计算机科学 ›› 2021, Vol. 48 ›› Issue (10): 351-358.doi: 10.11896/jsjkx.200900144
• 交叉&前沿 • 上一篇
李姝1, 杨华1, 宋波2
LI Shu1, YANG Hua1, SONG Bo2
摘要: 供应链网络与我们的生活密切相关,而供应链网络的级联失效问题一直是研究的重点。文中提出了一种多层供应链网络混合失效模型,更好地模拟了真实供应链网络欠载失效和过载级联失效的过程,为预防供应链网络崩溃提供了参考。首先,建立了上层供应商网络过载级联失效模型和下层零售商网络欠载失效模型,它们共同构成了上下层网络混合的供应链网络模型;然后,通过采用不同的攻击方式攻击上下层网络,分析了供应链网络的失效迭代过程和脆弱性。在初始攻击比例一定的情况下,上层供应商网络相较于下层零售商网络有更强的鲁棒性,初始攻击节点为上层供应商网络节点时,网络崩溃的阈值更低,更容易使供应链网络发生全面崩溃。仿真结果验证了模型的有效性,为预防供应链网络崩溃提供了新的研究模型。
中图分类号:
[1]LIAO Z D,ZHENG G H.Research on the evolution of supply chain considering the characteristics of different node behavior elements[J].Application Research of Computers,2020,37(6):1679-1682,1692. [2]TANG L,JING K,HE J,et al.Robustness of assembly supply chain networks by considering risk propagation and cascading failure[J].Physica A:Statistical Mechanics and Its Applications,2016,459:129-139. [3]ZHAO Z G,ZHOU G G,LI H X.Research on the Attack Stra-tegy and Robustness of Complex Weighted Supply Chain Network[J].Computer Science,2019,46(8):138-144. [4]LI Z,GUO Y H,XU G A,et al.Dynamic analysis of cascade with emergency recovery mechanism in complex network[J].Acta Physica Sinica,2014,63(15):417-428. [5]DUI H Y,MENG X Y,HUI X,et al.Analysis of the cascading failure for scale-free networks based on a multi-strategy evolutionary game[J].Reliability Engineering and System Safety,2020,199:106919. [6]SUN J Y,TANG J M,FU W P,et al.Construction of a multi-echelon supply chain complex network evolution model and robustness analysis of cascading failure[J].Computers & Industrial Engineering,2020,144:106457. [7]LIU H,ZHOU G G,FU P H.Research on Local EvolutionModel of Hierarchical Supply Chain Complex Network[J].Computer Science,2013,40(2):270-273. [8]ZHONG J L,SANHEDRAI H,ZHANG F M,et al.Networkendurance against cascading overload failure[J].Reliability Engineering and System Safety,2020,201:106916. [9]BELLINGERI M,CASSI D.Robutness of weighted networks[J].Physica A:Statistical Mechanics and Its Applications,2018,489:47-55. [10]LI H L,CHEN W H.The impact of the new crown epidemic on the global manufacturing supply chain and countermeasures[J].Price Theory and Practice,2020,40(5):272-275. [11]FENG G Z,SUN Y Y.The impact of the new crown pneumonia epidemic on the economy and society from the perspective of supply chain[J].Journal of Xi'an Jiaotong University (Social Science Edition),2020,40(4):42-49. [12]UNCTAD.Impact of COVID-19 pandemic on global FDI andGVCs updated analysis[R].New York:UNCTAD,2020. [13]ZHU W X,ZHANG P,LI P F,et al.The plight of small,me-dium and micro enterprises and the improvement of policy efficiency under the impact of the epidemic-Based on the analysis of two national questionnaire surveys[J].Management World,2020,36(4):13-26. [14]LI X,CHENG G R.A local-world evolving network model[J].Physica A:Statistical Mechanics and Its Applications,2003,328(1):274-286. [15]DUAN D L,WU J,DENG H Z,et al.A cascading failure model of complex networks based on adjustable load redistribution[J].System Engineering Theory and Practice,2013,33(1):203-208. [16]GAO J,CHEN Y Y.Analysis of supply chain network vulnerability under cascade failure[J].Logistics Engineering and Ma-nagement,2016,38(10):80-83,42. [17]TANG L,HE J,JING K.Research on the Cascade FailureMechanism and Robustness of Related Supply Chain Networks[J].Journal of Management Science,2016,19(11):33-44,62. [18]WANG Y C,XIAO R B.Supply chain network cascading failure modeling based on underload failure[J].Computer Integrated Manufacturing System,2020,26(5):1355-1365. [19]JIANG W J,LIU R R,FAN T L,et al.Overview of preventionand recovery strategies for multi-layer network cascade failure[J].Acta Physica Sinica,2020,69(8):81-91. [20]WANG H,GU T,JIN M,et al.The complexity measurement and evolution analysis of supply chain network under disruption risks[J].Chaos,Solitons & Fractals,2018,116(11):72-78. [21]LI G,ZHAO D Z.Study on the scale-free characteristics of supply chain networks[J].Industrial Engineering,2012,15(1):28-32. |
[1] | 任花, 牛少彰, 王茂森, 岳桢, 任如勇. 基于奇异值分解的同态可交换脆弱零水印研究 Homomorphic and Commutative Fragile Zero-watermarking Based on SVD 计算机科学, 2022, 49(3): 70-76. https://doi.org/10.11896/jsjkx.210800015 |
[2] | 王学光, 张爱新, 窦炳琳. 复杂网络上的非线性负载容量模型 Non-linear Load Capacity Model of Complex Networks 计算机科学, 2021, 48(6): 282-287. https://doi.org/10.11896/jsjkx.200700040 |
[3] | 刘强,况晓辉,陈华,李响,李广轲. 一种基于程序切片相似度匹配的脆弱性发现方法 Vulnerability Discovery Approach Based on Similarity Matching of Program Slicing 计算机科学, 2019, 46(7): 126-132. https://doi.org/10.11896/j.issn.1002-137X.2019.07.020 |
[4] | 况晓辉,李津,赵刚. 一种基于多层拓扑的大规模分布式系统结构脆弱性分析算法 Multilayer Topology Structural Vulnerability Analysis Algorithm for Large-scale Distributed System 计算机科学, 2016, 43(8): 26-29. https://doi.org/10.11896/j.issn.1002-137X.2016.08.005 |
[5] | 姜伟伟,刘光杰,戴跃伟. 基于Snort的Modbus TCP工控协议异常数据检测规则设计 Design of Modbus TCP Industrial Control Network Protocol Abnormal Data Detection Rules Based on Snort 计算机科学, 2015, 42(11): 212-216. https://doi.org/10.11896/j.issn.1002-137X.2015.11.044 |
[6] | 张颖淳,王淑良. 基于复杂网络理论的电力基础设施网络关键组件辨识 Critical Components Identification of Power Infrastructure Systems Based on Complex Network Theory 计算机科学, 2014, 41(5): 275-279. https://doi.org/10.11896/j.issn.1002-137X.2014.05.058 |
[7] | 唐成华,汤申生,强保华. DS融合知识的网络安全态势评估及验证 Assessment and Validation of Network Security Situation Based on DS and Knowledge Fusion 计算机科学, 2014, 41(4): 107-110. |
[8] | 柳虹,周根贵,傅培华,毛国红. 基于供应链网络的传递攻击策略研究 Research of Transferring Attack Based on Supply Chain Network 计算机科学, 2013, 40(7): 98-101. |
[9] | 陈加梅,陈锦富,詹永照,王环环,李青. 基于消息变异的Web服务脆弱性测试系统的设计与实现 Design and Implementation of Web Service Vulnerability Testing System Based on SOAP Messages Mutation 计算机科学, 2013, 40(7): 143-146. |
[10] | 况晓辉,赵刚,温研,许飞,苗青. 大规模分布式系统脆弱性分析框架研究 Research on Vulnerability Analysis Framework for Large-scale Distributed System 计算机科学, 2012, 39(6): 58-60. |
[11] | 李 艺,李新明,崔云飞. 软件脆弱性危险程度量化评估模型研究 Research of Evaluating Model on the Criticality of Software Vulnerability 计算机科学, 2011, 38(6): 169-172. |
[12] | 陈锋,毛捍东,张维明,雷长海. 攻击图技术研究进展 Survey of Attack Graph Technique 计算机科学, 2011, 38(11): 12-18. |
[13] | 吴耕锐,杨晓元,钮可. 一种改进的混编视频水印方案 Improved Mixed Video Watermarking Scheme 计算机科学, 2011, 38(10): 84-86. |
[14] | 王春雷,刘强,赵刚,戴一奇. 一种基于模型检测的二进制程序脆弱性分析框架 Vulnerability Analysis Framework for Binaries Based on Model Checking 计算机科学, 2010, 37(4): 120-. |
[15] | 欧阳敏 费奇 余明辉 栾恩杰. 复杂网络的功效性与脆弱性研究综述 计算机科学, 2008, 35(6): 1-4. |
|