Abstract

Service disruptions due to deliberate sabotage are serious threats to supply systems. To alleviate the loss of accessibility caused by such disruptions, identifying the system vulnerabilities that would be worth strengthening is a critical problem in the field of Critical Infrastructure Protection (CIP). Today’s supply systems tend to be attacked in a cooperative manner. A set of facilities of an infrastructure system would be struck by several attackers cooperatively to create the worst-case disruptions. In this case, the conventional critical infrastructure protection approach based on R-Interdiction Median models with Fortification (RIMF) does not work well because it does not consider the cooperative manner among attackers. To handle the problem, a Bi-objective Probabilistic Interdiction Median Model with Cooperative Attacks (BICA) is proposed in this work. It is formulated as a bi-objective nonlinear optimization model and solved by a modified multi-objective evolutionary algorithm. Experiments verify the high interdiction losses of disruptions caused by cooperative attacks without any protection. Compared with the conventional model, the experimental results show that the BICA model can model the cooperative attacking problem effectively and that its evolutionary-based algorithm can solve the model efficiently.

Highlights

  • An infrastructure system refers to delivery or service networks that are essential to the economic and societal well-being of a nation.[1]

  • We introduce the cooperative techniques of different attackers into network interdiction models and propose a Bi-objective Probabilistic Interdiction Median model with Cooperative Attacks (BICA)

  • The red points indicate a cooperative situation, and the black squares indicate a non-cooperative situation.From the figures, we observed that the operation costs after cooperative attacks are significantly greater than those after noncooperative attacks

Read more

Summary

Introduction

An infrastructure system refers to delivery or service networks that are essential to the economic and societal well-being of a nation.[1]. It can be used to assess the potential risks and losses and identify the system vulnerabilities or critical components. Critical components refer to the key assets that have damage and can result in the severe degradation of the system's functioning and performance. In reality, they can be instantiated as bridges, tunnels, power plants, warehouses and emergency stations.[3] Based on the network-based system of interest, interdiction scenarios in which elements (nodes or arcs) become disabled will be examined and analyzed. We will concentrate on the interdiction patterns that lead to the greatest losses and identify the interdicted components in these patterns as system vulnerabilities to focus on when designing protection plans

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call