Deceptive tactics for protecting cities against Vehicle Borne Improvised Explosive Devices
Lugo, Manuel X.
MetadataShow full item record
This thesis focuses on interdiction of Vehicle Borne Improvised Explosive Devices (VBIED) on a major city by using "transparent" and "deceptive" assets. Transparent assets (e.g., road blocks) are those for which we assume positions are known by both attackers and interdictors. "Decoys" and "traps" are deceptive assets. Decoys are meant to be perceived as effective interdiction assets by attackers, while traps are not perceived. We use a mathematical optimization model to allocate interdiction assets maximizing expected interdicted "value." Then, we use agent-based simulation to assess the effectiveness of those interdiction plans against a variety of attacker's behaviors: perceptive (as assumed by the optimization), naiÌ ve, communicative, route blocker (static), route blocker (dynamic) and clairvoyant. We use two test networks and seven scenarios consisting of different combinations of interdiction assets. From our analysis we note that: (a) if the network incorporates deception, any behavior other than perceptive may be advantageous to the attacker; (b) a communicative behavior proves effective for the attackers against scenarios containing traps; (c) decoys are most effective if used in defense against perceptive-like behaviors; and, (d) if the defender expects perceptive-like behavior, then adding transparent assets to traps and decoys may be of little value.
Showing items related by title, author, creator and subject.
Salmerón, Javier (Wiley, 2011-09-19);This article develops defender-attacker network interdiction models with deception. Here, deception refers to a preemptive and intelligent use of concealed interdiction assets and decoys by the defender, in addition to ...
Rowe, Neil C.; Michael, J. Bret; Auguston, Mikhail; Riehle, Richard (Monterey, California. Naval Postgraduate School, 2002-06);Some information systems are critical to defend against malicious attack. Yet they often rely on just the same countermeasures as any system ? firewalls, authentication, intrusion-detection systems, and encryp!tion ? ...
Phase I report on intelligent software decoys: technical feasibility and institutional issues in the context of homeland security Michael, James Bret; Rowe, Neil C.; Rothstein, Hy; Auguston, Mikhail; Drusinsky, Doron; Riehle, Richard (Monterey, California. Naval Postgraduate School, 2002-12-10); NPS-CS-03-001The purpose of this project is to explore the technical feasibility and institutional issues associated with applying software-based deception techniques as part of Homeland defense. At present, we refer to the embodiment ...