Using game theory to optimize allocation of defensive resources to protect multiple chemical facilities in a city against terrorist attacks

Abstract Owing to increasing global terrorist activities, it is highly important to optimize the allocation of a city’s limited defensive resources to protect multiple chemical facilities against terrorist attacks. Considerable research has focused on assessing the risk of terrorist attacks on chemical facilities; however, conventional risk-based methods do not take into account the strategy adjustments of terrorists and cannot identify the optimal global allocation of defensive resources. This study presents a game-theoretic method for optimizing the allocation of defensive resources; it fully considers the strategic interactions between defenders and attackers by integrating game theory with risk assessment. As a case study, we tested the applicability and reliability of our method using eight chemical plants storing explosive materials in a city in China. In this way, we clarified the differences between conventional methods and our presented method; we confirmed the advantage of the presented method in identifying the optimal global allocation of defensive resources.

[1]  Uriel G. Rothblum,et al.  Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..

[2]  Genserik Reniers,et al.  A sequential-move game for enhancing safety and security cooperation within chemical clusters. , 2011, Journal of hazardous materials.

[3]  Jun Zhuang,et al.  Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[4]  Jr. Louis Anthony Cox,et al.  Game Theory and Risk Analysis , 2009 .

[5]  Abdul-Akeem Sadiq,et al.  Assessing the Chemical Facility Anti-Terrorism Standards after 5 Years: Achievements, Challenges, and Risks Ahead , 2013 .

[6]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[7]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[8]  E. Rasmusen Games and Information: An Introduction to Game Theory , 2006 .

[9]  Henry H. Willis Guiding Resource Allocations Based on Terrorism Risk , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[10]  Ali Khavanin,et al.  Comprehensive risk assessment and management of petrochemical feed and product transportation pipelines , 2009 .

[11]  Calvin D Jaeger Chemical facility vulnerability assessment project. , 2003, Journal of hazardous materials.

[12]  Ciwei Gao,et al.  Risk Assessment of Malicious Attacks Against Power Systems , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[13]  M Sam Mannan,et al.  Lessons to be learned from an analysis of ammonium nitrate disasters in the last 100 years. , 2014, Journal of hazardous materials.

[14]  David A Moore The new risk paradigm for chemical process security and safety. , 2004, Journal of hazardous materials.

[15]  H. Vincent Poor,et al.  Infrastructure security games , 2014, Eur. J. Oper. Res..

[16]  Shi-Woei Lin,et al.  Should the Model for Risk‐Informed Regulation be Game Theory Rather than Decision Theory? , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[17]  Karel Soudan,et al.  A game-theoretical approach for reciprocal security-related prevention investment decisions , 2010, Reliab. Eng. Syst. Saf..

[18]  Louis Anthony Tony Cox,et al.  Some Limitations of “Risk = Threat × Vulnerability × Consequence” for Risk Analysis of Terrorist Attacks , 2008 .

[19]  Genserik Reniers,et al.  Using Game Theory to Improve Safety Within Chemical Industrial Parks , 2013 .

[20]  M Sam Mannan,et al.  Initial perspectives on process threat management. , 2004, Journal of hazardous materials.

[21]  Genserik Reniers,et al.  A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks. , 2016, Risk analysis : an official publication of the Society for Risk Analysis.

[22]  Quentin A. Baker,et al.  Vapor cloud explosion analysis , 1996 .

[23]  John C. McDonald,et al.  Confronting the risks of terrorism: making the right decisions , 2004, Reliab. Eng. Syst. Saf..

[24]  Jai P. Gupta,et al.  Terror-Proofing Chemical Process Industries , 2007 .

[25]  Valerio Cozzani,et al.  The assessment of the attractiveness of process facilities to terrorist attacks , 2015 .

[26]  Brian Veitch,et al.  A Grid Based Approach for Fire and Explosion Consequence Analysis , 2006 .

[27]  Guowei Ma,et al.  New correlation for vapor cloud explosion overpressure calculation at congested configurations , 2014 .

[28]  R. Powell Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.

[29]  Ashwani Srivastava,et al.  New methodologies for security risk assessment of oil and gas industry , 2010 .

[30]  M. Naceur Azaiez,et al.  Game Theoretic Risk Analysis of Security Threats , 2009 .

[31]  Richard White,et al.  A computational asset vulnerability model for the strategic protection of the critical infrastructure , 2014, Int. J. Crit. Infrastructure Prot..

[32]  J. P. Gupta,et al.  Security risk assessment: applying the concepts of fuzzy logic. , 2010, Journal of hazardous materials.

[33]  M. Sam Mannan,et al.  Case study: Assessment on large scale LPG BLEVEs in the 2011 Tohoku earthquakes , 2015 .

[34]  Jun Zhuang,et al.  Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF. , 2016, Risk analysis : an official publication of the Society for Risk Analysis.

[35]  Ilan Adler The equivalence of linear programs and zero-sum games , 2013, Int. J. Game Theory.

[36]  Gerald G. Brown,et al.  How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[37]  Henry H. Willis,et al.  Estimating Terrorism Risk , 2002 .

[38]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[39]  John A. Sokolowski,et al.  Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[40]  Kwang-Cheng Chen,et al.  Smart attacks in smart grid communication networks , 2012, IEEE Communications Magazine.

[41]  Jun Bi,et al.  A two-scale system to identify environmental risk of chemical industry clusters. , 2011, Journal of hazardous materials.

[42]  Uriel G. Rothblum,et al.  Allocating multiple defensive resources in a zero-sum game setting , 2015, Ann. Oper. Res..

[43]  Uday Kumar Chakrabarti,et al.  Route risk evaluation on class-2 hazmat transportation , 2011 .

[44]  J. Vrijling,et al.  An overview of quantitative risk measures for loss of life and economic damage. , 2003, Journal of hazardous materials.

[45]  Jun Zhuang,et al.  Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[46]  Doug Stephens,et al.  Chemical Plants Remain Vulnerable to Terrorists: A Call to Action , 2006, Environmental health perspectives.

[47]  Xiaojun Shan,et al.  Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game , 2013, Eur. J. Oper. Res..

[48]  V. Bier,et al.  SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .

[49]  Jun Zhuang,et al.  Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[50]  David A. Moore Security Risk Assessment Methodology for the petroleum and petrochemical industries , 2013 .

[51]  Shahid Abbas Abbasi,et al.  Major accidents in process industries and an analysis of causes and consequences , 1999 .