Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks

Many countries have multiple critical infrastructures that are potentially vulnerable to deliberate attacks by terrorists or other intelligent adversaries. determining how best to protect these and other critical infrastructures against intelligent attacks has become a topic of great concern. Researchers and practitioners have attempted a variety of approaches for dealing with this issue. One motivation for this book is the belief that methods for guiding resource allocations to defend against intelligent antagonists should explicitly take into account the intelligent and adaptive nature of the threat. As discussed in this chapter, simple approaches to risk assessment that may work well in other contexts (such as protecting against accidents or acts of nature) can fail to correctly anticipate and quantify the risks from persistent, intelligent attackers (Golany et al., to appear). Therefore, a more effective approach is needed. It is natural to turn to game theory for ideas and

[1]  Michael Shermer The Mind of the Market: Compassionate Apes, Competitive Humans, and Other Tales from Evolutionary Economics , 2007 .

[2]  Dimitris Bertsimas,et al.  Conservation Laws, Extended Polymatroids and Multiarmed Bandit Problems; A Polyhedral Approach to Indexable Systems , 1996, Math. Oper. Res..

[3]  Nicholas A. Linacre,et al.  Security Analysis for Agroterrorism: Applying the Threat, Vulnerability, Consequence Framework to Developing Countries , 2005 .

[4]  J. P. Indusi TERRORIST PROTECTION PLANNING USING A RELATIVE RISK REDUCTION APPROACH, SESSION VIII: TECHNOLOGY FORUM FOCUS GROUPS. , 2003 .

[5]  John N. Tsitsiklis,et al.  Stochastic Search in a Forest Revisited , 2007, Math. Oper. Res..

[6]  Uriel G. Rothblum,et al.  Index Policies for Stochastic Search in a Forest with an Application to R&D Project Management , 2004, Math. Oper. Res..

[7]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[8]  Gerd Infanger,et al.  Dynamic asset allocation strategies using a stochastic dynamic programming aproach , 2008 .

[9]  Pedro C. Diniz,et al.  Compilation Techniques for Reconfigurable Architectures , 2008 .

[10]  Uriel G. Rothblum,et al.  Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..

[11]  Louis Anthony (Tony) Cox,et al.  Some Limitations of Qualitative Risk Rating Systems , 2005, Risk analysis : an official publication of the Society for Risk Analysis.

[12]  B. Alberts Cybersecurity Today and Tomorrow: Pay Now or Pay Later , 2002 .