Network inspection for detecting strategic attacks

From MaRDI portal
Publication:5080657

DOI10.1287/OPRE.2021.2180zbMATH Open1493.90157arXiv1705.00349OpenAlexW4211167717MaRDI QIDQ5080657FDOQ5080657


Authors: Mathieu Dahan, Lina Sela, Saurabh Amin Edit this on Wikidata


Publication date: 31 May 2022

Published in: Operations Research (Search for Journal in Brave)

Abstract: This article studies a problem of strategic network inspection, in which a defender (agency) is tasked with detecting the presence of multiple attacks in the network. An inspection strategy entails monitoring the network components, possibly in a randomized manner, using a given number of detectors. We formulate the network inspection problem (mathcalP) as a large-scale bilevel optimization problem, in which the defender seeks to determine an inspection strategy with minimum number of detectors that ensures a target expected detection rate under worst-case attacks. We show that optimal solutions of (mathcalP) can be obtained from the equilibria of a large-scale zero-sum game. Our equilibrium analysis involves both game-theoretic and combinatorial arguments, and leads to a computationally tractable approach to solve (mathcalP). Firstly, we construct an approximate solution by utilizing solutions of minimum set cover (MSC) and maximum set packing (MSP) problems, and evaluate its detection performance. In fact, this construction generalizes some of the known results in network security games. Secondly, we leverage properties of the optimal detection rate to iteratively refine our MSC/MSP-based solution through a column generation procedure. Computational results on benchmark water networks demonstrate the scalability, performance, and operational feasibility of our approach. The results indicate that utilities can achieve a high level of protection in large-scale networks by strategically positioning a small number of detectors.


Full work available at URL: https://arxiv.org/abs/1705.00349




Recommendations




Cites Work


Cited In (5)





This page was built for publication: Network inspection for detecting strategic attacks

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5080657)