New solution approaches for the maximum-reliability stochastic network interdiction problem

We investigate methods to solve the maximum-reliability stochastic network interdiction problem (SNIP). In this problem, a defender interdicts arcs on a directed graph to minimize an attacker’s probability of undetected traversal through the network. The attacker’s origin and destination are unknown to the defender and assumed to be random. SNIP can be formulated as a stochastic mixed-integer program via a deterministic equivalent formulation (DEF). As the size of this DEF makes it impractical for solving large instances, current approaches to solving SNIP rely on modifications of Benders decomposition. We present two new approaches to solve SNIP. First, we introduce a new DEF that is significantly more compact than the standard DEF. Second, we propose a new path-based formulation of SNIP. The number of constraints required to define this formulation grows exponentially with the size of the network, but the model can be solved via delayed constraint generation. We present valid inequalities for this path-based formulation which are dependent on the structure of the interdicted arc probabilities. We propose a branch-and-cut (BC) algorithm to solve this new SNIP formulation. Computational results demonstrate that directly solving the more compact SNIP formulation and this BC algorithm both provide an improvement over a state-of-the-art implementation of Benders decomposition for this problem.

[1]  Oktay Günlük,et al.  Mixing mixed-integer inequalities , 2001, Math. Program..

[2]  Sanjeeb Dash,et al.  Strengthened Benders Cuts for Stochastic Integer Programs with Continuous Recourse , 2017, INFORMS J. Comput..

[3]  Delbert Ray Fulkerson,et al.  Maximizing the minimum source-sink path subject to a budget constraint , 1977, Math. Program..

[4]  David P. Morton,et al.  A Stochastic Program for Interdicting Smuggled Nuclear Material , 2003 .

[5]  David P. Morton,et al.  Stochastic Network Interdiction , 1998, Oper. Res..

[6]  Feng Pan,et al.  Minimizing a stochastic maximum‐reliability path , 2008, Networks.

[7]  Laurence A. Wolsey,et al.  Integer and Combinatorial Optimization , 1988 .

[8]  James E. Falk,et al.  Jointly Constrained Biconvex Programming , 1983, Math. Oper. Res..

[9]  Richard D. Wollmer,et al.  Removing Arcs from a Network , 1964 .

[10]  Feng Pan,et al.  Network deployment of radiation detectors with physics-based detection probability calculations , 2011, Ann. Oper. Res..

[11]  David L. Woodruff,et al.  Interdicting Stochastic Networks with Binary Interdiction Effort , 2003 .

[12]  David K. Smith Network Flows: Theory, Algorithms, and Applications , 1994 .

[13]  M. L. Fisher,et al.  An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..

[14]  Gerald G. Brown,et al.  Interdicting a Nuclear-Weapons Project , 2009, Oper. Res..

[15]  David P. Morton,et al.  Models for nuclear smuggling interdiction , 2007 .

[16]  Garth P. McCormick,et al.  Computability of global solutions to factorable nonconvex programs: Part I — Convex underestimating problems , 1976, Math. Program..

[17]  R. Fortet L’algebre de Boole et ses applications en recherche operationnelle , 1960 .

[18]  Alexander Schrijver,et al.  Combinatorial optimization. Polyhedra and efficiency. , 2003 .

[19]  B. Golden A problem in network interdiction , 1978 .

[20]  Shabbir Ahmed,et al.  Maximizing a class of submodular utility functions with constraints , 2017, Math. Program..

[21]  Jeff T. Linderoth,et al.  Reformulation and sampling to solve a stochastic network interdiction problem , 2008 .

[22]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .

[23]  Alper Atamtürk,et al.  Maximizing a class of submodular utility functions , 2011, Math. Program..

[24]  Iain Dunning,et al.  Computing in Operations Research Using Julia , 2013, INFORMS J. Comput..

[25]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.