IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v169y2018icp51-62.html
   My bibliography  Save this article

Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi

Author

Listed:
  • Ramirez-Marquez, José Emmanuel
  • Li, Qing

Abstract

To preserve continued effective performance of facilities, their protection against intentional attacks needs to be considered while determining optimal facility location solutions. We propose a simultaneous game between a defender and an attacker to study facility protection against intentional attacks while keeping the information about protection resource allocation secret. To deal with the complexity of solving the proposed simultaneous game, we employ an algorithm with necessary adaptations to identify its mixed-strategy Nash equilibrium solution, which is used to evaluate the disruption inflicted by intentional attacks on the efficiency of a facility location solution. The facility location problem with protection against intentional attacks is then modeled as a multi-objective optimization problem, in order to balance the cost of opening facilities and the efficiency of facilities with and without facility failures inflicted by intentional attacks. MO-PSDA, a multi-objective evolutionary algorithm, is employed to solve the proposed multi-objective optimization problem.

Suggested Citation

  • Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
  • Handle: RePEc:eee:reensy:v:169:y:2018:i:c:p:51-62
    DOI: 10.1016/j.ress.2017.08.005
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832017300893
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2017.08.005?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. José Ramirez-Marquez & Claudio Rocco, 2010. "Evolutionary optimization technique for multi-state two-terminal reliability allocation in multi-objective problems," IISE Transactions, Taylor & Francis Journals, vol. 42(8), pages 539-552.
    2. Hernandez, Ivan & Emmanuel Ramirez-Marquez, Jose & Rainwater, Chase & Pohl, Edward & Medal, Hugh, 2014. "Robust facility location: Hedging against failures," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 73-80.
    3. Irawan, Chandra Ade & Salhi, Said & Scaparra, Maria Paola, 2014. "An adaptive multiphase approach for large unconditional and conditional p-median problems," European Journal of Operational Research, Elsevier, vol. 237(2), pages 590-605.
    4. Ramirez-Marquez, José Emmanuel & Rocco, Claudio M., 2008. "All-terminal network reliability optimization via probabilistic solution discovery," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1689-1697.
    5. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    6. Patterson, S.A. & Apostolakis, G.E., 2007. "Identification of critical locations across multiple infrastructures for terrorist actions," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1183-1203.
    7. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    8. Kjell Hausken, 2011. "Protecting complex infrastructures against multiple strategic attackers," International Journal of Systems Science, Taylor & Francis Journals, vol. 42(1), pages 11-29.
    9. Vicki M. Bier & Louis A. Cox & M. Naceur Azaiez, 2009. "Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 1, pages 1-11, Springer.
    10. Concho, Ana Lisbeth & Ramirez-Marquez, Jose Emmanuel, 2010. "An evolutionary algorithm for port-of-entry security optimization considering sensor thresholds," Reliability Engineering and System Safety, Elsevier, vol. 95(3), pages 255-266.
    11. Jun Zhuang & Vicki Bier, 2011. "Secrecy And Deception At Equilibrium, With Applications To Anti-Terrorism Resource Allocation," Defence and Peace Economics, Taylor & Francis Journals, vol. 22(1), pages 43-61.
    12. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    13. Levitin, Gregory & Hausken, Kjell & Ben Haim, Hanoch, 2013. "Defending majority voting systems against a strategic attacker," Reliability Engineering and System Safety, Elsevier, vol. 111(C), pages 37-44.
    14. Chi Zhang & José Ramirez-Marquez & Claudio Sanseverino, 2011. "A holistic method for reliability performance assessment and critical components detection in complex networks," IISE Transactions, Taylor & Francis Journals, vol. 43(9), pages 661-675.
    15. Scaparra, Maria P. & Church, Richard L., 2008. "An exact solution approach for the interdiction median problem with fortification," European Journal of Operational Research, Elsevier, vol. 189(1), pages 76-92, August.
    16. Chaya Losada & M. Scaparra & Richard Church & Mark Daskin, 2012. "The stochastic interdiction median problem with disruption intensity levels," Annals of Operations Research, Springer, vol. 201(1), pages 345-365, December.
    17. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    18. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.
    19. S. L. Hakimi, 1964. "Optimum Locations of Switching Centers and the Absolute Centers and Medians of a Graph," Operations Research, INFORMS, vol. 12(3), pages 450-459, June.
    20. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    21. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    22. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    23. Ramirez-Marquez, José Emmanuel & Rocco S., Claudio M., 2009. "Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 913-921.
    24. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    25. G Levitin & K Hausken, 2012. "Individual versus overarching protection against strategic attacks," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(7), pages 969-981, July.
    26. Godinho, Pedro & Dias, Joana, 2013. "Two-player simultaneous location game: Preferential rights and overbidding," European Journal of Operational Research, Elsevier, vol. 229(3), pages 663-672.
    27. Ramirez-Marquez, Jose Emmanuel, 2008. "Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1698-1709.
    28. Mozart Menezes & O. Berman & D. Krass, 2007. "Facility Reliability Issues in Network p-Median Problems: Strategic Centralization and Co-location Effects," Post-Print halshs-00170396, HAL.
    29. Godinho, Pedro & Dias, Joana, 2010. "A two-player competitive discrete location model with simultaneous decisions," European Journal of Operational Research, Elsevier, vol. 207(3), pages 1419-1432, December.
    30. O'Hanley, Jesse R. & Church, Richard L., 2011. "Designing robust coverage networks to hedge against worst-case facility losses," European Journal of Operational Research, Elsevier, vol. 209(1), pages 23-36, February.
    31. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.
    32. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    33. Hausken, Kjell & Levitin, Gregory, 2009. "Minmax defense strategy for complex multi-state systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 577-587.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Ouyang, Min & Liu, Chuang & Xu, Min, 2019. "Value of resilience-based solutions on critical infrastructure protection: Comparing with robustness-based solutions," Reliability Engineering and System Safety, Elsevier, vol. 190(C), pages 1-1.
    2. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    3. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    5. Li, Yulong & Zhang, Chi & Jia, Chuanzhou & Li, Xiaodong & Zhu, Yimin, 2019. "Joint optimization of workforce scheduling and routing for restoring a disrupted critical infrastructure," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    6. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    7. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    8. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    9. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    10. Girish Ch. Dey & Mamata Jenamani, 2019. "Optimizing fortification plan of capacitated facilities with maximum distance limits," OPSEARCH, Springer;Operational Research Society of India, vol. 56(1), pages 151-173, March.
    11. Sachuer Bao & Chi Zhang & Min Ouyang & Lixin Miao, 2019. "An integrated tri-level model for enhancing the resilience of facilities against intentional attacks," Annals of Operations Research, Springer, vol. 283(1), pages 87-117, December.
    12. Hao, Zhifeng & Yeh, Wei-Chang & Liu, Zhenyao & Forghani-elahabad, Majid, 2020. "General multi-state rework network and reliability algorithm," Reliability Engineering and System Safety, Elsevier, vol. 203(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    2. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    3. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    4. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    5. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    6. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    7. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    8. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    9. Zhu, Huaxing & Zhang, Chi, 2019. "Expanding a complex networked system for enhancing its reliability evaluated by a new efficient approach," Reliability Engineering and System Safety, Elsevier, vol. 188(C), pages 205-220.
    10. Guozhen Xiong & Chi Zhang & Fei Zhou, 2017. "A robust reliability redundancy allocation problem under abnormal external failures guided by a new importance measure," Journal of Risk and Reliability, , vol. 231(2), pages 180-199, April.
    11. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    12. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    13. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    14. Sachuer Bao & Chi Zhang & Min Ouyang & Lixin Miao, 2019. "An integrated tri-level model for enhancing the resilience of facilities against intentional attacks," Annals of Operations Research, Springer, vol. 283(1), pages 87-117, December.
    15. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    16. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    17. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    18. Konrad, Kai A. & Morath, Florian, 2023. "How to preempt attacks in multi-front conflict with limited resources," European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
    19. Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.
    20. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:169:y:2018:i:c:p:51-62. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.