首页> 外文期刊>Computers & Industrial Engineering >A decomposition approach for solving tri-level defender-attacker-defender problems
【24h】

A decomposition approach for solving tri-level defender-attacker-defender problems

机译:解决三级防御者攻击者后卫问题的分解方法

获取原文
获取原文并翻译 | 示例
       

摘要

Network-based systems widely appear in different service, community, industrial, and economic systems such as electric power, water supply, transportation, and telecommunication networks. Due to the significant role of such systems in society, it is essential to have an effective plan to enhance the resilience of infrastructure networks against disruption (e.g., natural disasters, malevolent attacks, or operational failures). In relation to the concept of resilience, two relevant questions arise: (ⅰ) how does performance degrade after a disruption, or what is the vulnerability of the system? and (ⅱ) how rapid does the disrupted system return to the desired performance level, or how can we characterize the system's recoverability? To enhance the resilience of a system against disruption, we address simultaneous actions of vulnerability reduction and recoverability enhancement through interdiction model, particularly defender-attacker-defender (DAD) model. However, the proposed model is computationally challenging to solve. To deal with this issue, we design a decomposition-based solution algorithm as a general framework to optimally solve tri-level DAD models in more efficiently. The proposed solution technique is demonstrated with the existing DAD model, namely a tri-level protection-interdiction-restoration model. To define the critical components subject to protection and disruption, an efficient clustering technique is applied which results in generating three sets of candidate components based on three centrality measures. We represent an illustrative case study based on the system of interdependent infrastructure networks in Shelby County, TN, for which we solve the model and assess the computational results for each set of candidate components. The results indicate that the proposed solution algorithm substantially outperforms the traditional covering decomposition method with regard to computational complexity, particularly for the higher budget scenarios. Finally, we compare and analyze the results of the existing interdiction model, the protection-interdiction-restoration formulation represented by M-Ⅰ, with a new protection-interdiction-counteraction model, denoted by M-Ⅱ, in which the restoration level is not considered. Results suggest that although M-Ⅰ is a comprehensive interdiction model relative to M-Ⅱ, it suffers substantially from computational complexity. Therefore, there exists a tradeoff between employing a more comprehensive model with higher computational complexity and neglecting the recovery process with the interdiction model.
机译:基于网络的系统广泛出现在不同的服务,社区,工业和经济系统中,如电力,供水,运输和电信网络。由于这种系统在社会中的重要作用,必须有一个有效的计划,以提高基础设施网络抵抗中断的抵御(例如,自然灾害,恶性攻击或操作失败)。关于弹性的概念,出现了两个相关问题:(Ⅰ)在中断后性能如何降低,或系统漏洞是什么? (Ⅱ)中断的系统如何恢复到所需的性能水平,或者我们如何表征系统的可恢复性?为了增强危害中断的系统的恢复力,我们通过拦截模型来解决脆弱性降低和可收回性增强的同时行动,特别是后卫攻击者 - 后卫(爸爸)模型。然而,所提出的模型是在计算上解决的挑战。要处理这个问题,我们设计了一种基于分解的解决方案算法,作为一般框架,以更有效地解决三级爸爸模型。所提出的解决方案技术与现有的爸爸模型进行了证明,即三级保护互补恢复模型。为了定义受保护和中断的关键组件,应用了有效的聚类技术,这导致基于三个中心度测量产生三组候选组件。我们代表了一个基于Shelby County,TN的相互依存基础设施网络系统的说明性案例研究,我们解决了模型,并评估了每组候选组件的计算结果。结果表明,所提出的解决方案算法基本上优于传统的覆盖分解方法关于计算复杂性,特别是对于更高的预算场景。最后,我们比较和分析现有的截断模型的结果,由M-Ⅰ表示的M-Ⅰ表示的保护 - 闭幕恢复制剂,由M-Ⅱ表示,其中恢复水平不是经过考虑的。结果表明,尽管M-Ⅰ是相对于M-Ⅱ的综合截断模型,但它基本上受到计算复杂性的影响。因此,采用更全面的模型之间存在具有更高的计算复杂性并忽略互补模型的恢复过程之间的权衡。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号