CN118152725B - Killing chain closure evaluation method based on equipment system model - Google Patents
Killing chain closure evaluation method based on equipment system model Download PDFInfo
- Publication number
- CN118152725B CN118152725B CN202410332935.3A CN202410332935A CN118152725B CN 118152725 B CN118152725 B CN 118152725B CN 202410332935 A CN202410332935 A CN 202410332935A CN 118152725 B CN118152725 B CN 118152725B
- Authority
- CN
- China
- Prior art keywords
- equipment
- reconnaissance
- node
- follows
- radar
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000011156 evaluation Methods 0.000 title claims abstract description 16
- 238000004364 calculation method Methods 0.000 claims abstract description 79
- 238000004891 communication Methods 0.000 claims abstract description 78
- 238000012216 screening Methods 0.000 claims abstract description 17
- 238000000034 method Methods 0.000 claims abstract description 16
- 230000003993 interaction Effects 0.000 claims abstract description 12
- 238000001514 detection method Methods 0.000 claims description 34
- 230000005540 biological transmission Effects 0.000 claims description 21
- 230000002452 interceptive effect Effects 0.000 claims description 13
- 230000008569 process Effects 0.000 claims description 12
- 230000014509 gene expression Effects 0.000 claims description 9
- 230000000694 effects Effects 0.000 claims description 8
- 230000007613 environmental effect Effects 0.000 claims description 7
- 230000010365 information processing Effects 0.000 claims description 7
- 238000009825 accumulation Methods 0.000 claims description 6
- 238000012937 correction Methods 0.000 claims description 4
- 238000004422 calculation algorithm Methods 0.000 claims description 3
- 239000011888 foil Substances 0.000 claims description 3
- 238000005259 measurement Methods 0.000 claims description 3
- 230000035484 reaction time Effects 0.000 claims description 3
- 230000008439 repair process Effects 0.000 claims description 3
- 230000004044 response Effects 0.000 claims description 3
- 238000010187 selection method Methods 0.000 claims description 3
- 238000004458 analytical method Methods 0.000 abstract description 8
- 238000005457 optimization Methods 0.000 abstract description 2
- 230000001629 suppression Effects 0.000 description 5
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 1
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 1
- 101100012902 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) FIG2 gene Proteins 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000033228 biological regulation Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000006185 dispersion Substances 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/18—Complex mathematical operations for evaluating statistical data, e.g. average values, frequency distributions, probability functions, regression analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- Computational Mathematics (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Operations Research (AREA)
- Algebra (AREA)
- Databases & Information Systems (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Game Theory and Decision Science (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Quality & Reliability (AREA)
- General Business, Economics & Management (AREA)
- Life Sciences & Earth Sciences (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Evolutionary Biology (AREA)
- Probability & Statistics with Applications (AREA)
- Radar Systems Or Details Thereof (AREA)
Abstract
本发明涉及杀伤链闭合性评估方法领域,一种基于装备体系模型的杀伤链闭合性评估方法,根据已知信息计算杀伤链闭合概率需要对链条上每一个环节的交互关系计算效能,计算侦察概率、通信概率、指控概率、计算打击概率和计算杀伤链闭合时间,根据以上计算结果对所有初始生成的杀伤链进行计算,然后设计筛选规则,根据一定的闭合概率、闭合时间阈值进行筛选,得到的筛选结果即为有效杀伤链,有效杀伤链的集合构成了作战网络的杀伤网,本发明提出的对闭合性计算的方法从ADC效能评估方法出发,充分考虑杀伤链每个作战环节对闭合性的影响,构建了一套明确的杀伤链闭合性计算分析模型,可以准确反映作战网络的闭合性,为部署分配工作及优化提供指导。
The present invention relates to the field of kill chain closure evaluation methods, and is a kill chain closure evaluation method based on an equipment system model. To calculate the kill chain closure probability according to known information, it is necessary to calculate the efficiency of the interaction relationship of each link in the chain, calculate the reconnaissance probability, the communication probability, the command probability, the strike probability and the kill chain closure time. According to the above calculation results, all initially generated kill chains are calculated, and then screening rules are designed. According to certain closure probability and closure time thresholds, screening is performed. The obtained screening results are effective kill chains. The collection of effective kill chains constitutes a kill network of a combat network. The method for calculating closure proposed by the present invention starts from an ADC effectiveness evaluation method, fully considers the influence of each combat link of the kill chain on closure, and constructs a set of clear kill chain closure calculation and analysis models, which can accurately reflect the closure of the combat network and provide guidance for deployment allocation and optimization.
Description
技术领域Technical Field
本发明涉及杀伤链闭合性评估方法领域,具体为一种基于装备体系模型的杀伤链闭合性评估方法。The present invention relates to the field of kill chain closure evaluation methods, and in particular to a kill chain closure evaluation method based on an equipment system model.
背景技术Background Art
装备体系复杂网络建模理论是一套为了评估在特定战略使命任务中对敌方目标形成的战斗力的建模理论,其中将我方装备体系中的实体之间生成的包含侦察、通信、指控、打击等的多种交互关系按范围与能力属性构成一个由节点与连边组成的网络称为作战网络,网络中节点代表敌我双方装备实体,边表示两个节点的交互关系。The equipment system complex network modeling theory is a set of modeling theories for evaluating the combat effectiveness formed against enemy targets in specific strategic missions. In it, the various interactive relationships generated between entities in our equipment system, including reconnaissance, communication, command and control, and attack, are organized into a network composed of nodes and edges according to scope and capability attributes, which is called a combat network. The nodes in the network represent the equipment entities of both the enemy and us, and the edges represent the interactive relationship between two nodes.
杀伤链是在作战网络中依照OODA(Observation、Orientation、Decision、Action)循环理论建立的作战回路,以此对敌方目标形成有效战斗力。杀伤链形成的前提是整条链的作战活动可以成功闭合,在作战网络中成功闭合的杀伤链的集合构成的网络称为杀伤网。杀伤链的闭合性能的好坏主要通过闭合概率与闭合时间反映。因此,如何基于作战活动与杀伤链模型构建出对杀伤链的闭合性的评估方法是十分重要的,它能直接影响到后续我方战场装备的部署分配问题。而目前对于闭合性的计算缺乏明确有效的模型,同时很多模型对于作战活动中影响闭合性的可能因素考虑得不够充分,导致闭合性计算结果难以指导后续部署分配的优化问题,首先针对杀伤链的评估方法,目前主流的思路是基于各种已有的节点基础指标,采用如层次分析等方法进行聚合得到相应的评估结果,对基础指标的分析构建方法不明确,且设计的基础指标无法全面描述杀伤链的特征;在闭合性分析方面,目前主要采用的对每个作战环节进行具体分析,而缺乏将每个作战环节串联起来作为整体考虑,同时各个作战活动效能计算只考虑我方装备的能力属性,缺乏对战场环境、敌方部署装备对我方装备的影响的计算,为此,本发明提出了一种基于装备体系模型的杀伤链闭合性评估方法解决上述问题,为此,本发明提出了一种基于装备体系模型的杀伤链闭合性评估方法解决上述问题。The kill chain is a combat loop established in the combat network according to the OODA (Observation, Orientation, Decision, Action) cycle theory, which can form effective combat power against enemy targets. The premise for the formation of the kill chain is that the combat activities of the entire chain can be successfully closed. The network composed of the collection of successfully closed kill chains in the combat network is called a kill web. The quality of the closure performance of the kill chain is mainly reflected by the closure probability and closure time. Therefore, it is very important to construct an evaluation method for the closure of the kill chain based on combat activities and the kill chain model, which can directly affect the subsequent deployment and allocation of our battlefield equipment. However, there is currently a lack of clear and effective models for the calculation of closure. At the same time, many models do not fully consider the possible factors that may affect closure in combat activities, resulting in the difficulty of closure calculation results in guiding the optimization of subsequent deployment and allocation. First, with regard to the kill chain evaluation method, the current mainstream idea is based on various existing node basic indicators, and uses methods such as hierarchical analysis to aggregate and obtain corresponding evaluation results. The analysis and construction methods of basic indicators are unclear, and the designed basic indicators cannot fully describe the characteristics of the kill chain; in terms of closure analysis, the current main method is to conduct a specific analysis of each combat link, but lacks the consideration of connecting each combat link in series as a whole. At the same time, the effectiveness calculation of each combat activity only considers the capability attributes of our equipment, and lacks the calculation of the impact of the battlefield environment and the enemy's deployed equipment on our equipment. For this reason, the present invention proposes a kill chain closure evaluation method based on an equipment system model to solve the above problems. For this reason, the present invention proposes a kill chain closure evaluation method based on an equipment system model to solve the above problems.
发明内容Summary of the invention
本发明的目的在于提供一种基于装备体系模型的杀伤链闭合性评估方法,以解决上述背景技术中提出的问题。The purpose of the present invention is to provide a kill chain closure evaluation method based on an equipment system model to solve the problems raised in the above background technology.
为实现上述目的,一种基于装备体系模型的杀伤链闭合性评估方法,包括如下步骤:To achieve the above purpose, a kill chain closure evaluation method based on an equipment system model includes the following steps:
步骤S1,根据已知信息计算杀伤链闭合概率需要对链条上每一个环节的交互关系计算效能,首先计算侦察效能P(INV);Step S1, calculating the kill chain closure probability based on known information requires calculating the effectiveness of the interaction relationship of each link in the chain, first calculating the reconnaissance effectiveness P(INV);
步骤S2,计算通信效能P(COM);Step S2, calculating the communication performance P(COM);
步骤S3,计算指控效能P(DEC);Step S3, calculating the charge effectiveness P(DEC);
步骤S4,计算打击效能P(ATT);Step S4, calculating the attack effectiveness P (ATT);
步骤S5,计算杀伤链闭合时间;Step S5, calculating the kill chain closing time;
步骤S6,根据以上计算结果对所有初始生成的杀伤链进行计算,然后设计筛选规则,根据一定的闭合概率、闭合时间阈值进行筛选,得到的筛选结果即为有效杀伤链;Step S6, calculating all initially generated kill chains according to the above calculation results, and then designing screening rules to screen according to certain closing probability and closing time thresholds, and the obtained screening results are effective kill chains;
步骤S7,筛选得到有效杀伤链后,有效杀伤链的集合构成了作战网络的杀伤网。Step S7, after screening out effective kill chains, the set of effective kill chains constitutes the kill web of the combat network.
优选的:可用度P(A)计算方法如下:Preferred: The calculation method of availability P(A) is as follows:
式中t1为平均故障时间,t2为平均修理时间,可靠性P(D)计算方法如下:Where t1 is the mean time between failures and t2 is the mean time between repairs. The reliability P(D) is calculated as follows:
式中t为平台运行时间,效能P(C)计算方法如下:根据杀伤链中相邻两个装备所完成的作战活动(侦查、通信、指控、打击)计算装备之间的效能,进而得到杀伤链的效能。Where t is the platform operation time. The calculation method of effectiveness P(C) is as follows: the effectiveness between the equipment is calculated based on the combat activities (reconnaissance, communication, command and control, and strike) completed by two adjacent equipment in the kill chain, and then the effectiveness of the kill chain is obtained.
式中Pability为杀伤链效能;n为该杀伤链中装备的个数;(PINV)i,i+1为第i个装备和第i+1个装备之间的侦察效能;(PCOM)i,i+1为第i个装备和第i+1个装备之间的通信效能;(PDEC)i,i+1为第i个装备和第i+1个装备之间的指控效能;(PATT)i,i+1为第i个装备和第i+1个装备之间的打击效能。Where Pability is the kill chain effectiveness; n is the number of equipment in the kill chain; (P INV ) i,i+1 is the reconnaissance effectiveness between the i-th equipment and the i+1-th equipment; (P COM ) i,i+1 is the communication effectiveness between the i-th equipment and the i+1-th equipment; (P DEC ) i,i+1 is the command and control effectiveness between the i-th equipment and the i+1-th equipment; (P ATT ) i,i+1 is the strike effectiveness between the i-th equipment and the i+1-th equipment.
优选的:所述(PINV)i,i+1表示一条杀伤链中第i个装备和第i+1个装备之间的侦察效能,表示侦察装备i+1对敌方装备i进行侦察的单向交互关系,是我方侦察装备获取敌方装备信息的过程,具体计算方式如下所示:Preferably: the ( PINV ) i,i+1 represents the reconnaissance effectiveness between the i-th equipment and the i+1-th equipment in a kill chain, and represents the one-way interactive relationship in which the reconnaissance equipment i+1 performs reconnaissance on the enemy equipment i. It is the process in which our reconnaissance equipment obtains the enemy equipment information. The specific calculation method is as follows:
(1)雷达类侦察节点探测普通目标,雷达检测采用奈曼-皮尔逊准则:将虚警概率约束在一指定常数,使侦察效能达到最大,采用平方律检测时,单次侦察效能Pi计算方法如下所示:(1) Radar reconnaissance nodes detect ordinary targets. Radar detection uses the Neyman-Pearson criterion: the false alarm probability is constrained to a specified constant to maximize the reconnaissance effectiveness. When the square law is used for detection, the calculation method of the single reconnaissance effectiveness P i is as follows:
式中BWA为雷达波束宽度;AZR为雷达扫描频率;PRF为脉冲重复频率;N为雷达脉冲积累数;Thr为检测门限;Ψ为N个采样的信噪比均值;I(·,·)是不完全伽马函数的皮尔逊形式,雷达最大作用距离可表示为Rm;δ1为目标节点抗雷达系数,α为环境因子,选择方式如下所示:Where BWA is the radar beam width; AZR is the radar scanning frequency; PRF is the pulse repetition frequency; N is the number of radar pulse accumulation; Thr is the detection threshold; Ψ is the mean signal-to-noise ratio of N samples; I(·,·) is the Pearson form of the incomplete gamma function, and the maximum radar range can be expressed as R m ; δ 1 is the target node anti-radar coefficient, and α is the environmental factor. The selection method is as follows:
由于单次侦察难以满足作战需求,因此需要进行多次侦察,对应的侦察效能P(INV)计算方法如下所示:Since a single reconnaissance cannot meet combat requirements, multiple reconnaissances are required. The corresponding reconnaissance effectiveness P(INV) calculation method is as follows:
式中Ninv为多次侦察次数;p为雷达类侦察效能基准值;Where N inv is the number of multiple reconnaissances; p is the radar reconnaissance effectiveness benchmark value;
(2)雷达类侦察节点探测隐身目标,当被侦察目标为隐身目标时,侦察效能模型会受到明显的影响,Pi具体计算方法如下所示:(2) When radar reconnaissance nodes detect stealth targets, the reconnaissance effectiveness model will be significantly affected when the target being reconnaissance is a stealth target. The specific calculation method of Pi is as follows:
式中N为雷达脉冲积累数;Thr为检测门限;SN为信噪比;Θ为目标的雷达反射截面积;ε为目标节点隐身系数;Where N is the number of radar pulse accumulation; Thr is the detection threshold; SN is the signal-to-noise ratio; Θ is the radar reflection cross-sectional area of the target; ε is the stealth coefficient of the target node;
(3)雷达类侦察节点探测存在遮蔽的目标,当目标存在遮蔽时,雷达最大探测距离受到影响如下所示:(3) When a radar reconnaissance node detects an obscured target, the maximum detection distance of the radar is affected as follows:
式中φ为目标节点遮蔽系数;εk为雷达遮蔽角;Hg为目标高度;Where φ is the shielding coefficient of the target node; ε k is the radar shielding angle; H g is the target height;
(4)雷达类侦察节点在受干扰的情况下探测目标,当雷达受到干扰时,以无源干扰中最常用的干扰箔条为例,雷达的最大探测距离受到影响如下所示:(4) Radar reconnaissance nodes detect targets under interference. When the radar is interfered, taking the most commonly used interference foil in passive interference as an example, the maximum detection distance of the radar is affected as follows:
式中λ为雷达波长;为目标节点干扰强度;R0为无干扰时雷达最大探测距离;Where λ is the radar wavelength; is the interference intensity of the target node; R 0 is the maximum detection distance of the radar when there is no interference;
(5)卫星类侦察节点探测目标,当侦察装备为卫星时,侦察效能计算方法如下所示,(5) When a satellite-type reconnaissance node detects a target, the reconnaissance effectiveness calculation method is as follows:
式中k为侦察卫星总共发现的目标批数;Nt为地方来袭目标总数;Di为第i批目标的探测距离;ID为卫星对地面的探测范围半径;Hi为第i批目标节点的高度;IH为来袭目标的高度平均值;p1为单次探测概率,p0为卫星类侦察效能基准值;ns为探测次数;δ2为目标节点抗卫星系。Where k is the total number of target batches discovered by the reconnaissance satellite; Nt is the total number of local incoming targets; Di is the detection distance of the i-th batch of targets; ID is the detection range radius of the satellite to the ground; Hi is the height of the i-th batch of target nodes; IH is the average height of the incoming targets; p1 is the single detection probability, p0 is the satellite reconnaissance effectiveness benchmark value; ns is the number of detections; δ2 is the target node anti-satellite system.
优选的:所述P(COM)表示通信的成功概率,具体计算方法如下所示:Preferably: the P(COM) represents the success probability of communication, and the specific calculation method is as follows:
其中,ncom为通信次数,为第c次两节点间的通信效能,通信效能由通信传输能力pij表示。Among them, n com is the number of communications, is the c-th communication performance between two nodes, and the communication performance is represented by the communication transmission capacity p ij .
优选的:所述通信传输能力pij具体计算方法如下所示,Preferably: the specific calculation method of the communication transmission capacity p ij is as follows:
假设前后两个节点分别为S1和S2,则两个节点的通信交互关系可以根据节点通信建模中的覆盖范围dnode、传输速率vnode、通信质量enode、通信容量Canode以及信息延迟Denode;五个通信能力相关的战技指标组成的通信传输能力P(COM)计算得到:Assuming that the two nodes in front and behind are S 1 and S 2 respectively, the communication interaction relationship between the two nodes can be calculated based on the coverage range d node , transmission rate v node , communication quality e node , communication capacity Ca node and information delay De node in the node communication modeling; the communication transmission capability P(COM) composed of five communication capability-related combat technical indicators is:
式中dis表示两个节点的相对距离,其中两节点间的通信质量可由链路预算PRX计算得到,具体算法如下所示:Where dis represents the relative distance between two nodes, and the communication quality between the two nodes can be calculated by the link budget P RX . The specific algorithm is as follows:
式中PTX为发送天线的发射功率;GTX为发送天线的发射增益;GRX为接收天线的接收增益;LFSPL为信号自由传播损耗模型;cT为不同环境下的修正因子;R为接收与发送天线之间的距离;f为发射天线的工作频率;GRX为接收天线的接收增益;Latm为天线功率在大气中的损耗;Lm为其它各类因素的损耗,通信容量Ca计算如下:Where P TX is the transmit power of the transmitting antenna; G TX is the transmit gain of the transmitting antenna; G RX is the receive gain of the receiving antenna; L FSPL is the signal free propagation loss model; c T is the correction factor under different environments; R is the distance between the receiving and transmitting antennas; f is the operating frequency of the transmitting antenna; G RX is the receive gain of the receiving antenna; L atm is the loss of antenna power in the atmosphere; L m is the loss of other factors. The communication capacity Ca is calculated as follows:
式中m代表信道的数量,B为信道带宽;ρi为第i个子信道的信噪比;λi为第i个子信道的功率增益,根据自信息量的定义,表示信息共享关系的边所具有的信息传输能力P(COM)建模表达式为:Where m represents the number of channels, B is the channel bandwidth; ρ i is the signal-to-noise ratio of the i-th subchannel; λ i is the power gain of the i-th subchannel. According to the definition of self-information, the information transmission capacity P(COM) of the edge representing the information sharing relationship is modeled as follows:
其中wi为各个通信能力的权重;Ri(i=1,2,3,4,5)分别是pi的隶属函数,由于pi都是定量指标,因此可以用下列功效函数来表示,Where w i is the weight of each communication capability; R i (i=1,2,3,4,5) are the membership functions of pi respectively. Since pi are quantitative indicators, they can be expressed by the following efficacy function:
因此,S-S边的信息传输能力为:Therefore, the information transmission capacity of the S-S edge is:
优选的:所述P(DEC)表示决策型指控节点指控的成功概率,具体计算方法如下所示,Preferably: the P(DEC) represents the success probability of the decision-making charging node charging, and the specific calculation method is as follows:
假设指控节点为D1,被指控节点为S1,这种交互关系用指控能力P(DEC)表示,具体的计算方法如下所示:Assume that the accusing node is D 1 and the accused node is S 1 . This interactive relationship is represented by the accusing capability P(DEC). The specific calculation method is as follows:
D1的信息处理能力记作E1,用自信息量对其进行建模:The information processing capacity of D 1 is denoted as E 1 , and its self-information is used to model it:
式中,Ri为信息处理能力三个指标:响应时间tcom、吞吐率Thr、精确度Acc的隶属函数(i=1,2,3),交互关系的信息传输能力E2的建模表达式为:Where R i is the membership function of the three indicators of information processing capability: response time t com , throughput T hr , and accuracy Acc (i = 1, 2, 3). The modeling expression of the information transmission capability E 2 of the interactive relationship is:
其中,in,
由此这类交互关系建模的表达式:The expressions modeled by this type of interaction are:
优选的:P(ATT)表示打击效能,根据该链的打击装备i与目标装备j,根据打击类型分为火力打击与电子干扰,具体计算方法如下,Preferred: P(ATT) represents the strike effectiveness. According to the strike equipment i and target equipment j of the chain, the strike type is divided into fire strike and electronic interference. The specific calculation method is as follows:
(1)火力打击关系的计算过程为:设导弹制导误差服从圆分布律(σx=σy=σ),其散布中心不处于目标j所在位置,即其脱靶量分布的概率密度如下:(1) The calculation process of the firepower strike relationship is as follows: Assume that the missile guidance error obeys the circular distribution law (σ x = σ y = σ), and its dispersion center is not located at the location of target j, that is, the probability density of its miss distance distribution is as follows:
目标毁伤概率为:The target damage probability is:
则: but:
其近似表达式如下:Its approximate expression is as follows:
其中r0为散布中心与目标位置的距离,σ为制导误差的协方差,R0为武器毁伤半径,PW为威胁度。R0为武器装备的本身属性,σ对于单个武器为定值,r0本身与红蓝双方距离、蓝方装备速度有关,现建立r0计算方式如下:Among them, r 0 is the distance between the center of the dispersion and the target position, σ is the covariance of the guidance error, R 0 is the weapon damage radius, and P W is the threat level. R 0 is the property of the weapon equipment itself, σ is a fixed value for a single weapon, and r 0 itself is related to the distance between the red and blue sides and the speed of the blue side's equipment. The calculation method of r 0 is now established as follows:
r0=rh·rv·rb (1-34)r 0 = r h · r v · r b (1-34)
其中,rh、rv为r0有关距离、速度的一个分量,rb为制导误差的半径,给出打击距离的上下界hmin≤reff≤hmax,目标节点机动速度vtar则与我方打击节点的武器机动速度vnode则:Among them, r h and r v are the components of r 0 related to distance and speed, r b is the radius of guidance error, and the upper and lower bounds of the attack distance are given as h min ≤ r eff ≤ h max . The maneuvering speed of the target node v tar is related to the maneuvering speed of the weapon v node of our attack node:
式中μ为目标节点抗毁系数,k为调节参数,(1-33)中PW与蓝方威胁圈有关,若红方打击装备在多个蓝方装备威胁圈内则:Where μ is the target node invulnerability coefficient, k is the adjustment parameter, and P W in (1-33) is related to the blue threat circle. If the red attack equipment is within the threat circle of multiple blue equipment, then:
NW为对当前红方打击装备部署位置产生威胁的蓝方装备数量,为第i个蓝方装备对红方打击装备威胁度,计算方法如下所示:N W is the number of blue side equipment that threatens the current deployment position of the red side's strike equipment. The threat level of the i-th blue equipment to the red equipment is calculated as follows:
式中α为环境因子;β∈[1,10]为整数权重系数表示目标节点重要程度;w为目标节点的威胁度权重;Rmax为蓝方装备最大威胁范围;R为蓝方装备与红方装备距离;Where α is the environmental factor; β∈[1,10] is the integer weight coefficient indicating the importance of the target node; w is the threat weight of the target node; R max is the maximum threat range of the blue equipment; R is the distance between the blue equipment and the red equipment;
(2)电子干扰关系计算过程为,考虑敌方目标T是否在我方打击节点A的干扰范围内:(2) The calculation process of the electronic jamming relationship is as follows: Consider whether the enemy target T is within the jamming range of our attack node A:
式中Drat为干扰类打击节点干扰功率;μ为目标节点的抗毁系数;P接受为目标节点的接收功率;vwea2为干扰类打击节点的机动速度;τ为目标节点的预警时间;vtar为目标节点的机动速度;Dr为干扰类打击节点干扰半径。Where D rat is the interference power of the interference attack node; μ is the invulnerability coefficient of the target node; P received is the received power of the target node; v wea2 is the maneuvering speed of the interference attack node; τ is the warning time of the target node; v tar is the maneuvering speed of the target node; and D r is the interference radius of the interference attack node.
优选的:杀伤链闭合时间表示所有杀伤链(杀伤网)闭合的时间度量,闭合时间计算方法:Preferably: the kill chain closure time represents the time measurement for closing all kill chains (kill nets), and the closure time calculation method is:
T=T1+T2+T3 (2-1)T=T 1 +T 2 +T 3 (2-1)
式中T1为侦察时间;T2为决策时间;T3为打击时间,侦察时间计算方法:Where T1 is the reconnaissance time; T2 is the decision time; T3 is the strike time. The calculation method of reconnaissance time is:
T1=tXF+n*tscan (2-2)T 1 = t XF + n*t scan (2-2)
式中tXF为系统装备最大反应时间;n为雷达扫次数;tscan为雷达扫描间隔,决策时间计算方法:Where t XF is the maximum reaction time of the system equipment; n is the number of radar scans; t scan is the radar scan interval. The decision time calculation method is:
式中tc为指控决策花费时间;n为杀伤链上装备个数;ti为杀伤链相邻装备间通信花费时间,在计算决策时间时,需要预设每级指挥所所需要的决策时间分别为ti(i=1,2,...,S),S为指挥所的个数,决策时间计算方法为Where tc is the time taken for command and control decision; n is the number of equipment in the kill chain; ti is the time taken for communication between adjacent equipment in the kill chain. When calculating the decision time, it is necessary to preset the decision time required for each level of command post as ti (i=1,2,...,S), S is the number of command posts, and the decision time calculation method is:
在计算打击时间时,需要考虑打击装备准备启动时间t1',打击装备机动到打击正位的时间t'2,打击装备发射时间t′3,以及飞行时间t'4,其中rm为打击装备部署位置与目标之间的距离,vwea1为打击装备发射武器的运动速度。When calculating the strike time, it is necessary to consider the strike equipment preparation start time t 1 ', the strike equipment maneuvering time to the strike position t' 2 , the strike equipment launch time t' 3 , and the flight time t' 4 , where r m is the distance between the deployment position of the strike equipment and the target, and v wea1 is the movement speed of the strike equipment when launching the weapon.
本发明相较于现有技术,其有益效果为:Compared with the prior art, the present invention has the following beneficial effects:
本发明在杀伤链的闭合性分析上给出了明确详细的基础指标计算模型,并分析了多种节点的交互关系对应的效能计算方法,相比于现有技术,对于闭合性的计算更注重杀伤链整体的计算,综合考虑了杀伤链闭合时间、杀伤链闭合概率,从杀伤链中的每一个节点到杀伤网中的每一条杀伤链到作战网络中的杀伤网,从底层到顶层进行了整体考虑,从底层来看,本发明对于每个作战环节的可能情况都做了充分考虑,在侦察环节中详细分析了不同敌我节点在侦察过程中效能的差异以及多次侦察对闭合概率的影响;在通信环节中使用链路预算表征通信质量,并能通过损耗模型区分不同战场环境对通信效能的影响;在打击环节中,分别构建了硬杀伤(火力打击)和软杀伤(电子干扰)的计算模型,在计算过程中还分析了敌方部署分布情况与能力属性对我方火力打击效能的影响,提出了威胁圈计算模型,考虑多个敌方装备组成的联合威胁圈的影响,从顶层来看,在杀伤链的每个交互关系的计算中都考虑了战场环境的影响,如侦察环节、打击环节中的环境因子、通信环节中信号损耗模型在不同遮挡条件下的损耗修正参数等。The present invention provides a clear and detailed basic indicator calculation model for the closure analysis of the kill chain, and analyzes the performance calculation method corresponding to the interaction relationship of multiple nodes. Compared with the prior art, the calculation of closure pays more attention to the calculation of the kill chain as a whole, and comprehensively considers the kill chain closure time and the kill chain closure probability, from each node in the kill chain to each kill chain in the kill network to the kill network in the combat network, from the bottom to the top, an overall consideration is made. From the bottom, the present invention fully considers the possible situations of each combat link, and in the reconnaissance link, the difference in the effectiveness of different enemy and friendly nodes in the reconnaissance process and the influence of multiple reconnaissance on the closure probability are analyzed in detail; in Link budget is used in the communication link to characterize the communication quality, and the loss model can be used to distinguish the impact of different battlefield environments on communication efficiency; in the strike link, calculation models for hard kill (firepower strike) and soft kill (electronic interference) are constructed respectively. During the calculation process, the impact of the enemy's deployment distribution and capability attributes on the effectiveness of our firepower strike is also analyzed, and a threat circle calculation model is proposed to consider the impact of the joint threat circle composed of multiple enemy equipment. From the top level, the impact of the battlefield environment is considered in the calculation of each interactive relationship in the kill chain, such as environmental factors in the reconnaissance link, the strike link, and the loss correction parameters of the signal loss model in the communication link under different shielding conditions.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1为本发明装备体系复杂网络杀伤链闭合性分析模型图;FIG1 is a diagram of a closedness analysis model of a complex network kill chain of an equipment system of the present invention;
图2为本发明装备体系复杂网络杀伤链闭合性分析流程图。FIG2 is a flowchart of the closedness analysis of the complex network kill chain of the equipment system of the present invention.
具体实施方式DETAILED DESCRIPTION
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施条例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will be combined with the drawings in the embodiments of the present invention to clearly and completely describe the technical solutions in the embodiments of the present invention. Obviously, the implementation regulations described are only part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without creative work are within the scope of protection of the present invention.
实施例Example
请参阅图1-图2,图为本发明中一优选实施方式,一种基于装备体系模型的杀伤链闭合性评估方法,包括如下步骤:Please refer to FIG. 1-FIG. 2, which are a preferred embodiment of the present invention, a kill chain closure evaluation method based on an equipment system model, comprising the following steps:
步骤S1,根据已知信息计算杀伤链闭合概率需要对链条上每一个环节的交互关系计算效能,首先计算侦察效能P(INV);Step S1, calculating the kill chain closure probability based on known information requires calculating the effectiveness of the interaction relationship of each link in the chain, first calculating the reconnaissance effectiveness P(INV);
步骤S2,计算通信效能P(COM);Step S2, calculating the communication performance P(COM);
步骤S3,计算指控效能P(DEC);Step S3, calculating the charge effectiveness P(DEC);
步骤S4,计算打击效能P(ATT);Step S4, calculating the attack effectiveness P (ATT);
步骤S5,计算杀伤链闭合时间;Step S5, calculating the kill chain closing time;
步骤S6,根据以上计算结果对所有初始生成的杀伤链进行计算,然后设计筛选规则,根据一定的闭合概率、闭合时间阈值进行筛选,得到的筛选结果即为有效杀伤链;Step S6, calculating all initially generated kill chains according to the above calculation results, and then designing screening rules to screen according to certain closing probability and closing time thresholds, and the obtained screening results are effective kill chains;
步骤S7,筛选得到有效杀伤链后,有效杀伤链的集合构成了作战网络的杀伤网。Step S7, after screening out effective kill chains, the set of effective kill chains constitutes the kill web of the combat network.
杀伤链由侦查、通信、指控、打击等多个环节构成,每个环节由一个或多个装备完成该环节的作战任务,但杀伤链各个环节并不能保证百分百成功,例如,敌方目标出现在我方侦察装备的最大侦察范围内,雷达是以一定概率发现目标,可能需要多次探测以提高侦察成功的概率,这与侦察装备本身的功能属性、目标的距离等相关。如果杀伤链各个环节都成功实现该部分功能(即侦察节点侦察到目标,通信节点成功将侦察信息传递给指控节点,指控节点成功处理侦察信息确定执行打击任务的节点,通信节点成功将指控信息传递给打击节点,打击节点打击到目标)则称为该条杀伤链闭合。可以基于ADC环模型建立杀伤链闭合概率指标P,P=P(A)·P(D)·P(C),即可用度、可靠性、效能。The kill chain consists of multiple links such as reconnaissance, communication, command and control, and strike. Each link is completed by one or more equipment to complete the combat mission of the link, but each link of the kill chain cannot guarantee 100% success. For example, if the enemy target appears within the maximum reconnaissance range of our reconnaissance equipment, the radar will discover the target with a certain probability, and multiple detections may be required to increase the probability of successful reconnaissance. This is related to the functional attributes of the reconnaissance equipment itself and the distance of the target. If each link of the kill chain successfully implements this part of the function (i.e., the reconnaissance node detects the target, the communication node successfully transmits the reconnaissance information to the command and control node, the command and control node successfully processes the reconnaissance information to determine the node that performs the strike mission, the communication node successfully transmits the command and control information to the strike node, and the strike node strikes the target), then the kill chain is closed. The kill chain closure probability index P can be established based on the ADC loop model, P = P(A)·P(D)·P(C), that is, availability, reliability, and efficiency.
其中,可用度P(A)计算方法如下:Among them, the calculation method of availability P(A) is as follows:
式中t1为平均故障时间,t2为平均修理时间。Where t1 is the mean time between failures and t2 is the mean time between repairs.
进一步的,可靠性P(D)计算方法如下:Furthermore, the reliability P(D) is calculated as follows:
式中t为平台运行时间。Where t is the platform running time.
本实施例中,效能P(C)计算方法如下:根据杀伤链中相邻两个装备所完成的作战活动(侦查、通信、指控、打击)计算装备之间的效能,进而得到杀伤链的效能,In this embodiment, the calculation method of the effectiveness P(C) is as follows: the effectiveness between the equipment is calculated according to the combat activities (reconnaissance, communication, command and control, and attack) completed by two adjacent equipment in the kill chain, and then the effectiveness of the kill chain is obtained.
式中Pability为杀伤链效能;n为该杀伤链中装备的个数;(PINV)i,i+1为第i个装备和第i+1个装备之间的侦察效能;(PCOM)i,i+1为第i个装备和第i+1个装备之间的通信效能;(PDEC)i,i+1为第i个装备和第i+1个装备之间的指控效能;(PATT)i,i+1为第i个装备和第i+1个装备之间的打击效能。Where Pability is the kill chain effectiveness; n is the number of equipment in the kill chain; (P INV ) i,i+1 is the reconnaissance effectiveness between the i-th equipment and the i+1-th equipment; (P COM ) i,i+1 is the communication effectiveness between the i-th equipment and the i+1-th equipment; (P DEC ) i,i+1 is the command and control effectiveness between the i-th equipment and the i+1-th equipment; (P ATT ) i,i+1 is the strike effectiveness between the i-th equipment and the i+1-th equipment.
进一步的,(PINV)i,i+1表示一条杀伤链中第i个装备和第i+1个装备之间的侦察效能,表示侦察装备i+1对敌方装备i进行侦察的单向交互关系,是我方侦察装备获取敌方装备信息的过程,具体计算方式如下所示:Furthermore, (P INV ) i,i+1 represents the reconnaissance effectiveness between the i-th equipment and the i+1-th equipment in a kill chain, which indicates the one-way interactive relationship between the reconnaissance equipment i+1 and the enemy equipment i. It is the process of our reconnaissance equipment obtaining the enemy equipment information. The specific calculation method is as follows:
(1)雷达类侦察节点探测普通目标,雷达检测采用奈曼-皮尔逊准则:将虚警概率约束在一指定常数,使侦察效能达到最大,采用平方律检测时,单次侦察效能Pi计算方法如下所示:(1) Radar reconnaissance nodes detect ordinary targets. Radar detection uses the Neyman-Pearson criterion: the false alarm probability is constrained to a specified constant to maximize the reconnaissance effectiveness. When the square law is used for detection, the calculation method of the single reconnaissance effectiveness P i is as follows:
式中BWA为雷达波束宽度;AZR为雷达扫描频率;PRF为脉冲重复频率;N为雷达脉冲积累数;Thr为检测门限;Ψ为N个采样的信噪比均值;I(·,·)是不完全伽马函数的皮尔逊形式,雷达最大作用距离可表示为Rm;δ1为目标节点抗雷达系数,α为环境因子,选择方式如下所示:Where BWA is the radar beam width; AZR is the radar scanning frequency; PRF is the pulse repetition frequency; N is the number of radar pulse accumulation; Thr is the detection threshold; Ψ is the mean signal-to-noise ratio of N samples; I(·,·) is the Pearson form of the incomplete gamma function, and the maximum radar range can be expressed as R m ; δ 1 is the target node anti-radar coefficient, and α is the environmental factor. The selection method is as follows:
由于单次侦察难以满足作战需求,因此需要进行多次侦察,对应的侦察效能P(INV)计算方法如下所示:Since a single reconnaissance cannot meet combat requirements, multiple reconnaissances are required. The corresponding reconnaissance effectiveness P(INV) calculation method is as follows:
式中Ninv为多次侦察次数;p为雷达类侦察效能基准值。Where N inv is the number of reconnaissance attempts; p is the baseline value of radar reconnaissance effectiveness.
(2)雷达类侦察节点探测隐身目标,当被侦察目标为隐身目标时,侦察效能模型会受到明显的影响,Pi具体计算方法如下所示:(2) When radar reconnaissance nodes detect stealth targets, the reconnaissance effectiveness model will be significantly affected when the target being reconnaissance is a stealth target. The specific calculation method of Pi is as follows:
式中N为雷达脉冲积累数;Thr为检测门限;SN为信噪比;Θ为目标的雷达反射截面积;ε为目标节点隐身系数。Where N is the number of radar pulse accumulation; Thr is the detection threshold; SN is the signal-to-noise ratio; Θ is the radar reflection cross-sectional area of the target; ε is the stealth coefficient of the target node.
(3)雷达类侦察节点探测存在遮蔽的目标,当目标存在遮蔽时,雷达最大探测距离受到影响如下所示:(3) When a radar reconnaissance node detects an obscured target, the maximum detection distance of the radar is affected as follows:
式中φ为目标节点遮蔽系数;εk为雷达遮蔽角;Hg为目标高度。Where φ is the target node shielding coefficient; ε k is the radar shielding angle; H g is the target height.
(4)雷达类侦察节点在受干扰的情况下探测目标,当雷达受到干扰时,以无源干扰中最常用的干扰箔条为例,雷达的最大探测距离受到影响如下所示:(4) Radar reconnaissance nodes detect targets under interference. When the radar is interfered, taking the most commonly used interference foil in passive interference as an example, the maximum detection distance of the radar is affected as follows:
式中λ为雷达波长;为目标节点干扰强度;R0为无干扰时雷达最大探测距离。Where λ is the radar wavelength; is the interference intensity of the target node; R 0 is the maximum detection distance of the radar when there is no interference.
(5)卫星类侦察节点探测目标,当侦察装备为卫星时,侦察效能计算方法如下所示。(5) When a satellite-type reconnaissance node detects a target, the calculation method of the reconnaissance effectiveness is as follows when the reconnaissance equipment is a satellite.
式中k为侦察卫星总共发现的目标批数;Nt为地方来袭目标总数;Di为第i批目标的探测距离;ID为卫星对地面的探测范围半径;Hi为第i批目标节点的高度;IH为来袭目标的高度平均值;p1为单次探测概率,p0为卫星类侦察效能基准值;ns为探测次数;δ2为目标节点抗卫星系数。Where k is the total number of target batches discovered by the reconnaissance satellite; Nt is the total number of local incoming targets; Di is the detection distance of the i-th batch of targets; ID is the detection range radius of the satellite to the ground; Hi is the height of the i-th batch of target nodes; IH is the average height of the incoming targets; p1 is the single detection probability, p0 is the satellite reconnaissance effectiveness benchmark; ns is the number of detections; δ2 is the target node anti-satellite coefficient.
本实施例中,P(COM)表示通信的成功概率,具体计算方法如下所示:In this embodiment, P(COM) represents the success probability of communication, and the specific calculation method is as follows:
其中,ncom为通信次数,为第c次两节点间的通信效能,通信效能由通信传输能力pij表示,具体计算方法如下所示:Among them, n com is the number of communications, is the c-th communication efficiency between two nodes. The communication efficiency is represented by the communication transmission capacity p ij . The specific calculation method is as follows:
假设前后两个节点分别为S1和S2,则两个节点的通信交互关系可以根据节点通信建模中的覆盖范围dnode、传输速率vnode、通信质量enode、通信容量Canode以及信息延迟Denode;五个通信能力相关的战技指标组成的通信传输能力P(COM)计算得到:Assuming that the two nodes in front and behind are S 1 and S 2 respectively, the communication interaction relationship between the two nodes can be calculated based on the coverage range d node , transmission rate v node , communication quality e node , communication capacity Ca node and information delay De node in the node communication modeling; the communication transmission capability P(COM) composed of five communication capability-related combat technical indicators is:
式中dis表示两个节点的相对距离,其中两节点间的通信质量可由链路预算PRX计算得到,具体算法如下所示:Where dis represents the relative distance between two nodes, and the communication quality between the two nodes can be calculated by the link budget P RX . The specific algorithm is as follows:
式中PTX为发送天线的发射功率;GTX为发送天线的发射增益;GRX为接收天线的接收增益;LFSPL为信号自由传播损耗模型;cT为不同环境下的修正因子;R为接收与发送天线之间的距离;f为发射天线的工作频率;GRX为接收天线的接收增益;Latm为天线功率在大气中的损耗;Lm为其它各类因素的损耗。Where P TX is the transmit power of the transmitting antenna; G TX is the transmit gain of the transmitting antenna; G RX is the receive gain of the receiving antenna; L FSPL is the signal free propagation loss model; c T is the correction factor under different environments; R is the distance between the receiving and transmitting antennas; f is the operating frequency of the transmitting antenna; G RX is the receive gain of the receiving antenna; L atm is the loss of antenna power in the atmosphere; L m is the loss of other factors.
本实施例中,通信容量Ca计算如下:In this embodiment, the communication capacity Ca is calculated as follows:
式中m代表信道的数量,B为信道带宽;ρi为第i个子信道的信噪比;λi为第i个子信道的功率增益,根据自信息量的定义,表示信息共享关系的边所具有的信息传输能力P(COM)建模表达式为:Where m represents the number of channels, B is the channel bandwidth; ρ i is the signal-to-noise ratio of the i-th subchannel; λ i is the power gain of the i-th subchannel. According to the definition of self-information, the information transmission capacity P(COM) of the edge representing the information sharing relationship is modeled as follows:
其中wi为各个通信能力的权重;Ri(i=1,2,3,4,5)分别是pi的隶属函数,由于pi都是定量指标,因此可以用下列功效函数来表示:Where w i is the weight of each communication capability; R i (i=1,2,3,4,5) are the membership functions of pi respectively. Since pi are quantitative indicators, they can be expressed by the following efficacy function:
因此,S-S边的信息传输能力为:Therefore, the information transmission capacity of the S-S edge is:
本实施例中,P(DEC)表示决策型指控节点指控的成功概率,具体计算方法如下所示:In this embodiment, P(DEC) represents the success probability of the decision-making charge node charge, and the specific calculation method is as follows:
假设指控节点为D1,被指控节点为S1,这种交互关系用指控能力P(DEC)表示,具体的计算方法如下所示:Assume that the accusing node is D 1 and the accused node is S 1 . This interactive relationship is represented by the accusing capability P(DEC). The specific calculation method is as follows:
D1的信息处理能力记作E1,用自信息量对其进行建模:The information processing capacity of D 1 is denoted as E 1 , and its self-information is used to model it:
式中,Ri为信息处理能力三个指标:响应时间tcom、吞吐率Thr、精确度Acc的隶属函数(i=1,2,3),基于上述对于信息传输能力的建模,交互关系的信息传输能力E2的建模表达式为:Where R i is the membership function of the three indicators of information processing capability: response time t com , throughput T hr , and accuracy Acc (i=1, 2, 3). Based on the above modeling of information transmission capability, the modeling expression of the information transmission capability E 2 of the interactive relationship is:
其中,in,
可以得到这类交互关系建模的表达式:We can get expressions for modeling this type of interaction relationship:
本实施例中,P(ATT)表示打击效能,根据该链的打击装备i与目标装备j,根据打击类型分为火力打击与电子干扰,具体计算方法如下所示:In this embodiment, P(ATT) represents the strike effectiveness. According to the strike equipment i and the target equipment j of the chain, the strike type is divided into fire strike and electronic interference. The specific calculation method is as follows:
(1)火力打击关系,火力打击关系主要指我方作战网络中的毁伤类节点对敌方目标T进行攻击使其完全或部分地失去军事或经济价值的过程。一般来说,被攻击的敌方目标包括飞机、军舰、坦克等敌方武器和工事、掩蔽部、机场、港口、交通枢纽等基础设施,有时还会实施对敌方部队人员的火力打击,这类交互关系通过毁伤概率进行表征,具体计算方法如下所示:(1) Fire strike relationship. Fire strike relationship mainly refers to the process in which the damage nodes in our combat network attack the enemy target T to make it completely or partially lose its military or economic value. Generally speaking, the attacked enemy targets include enemy weapons such as aircraft, warships, tanks, and infrastructure such as fortifications, shelters, airports, ports, and transportation hubs. Sometimes, fire strikes are also carried out on enemy troops and personnel. This type of interactive relationship is characterized by the damage probability. The specific calculation method is as follows:
首先假设导弹制导误差服从圆分布律(σx=σy=σ)。First, assume that the missile guidance error obeys the circular distribution law (σ x =σ y =σ).
其散布中心不处于目标j所在位置,即其脱靶量分布的概率密度如下:Its scatter center is not located at the location of target j, that is, the probability density of its miss amount distribution is as follows:
目标毁伤概率为:The target damage probability is:
则:but:
通过一定的数学推导,其近似表达式如下:Through certain mathematical derivation, the approximate expression is as follows:
其中r0为散布中心与目标位置的距离,σ为制导误差的协方差,R0为武器毁伤半径,PW为威胁度,R0为武器装备的本身属性,σ对于单个武器为定值,r0本身与红蓝双方距离、蓝方装备速度有关,现建立r0计算方式如下:Where r0 is the distance between the center of the scatter and the target position, σ is the covariance of the guidance error, R0 is the weapon damage radius, PW is the threat level, R0 is the attribute of the weapon equipment itself, σ is a fixed value for a single weapon, r0 itself is related to the distance between the red and blue sides and the speed of the blue side's equipment. The calculation method of r0 is now established as follows:
r0=rh·rv·rb (1-34)r 0 = r h · r v · r b (1-34)
rh、rv为r0有关距离、速度的一个分量,rb为制导误差的半径。给出打击距离的上下界hmin≤reff≤hmax,目标节点机动速度vtar则与我方打击节点的武器机动速度vnode则:r h , r v are the components of r 0 related to distance and speed, and r b is the radius of guidance error. Given the upper and lower bounds of the strike distance h min ≤ r eff ≤ h max , the maneuvering speed of the target node v tar and the maneuvering speed of our weapon attacking node v node are:
式中μ为目标节点抗毁系数,k为调节参数,(1-33)中PW与蓝方威胁圈有关,若红方打击装备在多个蓝方装备威胁圈内则:Where μ is the target node invulnerability coefficient, k is the adjustment parameter, and P W in (1-33) is related to the blue threat circle. If the red attack equipment is within the threat circle of multiple blue equipment, then:
NW为对当前红方打击装备部署位置产生威胁的蓝方装备数量,为第i个蓝方装备对红方打击装备威胁度,计算方法如下所示:N W is the number of blue side equipment that threatens the current deployment position of the red side's strike equipment. The threat level of the i-th blue equipment to the red equipment is calculated as follows:
式中α为环境因子;β∈[1,10]为整数权重系数表示目标节点重要程度;w为目标节点的威胁度权重;Rmax为蓝方装备最大威胁范围;R为蓝方装备与红方装备距离。Where α is the environmental factor; β∈[1,10] is the integer weight coefficient indicating the importance of the target node; w is the threat weight of the target node; R max is the maximum threat range of the blue equipment; and R is the distance between the blue equipment and the red equipment.
(2)电子干扰关系,电子干扰关系主要指的是我方利用电子设备有效降低或摧毁敌方目标T利用各种电子设备进行战场侦察、作战指挥、通信联络等作战活动的能力。电子干扰可分为雷达干扰和通信干扰两种方式。与雷达干扰相关的指标主要包括:对敌雷达压制(干扰率)、有效压制(干扰)时间、敌预警侦察距离下降比等。技术指标包含天线增益和干扰功率等。与通信干扰相关的主要指标是误信率,计算误信率的主要影响P(ATT)因素是信噪比(通信接收机输入端内、通信接收机输入端外)。也可用压制率(压制系数)对通信干扰能力进行度量。对于电子干扰关系所抽象成的打击节点所具有的电子干扰能力的建模一方面考虑压制率,另一方面考虑敌方目标T是否在我方打击节点A的干扰范围内:(2) Electronic interference relationship. Electronic interference relationship mainly refers to our ability to use electronic equipment to effectively reduce or destroy the enemy target T's ability to use various electronic equipment to conduct battlefield reconnaissance, combat command, communication and liaison and other combat activities. Electronic interference can be divided into two types: radar interference and communication interference. The indicators related to radar interference mainly include: suppression of enemy radar (interference rate), effective suppression (interference) time, enemy early warning reconnaissance distance reduction ratio, etc. Technical indicators include antenna gain and interference power, etc. The main indicator related to communication interference is the false positive rate. The main influencing factor P(ATT) in calculating the false positive rate is the signal-to-noise ratio (inside the communication receiver input terminal and outside the communication receiver input terminal). The suppression rate (suppression coefficient) can also be used to measure the communication interference capability. The modeling of the electronic interference capability of the strike node abstracted by the electronic interference relationship takes into account the suppression rate on the one hand, and whether the enemy target T is within the interference range of our strike node A on the other hand:
式中Drat为干扰类打击节点干扰功率;μ为目标节点的抗毁系数;P接受为目标节点的接收功率;vwea2为干扰类打击节点的机动速度;τ为目标节点的预警时间;vtar为目标节点的机动速度;Dr为干扰类打击节点干扰半径。Where D rat is the interference power of the interference attack node; μ is the invulnerability coefficient of the target node; P received is the received power of the target node; v wea2 is the maneuvering speed of the interference attack node; τ is the warning time of the target node; v tar is the maneuvering speed of the target node; and D r is the interference radius of the interference attack node.
本实施例中,杀伤链闭合时间表示所有杀伤链(杀伤网)闭合的时间度量。闭合时间计算方法:In this embodiment, the kill chain closure time represents the time measurement for closing all kill chains (kill nets). Closing time calculation method:
T=T1+T2+T3 (2-1)T=T 1 +T 2 +T 3 (2-1)
式中T1为侦察时间;T2为决策时间;T3为打击时间。Where T1 is the reconnaissance time; T2 is the decision time; T3 is the strike time.
其中,侦察时间计算方法:T1=tXF+n*tscan(2-2)Among them, the calculation method of reconnaissance time is: T 1 = t XF + n*t scan (2-2)
式中tXF为系统装备最大反应时间;n为雷达扫次数;tscan为雷达扫描间隔。一般来说,侦察时间主要为信息处理融合时间,实际应用中,侦察时间直接给定。Where t XF is the maximum reaction time of the system equipment; n is the number of radar scans; t scan is the radar scan interval. Generally speaking, the reconnaissance time is mainly the information processing and fusion time. In practical applications, the reconnaissance time is directly given.
进一步的,决策时间计算方法:Further, the decision time calculation method is:
式中tc为指控决策花费时间;n为杀伤链上装备个数;ti为杀伤链相邻装备间通信花费时间,在计算决策时间时,需要预设每级指挥所所需要的决策时间分别为ti(i=1,2,...,S),S为指挥所的个数。所以决策时间计算方法为Where tc is the time taken for command and control decision; n is the number of equipment in the kill chain; ti is the time taken for communication between adjacent equipment in the kill chain. When calculating the decision time, it is necessary to preset the decision time required for each level of command post as ti (i=1,2,...,S), and S is the number of command posts. So the decision time calculation method is:
在计算打击时间时,需要考虑打击装备准备启动时间t1',打击装备机动到打击正位的时间t'2,打击装备发射时间t′3,以及飞行时间t'4,其中rm为打击装备部署位置与目标之间的距离,vwea1为打击装备发射武器的运动速度。When calculating the strike time, it is necessary to consider the strike equipment preparation start time t 1 ', the strike equipment maneuvering time to the strike position t' 2 , the strike equipment launch time t' 3 , and the flight time t' 4 , where r m is the distance between the deployment position of the strike equipment and the target, and v wea1 is the movement speed of the strike equipment when launching the weapon.
本实施例中,首先根据以上已知信息首先计算杀伤链闭合概率需要对链条上每一个环节的交互关系计算效能,先计算侦察效能P(INV),先确定目标节点与侦察节点的类型,例如:侦察装备为有源雷达,目标为无遮挡、无隐身的普通目标,战场环境中侦察节点未受到干扰,接着,根据侦察装备挂载的设备能力属性参数(如BWA雷达波束宽度、AZR雷达扫描频率、PRF脉冲重复频率等)带入式(1-4)计算单次侦察效能,根据计算结果与实际情况考虑式(1-5)计算多次侦察对应的概率,当侦察节点与目标节点存在不同情况时,则分别带入式(1-6)至(1-9)中,计算完成后记录每条链多次侦察次数,以便于杀伤链闭合时间的计算。In this embodiment, the kill chain closure probability is first calculated based on the above known information. It is necessary to calculate the efficiency of the interaction relationship of each link in the chain. The reconnaissance efficiency P(INV) is first calculated, and the types of target nodes and reconnaissance nodes are first determined. For example, the reconnaissance equipment is an active radar, the target is an ordinary target without obstruction and stealth, and the reconnaissance node is not interfered with in the battlefield environment. Then, the equipment capability attribute parameters mounted on the reconnaissance equipment (such as BWA radar beam width, AZR radar scanning frequency, PRF pulse repetition frequency, etc.) are substituted into formula (1-4) to calculate the single reconnaissance efficiency. According to the calculation result and the actual situation, formula (1-5) is considered to calculate the corresponding probability of multiple reconnaissance. When the reconnaissance node and the target node are in different situations, they are substituted into formulas (1-6) to (1-9) respectively. After the calculation is completed, the number of multiple reconnaissances of each chain is recorded to facilitate the calculation of the kill chain closure time.
进一步的,计算通信效能P(COM),按照式(1-11)至(1-15)计算节点基本通信能力,若已知数据无法提供通信质量和通信容量,则需按照式(1-16)、(1-17)计算通信质量和通信容量,然后对计算的基本通信能力按照式(1-18)至(1-20)进行聚合得到通信效能。Furthermore, the communication efficiency P(COM) is calculated, and the basic communication capacity of the node is calculated according to formulas (1-11) to (1-15). If the known data cannot provide communication quality and communication capacity, the communication quality and communication capacity must be calculated according to formulas (1-16) and (1-17), and then the calculated basic communication capacity is aggregated according to formulas (1-18) to (1-20) to obtain the communication efficiency.
再进一步,计算指控效能P(DEC),按照式(1-21)至(1-29)计算可得,这一步计算的前提条件是将战场环境考虑为多级指控环境,即存在多个指控节点,且指控节点分为多个层级,每个层级之间按指控关系连接,若建模过程中未考虑多级指控结构,该概率可视情况设置。Going further, the command and control effectiveness P(DEC) can be calculated according to equations (1-21) to (1-29). The prerequisite for this step is to consider the battlefield environment as a multi-level command and control environment, that is, there are multiple command and control nodes, and the command and control nodes are divided into multiple levels, and each level is connected according to the command and control relationship. If the multi-level command and control structure is not considered in the modeling process, the probability can be set as appropriate.
更进一步的,计算打击效能P(ATT),首先判断打击节点的类型,若为电子干扰型则直接按照式(1-39)至(1-41)计算即可;若为火力打击型节点,首先按照式(1-37)和式(1-38)遍历敌方节点,计算打击节点的受威胁程度,将结果带入式(1-30)至(1-36)计算得到打击效能,最后综合上述的计算结果,带入式(1-1)至(1-3)中即得到杀伤链闭合概率,然后计算杀伤链闭合时间,考虑计算得到多次侦察次数,与杀伤链上各节点基本能力信息带入式(2-1)至(2-5)即可得到结果,接着根据以上计算步骤对所有初始生成的杀伤链进行计算,然后设计筛选规则,根据一定的闭合概率、闭合时间阈值进行筛选,得到的筛选结果即为有效杀伤链,若筛选后没有杀伤链满足要求,说明战场部署情况较差,对敌方目标无法形成有效的战斗力,无法计算闭合性,需要考虑对部署情况进行优化,筛选得到有效杀伤链后,有效杀伤链的集合构成了作战网络的杀伤网。Furthermore, to calculate the strike effectiveness P(ATT), first determine the type of the strike node. If it is an electronic interference type, directly calculate it according to formulas (1-39) to (1-41); if it is a firepower strike type node, first traverse the enemy nodes according to formulas (1-37) and (1-38), calculate the threat level of the strike node, and substitute the results into formulas (1-30) to (1-36) to calculate the strike effectiveness. Finally, combine the above calculation results and substitute them into formulas (1-1) to (1-3) to obtain the kill chain closure probability, and then calculate the kill chain closure time, considering the calculation of multiple reconnaissance times. , and the basic capability information of each node on the kill chain are substituted into formulas (2-1) to (2-5) to obtain the result. Then, all the initially generated kill chains are calculated according to the above calculation steps, and then the screening rules are designed. Screening is performed according to a certain closure probability and closure time threshold. The screening result is the effective kill chain. If no kill chain meets the requirements after screening, it means that the battlefield deployment is poor, and it is impossible to form effective combat effectiveness against enemy targets and the closure cannot be calculated. It is necessary to consider optimizing the deployment. After screening and obtaining effective kill chains, the collection of effective kill chains constitutes the kill network of the combat network.
以上内容是结合具体实施方式对本发明作进一步详细说明,不能认定本发明具体实施只局限于这些说明,对于本发明所属技术领域的普通技术人员来说,在不脱离本发明的构思的前提下,还可以作出若干简单的推演或替换,都应当视为属于本发明所提交的权利要求书确定的保护范围。The above content is a further detailed description of the present invention in combination with specific implementation methods. It cannot be determined that the specific implementation of the present invention is limited to these descriptions. For ordinary technicians in the technical field to which the present invention belongs, some simple deductions or substitutions can be made without departing from the concept of the present invention, which should be regarded as belonging to the scope of protection determined by the claims submitted for the present invention.
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410332935.3A CN118152725B (en) | 2024-03-22 | 2024-03-22 | Killing chain closure evaluation method based on equipment system model |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410332935.3A CN118152725B (en) | 2024-03-22 | 2024-03-22 | Killing chain closure evaluation method based on equipment system model |
Publications (2)
Publication Number | Publication Date |
---|---|
CN118152725A CN118152725A (en) | 2024-06-07 |
CN118152725B true CN118152725B (en) | 2024-10-18 |
Family
ID=91294470
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410332935.3A Active CN118152725B (en) | 2024-03-22 | 2024-03-22 | Killing chain closure evaluation method based on equipment system model |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118152725B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118395758B (en) * | 2024-06-28 | 2024-08-23 | 中国人民解放军国防科技大学 | Meta-path-based cross-domain kill chain construction method, device and equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116702423A (en) * | 2023-04-24 | 2023-09-05 | 哈尔滨工业大学 | Weapons and equipment deployment point optimization method driven by rapid closure of kill chain |
CN116805136A (en) * | 2023-05-30 | 2023-09-26 | 中国科学院自动化研究所 | Heterogeneous multi-agent evaluation index construction method and device based on multi-layer graph network |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113255118B (en) * | 2021-05-11 | 2023-05-30 | 上海机电工程研究所 | Weaponry system optimization method and system based on killing chain |
CN114240169B (en) * | 2021-12-17 | 2024-08-06 | 中国航空研究院 | Intelligent tactical decision method based on killing chain |
CN115438467A (en) * | 2022-08-12 | 2022-12-06 | 西北工业大学 | Equipment system task reliability assessment method based on killer chain |
CN117217598A (en) * | 2023-09-14 | 2023-12-12 | 中国人民解放军国防科技大学 | Vulnerability calculation method, device and equipment of combat network |
-
2024
- 2024-03-22 CN CN202410332935.3A patent/CN118152725B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116702423A (en) * | 2023-04-24 | 2023-09-05 | 哈尔滨工业大学 | Weapons and equipment deployment point optimization method driven by rapid closure of kill chain |
CN116805136A (en) * | 2023-05-30 | 2023-09-26 | 中国科学院自动化研究所 | Heterogeneous multi-agent evaluation index construction method and device based on multi-layer graph network |
Also Published As
Publication number | Publication date |
---|---|
CN118152725A (en) | 2024-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN118152725B (en) | Killing chain closure evaluation method based on equipment system model | |
CN112651181B (en) | Radar countermeasure strategy modeling and simulation method based on zero and game | |
CN107064882B (en) | Radar networking resource control method based on radio frequency stealth under passive cooperation | |
CN110414061B (en) | Method for establishing probability model of ground attack survival ability of airplane platform system | |
WO2021258734A1 (en) | Networked radar optimal waveform design method based on low interception performance under game conditions | |
Yi et al. | Reinforcement learning-based joint adaptive frequency hopping and pulse-width allocation for radar anti-jamming | |
CN111090078A (en) | Networking radar residence time optimization control method based on radio frequency stealth | |
CN111060884A (en) | A Target Search Algorithm for Airborne Opportunistic Array Radar Based on Search Resource Management | |
Zhang et al. | Performance analysis of deep reinforcement learning-based intelligent cooperative jamming method confronting multi-functional networked radar | |
Gusland et al. | Deep temporal detection-A machine learning approach to multiple-dwell target detection | |
CN110927692A (en) | Solution method for searching radar radio frequency stealth working mode in sea clutter scene | |
CN115932750A (en) | Radar space-time-frequency-energy multi-domain joint intelligent active anti-interference method | |
Seo et al. | D3GF: A study on optimal defense performance evaluation of drone-type moving target defense through game theory | |
Wu et al. | Optimal distributed cooperative jamming resource allocation for multi‐missile threat scenario | |
CN111323772B (en) | Cooperative task allocation method for hybrid formation of unmanned aerial vehicle/active aerial vehicle based on radio frequency stealth | |
Lu et al. | Adaptive allocation strategy for cooperatively jamming netted radar system based on improved cuckoo search algorithm | |
CN110031807A (en) | A kind of multistage smart noise jamming realization method based on model-free intensified learning | |
Yang et al. | Consensus based target tracking against deception jamming in distributed radar networks | |
CN113221944A (en) | Ultraviolet light cooperation multi-sensor data fusion unmanned aerial vehicle friend or foe identification method | |
CN108287341A (en) | A kind of Low Altitude Target Detection method and its system, electronic equipment | |
CN118233859A (en) | Unmanned aerial vehicle cluster dynamic region coverage method oriented to low interception probability | |
CN114662392B (en) | Radar air defense reconnaissance effectiveness evaluation method based on deep learning | |
CN116794634A (en) | A method and device for resisting high repetition frequency interference of laser guidance radar | |
Liu et al. | Damage evaluation of microwave anti swarm attack based on scoring method | |
Ricciardi et al. | Modern electromagnetic spectrum battlefield |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |