Deception tactics for network interdiction: A multiobjective approach

This article develops defender‐attacker network interdiction models with deception. Here, deception refers to a preemptive and intelligent use of concealed interdiction assets and decoys by the defender, in addition to transparent assets commonly employed in modeling defender‐attacker problems. Thes...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Networks Ročník 60; číslo 1; s. 45 - 58
Hlavní autor: Salmerón, Javier
Médium: Journal Article
Jazyk:angličtina
Vydáno: Hoboken Wiley Subscription Services, Inc., A Wiley Company 01.08.2012
Témata:
ISSN:0028-3045, 1097-0037
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:This article develops defender‐attacker network interdiction models with deception. Here, deception refers to a preemptive and intelligent use of concealed interdiction assets and decoys by the defender, in addition to transparent assets commonly employed in modeling defender‐attacker problems. These models can help security planners to locate a limited number of checkpoints and sensors of various types to, for example, detect the smuggling of illegal products. The problem is complex, in part, because the objective functions of the defender and the attacker are different, and because the latter (which represents the attacker's behavior) is difficult to predict by the defender. First, we use duality theory and a generalized network flow model to devise an equivalent mixed‐integer programming formulation, and develop its Benders decomposition. We extend this formulation with a multiobjective approach to account for several behaviors simultaneously. The computational effort to solve these models is considerable, as exemplified by our testing on a variety of cases for a medium‐sized, notional network. Published 2011 Wiley Periodicals, Inc. NETWORKS, 2012
Bibliografie:ark:/67375/WNG-4G1SQG3H-X
istex:FE997F2A078980B0875DEE68C612885FC53C25E4
This article is a U.S. Government work and is in the public domain in the USA.
ArticleID:NET20458
ISSN:0028-3045
1097-0037
DOI:10.1002/net.20458