Network interdiction – models, applications, unexplored directions
نویسندگان
چکیده
Network interdiction is the monitoring or halting of an adversary’s activity on a network. Its models involve two players, usually called the interdictor and the evader (or, in the more general context of Stackelberg games, leader and follower). The evader operates on the network to optimize some objective such as moving through the network as fast as possible (shortest path interdiction), or with as little probability of being detected as possible (most reliable path interdiction), or to maximize the amount of goods transported through the network (network flow interdiction). The interdictor has the capacity to change the structure or parameters of the network (remove vertices or edges, increase detection probabilities, or lower arc capacities) in order to minimize the evader’s objective function. The study of network interdiction began with military applications: disruption of the flow of enemy troops. More recent applications include infectious disease control, counter-terrorism, interception of contraband and illegal items such as drugs, weapons, or nuclear material, and the monitoring of computer networks. A large variety of models have been proposed for different interdiction problems. These include combinatorial optimization, stochastic programming, and game theoretic approaches. In this note we attempt to collect the most researched models, match them with applications, and summarize the latest algorithmic and complexity results. In Section 1 we introduce the basic ideas and define the necessary terms. Section 2 is concerned with various models that have been proposed in the literature, as well as with algorithms and complexity bounds. In Section 3 we examine which models would be appropriate for which applications. Finally, in Section 4 we outline two promising research directions for the future.
منابع مشابه
Stochastic Network Interdiction: Models and Methods Stochastic Network Interdiction: Models and Methods Stochastic Network Interdiction: Models and Methods Chapter 2. Stochastic Network Interdiction Models List of Tables
vii
متن کاملA Note on the Integrality Gap in the Nodal Interdiction Problem
In the maximum flow network interdiction problem, an attacker attempts to minimize the maximum flow by interdicting flow on the arcs of network. In this paper, our focus is on the nodal interdiction for network instead of the arc interdiction. Two path inequalities for the node-only interdiction problem are represented. It has been proved that the integrality gap of relaxation of the maximum fl...
متن کاملInterdiction Models and Applications
Through interdiction models, we infer the vulnerabilities inherent in an operational system. This chapter presents four applications of interdiction modeling: (i) to delay an adversary’s development of a first nuclear weapon; (ii) to understand vulnerabilities in an electric power system; (iii) to locate sensors in a municipal water network; and (iv) to secure a border against a nuclear smuggle...
متن کاملInterdiction of a Markovian Evader
Shortest path network interdiction is a combinatorial optimization problem on an activity network arising in a number of important security-related applications. It is classically formulated as a bilevel maximin problem representing an “interdictor” and an “evader”. The evader tries to move from a source node to the target node along a path of the least cost while the interdictor attempts to fr...
متن کاملBilevel Network Interdiction Models: Formulations and Solutions
This definition is unnecessarily restrictive— for instance, it should also include ship-based firepower—but the essence is reasonable: interdiction connotes preemptive attacks that limit an enemy’s subsequent ability to wage war, or carry out other nefarious activities. The mathematical study of interdiction has focused primarily on network interdiction, in which an enemy’s activities are model...
متن کامل