the problem that the efficiency evaluation of the existing security system does not dynamically give efficiency evaluation results in combination with input-output relation. The invention comprises the following steps: acquiring input data and protection data of a target security system in a preset time period; further defining dynamic variables of a target security system, and obtaining dimensionless input data and dimensionless protection data, so as to construct a dynamic system flow stock diagram; and constructing a dynamic system flow stock graph through the dynamic variables, and analyzing to obtain the security efficiency of the target security system. The invention combines the fund investment of the security system with the time relation of the subsystems of the security system among the detection, response and delay systems, thereby determining the overall efficiency of the security system and predicting the future efficiency change condition so as to comprehensively know and estimate the efficiency condition of the security system and make optimal allocation.

Description

Security system efficiency evaluation method, system and equipment based on system dynamics
Technical Field
The invention belongs to the field of security systems and data analysis, and particularly relates to a security system efficiency evaluation method, system and equipment based on system dynamics.
Background
At present, the security protection system is widely applied to cultural relic protection units, nuclear facility units, financial institutions and the like, but the overall performance of the security protection system is affected due to the failure of certain technical protection systems or insufficient response of personal protection systems. Then for the manager of the security system, the security system efficiency of the unit can be mastered and estimated quickly, so that the purpose of security can be better achieved. Performance refers to a measure of the ability of a system to meet a set of requirements for a particular task; or the ability of the system to achieve a specified use target under specified conditions. The efficiency of the security system is a multiple measure of the security capability, and at present, most researchers at home and abroad mainly refer to the protection efficiency in evaluating, researching and practicing the security system. The method is characterized in that under specific conditions, the degree of expected prevention targets can be achieved when the specified prevention tasks are executed by using the physical facilities and the reaction force of the safety prevention system.
Most of the current methods for evaluating the efficacy of the security system are mainly qualitative and static evaluation methods, few quantitative and dynamic evaluation methods are carried out, and the efficacy evaluation results cannot be obtained by combining the actual fund investment of each unit. The students put forward a cost-effectiveness analysis model of the security system, and the model is constructed from a macroscopic level, takes the investment of the security system as cost, takes the threatened risk as benefit to evaluate, and cannot dynamically and quantitatively describe the effectiveness result of the security system.
Aiming at the problem of insufficient performance evaluation of the security system, the invention establishes a dynamic performance evaluation model of input and output type of the security system according to the relevance and feedback mechanism existing among subsystems in each unit security system. Based on the system dynamics method, the fund investment of the security system is combined with the time relation between detection, response and delay systems of the subsystems of the security system, and dynamic and quantitative efficiency evaluation is carried out on the security system, so that the overall efficiency of the security system is determined, future efficiency change is expected, and the efficiency is improved to the greatest extent under fixed investment, and is used for reference by a manager.
Disclosure of Invention
In order to solve the above problems in the prior art, that is, the problem that the existing security system performance evaluation does not combine the relationship between input and output to give a final performance evaluation result, the invention provides a security performance evaluation method based on system dynamics, which comprises the following steps:
step S100, acquiring input data and protection data in a preset time period of a target security system; the input data comprises detection system input data, response system input data and delay system input data; the protection data comprises detection system protection data, response system protection data and delay system protection data;
step S200, defining dynamic variables of a target security system based on the input data and the protection data, obtaining dimensionless input data and dimensionless protection data, and further constructing a functional causal loop diagram and a dynamic system flow stock diagram;
step S300, based on the dimensionless input data and the dimensionless protection data, a dynamic system flow stock diagram is constructed through the dynamic variables, and the security efficiency of a target security system is obtained through analysis, wherein the efficiency of the target security system is the sum of the efficiency of a detection system, the efficiency of a response system and the efficiency of a delay system.
In some preferred embodiments, the detection system inputs data I TC The method specifically comprises the following steps:
I TC =I ZJ +I JF
wherein I is ZJ Indicating personnel cost of the check-in machine, I JF The cost is monitored for the video; n represents the total number of personnel levels, i represents the ith personnel level, N i Representing the number of security personnel corresponding to the ith level, S ai Representing the compensation of the ith level personnel; m represents the total number of technical protection system categories, j represents the j-th type technical protection facility and JIC j Represents the initial construction cost of the j-th type technical protection facility, JLT j Represents the average service life of j-th technical protection facilities and JMTC j And the operation and maintenance cost of the j-th type technical protection facilities is represented.
In some preferred embodiments, the defining the dynamic variable of the target security system based on the input data and the protection data obtains dimensionless input data and dimensionless protection data, specifically includes:
based on the input data, a functional causal loop graph is constructed according to a feedback relation of the change amount of the detection system time, the response system time change amount and the delay system time change amount.
And carrying out dimensionless treatment on the input data and the protection data to obtain dimensionless input data and dimensionless protection data.
In some preferred embodiments, the constructing a dynamic system flow inventory map of the dynamic variables specifically includes:
and analyzing and obtaining a dynamic system flow stock diagram of system efficiency through analog software based on the dimensionless input data, the dimensionless protection data and the functional causal loop diagram.
In some preferred embodiments, the dynamic system flow inventory map of security system efficacy includes dynamic variables and inventory relationships for all security system elements; the stock relation comprises a first-order positive feedback system and a first-order negative feedback system: wherein, the detection system efficiency is:
S SP (t+Δt)=P SC (t+Δt)×a 2
P BJ (t+Δt)=P FG (t+Δt)×b 2
S TG (t+Δt)=P BJ (t+Δt)×b 3
R tc (t+Δt)=S SP (t+Δt)+S TG (t+Δt)
L tc (t+Δt)=2-R tc (t)
R tc (t+Δt)=-S SP (t+Δt)-S TG (t+Δt)
wherein P is SC Representing the probability of success of video review, I ZJ1 Indicating personnel cost of the check-in machine, a 1 Representing the conversion coefficient of the video recheck of the personnel on the machine, I SP1 Representing video monitoring subsystem cost, I SP2 Representing video monitoring subsystem lifting fees, I ZJ2 Indicating personnel lifting expense and JIC (just-in-time) 1 Representing initial construction cost of video monitoring subsystem, JLT 1 Representing average facility service life of video monitoring subsystem and JMTC 1 Representing video monitoring average operation and maintenance costs, JIC 2 Representing initial construction costs of an alarm subsystem, JLT 2 Representing average facility service life of alarm subsystem and JMTC 2 Representing annual average operation and maintenance cost of alarm subsystem S SP Representing the variation of the time of the video monitoring subsystem, P SP Representing video monitoring subsystem coverage, a 2 Representing the probability conversion coefficient of video rechecking success, b 1 Representing the cost conversion coefficient of the technical protection system, b 2 Representing the probability conversion coefficient of alarm success b 3 Represents the conversion coefficient of the probability of success of alarm, R tc Indicating the time variation of the detection system S TG Indicating the change of the time of the alarm subsystem, I BJ1 Indicating the cost of the alarm subsystem, I BJ2 Representing the lifting expense of the alarm subsystem, P BJ Represents the alarm success probability, P FG Representing the coverage rate of the alarm subsystem;
the response system efficiency is:
S TX (t+Δt)=P TX (t+Δt)×c 2
S JW (t+Δt)=P JW (t+Δt)×d 2
R xy (t+Δt)=S TX (t+Δt)+S JW (t+Δt)
L xy (t+Δt)=3-R xy (t)
wherein I is AF1 Indicating the cost of security equipment, I AF2 Indicating the lifting cost of security equipment and ZIC 1 Indicating initial purchase cost of equipment, ZIC 2 Representing maintenance costs of equipment, P TX Representing the average rate of communication, I JW1 Representing the cost of guard personnel, I JW2 Representing guard personnel lifting charge c 1 Representing the cost conversion coefficient of the security equipment, c 2 Representing the communication rate conversion coefficient, d 1 Representing the cost conversion coefficient of guard personnel, d 2 Represents guard response rate conversion coefficient, k represents the number of guard personnel corresponding to the kth level, S ak Representing annual salary, P, of a kth level guard person JW Represents the response rate of guard personnel, S TX Representing the amount of change in communication subsystem time, R xy Representing the time variation of the response system, S JW Representing the amount of change in guard response subsystem time;
the delay system performance is:
P LC (t+Δt)=P LL (t+Δt)×e 2
S ST (t+Δt)=P LC (t+Δt)×e 3
R yc (t+Δt)=S ST (t+Δt)
L yc (t+Δt)=5-R yc (t)
wherein P is LL Representing force deployment area coverage, I WF1 Engineering cost is prevented to the representation thing, I WF2 Indicating engineering lifting expense and WIC 0 Representing initial construction costs of class o facilities, WLT 0 Indicating design life of class o facility, WMTC 0 Representing annual average operating cost, P, of class o facilities LC Represent the probability of successful deployment of the power, S ST Representing the variation of the physical protection subsystem time, R yc Indicating the time variation of the delay system, e 1 Engineering cost conversion coefficient of representation object, e 2 Representing the force deployment area conversion coefficient e 3 Representing a strength deployment success probability conversion coefficient;
will delay the system performance L yc Subtracting the detection system effectiveness L tc And responsive to system performance L xy The method comprises the following steps:
XN(t+Δt)=L yc (t+Δt)-L xy (t+Δt)-L tc (t+Δt)
XN represents security system efficacy.
In some preferred embodiments, the step S300 specifically includes:
inputting the dimensionless input data and the dimensionless protection data into a dynamic variable to construct a dynamic system flow stock diagram, and respectively obtaining detection system time, response system time and delay system time;
And subtracting the detection system and response system time from the delay system time to obtain a difference value T, and obtaining the security performance of the target security system according to a preset XN performance result interval where T is located.
In some preferred embodiments, the method further comprises the step of calculating the total investment according to the protection objective, specifically:
calculating a security efficacy value to be improved based on the given security risk target level and the expected duration and the protection data;
based on the value to be improved of the security efficacy, the value to be improved of the security efficacy is changed through a Monte Carlo method, the detection system efficacy, the response system efficacy and the delay system efficacy of the security system after the expected duration are calculated through a method of a reverse pushing step S100-a step S300, so that a set of input distribution schemes capable of achieving the quantity to be improved of the security efficacy is obtained, the total input of the schemes is calculated, and the distribution scheme with the lowest total input of the schemes is selected as an optimal input scheme.
In some preferred embodiments, the preset XN efficacy result interval is specifically:
when T is greater than or equal to 300, namely XN is greater than or equal to 5, the risk level is first-level; the method comprises the steps of carrying out a first treatment on the surface of the
When T is greater than or equal to 180 and less than 300, namely XN is greater than or equal to 3 and less than 5, the risk level is a second level;
When T is more than or equal to 0 and less than 180, namely XN is more than or equal to 0 and less than 3, the risk level is three-level;
when T is smaller than 0, that is XN is smaller than 0, the risk level is lower than three levels, which means that the performance level of the unit security system is lower than the protection level of three levels of risk units required by relevant standards.
In another aspect of the present invention, a security performance evaluation system based on system dynamics is provided, including: the system comprises a data acquisition module, a dynamic system flow stock diagram construction module and a security efficiency evaluation module;
the data acquisition module is configured to acquire input data and protection data in a preset time period of the target security system; the input data comprises detection system input data, response system input data and delay system input data; the protection data comprises detection system protection data, response system protection data and delay system protection data;
the dynamic system flow inventory diagram construction module is configured to define dynamic variables of a target security system based on the input data and the protection data to obtain dimensionless input data and dimensionless protection data, so as to construct a functional causal loop diagram and a dynamic inventory flow diagram;
The security efficiency evaluation module is configured to construct a dynamic system flow stock diagram based on the dimensionless input data and the dimensionless protection data through the dynamic variables, and analyze and obtain security efficiency of a target security system, wherein the target security system efficiency is the sum of detection system efficiency, response system efficiency and delay system efficiency.
In a third aspect of the present invention, an electronic device is provided, including: at least one processor; and a memory communicatively coupled to at least one of the processors; the memory stores instructions executable by the processor, and the instructions are used for being executed by the processor to implement the security system efficiency evaluation method based on system dynamics.
In a fourth aspect of the present invention, a computer readable storage medium is provided, where computer instructions are stored, where the computer instructions are used to be executed by the computer to implement the above-mentioned security system performance evaluation method based on system dynamics.
The invention has the beneficial effects that:
(1) According to the security efficacy evaluation method based on system dynamics, provided by the invention, according to the relevance and existing feedback mechanism among all subsystems in the security system, an efficacy dynamic evaluation model of a dynamic method of unit input and output type of the security system is established, the fund input of the security system is combined with the time relation of the subsystems of the security system among detection, response and delay systems, and the security system is subjected to dynamic and quantitative efficacy evaluation, so that the overall efficacy of the security system and the predicted future efficacy change condition are determined, and a manager can comprehensively know and estimate the change condition of the efficacy of the security system of the unit.
(2) Under the condition that the investment funds of security and protection systems are unchanged every year of a security and protection system using unit, the optimal funds distribution scheme in the current year is obtained through multiple simulation experiments by changing the investment proportion of a detection system, the investment proportion of a response system and the investment proportion of a delay system through a Monte Carlo method, so that the efficiency of the security and protection system of the unit is optimal.
(3) Based on a given security risk target level and expected duration, calculating a security efficiency to-be-lifted value based on the protection data, changing the security efficiency lifting value based on the security efficiency to-be-lifted value through a Monte Carlo method, and obtaining a investment distribution scheme set capable of realizing the security efficiency to-be-lifted amount by reversely calculating the detection system efficiency, the response system efficiency and the delay system efficiency of the security system after the expected duration, further calculating the total investment of the scheme, and selecting the distribution scheme with the lowest total investment of the scheme as an optimal investment scheme.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the accompanying drawings in which:
FIG. 1 is a flow chart of a security system performance evaluation method based on system dynamics in an embodiment of the application;
FIG. 2 is a schematic diagram of the time-dependent relationship of the detection system, response system, and delay system in an embodiment of the present application;
FIG. 3 is a causal loop diagram of a security system constructed in an embodiment of the application;
FIG. 4 is a diagram of probe system flow inventory for a system dynamics system constructed in an embodiment of the application;
FIG. 5 is a response system flow inventory diagram of a system dynamics system constructed in an embodiment of the application;
FIG. 6 is a graph of delay system traffic inventory for a system dynamics system constructed in an embodiment of the application;
FIG. 7 is a diagram of security performance flow inventory for a system dynamics system constructed in an embodiment of the application;
FIG. 8 is a graph showing the relationship between the performance of a security system and the investment of the security system in a unit according to an embodiment of the present application;
FIG. 9 is a schematic diagram showing the performance of the security system according to the time variation of different investment allocation schemes in the same unit according to the embodiment of the present application;
FIG. 10 is a schematic diagram showing the effect of comparing annual capital investment with the performance acceleration of the original protocol, protocol one, in an embodiment of the application.
Detailed Description
The application is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be noted that, for convenience of description, only the portions related to the present application are shown in the drawings.
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
The application provides a system, which provides a method for establishing dynamic evaluation model dynamics of input and output type efficacy of a security system according to relevance and existing feedback mechanisms of all subsystems in the security system, combines the fund input of the security system with the time relation of the subsystems of the security system between detection, response and delay systems, and carries out dynamic and quantitative efficacy evaluation on the security system, thereby determining the overall efficacy and the expected future efficacy change condition of the security system, and providing a manager to comprehensively know and estimate the change condition of the efficacy of the security system
The application discloses a security system efficiency evaluation method based on system dynamics, which comprises the following steps:
step S100, acquiring input data and protection data in a preset time period of a target security system; the input data comprises detection system input data, response system input data and delay system input data; the protection data comprises detection system protection data, response system protection data and delay system protection data;
Step S200, based on the input data and the protection data, defining dynamic variables of a target security system to obtain dimensionless input data and dimensionless protection data, and further constructing a functional causal loop diagram and a dynamic system flow stock diagram;
step S300, based on the dimensionless input data and the dimensionless protection data, constructing a dynamic system flow stock graph through the dynamic variables, and analyzing to obtain the security efficiency of the target security system, wherein the security efficiency of the target security system is the sum of the detection system efficiency, the response system efficiency and the delay system efficiency.
In order to more clearly describe the system of the present invention, the following details of the steps in the embodiment of the present invention will be described with reference to fig. 1.
The security system efficiency evaluation method based on system dynamics of the first embodiment of the invention comprises the following steps:
system dynamics is a computer simulation technology for researching dynamic behavior of a system, and is a method for analyzing the structure, dynamic development and feedback effect among internal factors of a complex system. The method can be suitable for constructing a performance evaluation model of input and output of the security system, takes capital input as input and takes the time stock change of the performance of the security system as output, thereby achieving the purpose of performance evaluation.
The method in this embodiment classifies security systems into detection systems, response systems, and delay systems.
Detection system: in order to detect illegal personnel, namely the technical protection system for illegal actions of personnel invading the protection area through illegal authorization, the technical protection system consists of a video monitoring subsystem, an alarm subsystem and a check-in machine personnel re-checking subsystem. The operation mechanism is that after the alarm detector at the front end alarms, the alarm information is transmitted to the crewman of the command center, and the crewman rechecks the alarm information through the video monitoring subsystem and transmits the alarm information confirmation to the response system. In the running process of the detection system, the video monitoring subsystem is influenced by the cost, the lifting cost, the coverage rate and the related conversion coefficient of the subsystem; the alarm subsystem is influenced by the cost, the lifting cost, the coverage rate, the alarm success probability and the related conversion coefficient of the subsystem; the personnel subsystem of the check-in machine is influenced by the cost, the lifting expense, the video rechecking success probability and the related conversion coefficient of the subsystem.
And (3) a response system: the personal protection system which receives the alarm information of the confirmed detection system and responds by guard force consists of a communication subsystem and a response subsystem. The operation mechanism is to inform the guard personnel of the place of occurrence by telephone or intercom as a communication tool, and then the guard personnel quickly arrive at the designated place. In the operation process of the response system, the communication subsystem is influenced by the cost of the subsystem, the lifting cost, the average communication speed and the related coefficient, and the guard response subsystem is influenced by the cost of the subsystem, the lifting cost, the average guard response speed and the related coefficient.
Delay system: the system for preventing the illegal personnel from acquiring the protection target consists of an entity protection subsystem and a force deployment subsystem. The operation mechanism is to extend the time for illegal personnel to acquire the protection target through entity protection such as wall body and entrance guard and guard strength deployment, thereby achieving the purpose that the delay time is longer than the sum of detection and response time. In the running process of the delay system, the entity protection subsystem is influenced by the cost of the subsystem, the lifting cost and the power deployment coverage area occupation ratio, and the power deployment subsystem is influenced by the cost of the subsystem, the lifting cost, the power deployment area coverage ratio, the power deployment success probability and the related coefficient.
Regarding security system efficacy definitions, the academy has temporarily not been described by a unified quantitative formula. The efficacy of the security system which is accepted in the current academy is the time expression relationship of the detection system, the response system and the delay system in the security system. The three-proofing means of civil air defense, physical air defense and technical air defense in the security system mainly has the functions of time relation on the detection system, the delay system and the response system, the time-dependent change relation of the three is shown as figure 2, in figure 2, when the detection time (T A -T 0 ) Response time (T) with response system I -T A ) The sum is smaller than the delay time (T) C -T 0 ) And if the safety protection system performance level of the protection object is relatively good, otherwise, the safety protection system performance level is relatively poor, and the effect of effectively protecting the object cannot be achieved.
Step S100, acquiring input data and protection data in a preset time period of a target security system; the input data comprises detection system input data, response system input data and delay system input data; the protection data comprises detection system protection data, response system protection data and delay system protection data; the fund investment condition of the security system is convenient to count. Typically, the investment period is 1 year, and the capital investment units are calculated in ten thousand yuan.
In this embodiment, the detection system inputs data I TC The method specifically comprises the following steps:
I TC =I ZJ +I JF
wherein I is ZJ Indicating personnel cost of the check-in machine, I JF The cost is monitored for the video; n represents the total number of personnel levels, i represents the ith personnel level, N i Representing the number of security personnel corresponding to the ith level, S ai Representing the compensation of the ith level personnel; m represents the total number of technical protection system categories, j represents the j-th type technical protection facility and JIC j Represents the initial construction cost of the j-th type technical protection facility, JLT j Represents the average service life of j-th technical protection facilities and JMTC j And the operation and maintenance cost of the j-th type technical protection facilities is represented.
Correspondingly, the response system investment comprises the cost of guard personnel and the cost of security equipment; the delay system is input as the engineering cost of preventing things; the sum of the current annual investment of the detection system, the response system and the delay system is the security system investment of the unit.
Step S200, based on the input data and the protection data, defining dynamic variables of a target security system to obtain dimensionless input data and dimensionless protection data, and further constructing a functional causal loop diagram and a dynamic system flow stock diagram;
in this embodiment, the model boundary is assumed to be: (1) The unit changes new detection, response and delay equipment every time the fund of the security system is input, thereby reducing the response time of detection and response and prolonging the delay time; (2) The detection subsystem, the response subsystem and the delay subsystem are independent subsystems, and have no influence on each other in time; (3) The method is characterized in that an evaluation model aiming at the same protection target is constructed, and all the funds input for improving the security system of the whole unit are effective improvement effects on the system of the protection target, and the situation that the funds input is not improved to the system is not considered; (4) In the process of fund input and efficiency output, the security system does not consider the attenuation effect of each subsystem on detection, response and delay time; (5) The model is only used for evaluating and preventing the external staff from working and does not analyze the staff working in the unit.
In this embodiment, the step of defining the dynamic variable of the target security system to obtain dimensionless input data and dimensionless protection data based on the input data and the protection data specifically includes:
based on the input data, constructing a functional causal loop chart according to a feedback relation of the change amount of the detection system time, the response system time change amount and the delay system time change amount; the functional causal loop diagram is shown in fig. 3, wherein one causal loop diagram comprises a plurality of variables, and causal relationships among the variables are connected by arrows. Important feedback loops are also marked in the causal loop graph. When labeled positive (+) a positive feedback loop is indicated and when labeled negative (-) a negative feedback loop is indicated.
In this embodiment, the causal loop graph may preset a causal loop trunk, and set stage indexes, such as success rate, coverage rate, variation, etc., for the subsystem of the detection system, the response system, or the delay system; and determining which stage index forms positive feedback or negative feedback by correlation analysis after collecting one input data, and adding the input data into the causal loop chart until all input data are added into the causal loop chart. For example, by setting stage indexes for the subsystems of the detection system, the response system and the delay system respectively, the correlation between the factors in each subsystem and the effectiveness of the security system is found until all the factors are added into the causal loop chart. If the video monitoring subsystem in the detection system is preset as the cost, the lifting cost, the coverage rate and the related conversion coefficient of the video system, the positive and negative feedback relation between each index and the time variation of the alarm system and the efficiency of the detection system is determined through correlation analysis, and then the positive and negative feedback relation is added into a causal loop diagram.
And carrying out dimensionless treatment on the input data and the protection data to obtain dimensionless input data and dimensionless protection data. The method comprises the following steps: carrying out dimensionless treatment on input data and protection data, and processing the collected various data in a range normalization mode, namely finding out the maximum value and the minimum value of each data in each data, wherein the difference between the maximum value and the minimum value is the range, subtracting the minimum value of the index from the actual value of each data, dividing the minimum value by the range to obtain dimensionless values of the data, and the like to obtain all dimensionless input data and dimensionless protection data.
In this embodiment, the construction of the dynamic system flow stock map by the construction dynamic variables specifically includes:
and analyzing and obtaining a dynamic system flow stock diagram of system efficiency through analog software based on the dimensionless input data, the dimensionless protection data and the functional causal loop diagram. Dynamic system flow inventory for system performance is shown in figures 4, 5, 6 and 7.
The definition of the parameters in fig. 4, 5, 6 and 7 is shown in table 1:
TABLE 1 System dynamics variable set for Security System efficacy
In this embodiment, the dynamic system flow stock map of the system efficiency includes dynamic variables and stock relationships of all security system elements; the stock relation comprises a first-order positive feedback system and a first-order negative feedback system, wherein the efficiency of the detection system is as follows:
S SP (t+Δt)=P SC (t+Δt)×a 2
P BJ (t+Δt)=P FG (t+Δt)×b 2
S TG (t+Δt)=P BJ (t+Δt)×b 3
R tc (t+Δt)=S SP (t+Δt)+S TG (t+Δt)
L tc (t+Δt)=2-R tc (t)
R tc (t+Δt)=-S SP (t+Δt)-S TG (t+Δt)
wherein P is SC Representing the probability of success of video review, I ZJ1 Indicating personnel cost of the check-in machine, a 1 Video rechecking conversion system for indicating personnel on dutyNumber, I SP1 Representing video monitoring subsystem cost, I SP2 Representing video monitoring subsystem lifting fees, I ZJ2 Indicating personnel lifting expense and JIC (just-in-time) 1 Representing initial construction cost of video monitoring subsystem, JLT 1 Representing average facility service life of video monitoring subsystem and JMTC 1 Representing video monitoring average operation and maintenance costs, JIC 2 Representing initial construction costs of an alarm subsystem, JLT 2 Representing average facility service life of alarm subsystem and JMTC 2 Representing annual average operation and maintenance cost of alarm subsystem S SP Representing the variation of the time of the video monitoring subsystem, P SP Representing video monitoring subsystem coverage, a 2 Representing the probability conversion coefficient of video rechecking success, b 1 Representing the cost conversion coefficient of the technical protection system, b 2 Representing the probability conversion coefficient of alarm success b 3 Represents the conversion coefficient of the probability of success of alarm, R tc Indicating the time variation of the detection system S TG Indicating the change of the time of the alarm subsystem, I BJ1 Indicating the cost of the alarm subsystem, I BJ2 Representing the lifting expense of the alarm subsystem, P BJ Represents the alarm success probability, P FG Representing the coverage rate of the alarm subsystem;
the response system efficiency is:
S TX (t+Δt)=P TX (t+Δt)×c 2
S JW (t+Δt)=P JW (t+Δt)×d 2
R xy (t+Δt)=S TX (t+Δt)+S JW (t+Δt)
L xy (t+Δt)=3-R xy (t)
wherein I is AF1 Indicating the cost of security equipment, I AF2 Indicating the lifting cost of security equipment and ZIC 1 Indicating initial purchase cost of equipment, ZIC 2 Representing maintenance purchase cost of equipment, P TX Representing the average rate of communication, I JW1 Representing the cost of guard personnel, I JW2 Representing guard personnel lifting charge c 1 Representing the cost conversion coefficient of the security equipment, c 2 Representing the communication rate conversion coefficient, d 1 Representing the cost conversion coefficient of guard personnel, d 2 Represents guard response rate conversion coefficient, k represents the number of guard personnel corresponding to the kth level, S ak Representing annual salary, P, of a kth level guard person JW Represents the response rate of guard personnel, S TX Representing the amount of change in communication subsystem time, R xy Representing the time variation of the response system, S JW Representing the amount of change in guard response subsystem time;
the delay system performance is:
P LC (t+Δt)=P LL (t+Δt)×e 2
S ST (t+Δt)=P LC (t+Δt)×e 3
R yc (t+Δt)=S ST (t+Δt)
L yc (t+Δt)=5-R yc (t)
wherein P is LL Representing force deployment area coverage, I WF1 Engineering cost is prevented to the representation thing, I WF2 Indicating engineering lifting expense and WIC 0 Representing initial construction costs of class o facilities, WLT 0 Indicating design life of class o facility, WMTC 0 Representing annual tie operation and maintenance costs for class o facilities, P LC Represent the probability of successful deployment of the power, S ST Representing the variation of the physical protection subsystem time, R yc Indicating the time variation of the delay system, e 1 Engineering cost conversion coefficient of representation object, e 2 Representing the force deployment area conversion coefficient e 3 Representing a strength deployment success probability conversion coefficient;
will delay the system performance L yc Subtracting the detection system effectiveness L tc And responsive to system performance L xy The method comprises the following steps:
XN(t+Δt)=L yc (t+Δt)-L xy (t+Δt)-L tc (t+Δt)
XN represents security system efficacy.
In this embodiment, if a new influence factor appears, it is confirmed by correlation analysis that the influence factor directly affects which parameter in the confirmed dynamic system flow inventory map, and the parameter is added to the dynamic system flow inventory map.
Step S300, based on the dimensionless input data and the dimensionless protection data, a dynamic system flow stock diagram is constructed through the dynamic variables, and target security system efficiency is obtained through analysis, wherein the target security system efficiency is the sum of detection system efficiency, response system efficiency and delay system efficiency.
In this embodiment, the step S300 specifically includes:
Inputting the dimensionless input data and the dimensionless protection data into a dynamic variable to construct a dynamic system flow stock diagram, and respectively obtaining detection system time, response system time and delay system time;
and subtracting the detection system and response system time from the delay system time to obtain a difference value T, and obtaining the security performance of the target security system according to a preset XN performance result interval where T is located.
In this embodiment, the relationship between the unit risk classification and the protection time requirement of each subsystem in the security system is shown in table 2:
TABLE 2 relationship between risk classification and protection time requirements for subsystems in security system
The alarm time of the detection system as in table 2 is only the time from the sensing of an intrusion signal by the front-end intrusion detector to the alarm of the monitoring room. In addition to the alarm time of the detection system, the time of the detection system comprises video rechecking time, detection report time and the like. Therefore, the time of the first-level to third-level risk unit detection system is set to be not more than 2 minutes by integrating the video rechecking and reporting situation after the intrusion alarm is received in the daily working process of the unit. According to the time relation of detection, response and delay systems in the security system reviewed in the earlier stage, the delay system time of the three levels of risk units is subtracted from the delay system time of the detection system and the response system time to obtain difference values T of 300s, 180s and 0s respectively, and the difference values T are used as standards for measuring the efficacy of the security system.
In this embodiment, the preset XN performance result interval is specifically:
when T is greater than or equal to 300, namely XN is greater than or equal to 5, the risk level is first-level;
when T is greater than or equal to 180 and less than 300, namely XN is greater than or equal to 3 and less than 5, the risk level is a second level;
when T is greater than or equal to 0 and less than 180, namely XN is greater than or equal to 0 and less than 3, the risk level is three-level; when T is smaller than 0, that is XN is smaller than 0, the risk level is lower than three levels, which means that the performance level of the unit security system is lower than the three-level risk unit protection level required by the relevant standard
By using the method of the embodiment, the standard of the three-level risk unit is adopted, and the initial values of the overall reaction time of the detection system, the response system and the delay system in a security system of a unit are assumed to be 2, 3 and 5, namely the initial value XN of the performance of the security system of the unit is assumed to be 0. It is assumed that in the initial year (t=1), the investment of the security system includes the initial construction cost of the video monitoring subsystem, the alarm subsystem, the equipment, etc., the investment of personnel and guard personnel, and the annual lifting cost (Δt=1) later, so that the unit security system performance is improved to a certain degree each year. In addition, the probability distribution of each parameter determined after negotiation with the security technician of the unit is shown in table 3:
TABLE 3 probability distribution Table of analog data
Other assumptions for the determination are:
the number of personnel levels of the check-in machine and the number of personnel levels of the guard are 1, the number of the check-in machine is 23, and the number of the guard is 82;
the average annual salary of the personnel on duty is 6.118 ten thousand yuan, and the average annual salary of the personnel on guard is 5.014 ten thousand yuan;
other subsystems are subjected to initial construction cost, service life, annual average operation and maintenance cost, conversion coefficient and the like through the probability distribution table, and corresponding values are obtained after 500 iterations of Monte Carlo.
The simulation period is 10 years through a model constructed by the running of analog software, the time step is 1 year, and the expected security efficacy improving effect is observed every year through the running of software. And after the software is simulated and operated, the relation result of the security system efficiency of the cultural relic protection unit and the security system investment is shown in fig. 8. The simulation result is as follows: the efficiency of the security system and the accumulated investment of the security system are in positive correlation, namely, the greater the investment is, the efficiency of the security system is obviously improved; when the simulation time reaches 6 to 7 years, the accumulated investment reaches 75.519 to 95.558, and the efficiency of the security system can reach 3, namely the secondary security risk level is reached; when the simulation time reaches 8 to 9 years, the accumulated investment reaches 134.477 to 176.241, the security system efficiency can reach 5, and the first-level security risk level can be reached.
Assuming that the initial investment and the annual total lifting cost of the security system of the cultural relic protection unit are unchanged, the efficiency level reaching the first-level risk cultural relic protection unit is observed by adjusting the investment proportion of the annual lifting cost in the model. The fund input ratio distribution scheme is shown in table 4:
TABLE 4 capital investment ratio distribution scheme
Although the scheme I and the scheme II have the same system input proportion distribution scheme, the proportion of a median machine, video and alarm in the scheme I is 20%, 50% and 30%, and the proportion in the scheme II is 0%, 50% and 50%. The time-dependent graph of the security system performance of the cultural relic protection unit under each scheme (including the original scheme) is shown in fig. 9, and it can be seen that the annual performance change corresponding to different security schemes is shown in table 5:
table 5 annual performance change under different protocols
Other input schemes are significantly faster than the performance value changes of the original scheme. By analyzing the original scheme, the reason that the original scheme is slow in speed increasing is that the capital investment is not carried out on all subsystems in part of years, so that the efficiency of each system is unbalanced.
The annual capital investment and the original scheme, the first scheme, and the efficiency acceleration are compared, for example, as shown in fig. 10, the original scheme and the first scheme show a trend of increasing and then decreasing, which indicates that as the capital investment of the security system is performed, the efficiency acceleration of the security system reaches a peak value, the efficiency acceleration cannot be increased limitlessly, and the corresponding efficiency value finally reaches a level which tends to be stable. The invention can achieve optimal input configuration by changing the input proportion of the detection system, the input proportion of the response system and the input proportion of the delay system through a Monte Carlo method.
The security system efficacy evaluation system based on system dynamics of the second embodiment of the invention comprises: the system comprises a data acquisition module, a dynamic system flow stock diagram construction module and a security efficiency evaluation module;
the data acquisition module is configured to acquire input data and protection data in a preset time period of the target security system; the input data comprises detection system input data, response system input data and delay system input data; the protection data comprises detection system protection data, response system protection data and delay system protection data;
the dynamic system flow stock diagram construction module is configured to define dynamic variables of a target security system based on the input data and the protection data to obtain dimensionless input data and dimensionless protection data, so as to construct a functional causal loop diagram and a dynamic system flow stock diagram;
the security efficiency evaluation module is configured to construct a dynamic system flow stock graph based on the dimensionless input data and the dimensionless protection data, and analyze and obtain security efficiency of a target security system, wherein the security efficiency of the target security system is a sum of detection system efficiency, response system efficiency and delay system efficiency.
An electronic device of a third embodiment of the present invention includes: at least one processor; and a memory communicatively coupled to at least one of the processors; the memory stores instructions executable by the processor, and the instructions are used for being executed by the processor to implement the security system efficiency evaluation method based on system dynamics.
A computer readable storage medium according to a fourth embodiment of the present invention stores computer instructions for execution by the computer to implement the system dynamics-based security system performance evaluation method described above.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the storage device and the processing device described above and the related description may refer to the corresponding process in the foregoing method embodiment, which is not repeated herein.
The terms "first," "second," and the like, are used for distinguishing between similar objects and not for describing a particular sequential or chronological order.
The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus/apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus/apparatus.
Thus far, the technical solution of the present invention has been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of protection of the present invention is not limited to these specific embodiments. Equivalent modifications and substitutions for related technical features may be made by those skilled in the art without departing from the principles of the present invention, and such modifications and substitutions will be within the scope of the present invention.

Claims (7)

1. A security system efficacy evaluation method based on system dynamics, the method comprising:
step S100, acquiring input data and protection data in a preset time period of a target security system; the input data comprises detection system input data, response system input data and delay system input data; the protection data comprises detection system protection data, response system protection data and delay system protection data;
step S200, based on the input data and the protection data, defining dynamic variables of a target security system to obtain dimensionless input data and dimensionless protection data, and further constructing a functional causal loop diagram and a dynamic system flow stock diagram;
The method for obtaining dimensionless input data and dimensionless protection data by defining dynamic variables of a target security system based on the input data and the protection data specifically comprises the following steps:
based on the input data, constructing a functional causal loop chart according to a feedback relation of the change amount of the detection system time, the response system time change amount and the delay system time change amount;
carrying out dimensionless treatment on the input data and the protection data to obtain dimensionless input data and dimensionless protection data;
the construction function causal loop diagram and the dynamics system flow stock diagram specifically comprise: based on the dimensionless input data, dimensionless protection data and the functional causal loop diagram, analyzing and obtaining a dynamic system flow stock diagram of system efficiency through analog software;
the dynamic system flow stock diagram of the system efficiency comprises dynamic variables and stock relations of all security system elements; the stock relation comprises a first-order positive feedback system and a first-order negative feedback system:
wherein, the detection system efficiency is:
S SP (t+Δt)=P SC (t+Δt)×a 2
P BJ (t+Δt)=P FG (t+Δt)×b 2
S TG (t+Δt)=P BJ (t+Δt)×b 3
R tc (t+Δt)=S SP (t+Δt)+S TG (t+Δt)
L tc (t+Δt)=2-R tc (t)
R tc (t+Δt)=-S SP (t+Δt)-S TG (t+Δt)
wherein P is SC Representing the probability of success of video review, I ZJ1 Indicating personnel cost of the check-in machine, a 1 Representing the conversion coefficient of the video recheck of the personnel on the machine, I SP1 Representing video monitoring subsystem cost, I SP2 Representing video monitoring subsystem lifting fees, I ZJ2 Indicating personnel lifting expense and JIC (just-in-time) 1 Representing initial construction cost of video monitoring subsystem, JLT 1 Representing average facility service life of video monitoring subsystem and JMTC 1 Representing video monitoring average operation and maintenance costs, JIC 2 Representing initial construction costs of an alarm subsystem, JLT 2 Representing average facility service life of alarm subsystem and JMTC 2 Representing annual average operation and maintenance cost of alarm subsystem S SP Representing the variation of the time of the video monitoring subsystem, P SP Representing video monitoring subsystem coverage, a 2 Representing the probability conversion coefficient of video rechecking success, a 3 Representing video surveillance conversion coefficient, b 1 Representing the cost conversion coefficient of the technical protection system, b 3 Represents the conversion coefficient of the probability of success of alarm, R tc Indicating the time variation of the detection system S TG Indicating the change of the time of the alarm subsystem, I BJ1 Indicating the cost of the alarm subsystem, I BJ2 Representing the lifting expense of the alarm subsystem, P BJ Represents the alarm success probability, P FG Representing the coverage rate of the alarm subsystem;
the response system efficiency is:
S TX (t+Δt)=P TX (t+Δt)×c 2
S JW (t+Δt)=P JW (t+Δt)×d 2
R xy (t+Δt)=S TX (t+Δt)+S JW (t+Δt)
L xy (t+Δt)=3-R xy (t)
wherein I is AF1 Indicating the cost of security equipment, I AF2 Indicating the lifting cost of security equipment and ZIC 1 Indicating initial purchase cost of equipment, ZIC 2 Representing maintenance costs of equipment, P TX Representing the average rate of communication, I JW1 Representing the cost of guard personnel, I JW2 Representing guard personnel lifting charge c 1 Representing the cost conversion coefficient of the security equipment, c 2 Indicating communication rate conversion d 1 Representing the cost conversion coefficient of guard personnel, d 2 Represents guard response rate conversion coefficient, k represents the number of guard personnel corresponding to the kth level, S ak Representing annual salary, P, of a kth level guard person JW Represents the response rate of guard personnel, S TX Representing the amount of change in communication subsystem time, R xy Representing response system timeVariation, S JW Representing the amount of change in guard response subsystem time;
the delay system performance is:
P LC (t+Δt)=P LL (t+Δt)×e 2
S ST (t+Δt)=P LC (t+Δt)×e 3
R yc (t+Δt)=S ST (t+Δt)
L yc (t+Δt)=5-R yc (t)
wherein P is LL Representing force deployment area coverage, I WF1 Engineering cost is prevented to the representation thing, I WF2 Indicating engineering lifting expense and WIC 0 Representing initial construction costs of class o facilities, WLT 0 Indicating design life of class o facility, WMTC 0 Representing annual average operating cost, P, of class o facilities LC Represent the probability of successful deployment of the power, S ST Representing the variation of the physical protection subsystem time, R yc Indicating the time variation of the delay system, e 1 Engineering cost conversion coefficient of representation object, e 2 Representing the force deployment area conversion coefficient e 3 Representing a strength deployment success probability conversion coefficient;
will delay the system performance L yc Subtracting the detection system effectiveness L tc And responsive to system performance L xy The method comprises the following steps:
XN(t+Δt)=L yc (t+Δt)-L xy (t+Δt)-L tc (t+Δt)
XN represents security system efficacy;
step S300, based on the dimensionless input data and the dimensionless protection data, constructing a dynamic system flow stock graph through the dynamic variables, and analyzing to obtain the security efficacy of the target security system; the security performance of the target security system is the sum of the detection system performance, the response system performance and the delay system performance.
2. The system dynamics-based security system effectiveness evaluation method according to claim 1, wherein the detection system inputs data I TC The method specifically comprises the following steps:
I TC =I ZJ +I JF
wherein I is ZJ Indicating personnel cost of the check-in machine, I JF The cost is monitored for the video; n represents the total number of personnel levels, i represents the ith personnel level, N i Representing the number of security personnel corresponding to the ith level, S ai Representing the compensation of the ith level personnel; m represents the total number of technical protection system categories, j represents the j-th type technical protection facility and JIC j Represents the initial construction cost of the j-th type technical protection facility, JLT j Represents the average service life of j-th technical protection facilities and JMTC j And the operation and maintenance cost of the j-th type technical protection facilities is represented.
3. The system dynamics-based security system performance evaluation method according to claim 1, wherein the step S300 specifically includes:
inputting the dimensionless input data and the dimensionless protection data into dynamic variables, constructing a dynamic system flow stock diagram, and respectively obtaining detection system time, response system time and delay system time;
and subtracting the detection system and response system time from the delay system time to obtain a difference value T, and obtaining the security performance of the target security system according to a preset XN performance result interval where T is located.
4. The system dynamics-based security system performance evaluation method according to claim 3, wherein the preset XN performance result interval is specifically:
when T is greater than or equal to 300, namely XN is greater than or equal to 5, the risk level is first-level;
when T is greater than or equal to 180 and less than 300, namely XN is greater than or equal to 3 and less than 5, the risk level is a second level;
when T is more than or equal to 0 and less than 180, namely XN is more than or equal to 0 and less than 3, the risk level is three-level;
when T is smaller than 0, that is, XN is smaller than 0, the risk level is lower than three levels, and the safety protection system efficiency level is lower than the three-level risk unit protection level required by the relevant standard.
5. The system dynamics-based security system performance evaluation method according to claim 1, further comprising the step of calculating a total investment according to a protection target, specifically:
calculating a security efficacy value to be improved based on the given security risk target level and the expected duration and the protection data;
based on the value to be improved of the security efficacy, the value to be improved of the security efficacy is changed through a Monte Carlo method, the detection system efficacy, the response system efficacy and the delay system efficacy of the security system after the expected duration are calculated through a method of a reverse pushing step S100-a step S300, so that a set of input distribution schemes capable of achieving the quantity to be improved of the security efficacy is obtained, the total input of the schemes is calculated, and the distribution scheme with the lowest total input of the schemes is selected as an optimal input scheme.
6. A security system efficacy evaluation system based on system dynamics, comprising: the system comprises a data acquisition module, a dynamic system flow stock diagram construction module and a security efficiency evaluation module;
the data acquisition module is configured to acquire input data and protection data in a preset time period of the target security system; the input data comprises detection system input data, response system input data and delay system input data; the protection data comprises detection system protection data, response system protection data and delay system protection data;
The dynamic system flow stock diagram construction module is configured to define dynamic variables of a target security system based on the input data and the protection data to obtain dimensionless input data and dimensionless protection data, so as to construct a functional causal loop diagram and a dynamic system flow stock diagram; the method for obtaining dimensionless input data and dimensionless protection data by defining dynamic variables of a target security system based on the input data and the protection data specifically comprises the following steps:
based on the input data, constructing a functional causal loop chart according to a feedback relation of the change amount of the detection system time, the response system time change amount and the delay system time change amount;
carrying out dimensionless treatment on the input data and the protection data to obtain dimensionless input data and dimensionless protection data;
the construction function causal loop diagram and the dynamics system flow stock diagram specifically comprise: based on the dimensionless input data, dimensionless protection data and the functional causal loop diagram, analyzing and obtaining a dynamic system flow stock diagram of system efficiency through analog software;
the dynamic system flow stock diagram of the system efficiency comprises dynamic variables and stock relations of all security system elements; the stock relation comprises a first-order positive feedback system and a first-order negative feedback system:
Wherein, the detection system efficiency is:
S SP (t+Δt)=P SC (t+Δt)×a 2
P BJ (t+Δt)=P FG (t+Δt)×b 2
S TG (t+Δt)=P BJ (t+Δt)×b 3
R tc (t+Δt)=S SP (t+Δt)+S TG (t+Δt)
L tc (t+Δt)=2-R tc (t)
R tc (t+Δt)=-S SP (t+Δt)-S TG (t+Δt)
wherein P is SC Representing the probability of success of video review, I ZJ1 Indicating personnel cost of the check-in machine, a 1 Representing the conversion coefficient of the video recheck of the personnel on the machine, I SP1 Representing video monitoring subsystem cost, I SP2 Representing video monitoring subsystem lifting fees, I ZJ2 Indicating personnel lifting expense and JIC (just-in-time) 1 Representing initial construction cost of video monitoring subsystem, JLT 1 Representing average facility service life of video monitoring subsystem and JMTC 1 Representing video monitoring average operation and maintenance costs, JIC 2 Representing initial construction costs of an alarm subsystem, JLT 2 Representing average facility service life of alarm subsystem and JMTC 2 Representing annual average operation and maintenance cost of alarm subsystem S SP Representing video monitoring subsystem timeVariation of P SP Representing video monitoring subsystem coverage, a 2 Representing the probability conversion coefficient of video rechecking success, a 3 Representing video surveillance conversion coefficient, b 1 Representing the cost conversion coefficient of the technical protection system, b 3 Represents the conversion coefficient of the probability of success of alarm, R tc Indicating the time variation of the detection system S TG Indicating the change of the time of the alarm subsystem, I BJ1 Indicating the cost of the alarm subsystem, I BJ2 Representing the lifting expense of the alarm subsystem, P BJ Represents the alarm success probability, P FG Representing the coverage rate of the alarm subsystem;
The response system efficiency is:
S TX (t+Δt)=P TX (t+Δt)×c 2
S JW (t+Δt)=P JW (t+Δt)×d 2
R xy (t+Δt)=S TX (t+Δt)+S JW (t+Δt)
L xy (t+Δt)=3-R xy (t)
wherein I is AF1 Indicating the cost of security equipment, I AF2 Indicating the lifting cost of security equipment and ZIC 1 Indicating initial purchase cost of equipment, ZIC 2 Indicating the maintenance costs of the equipment,P TX representing the average rate of communication, I JW1 Representing the cost of guard personnel, I JW2 Representing guard personnel lifting charge c 1 Representing the cost conversion coefficient of the security equipment, c 2 Indicating communication rate conversion d 1 Representing the cost conversion coefficient of guard personnel, d 2 Represents guard response rate conversion coefficient, k represents the number of guard personnel corresponding to the kth level, S ak Representing annual salary, P, of a kth level guard person JW Represents the response rate of guard personnel, S TX Representing the amount of change in communication subsystem time, R xy Representing the time variation of the response system, S JW Representing the amount of change in guard response subsystem time;
the delay system performance is:
P LC (t+Δt)=P LL (t+Δt)×e 2
S ST (t+Δt)=P LC (t+Δt)×e 3
R yc (t+Δt)=S ST (t+Δt)
L yc (t+Δt)=5-R yc (t)
wherein P is LL Representing force deployment area coverage, I WF1 Engineering cost is prevented to the representation thing, I WF2 Indicating engineering lifting expense and WIC 0 Representing initial construction costs of class o facilities, WLT 0 Indicating design life of class o facility, WMTC 0 Representing annual average operating cost, P, of class o facilities LC Represent the probability of successful deployment of the power, S ST Representing the variation of the physical protection subsystem time, R yc Indicating the time variation of the delay system, e 1 Engineering cost conversion coefficient of representation object, e 2 Representing the force deployment area conversion coefficient e 3 Representing a strength deployment success probability conversion coefficient;
will delay the system performance L yc Subtracting the detection system effectiveness L tc And responsive to system performance L xy The method comprises the following steps:
XN(t+Δt)=L yc (t+Δt)-L xy (t+Δt)-L tc (t+Δt)
XN represents security system efficacy;
the security efficiency evaluation module is configured to construct a dynamic system flow stock graph based on the dimensionless input data and the dimensionless protection data, and analyze and obtain security efficiency of a target security system, wherein the security efficiency of the target security system is a sum of detection system efficiency, response system efficiency and delay system efficiency.
7. An electronic device, comprising: at least one processor; and a memory communicatively coupled to at least one of the processors; wherein the memory stores instructions executable by the processor for execution by the processor to implement the system dynamics-based security system efficacy assessment method of any one of claims 1-5.
CN202210145074.9A 2022-02-17 2022-02-17 Security system efficiency evaluation method, system and equipment based on system dynamics Active CN114548731B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210145074.9A CN114548731B (en) 2022-02-17 2022-02-17 Security system efficiency evaluation method, system and equipment based on system dynamics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210145074.9A CN114548731B (en) 2022-02-17 2022-02-17 Security system efficiency evaluation method, system and equipment based on system dynamics

Publications (2)

Publication Number Publication Date
CN114548731A CN114548731A (en) 2022-05-27
CN114548731B true CN114548731B (en) 2023-10-17

Family

ID=81675986

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210145074.9A Active CN114548731B (en) 2022-02-17 2022-02-17 Security system efficiency evaluation method, system and equipment based on system dynamics

Country Status (1)

Country Link
CN (1) CN114548731B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224772A (en) * 2015-11-04 2016-01-06 松辽流域水资源保护局松辽流域水环境监测中心 A kind of Nenjiang representative region Ecology methods of risk assessment based on system dynamics decision model
CN111585277A (en) * 2020-05-19 2020-08-25 三峡大学 Power system dynamic security assessment method based on hybrid integration model
CN113240305A (en) * 2021-05-20 2021-08-10 大连海事大学 Method and system for evaluating safety risk prevention and control efficiency of underway ship based on capability entropy
CN113591326A (en) * 2021-08-17 2021-11-02 中国人民解放军陆军工程大学 Information guarantee scheme simulation evaluation method and system based on system dynamics
CN113657703A (en) * 2021-07-02 2021-11-16 北京师范大学 Regional typhoon disaster rigidity and toughness system dynamics simulation method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224772A (en) * 2015-11-04 2016-01-06 松辽流域水资源保护局松辽流域水环境监测中心 A kind of Nenjiang representative region Ecology methods of risk assessment based on system dynamics decision model
CN111585277A (en) * 2020-05-19 2020-08-25 三峡大学 Power system dynamic security assessment method based on hybrid integration model
CN113240305A (en) * 2021-05-20 2021-08-10 大连海事大学 Method and system for evaluating safety risk prevention and control efficiency of underway ship based on capability entropy
CN113657703A (en) * 2021-07-02 2021-11-16 北京师范大学 Regional typhoon disaster rigidity and toughness system dynamics simulation method
CN113591326A (en) * 2021-08-17 2021-11-02 中国人民解放军陆军工程大学 Information guarantee scheme simulation evaluation method and system based on system dynamics

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
In-depth analysis on safety and security research based on system dynamics: A bibliometric mapping approach-based study;Xiaoqing Gou等;《Safety Science 》;第1-16页,全文 *
The Research of Simulation for Network Security Based on System Dynamics;Hong-shan Kong等;《2009 Fifth International Conference on Information Assurance and Security》;第145-148页,全文 *
化学灾害中个体风险感知的系统动力学建模与仿真研究;王中邮等;《科技管理研究》(第09期);第163-169页,全文 *
基于系统动力学的安全防范系统各影响因素研究;刘宇等;《中国人民公安大学学报(自然科学版)》(第02期);第96-102页,全文 *
基于系统动力学的安全防范系统效能仿真研究;刘宇;《中国优秀硕士学位论文全文数据库社会科学Ⅰ辑》;正文第2.3、3、4.1-4.3节 *
大型工程社会稳定风险扩散的系统动力学仿真研究;黄德春等;《河海大学学报 ( 哲学社会科学版)》;第21卷(第3期);第60-67页,全文 *
集成"能力-时效-决策"的应急处置 效果预评估模型;倪慧荟;《中国安全科学学报》;第30卷(第12期);第148-155页,全文 *

Also Published As

Publication number Publication date
CN114548731A (en) 2022-05-27

Similar Documents

Publication Publication Date Title
CN107909299B (en) People hinders Claims Resolution data risk checking method and system
US20090099884A1 (en) Method and system for detecting fraud based on financial records
CN110555617A (en) Real-time dynamic quantitative assessment method for building fire risk based on Internet of things
CN117150934B (en) Comprehensive monitoring system for transformer bushing state and online data processing method thereof
CN113012388B (en) Pollution source online monitoring system and online monitoring data false identification analysis method
CN109214658A (en) A kind of dynamic weighing weighbridge and weighbridge management system
CN114973567B (en) Automatic alarm method and terminal based on face recognition
CN110658544B (en) Equipment personnel state monitoring and predicting method based on nuclear power plant access monitoring system
CN114548731B (en) Security system efficiency evaluation method, system and equipment based on system dynamics
CN110675013A (en) Method for evaluating construction safety of construction engineering project
CN116882722B (en) Intelligent building site management method and system based on Internet of things
CN107609330B (en) Access log mining-based internal threat abnormal behavior analysis method
CN112016809B (en) Residential building grading system and method based on intelligent community construction
CN113283861A (en) Method for constructing intelligent enterprise compliance
CN116777244A (en) Performance evaluation method for barracks safety precaution system
CN117191147A (en) Flood discharge dam water level monitoring and early warning method and system
CN115271379B (en) Intelligent armed information service management platform
CN116346405A (en) Network security operation and maintenance capability evaluation system and method based on data statistics
CN115936293A (en) Subway construction safety accident risk evaluation method based on PCA
CN106444689A (en) Human body infrared sensor based smart home control center equipment
RU135435U1 (en) AUTOMATED WORKPLACE FOR MONITORING EFFECTIVENESS OF PERSONNEL WORK AND PREVENTION OF INSIDER ATTACKS
CN113205268A (en) Comprehensive evaluation method and system for enterprise environment management work
CN112904816B (en) Intelligent environment-friendly real-time monitoring method
KR102394464B1 (en) A SYSTEM AND METHOD FOR CALCULATING THE COMPREHENSIVE CIVIL COMPLAINT INDEX AND CONTROLING THE CRITICAL CIVIL COMPLIAINT POINTS USING IoT TIME SERIES NOISE, VIBRATION DATA AND REGULATORY STANDARDS AND THE CIVIL COMPLAINT INFORMATION
CN118051905A (en) Funds storage management customer information security management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant