Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation
Authored by Shahram Sarkani, William M Kroshl, Thomas A Mazzuchi
Date Published: 2015
DOI: 10.1111/risa.12325
Sponsors:
No sponsors listed
Platforms:
No platforms listed
Model Documentation:
Other Narrative
Flow charts
Model Code URLs:
Model code not found
Abstract
This article presents ongoing research that focuses on efficient
allocation of defense resources to minimize the damage inflicted on a
spatially distributed physical network such as a pipeline, water system, or power distribution system from an attack by an active adversary, recognizing the fundamental difference between preparing for natural
disasters such as hurricanes, earthquakes, or even accidental systems
failures and the problem of allocating resources to defend against an
opponent who is aware of, and anticipating, the defender's efforts to
mitigate the threat. Our approach is to utilize a combination of integer
programming and agent-based modeling to allocate the defensive
resources. We conceptualize the problem as a Stackelberg leader follower
game where the defender first places his assets to defend key areas of
the network, and the attacker then seeks to inflict the maximum damage
possible within the constraints of resources and network structure. The
criticality of arcs in the network is estimated by a deterministic
network interdiction formulation, which then informs an evolutionary
agent-based simulation. The evolutionary agent-based simulation is used
to determine the allocation of resources for attackers and defenders
that results in evolutionary stable strategies, where actions by either
side alone cannot increase its share of victories. We demonstrate these
techniques on an example network, comparing the evolutionary agent-based
results to a more traditional, probabilistic risk analysis (PRA)
approach. Our results show that the agent-based approach results in a
greater percentage of defender victories than does the PRA-based
approach.
Tags
Adversarial risk analysis
Probabilistic risk
Terrorist attacks