Analyzing the Vulnerability of Critical Infrastructure to Attack, and Planning Defenses
dc.contributor.author | Brown, G. | |
dc.contributor.author | Carlyle, W.M. | |
dc.contributor.author | Salmeron, J. | |
dc.contributor.author | Wood, K. | |
dc.date | 2005 | |
dc.date.accessioned | 2013-09-25T23:03:08Z | |
dc.date.available | 2013-09-25T23:03:08Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Brown, G., Carlyle, W.M., Salmeron, J. and Wood, K., 2005, “Analyzing the Vulnerability of Critical Infrastructure to Attack, and Planning Defenses,” in Tutorials in Operations Research: Emerging Theory, Methods, and Applications, H. Greenberg and J. Smith, eds., Institute for Operations Research and Management Science, Hanover, MD. | |
dc.identifier.uri | http://hdl.handle.net/10945/36718 | |
dc.description | The article of record as published may be located at http://dx.doi.org//10.1287/inte.1060.0252 | en_US |
dc.description.abstract | We describe new bilevel programming models to (1) help make the country’s critical infrastructure more resilient to attacks by terrorists, (2) help governments and businesses plan those improvements, and (3) help influence related public policy on investment incentives, regulations, etc. An intelligent attacker (terrorists) and defender (us) are key features of all these models, along with information transparency: These are Stackelberg games, as opposed to two-person, zero-sum games. We illustrate these models with applications to electric power grids, subways, airports, and other critical infrastructure. For instance, one model identifies locations for a given set of electronic sensors that minimize the worst-case time to detection of a chemical, biological, or radiological contaminant introduced into the Washington, D.C. subway system. The paper concludes by reporting insights we have gained through forming “red teams,” each of which gathers open-source data on a real-world system, develops an appro- priate attacker-defender or defender-attacker model, and solves the model to identify vulnerabilities in the system or to plan an optimal defense. | en_US |
dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
dc.title | Analyzing the Vulnerability of Critical Infrastructure to Attack, and Planning Defenses | en_US |
dc.contributor.department | Department of Operations Research | |
dc.subject.author | Network Interdiction and Attacker-Defender Modeling | en_US |
dc.subject.author | critical infrastructure protection | en_US |
dc.subject.author | bilevel program | en_US |
dc.subject.author | mixed-integer program | en_US |
dc.subject.author | homeland security | en_US |