Abstract:The performance of a multi-layered security system, such as those protecting high-value facilities or critical infrastructures, is characterized using several different attributes including detection and interruption probabilities, costs, and false/nuisance alarm rates. The multitude of technology options, alternative locations and configurations for those technologies, threats to the system, and resource considerations that must be weighed make exhaustive evaluation of all possible architectures extremely dif… Show more
“…The model developed in this paper extends the model given in [4] in two significant dimensions. First, scenarios are used to describe the connection between weather, visibility conditions and intruder capabilities with detection probability.…”
Section: Model Formulationmentioning
confidence: 84%
“…Many investments are only effective if they are deployed as a cycle or a contiguous boundary instead of possibly disconnected, single-link investments as described in [4]. Consequently, we make use of "layered" investments where a single investment layer consists of a collection of link investments of a single type (e.g., sensor "sX" investments) forming a contiguous boundary around the target at a fixed radius.…”
Section: Model Formulationmentioning
confidence: 99%
“…Since this probability becomes vanishingly small when the initial detection is close to the target, we set a threshold to ignore low probability paths (PI = 0.1) which mitigates the multipath issue described in [4] when trying to find the MVP (the path with the lowest PI).…”
Section: Model Formulationmentioning
confidence: 99%
“…The solution procedure for generating the candidate security architectures uses an investment planning optimization, similar to the one presented in [4]. A genetic algorithm (GA) determines the best mix of investments to apply to the network based on an objective composed of investment cost, NAR/FAR, and PI.…”
Section: Solution Proceduresmentioning
confidence: 99%
“…Since the investments are now collected in synergistic layers, there is no need to use the region crossover method for genetic crossover as done previously in [4], hence a traditional random cut procedure is used. Each child produced is postprocessed to guarantee feasibility by ensuring that at least one layer of each investment type (delay, detection, and ASO) is included, since anything less creates an infeasible solution.…”
“…The model developed in this paper extends the model given in [4] in two significant dimensions. First, scenarios are used to describe the connection between weather, visibility conditions and intruder capabilities with detection probability.…”
Section: Model Formulationmentioning
confidence: 84%
“…Many investments are only effective if they are deployed as a cycle or a contiguous boundary instead of possibly disconnected, single-link investments as described in [4]. Consequently, we make use of "layered" investments where a single investment layer consists of a collection of link investments of a single type (e.g., sensor "sX" investments) forming a contiguous boundary around the target at a fixed radius.…”
Section: Model Formulationmentioning
confidence: 99%
“…Since this probability becomes vanishingly small when the initial detection is close to the target, we set a threshold to ignore low probability paths (PI = 0.1) which mitigates the multipath issue described in [4] when trying to find the MVP (the path with the lowest PI).…”
Section: Model Formulationmentioning
confidence: 99%
“…The solution procedure for generating the candidate security architectures uses an investment planning optimization, similar to the one presented in [4]. A genetic algorithm (GA) determines the best mix of investments to apply to the network based on an objective composed of investment cost, NAR/FAR, and PI.…”
Section: Solution Proceduresmentioning
confidence: 99%
“…Since the investments are now collected in synergistic layers, there is no need to use the region crossover method for genetic crossover as done previously in [4], hence a traditional random cut procedure is used. Each child produced is postprocessed to guarantee feasibility by ensuring that at least one layer of each investment type (delay, detection, and ASO) is included, since anything less creates an infeasible solution.…”
Assessing physical protection system efficiency is mostly done manually by security experts due to the complexity of the assessment process and lack of tools. Computer aided numerical vulnerability analysis has been developed to quantitatively assess physical protection systems. A variety of methods have been proposed to optimize physical protection systems, where one of the most advanced approaches entails precisely defining which security components should be selected and where they should be placed at protected facilities, taking into consideration adversary type, to maximize the probability that an adversary will be stopped at minimum system cost. The most computationally intensive part of the optimization process is the evaluation. The evaluation involves recreating search space and finding optimal adversary's attack paths from each entry point. We present the domain experienced exploration method that optimizes evaluation process during the search for optimum solutions, considering results from previous evaluations. Performed experiments show that using the presented method, in real-world domains, results in a reduction of evaluation iterations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.