Improving connectivity of compromised digital networks via algebraic connectivity maximisation

被引:14
作者
Cheung, Kam-Fung [1 ]
Bell, Michael G. H. [1 ]
机构
[1] Univ Sydney, Inst Transport & Logist Studies, Business Sch, Sydney, NSW, Australia
关键词
Decision analysis; Algebraic connectivity; Cybersecurity; Real-time recovery; Heuristics; INFORMATION; CYBER;
D O I
10.1016/j.ejor.2021.01.015
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Automation and digitalisation in the logistics industry enhance the performance of customer service, while sabotage of the digital logistics network adversely deteriorates the performance. Although precau-tionary strategies are implemented to protect critical assets in the digital logistics network, a high-level adversary can still penetrate the network and launch attacks inside the organisation. Thus, real-time re-covery plays an important role in facing real-time cyberattacks. This paper proposes a novel max-min integer programming model subject to a budget constraint to improve network connectivity of a com-promised digital logistics network via a strategy of maximising algebraic connectivity. Due to the NP-hardness of the maximisation problem, the optimal solution may not be found quickly. Thus, several heuristic algorithms, including greedy algorithms, tabu search and relaxed semidefinite programming (SDP) with rounding, are proposed. Verification of these heuristic algorithms is achieved by applying them, firstly to a hypothetical network, then to a large scale-free network which mimics a digital logis -tics network. (c) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:353 / 364
页数:12
相关论文
共 47 条
[1]  
[Anonymous], 1998, SYMMETRIC EIGENVALUE
[2]   Emergence of scaling in random networks [J].
Barabási, AL ;
Albert, R .
SCIENCE, 1999, 286 (5439) :509-512
[3]  
BAVELAS A, 1950, J ACOUST SOC AM, V22, P723
[4]  
Bell M. G. H., 2019, EUR J OPER RES
[5]   Investigating transport network vulnerability by capacity weighted spectral analysis [J].
Bell, Michael G. H. ;
Kurauchi, Fumitaka ;
Perera, Supun ;
Wong, Walter .
TRANSPORTATION RESEARCH PART B-METHODOLOGICAL, 2017, 99 :251-266
[6]   Some unique properties of eigenvector centrality [J].
Bonacich, Phillip .
SOCIAL NETWORKS, 2007, 29 (04) :555-564
[7]   Sequential Interdiction with Incomplete Information and Learning [J].
Borrero, Juan S. ;
Prokopyev, Oleg A. ;
Saure, Denis .
OPERATIONS RESEARCH, 2019, 67 (01) :72-89
[8]  
Boyd S., 2009, Convex Optimization, DOI DOI 10.1017/CBO9780511804441
[9]  
Cheeger J., 1969, P PRINCETON C HONOR, P195
[10]   Managing cyber and information risks in supply chains: insights from an exploratory analysis [J].
Colicchia, Claudia ;
Creazza, Alessandro ;
Menachof, David A. .
SUPPLY CHAIN MANAGEMENT-AN INTERNATIONAL JOURNAL, 2019, 24 (02) :215-240