The K Critical Path Sets to Protect in Interdiction Networks under Limited Defensive Resources

This paper considers a network under intelligent threats. The defender of the network attempts to identify which disjoint K-critical path sets to be fortified under limited resources in order to better resist to attacks. Strengthening paths consists on increasing the path survivability by increasing...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE eTransactions on network and service management 2023-12, Vol.20 (4), p.1-1
Hauptverfasser: Suryahatmaja, Umar S., Mrad, Mehdi, Azaiez, M. Naceur, Yaghlane, Asma Ben, Gharbi, Anis
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue 4
container_start_page 1
container_title IEEE eTransactions on network and service management
container_volume 20
creator Suryahatmaja, Umar S.
Mrad, Mehdi
Azaiez, M. Naceur
Yaghlane, Asma Ben
Gharbi, Anis
description This paper considers a network under intelligent threats. The defender of the network attempts to identify which disjoint K-critical path sets to be fortified under limited resources in order to better resist to attacks. Strengthening paths consists on increasing the path survivability by increasing individual survival probabilities of some or all arcs within the path accounting for limited resources. These resources are expressed through a defensive budget. The model assumes different reinforcement scenarios using different levels of resources. The paper proposes two solution methods. The first method maximizes the smallest survival probability over the K breakthrough paths to select under a budget constraint. The second one minimizes the cost of the overall survivability improvement while maintaining the smallest survival probability over the K selected breakthrough paths to a predefined threshold value. The formulated integer programs are solved optimally in a short time. This is the case even for large networks. The sensitivity analysis indicates in particular that, beyond some levels of defensive resources consumption, the survivability improvement becomes very slow suggesting an efficient re-allocation of the budget.
doi_str_mv 10.1109/TNSM.2023.3282709
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_10144000</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10144000</ieee_id><sourcerecordid>2901276623</sourcerecordid><originalsourceid>FETCH-LOGICAL-c246t-ab937380c786cd23a485b35f12c0ae77e0a93090a5923d876232ad2f3afee3183</originalsourceid><addsrcrecordid>eNpNkMFOAjEQhhujiYg-gImHJp4Xp-3udns0KEpEJIJXm9KdDUXYxbZofHuXwIHTzOH__pl8hFwz6DEG6m42nr72OHDRE7zgEtQJ6TAleJJmQp4e7efkIoQlQFYwxTvkc7ZA-kL73kVnzYpOTFzQKcZAY0MnvoloI3U1HdYRfelsdE1Nxxh_G_8V6LYu0dORW7uIJX3ACuvgfpC-Y2i23mK4JGeVWQW8Oswu-Rg8zvrPyejtadi_HyWWp3lMzFwJKQqwsshtyYVJi2wusopxCwalRDBKgAKTKS7KQuZccFPySpgKUbBCdMntvnfjm-8thqiX7QN1e1JzBYzLvEXaFNunrG9C8FjpjXdr4_80A73TqHca9U6jPmhsmZs94xDxKM_SFADEP8Ekbfk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2901276623</pqid></control><display><type>article</type><title>The K Critical Path Sets to Protect in Interdiction Networks under Limited Defensive Resources</title><source>IEEE Xplore Digital Library</source><creator>Suryahatmaja, Umar S. ; Mrad, Mehdi ; Azaiez, M. Naceur ; Yaghlane, Asma Ben ; Gharbi, Anis</creator><creatorcontrib>Suryahatmaja, Umar S. ; Mrad, Mehdi ; Azaiez, M. Naceur ; Yaghlane, Asma Ben ; Gharbi, Anis</creatorcontrib><description>This paper considers a network under intelligent threats. The defender of the network attempts to identify which disjoint K-critical path sets to be fortified under limited resources in order to better resist to attacks. Strengthening paths consists on increasing the path survivability by increasing individual survival probabilities of some or all arcs within the path accounting for limited resources. These resources are expressed through a defensive budget. The model assumes different reinforcement scenarios using different levels of resources. The paper proposes two solution methods. The first method maximizes the smallest survival probability over the K breakthrough paths to select under a budget constraint. The second one minimizes the cost of the overall survivability improvement while maintaining the smallest survival probability over the K selected breakthrough paths to a predefined threshold value. The formulated integer programs are solved optimally in a short time. This is the case even for large networks. The sensitivity analysis indicates in particular that, beyond some levels of defensive resources consumption, the survivability improvement becomes very slow suggesting an efficient re-allocation of the budget.</description><identifier>ISSN: 1932-4537</identifier><identifier>EISSN: 1932-4537</identifier><identifier>DOI: 10.1109/TNSM.2023.3282709</identifier><identifier>CODEN: ITNSC4</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Budget constraint ; Budgets ; Critical path ; defense ; Games ; Integer programming ; interdiction networks ; Operations research ; Programming ; Resilience ; Resource management ; Sensitivity analysis ; Survivability ; Survival ; survival probability improvement ; Terrorism ; Transportation</subject><ispartof>IEEE eTransactions on network and service management, 2023-12, Vol.20 (4), p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c246t-ab937380c786cd23a485b35f12c0ae77e0a93090a5923d876232ad2f3afee3183</cites><orcidid>0000-0002-9482-5913 ; 0000-0001-5658-7259 ; 0000-0001-9655-6553</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10144000$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10144000$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Suryahatmaja, Umar S.</creatorcontrib><creatorcontrib>Mrad, Mehdi</creatorcontrib><creatorcontrib>Azaiez, M. Naceur</creatorcontrib><creatorcontrib>Yaghlane, Asma Ben</creatorcontrib><creatorcontrib>Gharbi, Anis</creatorcontrib><title>The K Critical Path Sets to Protect in Interdiction Networks under Limited Defensive Resources</title><title>IEEE eTransactions on network and service management</title><addtitle>T-NSM</addtitle><description>This paper considers a network under intelligent threats. The defender of the network attempts to identify which disjoint K-critical path sets to be fortified under limited resources in order to better resist to attacks. Strengthening paths consists on increasing the path survivability by increasing individual survival probabilities of some or all arcs within the path accounting for limited resources. These resources are expressed through a defensive budget. The model assumes different reinforcement scenarios using different levels of resources. The paper proposes two solution methods. The first method maximizes the smallest survival probability over the K breakthrough paths to select under a budget constraint. The second one minimizes the cost of the overall survivability improvement while maintaining the smallest survival probability over the K selected breakthrough paths to a predefined threshold value. The formulated integer programs are solved optimally in a short time. This is the case even for large networks. The sensitivity analysis indicates in particular that, beyond some levels of defensive resources consumption, the survivability improvement becomes very slow suggesting an efficient re-allocation of the budget.</description><subject>Budget constraint</subject><subject>Budgets</subject><subject>Critical path</subject><subject>defense</subject><subject>Games</subject><subject>Integer programming</subject><subject>interdiction networks</subject><subject>Operations research</subject><subject>Programming</subject><subject>Resilience</subject><subject>Resource management</subject><subject>Sensitivity analysis</subject><subject>Survivability</subject><subject>Survival</subject><subject>survival probability improvement</subject><subject>Terrorism</subject><subject>Transportation</subject><issn>1932-4537</issn><issn>1932-4537</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkMFOAjEQhhujiYg-gImHJp4Xp-3udns0KEpEJIJXm9KdDUXYxbZofHuXwIHTzOH__pl8hFwz6DEG6m42nr72OHDRE7zgEtQJ6TAleJJmQp4e7efkIoQlQFYwxTvkc7ZA-kL73kVnzYpOTFzQKcZAY0MnvoloI3U1HdYRfelsdE1Nxxh_G_8V6LYu0dORW7uIJX3ACuvgfpC-Y2i23mK4JGeVWQW8Oswu-Rg8zvrPyejtadi_HyWWp3lMzFwJKQqwsshtyYVJi2wusopxCwalRDBKgAKTKS7KQuZccFPySpgKUbBCdMntvnfjm-8thqiX7QN1e1JzBYzLvEXaFNunrG9C8FjpjXdr4_80A73TqHca9U6jPmhsmZs94xDxKM_SFADEP8Ekbfk</recordid><startdate>20231201</startdate><enddate>20231201</enddate><creator>Suryahatmaja, Umar S.</creator><creator>Mrad, Mehdi</creator><creator>Azaiez, M. Naceur</creator><creator>Yaghlane, Asma Ben</creator><creator>Gharbi, Anis</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-9482-5913</orcidid><orcidid>https://orcid.org/0000-0001-5658-7259</orcidid><orcidid>https://orcid.org/0000-0001-9655-6553</orcidid></search><sort><creationdate>20231201</creationdate><title>The K Critical Path Sets to Protect in Interdiction Networks under Limited Defensive Resources</title><author>Suryahatmaja, Umar S. ; Mrad, Mehdi ; Azaiez, M. Naceur ; Yaghlane, Asma Ben ; Gharbi, Anis</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c246t-ab937380c786cd23a485b35f12c0ae77e0a93090a5923d876232ad2f3afee3183</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Budget constraint</topic><topic>Budgets</topic><topic>Critical path</topic><topic>defense</topic><topic>Games</topic><topic>Integer programming</topic><topic>interdiction networks</topic><topic>Operations research</topic><topic>Programming</topic><topic>Resilience</topic><topic>Resource management</topic><topic>Sensitivity analysis</topic><topic>Survivability</topic><topic>Survival</topic><topic>survival probability improvement</topic><topic>Terrorism</topic><topic>Transportation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Suryahatmaja, Umar S.</creatorcontrib><creatorcontrib>Mrad, Mehdi</creatorcontrib><creatorcontrib>Azaiez, M. Naceur</creatorcontrib><creatorcontrib>Yaghlane, Asma Ben</creatorcontrib><creatorcontrib>Gharbi, Anis</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore Digital Library</collection><collection>CrossRef</collection><jtitle>IEEE eTransactions on network and service management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Suryahatmaja, Umar S.</au><au>Mrad, Mehdi</au><au>Azaiez, M. Naceur</au><au>Yaghlane, Asma Ben</au><au>Gharbi, Anis</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The K Critical Path Sets to Protect in Interdiction Networks under Limited Defensive Resources</atitle><jtitle>IEEE eTransactions on network and service management</jtitle><stitle>T-NSM</stitle><date>2023-12-01</date><risdate>2023</risdate><volume>20</volume><issue>4</issue><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1932-4537</issn><eissn>1932-4537</eissn><coden>ITNSC4</coden><abstract>This paper considers a network under intelligent threats. The defender of the network attempts to identify which disjoint K-critical path sets to be fortified under limited resources in order to better resist to attacks. Strengthening paths consists on increasing the path survivability by increasing individual survival probabilities of some or all arcs within the path accounting for limited resources. These resources are expressed through a defensive budget. The model assumes different reinforcement scenarios using different levels of resources. The paper proposes two solution methods. The first method maximizes the smallest survival probability over the K breakthrough paths to select under a budget constraint. The second one minimizes the cost of the overall survivability improvement while maintaining the smallest survival probability over the K selected breakthrough paths to a predefined threshold value. The formulated integer programs are solved optimally in a short time. This is the case even for large networks. The sensitivity analysis indicates in particular that, beyond some levels of defensive resources consumption, the survivability improvement becomes very slow suggesting an efficient re-allocation of the budget.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNSM.2023.3282709</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0002-9482-5913</orcidid><orcidid>https://orcid.org/0000-0001-5658-7259</orcidid><orcidid>https://orcid.org/0000-0001-9655-6553</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1932-4537
ispartof IEEE eTransactions on network and service management, 2023-12, Vol.20 (4), p.1-1
issn 1932-4537
1932-4537
language eng
recordid cdi_ieee_primary_10144000
source IEEE Xplore Digital Library
subjects Budget constraint
Budgets
Critical path
defense
Games
Integer programming
interdiction networks
Operations research
Programming
Resilience
Resource management
Sensitivity analysis
Survivability
Survival
survival probability improvement
Terrorism
Transportation
title The K Critical Path Sets to Protect in Interdiction Networks under Limited Defensive Resources
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T17%3A55%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20K%20Critical%20Path%20Sets%20to%20Protect%20in%20Interdiction%20Networks%20under%20Limited%20Defensive%20Resources&rft.jtitle=IEEE%20eTransactions%20on%20network%20and%20service%20management&rft.au=Suryahatmaja,%20Umar%20S.&rft.date=2023-12-01&rft.volume=20&rft.issue=4&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1932-4537&rft.eissn=1932-4537&rft.coden=ITNSC4&rft_id=info:doi/10.1109/TNSM.2023.3282709&rft_dat=%3Cproquest_RIE%3E2901276623%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2901276623&rft_id=info:pmid/&rft_ieee_id=10144000&rfr_iscdi=true