Tri-level optimization of critical infrastructure resilience

Download
Author
Babick, John P.
Date
2009-09Advisor
Carlyle, W. Matthew
Second Reader
Brown, Gerald G.
Metadata
Show full item recordAbstract
We introduce a new way to perform network analysis on critical infrastructure that is superior to Risk Analysis and Management for Critical Asset Protection (RAMCAP), currently used by the Department of Homeland Security. We introduce the idea of a Design-Attack-Defend (DAD) model that determines the optimal defense plan for a critical infrastructure network within a specified budget constraint. Design-Attack-Defend first determines worst-case attacks and then determines where to defend or build additional infrastructure that will maximize the surviving efficiency of the infrastructure after a malicious attack or natural disaster. Design- Attack-Defend ensures that the defense plan suggested is optimal to a range of attacks, out of all possible defense plans, within budget constraints. The Design-Attack-Defend will always give a solution at least as good as RAMCAP and as a simpler, bi-level Attacker-Defender model-and in many cases it can be expected to suggest a better plan for where to defend or build additional critical infrastructure. We demonstrate with a model of the Western U.S. railroad network.
Collections
Related items
Showing items related by title, author, creator and subject.
-
Homeland Security Affairs Journal, Volume I - 2005: Issue 2, Fall
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2005-09);September 2005. Welcome to the second issue of Homeland Security Affairs. The central theme is Hurricane Katrina. We also offer articles about critical infrastructure protection and capabilities based planning. One of ... -
SEABED INFRASTRUCTURE DEFENSE ANALYSIS
Antonio, Francische N.; Asmus, Jared C.; Belcher, Kyle; Berger, Asaf; Bey, Ben Muwei; Chen, Zhaolin; Chew, Jian Ming; Constantine, Scott S.; Eich, Dolph E., Jr.; Hanacek, Joseph E.; Kui, Jie Ren; Lee, Cheng Qian; Lian, Weiwen Mervyn; Morgan, John N.; Newgren, Brian J.; Rydalch, Wilson L.; Se, Xi Yang Ronald; Shi, Ronghua; Tan, Kang Hao; Wheeler, Kevin M.; Yee, Jun Xian Jeremy; SEA Cohort SEA-28 (Monterey, California: Naval Postgraduate School, 2019-06);Traditional fleet operations and technologies are not adequately suited to counter the growing threat to undersea infrastructure from autonomous undersea systems. A cost-effective unmanned and manned system of systems is ... -
Cyberterrorism cyber prevention vs cyber recovery
DiBiasi, Jeffrey R. (Monterey California. Naval Postgraduate School, 2007-12);The technological age has forced the U.S. to engage a new set of national security challenges. Several potential adversaries have cyberspace capabilities comparable to those of the U.S., and are constantly conducting ...