IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v94y2009i2p568-576.html
   My bibliography  Save this article

Deterministic network interdiction optimization via an evolutionary approach

Author

Listed:
  • Rocco S, Claudio M.
  • Ramirez-Marquez, José Emmanuel

Abstract

This paper introduces an evolutionary optimization approach that can be readily applied to solve deterministic network interdiction problems. The network interdiction problem solved considers the minimization of the maximum flow that can be transmitted between a source node and a sink node for a fixed network design when there is a limited amount of resources available to interdict network links. Furthermore, the model assumes that the nominal capacity of each network link and the cost associated with their interdiction can change from link to link. For this problem, the solution approach developed is based on three steps that use: (1) Monte Carlo simulation, to generate potential network interdiction strategies, (2) Ford–Fulkerson algorithm for maximum s–t flow, to analyze strategies’ maximum source-sink flow and, (3) an evolutionary optimization technique to define, in probabilistic terms, how likely a link is to appear in the final interdiction strategy. Examples for different sizes of networks and network behavior are used throughout the paper to illustrate the approach. In terms of computational effort, the results illustrate that solutions are obtained from a significantly restricted solution search space. Finally, the authors discuss the need for a reliability perspective to network interdiction, so that solutions developed address more realistic scenarios of such problem.

Suggested Citation

  • Rocco S, Claudio M. & Ramirez-Marquez, José Emmanuel, 2009. "Deterministic network interdiction optimization via an evolutionary approach," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 568-576.
  • Handle: RePEc:eee:reensy:v:94:y:2009:i:2:p:568-576
    DOI: 10.1016/j.ress.2008.06.008
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S095183200800183X
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2008.06.008?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Anandalingam, G. & Apprey, Victor, 1991. "Multi-level programming and conflict resolution," European Journal of Operational Research, Elsevier, vol. 51(2), pages 233-247, March.
    2. Ramirez-Marquez, José Emmanuel & Rocco, Claudio M., 2008. "All-terminal network reliability optimization via probabilistic solution discovery," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1689-1697.
    3. Cook, Jason L. & Ramirez-Marquez, Jose Emmanuel, 2008. "Reliability analysis of cluster-based ad-hoc networks," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1512-1522.
    4. Cook, Jason L. & Ramirez-Marquez, Jose Emmanuel, 2007. "Two-terminal reliability analyses for a mobile ad hoc wireless network," Reliability Engineering and System Safety, Elsevier, vol. 92(6), pages 821-829.
    5. Richard Wollmer, 1964. "Removing Arcs from a Network," Operations Research, INFORMS, vol. 12(6), pages 934-940, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    2. Wang, Jingbei & Yang, Naiding & Zhang, Yanlu & Song, Yue, 2018. "Development of the mitigation strategy against the schedule risks of the R&D project through controlling the cascading failure of the R&D network," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 508(C), pages 390-401.
    3. Rocco S., Claudio M. & Emmanuel Ramirez-Marquez, José, 2013. "Identification of top contributors to system vulnerability via an ordinal optimization based method," Reliability Engineering and System Safety, Elsevier, vol. 114(C), pages 92-98.
    4. Gloria Pumpuni‐Lenss & Timothy Blackburn & Andreas Garstenauer, 2017. "Resilience in Complex Systems: An Agent‐Based Approach," Systems Engineering, John Wiley & Sons, vol. 20(2), pages 158-172, March.
    5. Liberatore, Federico & Scaparra, Maria P. & Daskin, Mark S., 2012. "Hedging against disruptions with ripple effects in location analysis," Omega, Elsevier, vol. 40(1), pages 21-30, January.
    6. Zio, E. & Golea, L.R. & Sansavini, G., 2012. "Optimizing protections against cascades in network systems: A modified binary differential evolution algorithm," Reliability Engineering and System Safety, Elsevier, vol. 103(C), pages 72-83.
    7. Zhang, Xiaoge & Mahadevan, Sankaran & Sankararaman, Shankar & Goebel, Kai, 2018. "Resilience-based network design under uncertainty," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 364-379.
    8. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    9. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    10. A Carrigy & J E Ramirez-Marquez & C M Rocco, 2010. "Multistate stochastic network interdiction via reliability modelling and evolutionary optimization," Journal of Risk and Reliability, , vol. 224(1), pages 27-42, March.
    11. Li, Y.F. & Sansavini, G. & Zio, E., 2013. "Non-dominated sorting binary differential evolution for the multi-objective optimization of cascading failures protection in complex networks," Reliability Engineering and System Safety, Elsevier, vol. 111(C), pages 195-205.
    12. Rocco S., Claudio M. & Emmanuel Ramirez-Marquez, José & Salazar A., Daniel E., 2010. "Bi and tri-objective optimization in the deterministic network interdiction problem," Reliability Engineering and System Safety, Elsevier, vol. 95(8), pages 887-896.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ramirez-Marquez, José Emmanuel & Rocco S., Claudio M., 2009. "Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 913-921.
    2. Padmavathy, N. & Chaturvedi, Sanjay K., 2013. "Evaluation of mobile ad hoc network reliability using propagation-based link reliability model," Reliability Engineering and System Safety, Elsevier, vol. 115(C), pages 1-9.
    3. Chakraborty, Suparna & Goyal, N.K. & Mahapatra, S. & Soh, Sieteng, 2020. "A Monte-Carlo Markov chain approach for coverage-area reliability of mobile wireless sensor networks with multistate nodes," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    4. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    5. Forghani-elahabad, Majid & Mahdavi-Amiri, Nezam, 2015. "An efficient algorithm for the multi-state two separate minimal paths reliability problem with budget constraint," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 472-481.
    6. Xiang, Shihu & Yang, Jun, 2018. "Performance reliability evaluation for mobile ad hoc networks," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 32-39.
    7. Akgün, Ibrahim & Tansel, Barbaros Ç. & Kevin Wood, R., 2011. "The multi-terminal maximum-flow network-interdiction problem," European Journal of Operational Research, Elsevier, vol. 211(2), pages 241-251, June.
    8. Xiao‐Bing Hu & Hang Li & XiaoMei Guo & Pieter H. A. J. M. van Gelder & Peijun Shi, 2019. "Spatial Vulnerability of Network Systems under Spatially Local Hazards," Risk Analysis, John Wiley & Sons, vol. 39(1), pages 162-179, January.
    9. Laan, Corine M. & van der Mijden, Tom & Barros, Ana Isabel & Boucherie, Richard J. & Monsuur, Herman, 2017. "An interdiction game on a queueing network with multiple intruders," European Journal of Operational Research, Elsevier, vol. 260(3), pages 1069-1080.
    10. Foad Mahdavi Pajouh, 2020. "Minimum cost edge blocker clique problem," Annals of Operations Research, Springer, vol. 294(1), pages 345-376, November.
    11. Wu, Liusan & Tan, Qingmei & Zhang, Yuehui, 2013. "Network connectivity entropy and its application on network connectivity reliability," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 392(21), pages 5536-5541.
    12. Xiaoge Zhang & Sankaran Mahadevan & Kai Goebel, 2019. "Network Reconfiguration for Increasing Transportation System Resilience Under Extreme Events," Risk Analysis, John Wiley & Sons, vol. 39(9), pages 2054-2075, September.
    13. Baycik, N. Orkun & Sharkey, Thomas C. & Rainwater, Chase E., 2020. "A Markov Decision Process approach for balancing intelligence and interdiction operations in city-level drug trafficking enforcement," Socio-Economic Planning Sciences, Elsevier, vol. 69(C).
    14. Eli Towle & James Luedtke, 2018. "New solution approaches for the maximum-reliability stochastic network interdiction problem," Computational Management Science, Springer, vol. 15(3), pages 455-477, October.
    15. Concho, Ana Lisbeth & Ramirez-Marquez, Jose Emmanuel, 2010. "An evolutionary algorithm for port-of-entry security optimization considering sensor thresholds," Reliability Engineering and System Safety, Elsevier, vol. 95(3), pages 255-266.
    16. Ahlatcioglu, Mehmet & Tiryaki, Fatma, 2007. "Interactive fuzzy programming for decentralized two-level linear fractional programming (DTLLFP) problems," Omega, Elsevier, vol. 35(4), pages 432-450, August.
    17. Cook, Jason L. & Ramirez-Marquez, Jose Emmanuel, 2009. "Optimal design of cluster-based ad-hoc networks using probabilistic solution discovery," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 218-228.
    18. Bernardetta Addis & Roberto Aringhieri & Andrea Grosso & Pierre Hosteins, 2016. "Hybrid constructive heuristics for the critical node problem," Annals of Operations Research, Springer, vol. 238(1), pages 637-649, March.
    19. Sarhadi, Hassan & Tulett, David M. & Verma, Manish, 2017. "An analytical approach to the protection planning of a rail intermodal terminal network," European Journal of Operational Research, Elsevier, vol. 257(2), pages 511-525.
    20. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:94:y:2009:i:2:p:568-576. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.