Analytical and Evolutionary Methods for Finding Cut Volumes in Fault Trees Constrained by Location

Fault tree analysis (FTA) is used to find and mitigate vulnerabilities in a system based on its constituent components. Methods exist to efficiently find minimal cut sets (MCSs), which are combinations of components whose failure causes the system to fail. However, traditional FTA ignores the physical location of the components. Components that are close to each other could be defeated by a single event with a radius of effect, such as an explosion or fire. This motivates the search for techniques to identify such vulnerabilities. Adding physical locations to the fault tree structure can help identify vulnerabilities in the overall system. Using this information requires extending existing solution methods or developing entirely new methods. In this paper, two solution approaches were explored. The first executes traditional FTA software, then searches for clusters in the resulting MCS to find these vulnerabilities. The second uses an evolutionary algorithm to search directly for volumes containing components that form cut sets. Results show that the evolutionary approach provided better answers (i.e., smaller volumes) overall and is suitable to identify vulnerabilities caused by proximity of components. However, the cluster approach performed well when evaluating higher numbers of locations and may be suitable in specific situations. Potential refinements to both methods are discussed.

[1]  Enrico Zio,et al.  Analytical Solutions of Large Fault Tree Models using BDD: New Techniques and Applications , 2010 .

[2]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[3]  S. P. Lloyd,et al.  Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.

[4]  J Gauthier,et al.  Assessment of large automatically generated fault trees by means of binary decision diagrams , 2007 .

[5]  Antoine Rauzy Mathematical foundations of minimal cutsets , 2001, IEEE Trans. Reliab..

[6]  R. P. Wiegand,et al.  Exploring solution methods for fault trees constrained by location , 2017, 2017 Annual Reliability and Maintainability Symposium (RAMS).

[7]  E. Boebert,et al.  Deepwater Horizon: A Systems Analysis of the Macondo Disaster , 2016 .

[8]  Mariëlle Stoelinga,et al.  Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools , 2014, Comput. Sci. Rev..

[9]  R. Paul Wiegand,et al.  Using L-Systems to Generate Fault Trees for Benchmarking and Testing , 2016, FLAIRS Conference.

[10]  Eric Edwards,et al.  Fundamentals of Ground Combat System Ballistic Vulnerability/Lethality , 2009 .

[11]  Salvatore J. Bavuso,et al.  Dynamic fault-tree models for fault-tolerant computer systems , 1992 .

[12]  Mariëlle Stoelinga,et al.  A Compositional Semantics for Dynamic Fault Trees in Terms of Interactive Markov Chains , 2007, ATVA.