Optimal employment of port radar and picket ships to detect attacker speedboats a defender-attacker optimization model to enhance maritime domain awareness
Abdul-Ghaffar, Ahmad M.
Brown, Gerald G.
Kline, Jeffrey E.
MetadataShow full item record
The U.S. Coast Guard has deployed several hundred port patrol vessels to protect U.S. Navy ships and other high-value assets in ports world-wide. Each vessel has an armed crew of four, is relatively fast, and features a simple surface search radar, radios, and a machine gun. These vessels coordinate surveillance patrols in groups of two or four, perhaps working with shorebased radar. We seek to advantageously position these vessels, and perhaps shore-based radar too, to minimize the probability that an intelligent adversary in one or more speed-boats will evade detection while mounting an attack. Attackers can use elevated obstructions to our radar detection in their attack paths, and ports feature many such restrictions to navigation and observation. We make a key, but realistic assumption that complicates planning: we assume the attackers will see or be told of our defensive positions and capabilities in advance of mounting their attack. We demonstrate our defender-attacker optimization with a fictitious port, and with Los Angeles-Long Beach, Hong Kong, U.S. Navy 5-th Fleet in Bahrain, and the Al Basra oil terminal. In cases we analyze, we can almost certainly detect any attack, even though the attacker, observing our pre-positions, plans clever, evasive attack tracks.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Lack, Lindsey A. (Monterey, California. Naval Postgraduate School, 2003-06);The attack of choice for a professional attacker is system subversion: the insertion of a trap door that allows the attacker to bypass an operating system's protection controls. This attack provides significant capabilities ...
Petrakos, Nikolaos (Monterey, California. Naval Postgraduate School, 2009-09);In this study, we investigated an algebraic-type attack, known as the cube attack, against wireless networks. We implemented the cube attack in a wireless system, namely Bluetooth. We formally modeled the encryption function ...
Mobile sensor networks a discrete event simulation of WMD threat detection in urban traffic schemes Hyink, Jeffrey F. (Monterey, California. Naval Postgraduate School, 2007-03);The rise of the threat of WMD attack on American soil necessitates new and innovative approaches to homeland security. A layered security model has been proposed in which an attacker must successfully penetrate multiple ...