Exploring solution methods for fault trees constrained by location

Jeff Hanes, R. P. Wiegand
{"title":"Exploring solution methods for fault trees constrained by location","authors":"Jeff Hanes, R. P. Wiegand","doi":"10.1109/RAM.2017.7889720","DOIUrl":null,"url":null,"abstract":"Fault Tree Analysis (FTA) is used extensively to evaluate the logical dependency of a system on its constituent components. Fault trees (FTs) can be used to identify and correct weaknesses in a design before a system goes to production. Effective methods have been developed over the course of several decades for finding minimal cut sets (MCS). Cut sets identify combinations of component failures that cause the system to fail. Other methods focus on probability risk assessment, in which component failure probabilities are evaluated to determine which failure events are most probable under normal operating conditions. However, traditional FTs do not contain information about the physical location of the components that make up the system. Thus, they cannot identify vulnerabilities induced by the proximity relationships of those components. Components that are sufficiently close to each other could be defeated by a single event with a large enough radius of effect. Events such as the Deepwater Horizon explosion and subsequent oil spill demonstrate the potentially devastating risk posed by such vulnerabilities. Adding positional information to the logical information contained in the FT can capture proximity relationships that constitute vulnerabilities in the overall system but are not contained in the logical structure alone. Thus, existing FTA methods cannot address these concerns. Making use of the positional information would require extensions to existing solution methods or possibly new methods altogether. In practice, fault trees can grow very large, exceeding one thousand components for a large system, which causes a combinatorial explosion in the number of possible solutions. Traditional methods cope with this problem by limiting the number of solutions; generally this is an acceptable limitation since those methods will find the most likely events capable of defeating the fault tree. However, adding more information to the tree and searching for different criteria (such as conditional probabilities) can render that trade invalid and motivates the search for alternate means to find vulnerabilities in the system. Candidate methods for this type of problem should be able to find “hot spots” in the physical space of very large real world systems where a destructive event would damage multiple components and cause the overall system to fail. In the present research, a test set of medium to large fault tree systems was generated using Lindenmayer systems. These systems vary in size from tens of components to over a thousand and vary in terms of complexity as measured by the proportion of operator types and size of minimal cut sets. Two solution approaches were explored in this research that use graph clustering to integrate positional information with FT solutions as an initial attempt to solve spatially constrained fault trees. These methods were applied to the set of test fault trees to evaluate their performance in finding solutions to this type of problem. The first method uses xfta, a freely available FT solver from OpenPSA, to find minimal cut sets, then performs k-means clustering on the resulting cut sets to determine whether a spatial vulnerability exists. This method works well for smaller fault trees for which all minimal cut sets can be determined. However, for large, complex fault trees, there remains the possibility that crucial vulnerabilities are not identified since the overall proportion of MCS that can be evaluated in practical time can be less than one in a million. The second method performs a modified k-means cluster on the entire set of components to find groups of spatially related components, then feeds the groups into a fault tree evaluator. This method also works, though not very effectively, for smaller fault trees or when the radius of effect is large relative to the physical space. Neither method provides a deterministic means to solve large complex fault trees, leaving open the question of whether better methods exist to solve this type of problem. The combinatorial effect combined with the addition of positional information increases the difficulty of finding solutions in the search space. This research is presented in the hope of stimulating interest in the research community to find better methods of finding and correcting vulnerabilities using fault trees with location information.","PeriodicalId":138871,"journal":{"name":"2017 Annual Reliability and Maintainability Symposium (RAMS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Annual Reliability and Maintainability Symposium (RAMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAM.2017.7889720","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Fault Tree Analysis (FTA) is used extensively to evaluate the logical dependency of a system on its constituent components. Fault trees (FTs) can be used to identify and correct weaknesses in a design before a system goes to production. Effective methods have been developed over the course of several decades for finding minimal cut sets (MCS). Cut sets identify combinations of component failures that cause the system to fail. Other methods focus on probability risk assessment, in which component failure probabilities are evaluated to determine which failure events are most probable under normal operating conditions. However, traditional FTs do not contain information about the physical location of the components that make up the system. Thus, they cannot identify vulnerabilities induced by the proximity relationships of those components. Components that are sufficiently close to each other could be defeated by a single event with a large enough radius of effect. Events such as the Deepwater Horizon explosion and subsequent oil spill demonstrate the potentially devastating risk posed by such vulnerabilities. Adding positional information to the logical information contained in the FT can capture proximity relationships that constitute vulnerabilities in the overall system but are not contained in the logical structure alone. Thus, existing FTA methods cannot address these concerns. Making use of the positional information would require extensions to existing solution methods or possibly new methods altogether. In practice, fault trees can grow very large, exceeding one thousand components for a large system, which causes a combinatorial explosion in the number of possible solutions. Traditional methods cope with this problem by limiting the number of solutions; generally this is an acceptable limitation since those methods will find the most likely events capable of defeating the fault tree. However, adding more information to the tree and searching for different criteria (such as conditional probabilities) can render that trade invalid and motivates the search for alternate means to find vulnerabilities in the system. Candidate methods for this type of problem should be able to find “hot spots” in the physical space of very large real world systems where a destructive event would damage multiple components and cause the overall system to fail. In the present research, a test set of medium to large fault tree systems was generated using Lindenmayer systems. These systems vary in size from tens of components to over a thousand and vary in terms of complexity as measured by the proportion of operator types and size of minimal cut sets. Two solution approaches were explored in this research that use graph clustering to integrate positional information with FT solutions as an initial attempt to solve spatially constrained fault trees. These methods were applied to the set of test fault trees to evaluate their performance in finding solutions to this type of problem. The first method uses xfta, a freely available FT solver from OpenPSA, to find minimal cut sets, then performs k-means clustering on the resulting cut sets to determine whether a spatial vulnerability exists. This method works well for smaller fault trees for which all minimal cut sets can be determined. However, for large, complex fault trees, there remains the possibility that crucial vulnerabilities are not identified since the overall proportion of MCS that can be evaluated in practical time can be less than one in a million. The second method performs a modified k-means cluster on the entire set of components to find groups of spatially related components, then feeds the groups into a fault tree evaluator. This method also works, though not very effectively, for smaller fault trees or when the radius of effect is large relative to the physical space. Neither method provides a deterministic means to solve large complex fault trees, leaving open the question of whether better methods exist to solve this type of problem. The combinatorial effect combined with the addition of positional information increases the difficulty of finding solutions in the search space. This research is presented in the hope of stimulating interest in the research community to find better methods of finding and correcting vulnerabilities using fault trees with location information.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
探索受位置约束的故障树的求解方法
故障树分析(FTA)被广泛用于评估系统与其组成部件之间的逻辑依赖关系。故障树(FTs)可用于在系统投入生产之前识别和纠正设计中的弱点。在过去的几十年里,人们已经开发出了寻找最小割集的有效方法。切断集识别导致系统故障的组件故障组合。其他方法侧重于概率风险评估,其中评估部件的失效概率,以确定在正常运行条件下哪些故障事件最可能发生。然而,传统的ft不包含有关组成系统的组件的物理位置的信息。因此,它们不能识别由这些组件的接近关系引起的漏洞。彼此距离足够近的组件可能会被一个影响半径足够大的事件所击败。深水地平线爆炸和随后的石油泄漏等事件表明,这些脆弱性可能带来毁灭性的风险。将位置信息添加到FT中包含的逻辑信息中,可以捕获在整个系统中构成漏洞但不单独包含在逻辑结构中的接近关系。因此,现有的自由贸易协定方法无法解决这些问题。利用位置信息将需要扩展现有的解决方法,或者可能需要完全使用新方法。在实践中,故障树可以增长得非常大,对于一个大系统来说可能超过一千个组件,这将导致可能解决方案数量的组合爆炸。传统方法通过限制解的数量来解决这个问题;一般来说,这是一个可以接受的限制,因为这些方法将找到最有可能击败故障树的事件。然而,向树中添加更多信息并搜索不同的标准(例如条件概率)可能会使交易无效,并促使搜索替代方法来查找系统中的漏洞。这类问题的候选方法应该能够在非常大的现实世界系统的物理空间中找到“热点”,在这些物理空间中,破坏性事件会损坏多个组件并导致整个系统失败。在本研究中,利用Lindenmayer系统生成了中大型故障树系统的测试集。这些系统的大小各不相同,从几十个组件到超过一千个组件,并且通过操作员类型的比例和最小切割集的大小来衡量复杂性。本研究探索了两种解决方法,即使用图聚类将位置信息与FT解相结合,作为解决空间约束故障树的初步尝试。将这些方法应用于测试故障树集,以评估它们在寻找此类问题的解决方案方面的性能。第一种方法使用OpenPSA免费提供的FT求解器xfta来寻找最小切割集,然后对结果切割集执行k-means聚类,以确定是否存在空间脆弱性。该方法适用于可以确定所有最小割集的小故障树。然而,对于大型、复杂的故障树,仍然存在无法识别关键漏洞的可能性,因为在实际时间内可以评估的MCS的总体比例可能不到百万分之一。第二种方法对整个组件集执行改进的k-means聚类,以找到空间相关组件组,然后将这些组提供给故障树评估器。这种方法也适用于较小的故障树,或者当影响半径相对于物理空间较大时,虽然不是很有效。这两种方法都没有提供解决大型复杂故障树的确定性方法,留下了是否存在更好的方法来解决这类问题的问题。组合效应加上位置信息的加入,增加了在搜索空间中寻找解的难度。本研究旨在激发研究界的兴趣,寻找更好的方法,利用故障树和位置信息来发现和纠正漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Reliability study on high-k bi-layer dielectrics Contracting for system availability under fleet expansion: Redundancy allocation or spares inventory? Risk modeling of variable probability external initiating events Human reliability assessments: Using the past (Shuttle) to predict the future (Orion) Uniform analysis of fault trees through model transformations
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1