Abstract

We use the adversarial risk analysis (ARA) framework to deal with the protection of a critical networked infrastructure from the attacks of intelligent adversaries. We deploy an ARA model for each relevant element (node, link, hotspot in link) in the network, using a Sequential Defend–Attack–Defend template as a reference. Such ARA models are related by resource constraints and result aggregation over various sites, for both the Defender and the Attacker. As a case study, we consider the protection of a section of the Spanish railway network from a potential terrorist attack.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call