IDEAS home Printed from https://ideas.repec.org/a/wly/syseng/v13y2010i2p119-129.html
   My bibliography  Save this article

A methodology for estimating and optimizing effectiveness of Non‐Independent Layered Defense

Author

Listed:
  • Boaz I. Kaminer
  • Joseph Z. Ben‐Asher

Abstract

For many years, systems, developed to be integrated into a layered defense array, were planned through the “Stand Alone” paradigm, assuming that the layers of defense are independent. Almost all published literature dealing with Layered Defense automatically assumes that the layers of defense are independent of each other. The fact is they are not! Defense layers may influence one another in positive and/or negative ways. We attempt to initiate a new look at developing and deploying systems in an integrated array of defense systems, based on the understanding that influences between systems must be taken into account. A methodology for modeling the dependencies between defense systems engagements, of a single attacker, or of a salvo of attackers, is developed in this paper through an “Influence Decay Function” model. A tractable algorithm is developed to compute the complex effectiveness objective functions. The Non Independent Layered Defense Problem (NILDP) is formulated as a Mixed Integer Non Linear Programming problem. The optimization problem for maximum layered defense effectiveness is solved through powerful heuristic methods. The discussion deals with engineering defense systems to operate within complex environments which include not only threat from an opponent but also friendly systems to which integration is not at all trivial. © 2009 Wiley Periodicals, Inc. Syst Eng

Suggested Citation

  • Boaz I. Kaminer & Joseph Z. Ben‐Asher, 2010. "A methodology for estimating and optimizing effectiveness of Non‐Independent Layered Defense," Systems Engineering, John Wiley & Sons, vol. 13(2), pages 119-129, June.
  • Handle: RePEc:wly:syseng:v:13:y:2010:i:2:p:119-129
    DOI: 10.1002/sys.20137
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/sys.20137
    Download Restriction: no

    File URL: https://libkey.io/10.1002/sys.20137?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. D. Orlin, 1987. "Optimal weapons allocation against layered defenses," Naval Research Logistics (NRL), John Wiley & Sons, vol. 34(5), pages 605-617, October.
    2. Walter R. Nunn & David V. Glass & Ih-Ching Hsu & David A. Perin, 1982. "Technical Note—Analysis of a Layered Defense Model," Operations Research, INFORMS, vol. 30(3), pages 595-599, June.
    3. Rui Almeida & Donald P. Gaver & Patricia A. Jacobs, 1995. "Simple probability models for assessing the value of information in defense against missile attack," Naval Research Logistics (NRL), John Wiley & Sons, vol. 42(4), pages 535-547, June.
    4. Gerald Brown & Matthew Carlyle & Douglas Diehl & Jeffrey Kline & Kevin Wood, 2005. "A Two-Sided Optimization for Theater Ballistic Missile Defense," Operations Research, INFORMS, vol. 53(5), pages 745-763, October.
    5. Jerome Bracken, 1984. "Layered defense of deceptively based ICBMs," Naval Research Logistics Quarterly, John Wiley & Sons, vol. 31(4), pages 653-670, December.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    2. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    3. Gokhan Karakose & Ronald G. McGarvey, 2019. "Optimal Detection of Critical Nodes: Improvements to Model Structure and Performance," Networks and Spatial Economics, Springer, vol. 19(1), pages 1-26, March.
    4. Kathryn Merrick & Medria Hardhienata & Kamran Shafi & Jiankun Hu, 2016. "A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios," Future Internet, MDPI, vol. 8(3), pages 1-29, July.
    5. Juan S. Borrero & Oleg A. Prokopyev & Denis Sauré, 2019. "Sequential Interdiction with Incomplete Information and Learning," Operations Research, INFORMS, vol. 67(1), pages 72-89, January.
    6. Gerald G. Brown & Walter C. DeGrange & Robert F. Dell & Ronald D. Fricker, 2015. "ASP, Art and Science of Practice: Educating Military Operations Research Practitioners," Interfaces, INFORMS, vol. 45(2), pages 175-186, April.
    7. Mark Horner & Michael Widener, 2011. "The effects of transportation network failure on people’s accessibility to hurricane disaster relief goods: a modeling approach and application to a Florida case study," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 59(3), pages 1619-1634, December.
    8. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    9. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    10. Ravindra K. Ahuja & Arvind Kumar & Krishna C. Jha & James B. Orlin, 2007. "Exact and Heuristic Algorithms for the Weapon-Target Assignment Problem," Operations Research, INFORMS, vol. 55(6), pages 1136-1146, December.
    11. Nedialko B. Dimitrov & Gerald Brown & Matthew Carlyle, 2013. "A Real-World Network Modeling Project," INFORMS Transactions on Education, INFORMS, vol. 14(1), pages 4-12, September.
    12. Haywood, Adam B. & Lunday, Brian J. & Robbins, Matthew J., 2022. "Intruder detection and interdiction modeling: A bilevel programming approach for ballistic missile defense asset location," Omega, Elsevier, vol. 110(C).
    13. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    14. Ankur Sinha & Zhichao Lu & Kalyanmoy Deb & Pekka Malo, 2020. "Bilevel optimization based on iterative approximation of multiple mappings," Journal of Heuristics, Springer, vol. 26(2), pages 151-185, April.
    15. Leonardo Lozano & J. Cole Smith, 2017. "A Backward Sampling Framework for Interdiction Problems with Fortification," INFORMS Journal on Computing, INFORMS, vol. 29(1), pages 123-139, February.
    16. Bo An & Fernando Ordóñez & Milind Tambe & Eric Shieh & Rong Yang & Craig Baldwin & Joseph DiRenzo & Kathryn Moretti & Ben Maule & Garrett Meyer, 2013. "A Deployed Quantal Response-Based Patrol Planning System for the U.S. Coast Guard," Interfaces, INFORMS, vol. 43(5), pages 400-420, October.
    17. Orhan Karasakal & Nur Evin Özdemirel & Levent Kandiller, 2011. "Anti‐ship missile defense for a naval task group," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(3), pages 304-321, April.
    18. Michael J. Armstrong, 2014. "Modeling Short-Range Ballistic Missile Defense and Israel's Iron Dome System," Operations Research, INFORMS, vol. 62(5), pages 1028-1039, October.
    19. David L. Alderson & Gerald G. Brown & W. Matthew Carlyle, 2015. "Operational Models of Infrastructure Resilience," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 562-586, April.
    20. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:syseng:v:13:y:2010:i:2:p:119-129. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1002/(ISSN)1520-6858 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.