Deterministic network interdiction optimization via an evolutionary approach

Claudio M. Rocco S, José Emmanuel Ramirez-Marquez

    Research output: Contribution to journalArticlepeer-review

    46 Scopus citations

    Abstract

    This paper introduces an evolutionary optimization approach that can be readily applied to solve deterministic network interdiction problems. The network interdiction problem solved considers the minimization of the maximum flow that can be transmitted between a source node and a sink node for a fixed network design when there is a limited amount of resources available to interdict network links. Furthermore, the model assumes that the nominal capacity of each network link and the cost associated with their interdiction can change from link to link. For this problem, the solution approach developed is based on three steps that use: (1) Monte Carlo simulation, to generate potential network interdiction strategies, (2) Ford-Fulkerson algorithm for maximum s-t flow, to analyze strategies' maximum source-sink flow and, (3) an evolutionary optimization technique to define, in probabilistic terms, how likely a link is to appear in the final interdiction strategy. Examples for different sizes of networks and network behavior are used throughout the paper to illustrate the approach. In terms of computational effort, the results illustrate that solutions are obtained from a significantly restricted solution search space. Finally, the authors discuss the need for a reliability perspective to network interdiction, so that solutions developed address more realistic scenarios of such problem.

    Original languageEnglish
    Pages (from-to)568-576
    Number of pages9
    JournalReliability Engineering and System Safety
    Volume94
    Issue number2
    DOIs
    StatePublished - Feb 2009

    Keywords

    • Network interdiction
    • Reliability
    • Resource allocation
    • Solution discovery

    Fingerprint

    Dive into the research topics of 'Deterministic network interdiction optimization via an evolutionary approach'. Together they form a unique fingerprint.

    Cite this