Defense and attack of complex and dependent systems

被引:46
作者
Hausken, Kjell [1 ]
机构
[1] Univ Stavanger, Fac Social Sci, N-4036 Stavanger, Norway
关键词
Complex infrastructures; Reliability theory; Game theory; Defense; Attack; Contest success function; Parallel system; Series system; Complex systems; Dependent systems; Interdependent systems; Protection; Terrorism; TERRORISM; STRATEGY;
D O I
10.1016/j.ress.2009.07.006
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
A framework is Constructed for how to analyze the strategic defense of ail infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent, The defender and attacker determine how much to invest in defending versus attacking each Of Multiple targets. A target can have economic, human, and symbolic Values, Subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and oil characteristics of the contest. The defender minimizes the expected damage Plus the defense costs. the attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact oil his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack oil one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:29 / 42
页数:14
相关论文
共 36 条
[21]   Minmax defense strategy for complex multi-state systems [J].
Hausken, Kjell ;
Levitin, Gregory .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2009, 94 (02) :577-587
[22]   ANARCHY AND ITS BREAKDOWN [J].
HIRSHLEIFER, J .
JOURNAL OF POLITICAL ECONOMY, 1995, 103 (01) :26-52
[23]  
Kanturska U, 2009, INT SER OPER RES MAN, V128, P199
[24]   Interdependent security [J].
Kunreuther, H ;
Heal, G .
JOURNAL OF RISK AND UNCERTAINTY, 2003, 26 (2-3) :231-249
[25]  
Levitin G, 2009, INT SER OPER RES MAN, V128, P33
[26]   Redundancy vs. Protection vs. False Targets for Systems Under Attack [J].
Levitin, Gregory ;
Hausken, Kjell .
IEEE TRANSACTIONS ON RELIABILITY, 2009, 58 (01) :58-68
[27]   Methodology for Ranking the Elements of Water-Supply Networks [J].
Michaud, David ;
Apostolakis, George E. .
JOURNAL OF INFRASTRUCTURE SYSTEMS, 2006, 12 (04) :230-242
[28]  
Paté-Cornell E, 2009, INT SER OPER RES MAN, V128, P147
[29]   Identification of critical locations across multiple infrastructures for terrorist actions [J].
Patterson, S. A. ;
Apostolakis, G. E. .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2007, 92 (09) :1183-1203
[30]   Allocating defensive resources with private information about vulnerability [J].
Powell, Robert .
AMERICAN POLITICAL SCIENCE REVIEW, 2007, 101 (04) :799-809