Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information

It is now paramount to protect critical infrastructures because of their significance for economic development and social well-being of modern societies. One of the main threats to these networked systems is from intentional attackers, who are resourceful and inventive in selecting time, target, and means of attack. Thus, attackers’ intelligence should be considered when developing intelligent and cost-effective protection strategies. In this research, critical infrastructures are modeled as networks and the development of network protection strategies is modeled as a two-stage game between a protector and an attacker with incomplete information. Due to the complexity of critical infrastructures, there are usually a large number of combinations of potential protection and attack strategies leading to a computational challenge to find the Pareto equilibrium solutions for the proposed game. To meet this challenge, this research develops an evolutionary algorithm to solve the proposed a transformation of the game into a multi-objective optimization model.

[1]  R. Kevin Wood,et al.  The multi-terminal maximum-flow network-interdiction problem , 2011, Eur. J. Oper. Res..

[2]  Gregory Levitin,et al.  Minmax defense strategy for complex multi-state systems , 2009, Reliab. Eng. Syst. Saf..

[3]  Kwang-Jae Kim,et al.  Optimizing multi-response surface problems: How to use multi-objective optimization techniques , 2005 .

[4]  Kjell Hausken,et al.  Strategic Defense and Attack of Complex Networks , 2007, WEIS.

[5]  Jacques Periaux,et al.  Combining game theory and genetic algorithms with application to DDM-nozzle optimization problems , 2001 .

[6]  David W. Coit,et al.  Multi-objective optimization using genetic algorithms: A tutorial , 2006, Reliab. Eng. Syst. Saf..

[7]  Claudio M. Rocco Sanseverino,et al.  Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery , 2009, Reliab. Eng. Syst. Saf..

[8]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[9]  Jun Zhuang,et al.  Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[10]  Claudio M. Rocco Sanseverino,et al.  A bi-objective approach for shortest-path network interdiction , 2010, Comput. Ind. Eng..

[11]  Bob Duckett Concise Oxford English Dictionary (11th edition) , 2005 .

[12]  Claudio M. Rocco Sanseverino,et al.  Assessing the Vulnerability of a Power System Through a Multiple Objective Contingency Screening Approach , 2011, IEEE Transactions on Reliability.

[13]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[14]  John A. Major Advanced Techniques for Modeling Terrorism Risk , 2002 .

[15]  George W Bush,et al.  The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets , 2003 .

[16]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .

[17]  J. C. Smith,et al.  Algorithms for discrete and continuous multicommodity flow network interdiction problems , 2007 .

[18]  Vicki M. Bier,et al.  Subsidies in Interdependent Security With Heterogeneous Discount Rates , 2007 .

[19]  Gregory Levitin,et al.  Optimal protection of general source-sink networks via evolutionary techniques , 2009, Reliab. Eng. Syst. Saf..

[20]  Jun Zhuang,et al.  Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[21]  Claudio M. Rocco Sanseverino,et al.  Deterministic network interdiction optimization via an evolutionary approach , 2009, Reliab. Eng. Syst. Saf..

[22]  N. Assimakopoulos,et al.  A network interdiction model for hospital infection control. , 1987, Computers in biology and medicine.

[23]  Gregory Levitin,et al.  Redundancy vs. Protection in Defending Parallel Systems Against Unintentional and Intentional Impacts , 2009, IEEE Transactions on Reliability.

[24]  Kjell Hausken,et al.  Governments' and Terrorists' Defense and Attack in a T-Period Game , 2011, Decis. Anal..

[25]  Claudio M. Rocco Sanseverino,et al.  Bi and tri-objective optimization in the deterministic network interdiction problem , 2010, Reliab. Eng. Syst. Saf..

[26]  George E. Apostolakis,et al.  Identification of critical locations across multiple infrastructures for terrorist actions , 2007, Reliab. Eng. Syst. Saf..

[27]  David Michaud,et al.  Methodology for Ranking the Elements of Water-Supply Networks , 2006 .

[28]  M. Naceur Azaiez,et al.  Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..

[29]  Kjell Hausken,et al.  Protecting complex infrastructures against multiple strategic attackers , 2011, Int. J. Syst. Sci..

[30]  Claudio M. Rocco Sanseverino,et al.  A holistic method for reliability performance assessment and critical components detection in complex networks , 2011 .

[31]  Jose Emmanuel Ramirez-Marquez,et al.  Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach , 2008, Reliab. Eng. Syst. Saf..

[32]  Jose Emmanuel Ramirez-Marquez,et al.  Evolutionary optimization technique for multi-state two-terminal reliability allocation in multi-objective problems , 2010 .

[33]  C. Papadimitriou Algorithmic Game Theory: The Complexity of Finding Nash Equilibria , 2007 .

[34]  Barry M. Horowitz,et al.  Modeling interdependent infrastructures for sustainable counterterrorism , 2004 .

[35]  Philip S. Bud Whiteman Improving Single Strike Effectiveness for Network Interdiction , 1999 .

[36]  Heidi A. Taboada,et al.  Multi-objective scheduling problems: Determination of pruned Pareto sets , 2008 .

[37]  Chi Zhang and José Emmanuel Ramirez-Marquez Approximation of Minimal Cut Sets for a Flow Network via Evolutionary Optimization and Data Mining Techniques , 2011 .

[38]  Vicki M. Bier,et al.  Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..

[39]  Kjell Hausken Defense and attack of complex and dependent systems , 2010, Reliab. Eng. Syst. Saf..

[40]  Slavko Krajcar,et al.  Integrated approach to energy security and critical infrastructure in Croatia , 2009, 2009 6th International Conference on the European Energy Market.

[41]  Avinash Agrawal,et al.  A Survey of Network Reliability and Domination Theory , 1984, Oper. Res..

[42]  M. Naceur Azaiez,et al.  Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks , 2009 .

[43]  Johannes O. Royset,et al.  Solving the Bi-Objective Maximum-Flow Network-Interdiction Problem , 2007, INFORMS J. Comput..

[44]  Claudio M. Rocco Sanseverino,et al.  All-terminal network reliability optimization via probabilistic solution discovery , 2008, Reliab. Eng. Syst. Saf..

[45]  Albert Jones,et al.  Toward modeling and simulation of critical national infrastructure interdependencies , 2005 .

[46]  Gregory Levitin,et al.  Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems , 2010, Reliab. Eng. Syst. Saf..

[47]  Thomas Krieger,et al.  On Pareto equilibria in vector-valued extensive form games , 2003, Math. Methods Oper. Res..

[48]  M. Naceur Azaiez,et al.  Game Theoretic Risk Analysis of Security Threats , 2009 .

[49]  Jun Zhuang,et al.  Modelling ‘contracts’ between a terrorist group and a government in a sequential game , 2012, J. Oper. Res. Soc..

[50]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.