The K Critical Path Sets to Protect in Interdiction Networks under Limited Defensive Resources
This paper considers a network under intelligent threats. The defender of the network attempts to identify which disjoint K-critical path sets to be fortified under limited resources in order to better resist to attacks. Strengthening paths consists on increasing the path survivability by increasing...
Gespeichert in:
Veröffentlicht in: | IEEE eTransactions on network and service management 2023-12, Vol.20 (4), p.1-1 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1 |
---|---|
container_issue | 4 |
container_start_page | 1 |
container_title | IEEE eTransactions on network and service management |
container_volume | 20 |
creator | Suryahatmaja, Umar S. Mrad, Mehdi Azaiez, M. Naceur Yaghlane, Asma Ben Gharbi, Anis |
description | This paper considers a network under intelligent threats. The defender of the network attempts to identify which disjoint K-critical path sets to be fortified under limited resources in order to better resist to attacks. Strengthening paths consists on increasing the path survivability by increasing individual survival probabilities of some or all arcs within the path accounting for limited resources. These resources are expressed through a defensive budget. The model assumes different reinforcement scenarios using different levels of resources. The paper proposes two solution methods. The first method maximizes the smallest survival probability over the K breakthrough paths to select under a budget constraint. The second one minimizes the cost of the overall survivability improvement while maintaining the smallest survival probability over the K selected breakthrough paths to a predefined threshold value. The formulated integer programs are solved optimally in a short time. This is the case even for large networks. The sensitivity analysis indicates in particular that, beyond some levels of defensive resources consumption, the survivability improvement becomes very slow suggesting an efficient re-allocation of the budget. |
doi_str_mv | 10.1109/TNSM.2023.3282709 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_10144000</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10144000</ieee_id><sourcerecordid>2901276623</sourcerecordid><originalsourceid>FETCH-LOGICAL-c246t-ab937380c786cd23a485b35f12c0ae77e0a93090a5923d876232ad2f3afee3183</originalsourceid><addsrcrecordid>eNpNkMFOAjEQhhujiYg-gImHJp4Xp-3udns0KEpEJIJXm9KdDUXYxbZofHuXwIHTzOH__pl8hFwz6DEG6m42nr72OHDRE7zgEtQJ6TAleJJmQp4e7efkIoQlQFYwxTvkc7ZA-kL73kVnzYpOTFzQKcZAY0MnvoloI3U1HdYRfelsdE1Nxxh_G_8V6LYu0dORW7uIJX3ACuvgfpC-Y2i23mK4JGeVWQW8Oswu-Rg8zvrPyejtadi_HyWWp3lMzFwJKQqwsshtyYVJi2wusopxCwalRDBKgAKTKS7KQuZccFPySpgKUbBCdMntvnfjm-8thqiX7QN1e1JzBYzLvEXaFNunrG9C8FjpjXdr4_80A73TqHca9U6jPmhsmZs94xDxKM_SFADEP8Ekbfk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2901276623</pqid></control><display><type>article</type><title>The K Critical Path Sets to Protect in Interdiction Networks under Limited Defensive Resources</title><source>IEEE Xplore Digital Library</source><creator>Suryahatmaja, Umar S. ; Mrad, Mehdi ; Azaiez, M. Naceur ; Yaghlane, Asma Ben ; Gharbi, Anis</creator><creatorcontrib>Suryahatmaja, Umar S. ; Mrad, Mehdi ; Azaiez, M. Naceur ; Yaghlane, Asma Ben ; Gharbi, Anis</creatorcontrib><description>This paper considers a network under intelligent threats. The defender of the network attempts to identify which disjoint K-critical path sets to be fortified under limited resources in order to better resist to attacks. Strengthening paths consists on increasing the path survivability by increasing individual survival probabilities of some or all arcs within the path accounting for limited resources. These resources are expressed through a defensive budget. The model assumes different reinforcement scenarios using different levels of resources. The paper proposes two solution methods. The first method maximizes the smallest survival probability over the K breakthrough paths to select under a budget constraint. The second one minimizes the cost of the overall survivability improvement while maintaining the smallest survival probability over the K selected breakthrough paths to a predefined threshold value. The formulated integer programs are solved optimally in a short time. This is the case even for large networks. The sensitivity analysis indicates in particular that, beyond some levels of defensive resources consumption, the survivability improvement becomes very slow suggesting an efficient re-allocation of the budget.</description><identifier>ISSN: 1932-4537</identifier><identifier>EISSN: 1932-4537</identifier><identifier>DOI: 10.1109/TNSM.2023.3282709</identifier><identifier>CODEN: ITNSC4</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Budget constraint ; Budgets ; Critical path ; defense ; Games ; Integer programming ; interdiction networks ; Operations research ; Programming ; Resilience ; Resource management ; Sensitivity analysis ; Survivability ; Survival ; survival probability improvement ; Terrorism ; Transportation</subject><ispartof>IEEE eTransactions on network and service management, 2023-12, Vol.20 (4), p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c246t-ab937380c786cd23a485b35f12c0ae77e0a93090a5923d876232ad2f3afee3183</cites><orcidid>0000-0002-9482-5913 ; 0000-0001-5658-7259 ; 0000-0001-9655-6553</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10144000$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10144000$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Suryahatmaja, Umar S.</creatorcontrib><creatorcontrib>Mrad, Mehdi</creatorcontrib><creatorcontrib>Azaiez, M. Naceur</creatorcontrib><creatorcontrib>Yaghlane, Asma Ben</creatorcontrib><creatorcontrib>Gharbi, Anis</creatorcontrib><title>The K Critical Path Sets to Protect in Interdiction Networks under Limited Defensive Resources</title><title>IEEE eTransactions on network and service management</title><addtitle>T-NSM</addtitle><description>This paper considers a network under intelligent threats. The defender of the network attempts to identify which disjoint K-critical path sets to be fortified under limited resources in order to better resist to attacks. Strengthening paths consists on increasing the path survivability by increasing individual survival probabilities of some or all arcs within the path accounting for limited resources. These resources are expressed through a defensive budget. The model assumes different reinforcement scenarios using different levels of resources. The paper proposes two solution methods. The first method maximizes the smallest survival probability over the K breakthrough paths to select under a budget constraint. The second one minimizes the cost of the overall survivability improvement while maintaining the smallest survival probability over the K selected breakthrough paths to a predefined threshold value. The formulated integer programs are solved optimally in a short time. This is the case even for large networks. The sensitivity analysis indicates in particular that, beyond some levels of defensive resources consumption, the survivability improvement becomes very slow suggesting an efficient re-allocation of the budget.</description><subject>Budget constraint</subject><subject>Budgets</subject><subject>Critical path</subject><subject>defense</subject><subject>Games</subject><subject>Integer programming</subject><subject>interdiction networks</subject><subject>Operations research</subject><subject>Programming</subject><subject>Resilience</subject><subject>Resource management</subject><subject>Sensitivity analysis</subject><subject>Survivability</subject><subject>Survival</subject><subject>survival probability improvement</subject><subject>Terrorism</subject><subject>Transportation</subject><issn>1932-4537</issn><issn>1932-4537</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkMFOAjEQhhujiYg-gImHJp4Xp-3udns0KEpEJIJXm9KdDUXYxbZofHuXwIHTzOH__pl8hFwz6DEG6m42nr72OHDRE7zgEtQJ6TAleJJmQp4e7efkIoQlQFYwxTvkc7ZA-kL73kVnzYpOTFzQKcZAY0MnvoloI3U1HdYRfelsdE1Nxxh_G_8V6LYu0dORW7uIJX3ACuvgfpC-Y2i23mK4JGeVWQW8Oswu-Rg8zvrPyejtadi_HyWWp3lMzFwJKQqwsshtyYVJi2wusopxCwalRDBKgAKTKS7KQuZccFPySpgKUbBCdMntvnfjm-8thqiX7QN1e1JzBYzLvEXaFNunrG9C8FjpjXdr4_80A73TqHca9U6jPmhsmZs94xDxKM_SFADEP8Ekbfk</recordid><startdate>20231201</startdate><enddate>20231201</enddate><creator>Suryahatmaja, Umar S.</creator><creator>Mrad, Mehdi</creator><creator>Azaiez, M. Naceur</creator><creator>Yaghlane, Asma Ben</creator><creator>Gharbi, Anis</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-9482-5913</orcidid><orcidid>https://orcid.org/0000-0001-5658-7259</orcidid><orcidid>https://orcid.org/0000-0001-9655-6553</orcidid></search><sort><creationdate>20231201</creationdate><title>The K Critical Path Sets to Protect in Interdiction Networks under Limited Defensive Resources</title><author>Suryahatmaja, Umar S. ; Mrad, Mehdi ; Azaiez, M. Naceur ; Yaghlane, Asma Ben ; Gharbi, Anis</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c246t-ab937380c786cd23a485b35f12c0ae77e0a93090a5923d876232ad2f3afee3183</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Budget constraint</topic><topic>Budgets</topic><topic>Critical path</topic><topic>defense</topic><topic>Games</topic><topic>Integer programming</topic><topic>interdiction networks</topic><topic>Operations research</topic><topic>Programming</topic><topic>Resilience</topic><topic>Resource management</topic><topic>Sensitivity analysis</topic><topic>Survivability</topic><topic>Survival</topic><topic>survival probability improvement</topic><topic>Terrorism</topic><topic>Transportation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Suryahatmaja, Umar S.</creatorcontrib><creatorcontrib>Mrad, Mehdi</creatorcontrib><creatorcontrib>Azaiez, M. Naceur</creatorcontrib><creatorcontrib>Yaghlane, Asma Ben</creatorcontrib><creatorcontrib>Gharbi, Anis</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore Digital Library</collection><collection>CrossRef</collection><jtitle>IEEE eTransactions on network and service management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Suryahatmaja, Umar S.</au><au>Mrad, Mehdi</au><au>Azaiez, M. Naceur</au><au>Yaghlane, Asma Ben</au><au>Gharbi, Anis</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The K Critical Path Sets to Protect in Interdiction Networks under Limited Defensive Resources</atitle><jtitle>IEEE eTransactions on network and service management</jtitle><stitle>T-NSM</stitle><date>2023-12-01</date><risdate>2023</risdate><volume>20</volume><issue>4</issue><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1932-4537</issn><eissn>1932-4537</eissn><coden>ITNSC4</coden><abstract>This paper considers a network under intelligent threats. The defender of the network attempts to identify which disjoint K-critical path sets to be fortified under limited resources in order to better resist to attacks. Strengthening paths consists on increasing the path survivability by increasing individual survival probabilities of some or all arcs within the path accounting for limited resources. These resources are expressed through a defensive budget. The model assumes different reinforcement scenarios using different levels of resources. The paper proposes two solution methods. The first method maximizes the smallest survival probability over the K breakthrough paths to select under a budget constraint. The second one minimizes the cost of the overall survivability improvement while maintaining the smallest survival probability over the K selected breakthrough paths to a predefined threshold value. The formulated integer programs are solved optimally in a short time. This is the case even for large networks. The sensitivity analysis indicates in particular that, beyond some levels of defensive resources consumption, the survivability improvement becomes very slow suggesting an efficient re-allocation of the budget.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNSM.2023.3282709</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0002-9482-5913</orcidid><orcidid>https://orcid.org/0000-0001-5658-7259</orcidid><orcidid>https://orcid.org/0000-0001-9655-6553</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1932-4537 |
ispartof | IEEE eTransactions on network and service management, 2023-12, Vol.20 (4), p.1-1 |
issn | 1932-4537 1932-4537 |
language | eng |
recordid | cdi_ieee_primary_10144000 |
source | IEEE Xplore Digital Library |
subjects | Budget constraint Budgets Critical path defense Games Integer programming interdiction networks Operations research Programming Resilience Resource management Sensitivity analysis Survivability Survival survival probability improvement Terrorism Transportation |
title | The K Critical Path Sets to Protect in Interdiction Networks under Limited Defensive Resources |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T17%3A55%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20K%20Critical%20Path%20Sets%20to%20Protect%20in%20Interdiction%20Networks%20under%20Limited%20Defensive%20Resources&rft.jtitle=IEEE%20eTransactions%20on%20network%20and%20service%20management&rft.au=Suryahatmaja,%20Umar%20S.&rft.date=2023-12-01&rft.volume=20&rft.issue=4&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1932-4537&rft.eissn=1932-4537&rft.coden=ITNSC4&rft_id=info:doi/10.1109/TNSM.2023.3282709&rft_dat=%3Cproquest_RIE%3E2901276623%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2901276623&rft_id=info:pmid/&rft_ieee_id=10144000&rfr_iscdi=true |