Vulnerability assessment of a food supply chain to an intentional attack

Our objective is to develop an approach for quantifying the vulnerability of a food product supply chain that may be used by an intelligent adversary to deliver a chemical or biological agent. The approach is intended to create control strategies that seek to ensure a high level of system productivity while mitigating risk. We have developed a supply chain process model that determines the consequence of a given attack, in terms of the number of contaminated containers exiting the production system. An attacker-defender sequential game model is also developed to determine the likelihood that the system is successfully attacked as a function of how the targets are protected in the presence of an intelligent attacker. The combined model determines the expected impact of a successful attack and provides near optimal control strategies. A case study is built for the liquid egg production industry, which compares the productivity and vulnerability of two alternative supply chain designs.

[1]  Eberhard E. Bischoff,et al.  Multi-Objective Decision Analysis — the Right Objectives? , 1986 .

[2]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[3]  Leslie Pack Kaelbling,et al.  All learning is Local: Multi-agent Learning in Global Reward Games , 2003, NIPS.

[4]  Michael L. Littman,et al.  Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.

[5]  H. Rosoff,et al.  Decision Analysis by Proxy for the Rational Terrorist , 2022 .

[6]  Erim Kardes Robust Stochastic Games and Applications to Counter-Terrorism Strategies , 2005 .

[7]  Salim Hariri,et al.  Game Theory Based Network Security , 2010, J. Information Security.

[8]  Juan F. Escobar,et al.  A Theory of Regular Markov Perfect Equilibria in Dynamic Stochastic Games: Genericity, Stability, and Purification , 2008 .

[9]  John A. Sokolowski,et al.  Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[10]  Joao P. Hespanha,et al.  Deception in Non-Cooperative Games with Partial Information , 2000 .

[11]  Drew Fudenberg,et al.  Game theory (3. pr.) , 1991 .

[12]  Sarit Kraus,et al.  Efficient Algorithms to Solve Bayesian Stackelberg Games for Security Applications , 2008, AAAI.

[13]  Sarit Kraus,et al.  ARMOR Security for Los Angeles International Airport , 2008, AAAI.

[14]  Sarit Kraus,et al.  An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.