Defending Critical Infrastructure

We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions by attacker and defender. We illustrate with examples of the US Strategic Petroleum Reserve, the US Border Patrol at Yuma, Arizona, and an electrical transmission system. We conclude by reporting insights gained from the modeling experience and many “red-team” exercises. Each exercise gathers open-source data on a real-world infrastructure system, develops an appropriate bilevel or trilevel model, and uses these to identify vulnerabilities in the system or to plan an optimal defense.

[1]  Patrick S. Brown Optimizing the long-term capacity expansion and protection of Iraqi oil infrastructure , 2005 .

[2]  Jonathan F. Bard,et al.  The Mixed Integer Linear Bilevel Programming Problem , 1990, Oper. Res..

[3]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[4]  Allen J. Wood,et al.  Power Generation, Operation, and Control , 1984 .

[5]  G. Sheblé,et al.  Power generation operation and control — 2nd edition , 1996 .

[6]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .

[7]  Gerald G. Brown,et al.  Anatomy of a Project to Produce a First Nuclear Weapon , 2006 .

[8]  James W. Moore,et al.  Institute of Electrical and Electronics Engineers (IEEE) , 2002 .

[9]  Mary Lynn Garcia,et al.  The Design and Evaluation of Physical Protection Systems , 2001 .

[10]  Halil Pulat,et al.  A Two-Sided Optimization of Border Patrol Interdiction , 2005 .

[11]  Heinrich von Stackelberg,et al.  Stackelberg (Heinrich von) - The Theory of the Market Economy, translated from the German and with an introduction by Alan T. PEACOCK. , 1953 .

[12]  Ross Baldick,et al.  Optimizing Electric Grid Design under Asymmetric Threat , 2003 .

[13]  Gerald G. Brown,et al.  Analyzing the Vulnerability of Critical Infrastructure to Attack and Planning Defenses , 2005 .

[14]  David P. Morton,et al.  A Stochastic Program for Interdicting Smuggled Nuclear Material , 2003 .

[15]  Lawrence M Wein,et al.  Analyzing a bioterror attack on the food supply: the case of botulinum toxin in milk. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[16]  Mohammad Shahidehpour,et al.  The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .

[17]  David P. Morton,et al.  Stochastic Network Interdiction , 1998, Oper. Res..

[18]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[19]  B. Golden A problem in network interdiction , 1978 .

[20]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[21]  Richard P. O’Neill Nested Decomposition of Multistage Convex Programs , 1976 .

[22]  J. F. Benders Partitioning procedures for solving mixed-variables programming problems , 1962 .

[23]  W E Vesely,et al.  Fault Tree Handbook , 1987 .