2022
DOI: 10.1287/opre.2021.2180
|View full text |Cite
|
Sign up to set email alerts
|

Network Inspection for Detecting Strategic Attacks

Abstract: Ensuring the security of critical infrastructures is crucial for the society’s welfare and prosperity. However, these infrastructure networks are inherently vulnerable to both intentional and unintentional threats. In “Network Inspection for Detecting Strategic Attacks,” Dahan, Sela, and Amin study a strategic network inspection problem, formulated as a large-scale bilevel optimization problem, in which a utility seeks to determine an inspection strategy with minimum number of smart detectors that ensures a de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 40 publications
0
7
0
Order By: Relevance
“…We also look into the impact of varying interdiction budget B I and monitoring budget B M simultaneously on the optimal objective value while setting a common total budget: B I + B M = 15. Specifically, in addition to having (B I , B M ) = (5, 10), for each of the instances solved between 1 min and 1 h under SVI, we created six new settings: (B I , B M ) = (1, 14), (3, 12), (7, 8), (9,6), (11,4), and (13, 2). Note that this setting is different from considering the NISG given a shared budget that can be allocated towards either interdiction or monitoring decisions.…”
Section: Sensitivity Analyses On Key Problem Parametersmentioning
confidence: 99%
See 1 more Smart Citation
“…We also look into the impact of varying interdiction budget B I and monitoring budget B M simultaneously on the optimal objective value while setting a common total budget: B I + B M = 15. Specifically, in addition to having (B I , B M ) = (5, 10), for each of the instances solved between 1 min and 1 h under SVI, we created six new settings: (B I , B M ) = (1, 14), (3, 12), (7, 8), (9,6), (11,4), and (13, 2). Note that this setting is different from considering the NISG given a shared budget that can be allocated towards either interdiction or monitoring decisions.…”
Section: Sensitivity Analyses On Key Problem Parametersmentioning
confidence: 99%
“…Okamoto et al [28] examine a network flow interdiction problem in which the evader minimizes inflicted damages, while the defender maximizes damages minus the attack costs. Dahan et al [11] study a network inspection game in which the defender determines a node inspection strategy that minimizes the number of detectors while achieving a target expected detection rate in the worst case. Basilico et al [4] consider a multi‐stage game with an infinite horizon.…”
Section: Introduction and Problem Statementmentioning
confidence: 99%
“…Game theory has successfully been used to study problems in the domain of cybersecurity (and network security more broadly) [6,7,8,9,10,11,12,13]. In particular, it has proven successful for sensor allocation problems [13,14,15]. In our model, the defender allocates heterogeneous sensors in order to detect multiple attacks caused by a strategic attacker.…”
Section: Introductionmentioning
confidence: 99%
“…Thus we model the interactions between both players using a zero-sum game, in which both players may potentially select randomized strategies. This feature is known to be desirable in security settings in which finite resources are allocated [14,16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation