TY - JOUR
T1 - Optimal protection of general source-sink networks via evolutionary techniques
AU - Ramirez-Marquez, Jose E.
AU - Rocco S, Claudio M.
AU - Levitin, Gregory
PY - 2009/10
Y1 - 2009/10
N2 - This paper presents a network optimization model that maximizes the survivability of a network for a specific source-sink flow when resources are allocated to protect network links under an evenly distributed attack strategy. The proposed model takes into account the stochastic behavior of link interdiction by assuming that the vulnerability of an attacked/defended link is determined via a ratio form of the attacker-defender contest success function. The research done as part of this manuscript extends previous network interdiction approaches through an optimization model that relates the defenders'/attackers' per-link resources with link vulnerability values allowing for the defender to consider competing courses of action. Once the network vulnerability model is proposed, the manuscript describes an evolutionary algorithm that can provide optimal defense strategies in networks that follow a source-sink behavior. The results of the extensive experimentation done for different sized networks illustrate that when a defender is faced with an evenly distributed attack his/her defense strategy should take into account the configuration of the network, the source-sink flow and the importance of the different network elements.
AB - This paper presents a network optimization model that maximizes the survivability of a network for a specific source-sink flow when resources are allocated to protect network links under an evenly distributed attack strategy. The proposed model takes into account the stochastic behavior of link interdiction by assuming that the vulnerability of an attacked/defended link is determined via a ratio form of the attacker-defender contest success function. The research done as part of this manuscript extends previous network interdiction approaches through an optimization model that relates the defenders'/attackers' per-link resources with link vulnerability values allowing for the defender to consider competing courses of action. Once the network vulnerability model is proposed, the manuscript describes an evolutionary algorithm that can provide optimal defense strategies in networks that follow a source-sink behavior. The results of the extensive experimentation done for different sized networks illustrate that when a defender is faced with an evenly distributed attack his/her defense strategy should take into account the configuration of the network, the source-sink flow and the importance of the different network elements.
KW - Evolutionary optimization
KW - Network survivability
KW - System protection
UR - http://www.scopus.com/inward/record.url?scp=67649446257&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=67649446257&partnerID=8YFLogxK
U2 - 10.1016/j.ress.2009.05.002
DO - 10.1016/j.ress.2009.05.002
M3 - Article
AN - SCOPUS:67649446257
SN - 0951-8320
VL - 94
SP - 1676
EP - 1684
JO - Reliability Engineering and System Safety
JF - Reliability Engineering and System Safety
IS - 10
ER -