Defending Critical Infrastructure
نویسندگان
چکیده
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions by attacker and defender. We illustrate with examples of the US Strategic Petroleum Reserve, the US Border Patrol at Yuma, Arizona, and an electrical transmission system. We conclude by reporting insights gained from the modeling experience and many “red-team” exercises. Each exercise gathers open-source data on a real-world infrastructure system, develops an appropriate bilevel or trilevel model, and uses these to identify vulnerabilities in the system or to plan an optimal defense.
منابع مشابه
Chapter 2 CYBERSPACE POLICY FOR CRITICAL INFRASTRUCTURES
The first step in preparing any battlespace is to define the domain for attack and maneuver. The various military service components have directed authority to focus their efforts in specific domains of operations (e.g., naval operations are mainly in the maritime domain). However, cyberspace operations pose challenges because they span multiple operational domains. This paper focuses on U.S. c...
متن کاملNeil C . Rowe , and Albert
Deception can be a useful tool in defending computer systems against cyberattacks because it is unexpected and offers much variety of tactics. It is particularly useful for sites of critical infrastructure for which multiple defenses are desirable. We have developed an experimental approach to finding deceptive tactics for system defense by trying a variety of tactics against live Internet traf...
متن کاملInfrastructure for Intrusion Detection and Response
Automated response to intrusions has become a major issue in defending critical systems. Because the adversary can take actions at computer speeds, systems need the capability to react without human intervention. An infrastructure that supports development of automated response systems is critically needed. This infrastructure must allow easy integration of detection and response components to ...
متن کاملPassivity-Based Distributed Strategies for Stochastic Stackelberg Security Games
Stackelberg Security Games (SSGs) model scenarios where a defender implements a randomized security policy, while an attacker observes the policy and selects an optimal attack strategy. Applications of SSG include critical infrastructure protection and dynamic defense of computer networks. Current work focuses on centralized algorithms for computing stochastic, mixed-strategy equilibria and tra...
متن کاملEnsuring Military Capability: Continuity of Operations
This chapter addresses the third homeland security task area—the continuity of military operations in the United States, its territories, and its possessions. As distinct from the COG operations, discussed in Chapter Five, this task area of homeland security consists of the continuity of military operations, including • force protection, primarily for deploying units; • critical infrastructure ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Interfaces
دوره 36 شماره
صفحات -
تاریخ انتشار 2006