Interdiction-Based Approaches to Identify Damage in Disrupted Critical Infrastructures with Dependencies

被引:6
作者
Baycik, N. Orkun [1 ]
Sharkey, Thomas C. [2 ]
机构
[1] Shenandoah Univ, Harry Byrd Jr Sch Business, Winchester, VA 22601 USA
[2] Rensselaer Polytech Inst, Ind & Syst Engn, Troy, NY 12180 USA
基金
美国国家科学基金会;
关键词
NETWORK DESIGN; RESTORATION; SYSTEMS;
D O I
10.1061/(ASCE)IS.1943-555X.0000487
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
In this paper, we consider a problem in which the decision maker only has access to outage reports from service receivers in critical infrastructures with dependencies among them, and our objective is to determine inspection plans to identify the damaged components that lead to the reported outages. This situation could occur, for example, if a cyberattack on the human-machine interface of the infrastructures occurs at the same time a natural hazard damages physical components. The demand nodes within these infrastructure networks may have an outage either from damage that occurred within their infrastructure or due to cascading failures across infrastructures. We present network interdiction-based approaches to identify a set of components to inspect that replicates the service outages reported across the infrastructures. These approaches can be applied in an iterative nature where a particular approach first identifies a set of components across infrastructures to inspect, and then, based on the feedback received from the inspections, determines an updated set of components to inspect. Performance criteria of the proposed approaches are the percentage of successful inspections, which represents the percentage of inspection resources used to successfully identify damaged components. As a benchmark, we applied a breadth-first search (BFS) approach to the problem, which mimics a top-down inspection policy for identifying damaged components within an infrastructure. We tested our approaches on realistic infrastructure systems and demonstrated that they far outperform the BFS approach.
引用
收藏
页数:19
相关论文
共 33 条
  • [1] Ahuja Ravindra K, 1993, Network Flows: Theory, Algorithms and Applications
  • [2] [Anonymous], 2013, VIKALPA
  • [3] [Anonymous], EC IMP HURR SAND POT
  • [4] Interdicting layered physical and information flow networks
    Baycik, Nail Orkun
    Sharkey, Thomas C.
    Rainwater, Chase E.
    [J]. IISE TRANSACTIONS, 2018, 50 (04) : 316 - 331
  • [5] Classification and trend analysis of threats origins to the security of power systems
    Bompard, Ettore
    Huang, Tao
    Wu, Yingjun
    Cremenescu, Mihai
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2013, 50 : 50 - 64
  • [6] Defending critical infrastructure
    Brown, Gerald
    Carlyle, Matthew
    Salmeron, Javier
    Wood, Kevin
    [J]. INTERFACES, 2006, 36 (06) : 530 - 544
  • [7] Integrating restoration and scheduling decisions for disrupted interdependent infrastructure systems
    Cavdaroglu, Burak
    Hammel, Erik
    Mitchell, John E.
    Sharkey, Thomas C.
    Wallace, William A.
    [J]. ANNALS OF OPERATIONS RESEARCH, 2013, 203 (01) : 279 - 294
  • [8] Celik Melih, 2016, Surveys in Operations Research and Management Science, V21, P47, DOI 10.1016/j.sorms.2016.12.001
  • [9] Chittester C. G., 2004, J HOMEL SECUR EMERG, V1, P1075, DOI 10. 2202/1547-7355. 1075
  • [10] The Interdependent Network Design Problem for Optimal Infrastructure System Restoration
    Gonzalez, Andres D.
    Duenas-Osorio, Leonardo
    Sanchez-Silva, Mauricio
    Medaglia, Andres L.
    [J]. COMPUTER-AIDED CIVIL AND INFRASTRUCTURE ENGINEERING, 2016, 31 (05) : 334 - 350