Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification

We present the Stochastic R-Interdiction Median Problem with Fortification (S-RIMF). This model optimally allocates defensive resources among facilities to minimize the worst-case impact of an intentional disruption. Since the extent of terrorist attacks and malicious actions is uncertain, the problem deals with a random number of possible losses. A max-covering type formulation for the S-RIMF is developed. Since the problem size grows very rapidly with the problem inputs, we propose pre-processing techniques based on the computation of valid lower and upper bounds to expedite the solution of instances of realistic size. We also present heuristic approaches based on heuristic concentration-type rules. The heuristics are able to find an optimal solution for almost all the problem instances considered. Extensive computational testing shows that both the optimal algorithm and the heuristics are very successful at solving the problem. Finally, a discussion of the importance of recognizing the stochastic nature of the number of possible attacks is provided.

[1]  Gerald G. Brown,et al.  Analyzing the Vulnerability of Critical Infrastructure to Attack and Planning Defenses , 2005 .

[2]  Jesse R. O'Hanley,et al.  Designing robust coverage networks to hedge against worst-case facility losses , 2008, Eur. J. Oper. Res..

[3]  Oded Berman,et al.  Facility Reliability Issues in Network p-Median Problems: Strategic Centralization and Co-Location Effects , 2007, Oper. Res..

[4]  Alan T. Murray,et al.  Vital Nodes, Interconnected Infrastructures, and the Geographies of Network Survivability , 2006 .

[5]  Lawrence V. Snyder,et al.  Reliability Models for Facility Location: The Expected Failure Cost Case , 2005, Transp. Sci..

[6]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[7]  Richard D. Wollmer,et al.  Removing Arcs from a Network , 1964 .

[8]  Richard L. Church,et al.  Identifying Critical Infrastructure: The Median and Covering Facility Interdiction Problems , 2004 .

[9]  Michael G. H. Bell The use of game theory to measure the vulnerability of stochastic networks , 2003, IEEE Trans. Reliab..

[10]  Jonathan Cole Smith,et al.  Survivable network design under optimal and heuristic interdiction scenarios , 2007, J. Glob. Optim..

[11]  Richard L. Church,et al.  Protecting Critical Assets: The r-interdiction median problem with fortification , 2007 .

[12]  C. Revelle,et al.  Heuristic concentration: Two stage solution construction , 1997 .

[13]  M. Naceur Azaiez,et al.  Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..

[14]  M. John Hodgson,et al.  Heuristic concentration for the p-median: an example demonstrating how and why it works , 2002, Comput. Oper. Res..

[15]  V. Bier Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[16]  J. C. Smith,et al.  Algorithms for discrete and continuous multicommodity flow network interdiction problems , 2007 .

[17]  Richard L. Church,et al.  Production , Manufacturing and Logistics An exact solution approach for the interdiction median problem with fortification , 2008 .

[18]  Dulcy M. Abraham,et al.  Allocating security resources to a water supply network , 2007 .

[19]  Julia L. Higle,et al.  Stochastic Programming: Optimization When Uncertainty Matters , 2005 .

[20]  Richard L. Church,et al.  A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..

[21]  Mark S. Daskin,et al.  The α‐reliable mean‐excess regret model for stochastic facility location modeling , 2006 .