×

Multithreat multisite protection: a security case study. (English) Zbl 1346.90444

Summary: We provide a novel adversarial risk analysis approach to security resource allocation decision processes for an organization which faces multiple threats over multiple sites. We deploy a Sequential Defend-Attack model for each type of threat and site, under the assumption that different attackers are uncoordinated, although cascading effects are contemplated. The models are related by resource constraints and results are aggregated over the sites for each participant and, for the Defender, by value aggregation across threats. We illustrate the model with a case study in which we support a railway operator in allocating resources to protect from two threats: fare evasion and pickpocketing. Results suggest considerable expected savings due to the proposed investments.

MSC:

90B50 Management decision making, including multiple objectives
90B90 Case-oriented studies in operations research
91B32 Resource and cost allocation (including fair division, apportionment, etc.)

References:

[1] Alpern, S.; Morton, A.; Papadaki, K., Patrolling games, Operations Research, 59, 5, 1246-1257 (2011) · Zbl 1233.91063
[2] Bier, V. M.; Oliveros, S.; Samuelson, L., Choosing what to protect: strategic defensive allocation against an unknown attacker, Journal of Public Economic Theory, 9, 4, 563-587 (2007)
[3] Brown, G.; Carlyle, M.; Salmerón, J.; Wood, K., Defending critical infrastructure, Interfaces, 36, 6, 530-544 (2006)
[4] Brown, M.; Saisubramanian, S.; Varakantham, P. R.; Tambe, M., STREETS: game-theoretic traffic patrolling with exploration and exploitation, Innovative applications in artificial intelligence (IAAI). Twenty Eighth AAAI Conference on Artificial Intelligence, AAAI-14 (2014), Research Collection School of Information Systems
[5] Dyer, J. S.; Sarin, R. K., Measurable multiattribute value functions, Operations Research, 27, 4, 810-822 (1979) · Zbl 0423.90004
[6] Dyer, J. S.; Sarin, R. K., Relative risk aversion, Management Science, 28, 8, 875-886 (1982) · Zbl 0487.90004
[7] Enders, W.; Sandler, T., The political economy of terrorism (2011), Cambridge University Press: Cambridge University Press New York
[8] Ezell, B. C.; Bennett, S. P.; von Winterfeldt, D.; Sokolowski, J.; Collins, A. J., Probabilistic risk analysis and terrorism risk, Risk Analysis, 30, 4, 575-589 (2010)
[9] Farquhar, P. H., State of the art—utility assessment methods, Management Science, 30, 11, 1283-1300 (1984) · Zbl 0551.90048
[10] Ferguson, T. S., A Bayesian analysis of some nonparametric problems, The Annals of Statistics, 1, 2, 209-230 (1973) · Zbl 0255.62037
[11] French, S.; Ríos Insua, D., Statistical decision theory (2000), Arnold: Arnold London
[12] Gil, C.; Ríos, J.; Ríos Insua, D., Adversarial risk analysis for urban security resource allocation, Risk Analysis, To appear (2016)
[13] Goldberg, D. E., Genetic algorithms in search, optimization, and machine learning (1989), Addison-Wesley: Addison-Wesley Reading, MA · Zbl 0721.68056
[14] Haberfeld, M. R.; von Hassell, A., A new understanding of terrorism: case studies, trajectories and lessons learned. A new understanding of terrorism: case studies, trajectories and lessons learned, Humanities, Social Sciences and Law (2009), Springer: Springer New York
[15] Haphuriwat, N.; Bier, V. M., Trade-offs between target hardening and overarching protection, European Journal of Operational Research, 213, 1, 320-328 (2011)
[16] Hausken, K., Choosing what to protect when attacker resources and asset valuations are uncertain, Operations Research and Decisions, 24, 3, 23-44 (2014) · Zbl 1395.91003
[17] Hausken, K., Individual versus overarching protection and attack of assets, Central European Journal of Operations Research, 22, 1, 89-112 (2014) · Zbl 1339.91028
[18] Hausken, K.; Bier, V. M., Defending against multiple different attackers, European Journal of Operational Research, 211, 2, 370-384 (2011) · Zbl 1250.91021
[19] Hausken, K.; Levitin, G., Review of systems defense and attack models, International Journal of Performability Engineering, 8, 4, 355-366 (2012)
[20] Keeney, G. L.; von Winterfeldt, D., Identifying and structuring the objectives of terrorists, Risk Analysis, 30, 12, 1803-1816 (2010)
[21] Keeney, R. L., Modeling values for anti-terrorism analysis, Risk Analysis, 27, 3, 585-596 (2007)
[22] Keeney, R. L.; von Winterfeldt, D., A value model for evaluating homeland security decisions, Risk Analysis, 31, 9, 1470-1487 (2011)
[23] Koller, D.; Milch, B., Multi-agent influence diagrams for representing and solving games, Games and Economic Behavior, 45, 1, 181-221 (2003) · Zbl 1054.91007
[24] Kraan, B.; Bedford, T., Probabilistic inversion of expert judgments in the quantification of model uncertainty, Management Science, 51, 6, 995-1006 (2005) · Zbl 1232.62164
[25] Levitin, G.; Hausken, K.; Dai, Y., Optimal defense with variable number of overarching and individual protections, Reliability Engineering & System Safety, 123, 81-90 (2014)
[26] O’Hagan, A.; Buck, C. E.; Daneshkhah, A.; Eiser, J. R.; Garthwaite, P. H.; Jenkinson, D. J.; Rakow, T., Uncertain judgements: eliciting experts’ probabilities (2006), John Wiley & Sons: John Wiley & Sons Chichester, West Sussex · Zbl 1269.62009
[27] Parnell, G. S.; Banks, D.; Borio, L.; Brown, G.; Cox Jr, L. A.T.; Gannon, J.; Wilson, A., Report on Methodological Improvements to the Department of Homeland Security’s Biological Agent Risk Analysis (2008), National Academies Press
[28] Reddy, A. V.; Kuhls, J.; Lu, A., Measuring and controlling subway fare evasion, Transportation Research Record: Journal of the Transportation Research Board, 2216, 1, 85-99 (2011)
[29] Ríos, J.; Ríos Insua, D., Adversarial risk analysis for counterterrorism modeling, Risk Analysis, 32, 5, 894-915 (2012)
[30] Ríos Insua, D.; Banks, D.; Ríos, J., Modeling opponents in adversarial risk analysis, Risk Analysis, n/a-n/a (2015)
[31] Ríos Insua, D.; Cano, J.; Pellot, M.; Ortega, R., Current trends in bayesian methodology with applications, 311-334 (2015), Chapman and Hall/CRC: Chapman and Hall/CRC Boca Raton, Florida
[32] Ríos Insua, D.; Ríos, J.; Banks, D., Adversarial risk analysis, Journal of the American Statistical Association, 104, 486, 841-854 (2009) · Zbl 1390.91117
[33] Rossman, A. J.; Short, T. H.; Parks, M. T., Bayes estimators for the continuous uniform distribution, Journal of Statistics Education, 6, 3, 1-7 (1998)
[34] Sunstein, C. R., Worst-case scenarios (2007), Harvard University Press: Harvard University Press Boston
[36] Troelsen, L. H.; Barr, L., Combating pickpocketing in public transportation, Public Transport International, 61, 1, 32-33 (2012)
[37] Wang, C.; Bier, V. M., Expert elicitation of adversary preferences using ordinal judgments, Operations Research, 61, 2, 372-385 (2013) · Zbl 1268.91059
[38] Wein, L. M., OR forum—Homeland security: from mathematical models to policy implementation, Operations Research, 57, 4, 801-811 (2009)
[40] Yang, R.; Kiekintveld, C.; Ordóñez, F.; Tambe, M.; John, R., Improving resource allocation strategies against human adversaries in security games: an extended study, Artificial Intelligence, 195, 440-469 (2013) · Zbl 1270.91015
[41] Zhuang, J.; Bier, V. M., Balancing terrorism and natural disasters—defensive strategy with endogenous attacker effort, Operations Research, 55, 5, 976-991 (2007) · Zbl 1167.91331
[42] Zoroa, N.; Fernández-Sáez, M. J.; Zoroa, P., Patrolling a perimeter, European Journal of Operational Research, 222, 3, 571-582 (2012) · Zbl 1253.91029
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.