[article]
Titre : |
Optimal defence of single object with imperfect false targets |
Type de document : |
texte imprimé |
Auteurs : |
Peng, R., Auteur ; G. Levitin, Auteur ; Xie, M., Auteur |
Année de publication : |
2011 |
Article en page(s) : |
pp. 134–141 |
Note générale : |
Recherche opérationnelle |
Langues : |
Anglais (eng) |
Mots-clés : |
Vulnerability Attack Defence False target |
Index. décimale : |
001.424 |
Résumé : |
The paper considers an object exposed to external intentional attacks. The defender distributes its resource between deploying false targets and protecting the object. The false targets are not perfect and there is a nonzero probability that a false target can be detected by the attacker. Once the attacker has detected a certain number of false targets, it ignores them and chooses such number of undetected targets to attack that maximizes the probability of the object destruction. The defender decides how many false targets to deploy in order to minimize the probability of the object destruction assuming that the attacker uses the most harmful strategy to attack. The optimal number of false targets and the optimal number of attacked targets are obtained for the case of single and multiple types of the false targets. A methodology of finding the optimal defence strategy under uncertain contest intensity is suggested. |
DEWEY : |
001.424 |
ISSN : |
0160-5682 |
En ligne : |
http://www.palgrave-journals.com/jors/journal/v62/n1/abs/jors2009171a.html |
in Journal of the operational research society (JORS) > Vol. 62 N° 1 (Janvier 2011) . - pp. 134–141
[article] Optimal defence of single object with imperfect false targets [texte imprimé] / Peng, R., Auteur ; G. Levitin, Auteur ; Xie, M., Auteur . - 2011 . - pp. 134–141. Recherche opérationnelle Langues : Anglais ( eng) in Journal of the operational research society (JORS) > Vol. 62 N° 1 (Janvier 2011) . - pp. 134–141
Mots-clés : |
Vulnerability Attack Defence False target |
Index. décimale : |
001.424 |
Résumé : |
The paper considers an object exposed to external intentional attacks. The defender distributes its resource between deploying false targets and protecting the object. The false targets are not perfect and there is a nonzero probability that a false target can be detected by the attacker. Once the attacker has detected a certain number of false targets, it ignores them and chooses such number of undetected targets to attack that maximizes the probability of the object destruction. The defender decides how many false targets to deploy in order to minimize the probability of the object destruction assuming that the attacker uses the most harmful strategy to attack. The optimal number of false targets and the optimal number of attacked targets are obtained for the case of single and multiple types of the false targets. A methodology of finding the optimal defence strategy under uncertain contest intensity is suggested. |
DEWEY : |
001.424 |
ISSN : |
0160-5682 |
En ligne : |
http://www.palgrave-journals.com/jors/journal/v62/n1/abs/jors2009171a.html |
|