Defending Critical Infrastructure

Loading...
Thumbnail Image
Authors
Brown, Gerald
Carlyle, Matthew
Salmerón, Javier
Wood, Kevin
Advisors
Second Readers
Subjects
Network Interdiction and Attacker-Defender Modeling
Date of Issue
2006
Date
2006
Publisher
Language
Abstract
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions by attacker and defender. We illustrate with examples of the US Strategic Petroleum Reserve, the US Border Patrol at Yuma, Arizona, and an electrical transmission system. We conclude by reporting insights gained from the modeling experience and many “red-team” exercises. Each exercise gathers open-source data on a real-world infrastructure system, develops an appropriate bilevel or trilevel model, and uses these to identify vulnerabilities in the system or to plan an optimal defense.
Type
Article
Description
Interfaces, 36, pp. 530‐544.
The article of record as published may be located at http://dx.doi.org/doi 10.1287/inte.1060.0252
Center for Infrastructure Defense (CID) Paper.
Department
Department of Operations Research
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
Brown, G., Carlyle, M., Salmerón, J. and Wood, K., 2006, “Defending Critical Infrastructure,” Interfaces, 36, pp. 530‐544.
Distribution Statement
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Collections