Solving Defender-Attacker-Defender Models for Infrastructure Defense
Alderson, David L.
Brown, Gerald G.
Carlyle, W. Matthew
Wood, R. Kevin
MetadataShow full item record
This paper (a) describes a defender-attacker-defender sequential game model (DAD) to plan defenses for an infrastructure system that will enhance that system's resilience against attacks for an intelligent adversary, (b) describes a realistic formulation of DAD for defending a transportation network, (c) develops a decomposition algorithm for solving this instance of DAD and others, and (d) demonstrates the solution of a small transportation-network example. A DAD model generally evaluates system operation through the solution of an optimization model, and the decomposition algorithm developed here requires only that this system-operation model be continuous and convex. For example, our transportation-network example incorporates a congestion model with a (convex) nonlinear objective function and linear constraints.
In Operations Research, Computing, and Homeland Defense, R.K. Wood and R.F. Dell, editors, INFORMS, Hanover, MD, pp. 28-49.The article of record as published may be located at http://dx.doi.org10.1287/ics.2011.0047
Rightsdefined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Pfeiff, Daniel M. (Monterey, California. Naval Postgraduate School, 2009);Self-Propelled Semi-Submersibles now transport an estimated 75% of cocaine originating from Colombia and headed for the United States. There are several types of search platforms (i.e., units to detect, classify, and ...
Lazzaro, Gary L. (Monterey, California: Naval Postgraduate School, 2016-06);The optimal defense and operation of networks against worst-case attack is an important problem for military analysts. We review development of existing solutions for the Defender-Attacker-Defender (DAD) tri-level optimization ...
Klaus, Christian (Monterey, California: Naval Postgraduate School, 2014-03);We define and solve two network-design problems. In the first, (1) a defender uses limited resources to select a portfolio of paths or design a sub-network; (2) an attacker then uses limited attack resources to destroy ...