Solving Defender-Attacker-Defender Models for Infrastructure Defense
نویسندگان
چکیده
This paper (a) describes a defender-attacker-defender sequential game model (DAD) to plan defenses for an infrastructure system that will enhance that system’s resilience against attacks by an intelligent adversary, (b) describes a realistic formulation of DAD for defending a transportation network, (c) develops a decomposition algorithm for solving this instance of DAD and others, and (d) demonstrates the solution of a small transportation-network example. A DAD model generally evaluates system operation through the solution of an optimization model, and the decomposition algorithm developed here requires only that this system-operation model be continuous and convex. For example, our transportation-network example incorporates a congestion model with a (convex) nonlinear objective function and linear constraints.
منابع مشابه
Analyzing the Vulnerability of Critical Infrastructure to Attack and Planning Defenses
We describe new bilevel programming models to (1) help make the country’s critical infrastructure more resilient to attacks by terrorists, (2) help governments and businesses plan those improvements, and (3) help influence related public policy on investment incentives, regulations, etc. An intelligent attacker (terrorists) and defender (us) are key features of all these models, along with info...
متن کاملSecurity of Transportation Networks: Modeling Attacker-Defender Interaction
Transportation networks are increasingly facing new security threats due to the vulnerabilities of cyber-physical components that support their operation. In this article, we aim to understand how the network operator (defender) should prioritize the investment in securing a set of facilities in order to limit the impact of a strategic adversary (attacker) who can target a facility to increase ...
متن کاملDefending Critical Infrastructure
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions by attacker and defender. We illustrate with examples of the US Strategic Petroleum Reserve, the US Border Patrol at Yuma, Arizona, and an ele...
متن کاملOptimal power grid protection through a defender-attacker-defender model
Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level defender-attacker-defender model. However, this tri-level problem is computationally challenging. In this paper, we design and implement a Column-and-Constraint Generation algorithm to derive its optimal solutions. Numerical results on an IEEE system show that: (i) the devel...
متن کاملAdaptive Attacker Strategy Development Against Moving Target Cyber Defenses
A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker-defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Against this defense, a population of attackers develop strategies specifying the temporal ordering of resource investments that bring targeted zero-da...
متن کامل