IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v96y2011i3p374-382.html
   My bibliography  Save this article

Optimal network protection against diverse interdictor strategies

Author

Listed:
  • Ramirez-Marquez, Jose E.
  • Rocco, Claudio M.
  • Levitin, Gregory

Abstract

The objective of this paper is to provide optimal protection configurations for a network with components vulnerable to an interdictor with potentially different attacking strategies. Under this new setting, a solution/configuration describes the defender’s optimal amount of defense resources allocated to each link against a potential interdictor strategy. Previous to this research decisions were of a binary nature, restricted to defend or not. Obtaining these configurations is important because along with describing the protection scheme, they are also useful for identifying sets of components critical to the successful performance of the network. The application of the approach can be beneficial for networks in telecommunications, energy, and supply chains to name a few. To obtain an optimal solution, the manuscript describes an evolutionary algorithm that considers continuous decision variables. The results obtained for different examples illustrate that equal resource allocation is optimal for the case of homogeneous component vulnerability. These findings are the basis for discussion and for describing future research directives in this area.

Suggested Citation

  • Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
  • Handle: RePEc:eee:reensy:v:96:y:2011:i:3:p:374-382
    DOI: 10.1016/j.ress.2010.10.003
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832010002280
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2010.10.003?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Ramirez-Marquez, José Emmanuel & Rocco, Claudio M., 2008. "All-terminal network reliability optimization via probabilistic solution discovery," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1689-1697.
    2. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    3. Ramirez-Marquez, Jose Emmanuel, 2008. "Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1698-1709.
    4. José Ramirez-Marquez & Claudio Rocco, 2010. "Evolutionary optimization technique for multi-state two-terminal reliability allocation in multi-objective problems," IISE Transactions, Taylor & Francis Journals, vol. 42(8), pages 539-552.
    5. Zio, E., 2009. "Reliability engineering: Old problems and new challenges," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 125-141.
    6. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    7. Hausken, Kjell & Levitin, Gregory, 2009. "Minmax defense strategy for complex multi-state systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 577-587.
    8. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    9. Kelly J. Cormican & David P. Morton & R. Kevin Wood, 1998. "Stochastic Network Interdiction," Operations Research, INFORMS, vol. 46(2), pages 184-197, April.
    10. Rocco S, Claudio M. & Ramirez-Marquez, José Emmanuel, 2009. "Deterministic network interdiction optimization via an evolutionary approach," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 568-576.
    11. Kjell Hausken, 2011. "Protecting complex infrastructures against multiple strategic attackers," International Journal of Systems Science, Taylor & Francis Journals, vol. 42(1), pages 11-29.
    12. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    13. Hirshleifer, Jack, 1995. "Anarchy and Its Breakdown," Journal of Political Economy, University of Chicago Press, vol. 103(1), pages 26-52, February.
    14. Ramirez-Marquez, José Emmanuel & Rocco S., Claudio M., 2009. "Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 913-921.
    15. Concho, Ana Lisbeth & Ramirez-Marquez, Jose Emmanuel, 2010. "An evolutionary algorithm for port-of-entry security optimization considering sensor thresholds," Reliability Engineering and System Safety, Elsevier, vol. 95(3), pages 255-266.
    16. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
    2. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    3. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    4. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    5. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    6. Bricha, Naji & Nourelfath, Mustapha, 2015. "Protection of warehouses and plants under capacity constraint," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 93-104.
    7. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    8. Li, Y.F. & Sansavini, G. & Zio, E., 2013. "Non-dominated sorting binary differential evolution for the multi-objective optimization of cascading failures protection in complex networks," Reliability Engineering and System Safety, Elsevier, vol. 111(C), pages 195-205.
    9. Yaghlane, Asma Ben & Azaiez, M. Naceur & Mrad, Mehdi, 2019. "System survivability in the context of interdiction networks," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 362-371.
    10. Hiba Baroud & Kash Barker & Jose E. Ramirez‐Marquez & Claudio M. Rocco, 2015. "Inherent Costs and Interdependent Impacts of Infrastructure Network Resilience," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 642-662, April.
    11. Hong, Liu & Ouyang, Min & Peeta, Srinivas & He, Xiaozheng & Yan, Yongze, 2015. "Vulnerability assessment and mitigation for the Chinese railway system under floods," Reliability Engineering and System Safety, Elsevier, vol. 137(C), pages 58-68.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    2. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    3. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    4. Guozhen Xiong & Chi Zhang & Fei Zhou, 2017. "A robust reliability redundancy allocation problem under abnormal external failures guided by a new importance measure," Journal of Risk and Reliability, , vol. 231(2), pages 180-199, April.
    5. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    6. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    7. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    8. Zhu, Huaxing & Zhang, Chi, 2019. "Expanding a complex networked system for enhancing its reliability evaluated by a new efficient approach," Reliability Engineering and System Safety, Elsevier, vol. 188(C), pages 205-220.
    9. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense And Attack For Series And Parallel Reliability Systems: Comment," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 507-515, October.
    10. Ana Concho & José Ramirez-Marquez, 2012. "Optimal design of container inspection strategies considering multiple objectives via an evolutionary approach," Annals of Operations Research, Springer, vol. 196(1), pages 167-187, July.
    11. Liberatore, Federico & Scaparra, Maria P. & Daskin, Mark S., 2012. "Hedging against disruptions with ripple effects in location analysis," Omega, Elsevier, vol. 40(1), pages 21-30, January.
    12. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    13. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    14. Yaghlane, Asma Ben & Azaiez, M. Naceur & Mrad, Mehdi, 2019. "System survivability in the context of interdiction networks," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 362-371.
    15. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    16. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    17. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    18. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    19. Concho, Ana Lisbeth & Ramirez-Marquez, Jose Emmanuel, 2010. "An evolutionary algorithm for port-of-entry security optimization considering sensor thresholds," Reliability Engineering and System Safety, Elsevier, vol. 95(3), pages 255-266.
    20. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:96:y:2011:i:3:p:374-382. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.