Network Throughput and Reliability: Preventing Hazards and Attacks Through Gaming—Part 2: A Research Agenda

It is clear from the discussions in the previous chapter that, while there has been work done on improving network throughput and reliability, only a plethora of literature discusses a unified model to address both hazards and attacks. This is the motivation behind the previous chapter and the current one, where an attempt is made to bridge this gap. In spite of our initial modeling and computational experiments, no one has yet established the formal conditions under which a Pareto Nash equilibrium exists to prevent both hazards and attacks. Such an equilibrium includes the necessary posturing to discourage terrorist attacks, and to perform preventive maintenance and upgrade on our critical civil infrastructure ahead of a hazard. Meanwhile, general principles of how to best defend systems of specific types against intelligent attacks are emerging that can help system managers to allocate resources to best defend their systems. The research framework outlined in this chapter will gain insights into hazards and attack mitigation for a variety of infrastructure networks. In addition, there is much that can be done in the behavioral science perspective.

[1]  Alper Atamtürk,et al.  Two-Stage Robust Network Flow and Design Under Demand Uncertainty , 2007, Oper. Res..

[2]  J. G. Dai,et al.  Maximum Pressure Policies in Stochastic Processing Networks , 2005, Oper. Res..

[3]  Yupo Chan,et al.  Exact and approximate improvement to the throughput of a stochastic network , 1997 .

[4]  Richard L. Church,et al.  A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..

[5]  E. Salas,et al.  Reflections on shared cognition , 2001 .

[6]  Yupo Chan,et al.  Stochastic Incident-Management of Asymmetrical Network-Workloads , 2006 .

[7]  N. Sancho,et al.  On the Maximum Expected Flow in a Network , 1988 .

[8]  Michael G. H. Bell The use of game theory to measure the vulnerability of stochastic networks , 2003, IEEE Trans. Reliab..

[9]  Golbon Zakeri,et al.  On Cournot Equilibria in Electricity Transmission Networks , 2010, Oper. Res..

[10]  Fakhri Karray,et al.  A Greedy Algorithm for Faster Feasibility Evaluation of All-Terminal-Reliable Networks , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[11]  Roman M. Sheremeta,et al.  The attack and defense of weakest-link networks , 2010, Public Choice.

[12]  Wai Yuen Szeto,et al.  Measuring Network Reliability by considering Paradoxes , 2009 .

[13]  P. Pardalos,et al.  Pareto optimality, game theory and equilibria , 2008 .

[14]  Alfredo García,et al.  A Decentralized Approach to Discrete Optimization via Simulation: Application to Network Flow , 2007, Oper. Res..

[15]  D. R. Fulkerson,et al.  Flows in Networks. , 1964 .

[16]  José R. Correa,et al.  The Impact of Oligopolistic Competition in Networks , 2009, Oper. Res..

[17]  Kjell Hausken,et al.  Defending Against Terrorism, Natural Disaster, and All Hazards , 2009 .

[18]  Miro Kraetzl,et al.  The Cross-Entropy Method for Network Reliability Estimation , 2005, Ann. Oper. Res..

[19]  J. R. Evans,et al.  Maximum flow in probabilistic graphs-the discrete case , 1976, Networks.

[20]  Yupo Chan,et al.  Improving information-network performance: reliability versus invulnerability , 1999 .

[21]  Jesse R. O'Hanley,et al.  Optimizing system resilience: A facility protection model with recovery time , 2012, Eur. J. Oper. Res..

[22]  L. Samuelson Evolutionary Games and Equilibrium Selection , 1997 .

[23]  Andreas Pitsillides,et al.  Game Theory in Communication Networks: Cooperative Resolution of Interactive Networking Scenarios , 2012 .

[24]  Maria Paola Scaparra,et al.  Optimal Allocation of Protective Resources in Shortest-Path Networks , 2011, Transp. Sci..

[25]  Yupo Chan,et al.  Information security: Designing a stochastic-network for throughput and reliability†‡ , 2009 .

[26]  Xiang Fei,et al.  A Methodology for Assessing Transportation Network Terrorism Risk with Attacker and Defender Interactions , 2010, Comput. Aided Civ. Infrastructure Eng..

[27]  Åke J. Holmgren,et al.  Evaluating Strategies for Defending Electric Power Networks Against Antagonistic Attacks , 2007, IEEE Transactions on Power Systems.

[28]  Yupo Chan,et al.  Game-theoretic paradigms in collaborative research: Part 2 – experimental design , 2014 .

[29]  Wai Yuen Szeto Cooperative game approaches to measuring network reliability considering paradoxes , 2011 .

[30]  Margaret M. Wiecek,et al.  International Series in Operations Research and Management Science , 2016 .

[31]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[32]  M G H Bell,et al.  Attacker–defender models and road network vulnerability , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[33]  Xiaodong Wang,et al.  Quantitative Modeling of Coupled Piezo-Elastodynamic Behavior of Piezoelectric Actuators Bonded to an Elastic Medium for Structural Health Monitoring: A Review , 2010, Sensors.

[34]  Yupo Chan,et al.  Detecting a Security Disturbance in Multi Commodity Stochastic Networks , 2006, Telecommun. Syst..

[35]  R. S. Laundy,et al.  Multiple Criteria Optimisation: Theory, Computation and Application , 1989 .

[36]  Yupo Chan,et al.  Location, Transport and Land-Use: Modelling Spatial-Temporal Information , 2004 .

[37]  C. Aliprantis,et al.  Games and Decision Making , 1999 .

[38]  Seth D. Guikema,et al.  Game Theory Models of Intelligent Actors in Reliability Analysis: An Overview of the State of the Art , 2009 .

[39]  Jian Hu,et al.  A multi-criteria routing model for incident management , 2005, SMC.

[40]  Thomas L. Magnanti,et al.  Variable Disaggregation in Network Flow Problems with Piecewise Linear Costs , 2007, Oper. Res..

[41]  Yingyan Lou,et al.  Defending Transportation Networks against Random and Targeted Attacks , 2011 .

[42]  David Wettstein,et al.  Bidding for the Surplus : A Non-cooperative Approach to the Shapley Value , 2001, J. Econ. Theory.

[43]  Sanguthevar Rajasekaran,et al.  Many-to-Many Game-Theoretic Approach for the Measurement of Transportation Network Vulnerability , 2011 .

[44]  Churlzu Lim,et al.  Algorithms for Network Interdiction and Fortification Games , 2008 .

[45]  Chung-Chi Hsieh,et al.  Simple algorithms for updating multi-resource allocations in an unreliable flow network , 2006, Comput. Ind. Eng..

[46]  Dietrich Braess,et al.  Über ein Paradoxon aus der Verkehrsplanung , 1968, Unternehmensforschung.

[47]  C.G.A.M. van den Nouweland,et al.  A game theoretic approach to problems in telecommunication , 1996 .