Network Monitoring under Strategic Disruptions

This article considers a resource allocation problem for monitoring infrastructure networks facing strategic disruptions. The network operator is interested in determining the minimum number of sensors and a sensing strategy, to ensure a desired detection performance against simultaneous failures induced by a resource-constrained attacker. To address this problem, we formulate a mathematical program with constraints involving the mixed strategy Nash equilibria of an operator-attacker game. The set of player strategies in this game are determined by the network structure and players' resources, and grow combinatorially with the network size. Thus, well-known algorithms for computing equilibria in strategic games cannot be used to evaluate the constraints in our problem. We present a solution approach based on two combinatorial optimization problems, formulated as minimum set cover and maximum set packing problems. By using a combination of game-theoretic and combinatorial arguments, we show that the resulting solution has guarantees on the detection performance and admits a small optimality gap in practical settings. Importantly, this approach is scalable to large-scale networks. We also identify a sufficient condition on the network structure for this solution to be optimal. Finally, we demonstrate the scalability and optimality guarantee of our approach using a set of benchmark water networks.

[1]  Steve Alpern,et al.  Patrolling Games , 2011, Oper. Res..

[2]  Cynthia A. Phillips,et al.  Sensor Placement in Municipal Water Networks with Temporal Integer Programming Models , 2006 .

[3]  Kamal Youcef-Toumi,et al.  Relay node placement in wireless sensor networks for pipeline inspection , 2014, 2013 American Control Conference.

[4]  Sam Chamberlain,et al.  Rapid, Vehicle-Based Identification of Location and Magnitude of Urban Natural Gas Pipeline Leaks. , 2017, Environmental science & technology.

[5]  James B. Orlin,et al.  Robust monotone submodular function maximization , 2015, Mathematical Programming.

[6]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[7]  Yijie Han,et al.  Improved algorithm for all pairs shortest paths , 2004, Inf. Process. Lett..

[8]  Yoav Shoham,et al.  Simple search methods for finding a Nash equilibrium , 2004, Games Econ. Behav..

[9]  Tim Roughgarden,et al.  Algorithmic Game Theory , 2007 .

[10]  Andreas Krause,et al.  Near-Optimal Sensor Placements in Gaussian Processes: Theory, Efficient Algorithms and Empirical Studies , 2008, J. Mach. Learn. Res..

[11]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS.

[12]  Ebrahim Nasrabadi,et al.  On the power of randomization in network interdiction , 2013, Oper. Res. Lett..

[13]  Jan Kratochvíl,et al.  Independent Sets with Domination Constraints , 1998, Discret. Appl. Math..

[14]  H. Vincent Poor,et al.  Infrastructure security games , 2014, Eur. J. Oper. Res..

[15]  George B. Dantzig,et al.  Decomposition Principle for Linear Programs , 1960 .

[16]  P. Parpas,et al.  Control of water distribution networks with dynamic DMA topology using strictly feasible sequential convex programming , 2015 .

[17]  Demetrios G. Eliades,et al.  Placement of Synchronized Measurements for Power System Observability , 2009, IEEE Transactions on Power Delivery.

[18]  Saurabh Amin,et al.  Network Inspection for Detecting Strategic Attacks , 2017 .

[19]  Jan Kratochvíl,et al.  Independent Sets with Domination Constraints , 2000, Discret. Appl. Math..

[20]  H. B. McMahan,et al.  Robust Submodular Observation Selection , 2008 .

[21]  Paul G. Spirakis,et al.  A Network Game with Attackers and a Defender , 2008, Algorithmica.

[22]  Andreas Krause,et al.  Near-optimal sensor placements in Gaussian processes , 2005, ICML.

[23]  Kamal Youcef-Toumi,et al.  Optimal coverage of an infrastructure network using sensors with distance-decaying sensing quality , 2013, Autom..

[24]  Saurabh Amin,et al.  Network sensing for security against link disruption attacks , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[25]  Zoran Kapelan,et al.  Automated Detection of Pipe Bursts and Other Events in Water Distribution Systems , 2014 .

[26]  Avi Ostfeld,et al.  Using aggregation/skeletonization network models for water quality simulations in epidemiologic studies , 2008 .

[27]  Vangelis Th. Paschos,et al.  A New Efficient Heuristic for the Minimum Set Covering Problem , 1995 .

[28]  Amanda D. Lothes,et al.  Research Database of Water Distribution System Models , 2014 .

[29]  Bethany L. Nicholson,et al.  Mathematical Programs with Equilibrium Constraints , 2021, Pyomo — Optimization Modeling in Python.

[30]  P. Goutal,et al.  On the infiltration game , 1997, Int. J. Game Theory.

[31]  Vijay V. Vazirani,et al.  Approximation Algorithms , 2001, Springer Berlin Heidelberg.

[32]  Kaiguang Zhao,et al.  Mapping urban pipeline leaks: methane leaks across Boston. , 2013, Environmental pollution.

[33]  Peter H. Gleick,et al.  Water and terrorism , 2006 .

[34]  John von Neumann,et al.  1. A Certain Zero-sum Two-person Game Equivalent to the Optimal Assignment Problem , 1953 .

[35]  Joseph R. Dancy,et al.  Terrorism and Oil & Gas Pipeline Infrastructure: Vulnerability and Potential Liability for Cybersecurity Attacks , 2017 .

[36]  Alan Washburn,et al.  Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..

[37]  Churlzu Lim,et al.  Algorithms for Network Interdiction and Fortification Games , 2008 .

[38]  Avi Ostfeld,et al.  Optimal Layout of Early Warning Detection Stations for Water Distribution Systems Security , 2004 .

[39]  Mhand Hifi,et al.  A genetic algorithm-based heuristic for solving the weighted maximum independent set and some equivalent problems , 1997 .

[40]  M. Cripps The theory of learning in games. , 1999 .

[41]  Vasek Chvátal,et al.  A Greedy Heuristic for the Set-Covering Problem , 1979, Math. Oper. Res..

[42]  Petra Koenig,et al.  Search Games And Other Applications Of Game Theory , 2016 .

[43]  George J. Pappas,et al.  Resilient monotone submodular function maximization , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[44]  Aranyak Mehta,et al.  Playing large games using simple strategies , 2003, EC '03.

[45]  D. Fudenberg,et al.  The Theory of Learning in Games , 1998 .

[46]  L. Nachman,et al.  PIPENET: A Wireless Sensor Network for Pipeline Monitoring , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[47]  Orazio Giustolisi,et al.  Pressure-Driven Demand and Leakage Simulation for Water Distribution Networks , 2008 .

[48]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[49]  Saurabh Amin,et al.  Sensor placement for fault location identification in water networks: A minimum test cover approach , 2015, Autom..

[50]  Anna R. Karlin,et al.  Game Theory, Alive , 2017 .

[51]  David P. Morton,et al.  Stochastic Network Interdiction , 1998, Oper. Res..

[52]  Chee-Yee Chong,et al.  Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.