Title :
Precise structural vulnerability assessment via mathematical programming
Author :
Dinh, Thang N. ; Thai, My T.
Author_Institution :
Comput. & Inf. Sci. & Eng., Univ. of Florida, Gainesville, FL, USA
Abstract :
Network vulnerability assessment is an indispensable component of attack risk reduction and proactive response. However, traditional assessment methods simply assume the attacks only target at nodes with high degree or betweenness centrality, thus fail to capture the worst-case scenarios under simultaneous failures. In our previous work, we formulated assessing network vulnerability as optimization problems, so-called β-edge disruptor and β-vertex disruptor, to identify the minimum cost critical infrastructures that removal expose the network to a certain disruption level. Here, the disruption is measured as the fraction of node pairs with no paths between them in the residual network. In this paper, we present an exact analytical solution for the vulnerability assessment problems i.e. an exact branch-and-cut algorithm to solve the integer programming formulation of the β-vertex disruptor. The two intriguing aspects of the algorithms are an efficient Mixed Integer Programming (MIP) formulation, called sparse metric, and vertex-cut inequalities, a specialized cutting plane procedure that tightens the bound on the optimal solutions. Experiments on both synthetic and real-world networks suggest that our algorithm yields a significant improvement on a large variety of network instances, raising the size of the largest instance solved from several dozen to several hundred nodes. Our techniques can be easily extended to many graph partitioning and connectivity optimization problems.
Keywords :
integer programming; mathematical programming; β-edge disruptor; β-vertex disruptor; MIP formulation; attack risk reduction; branch-and-cut algorithm; cutting plane; mathematical programming; minimum cost critical infrastructure; mixed integer programming; network instances; network vulnerability assessment; proactive response; residual network; sparse metric; structural vulnerability assessment; vertex-cut inequalities; Algorithm design and analysis; Complexity theory; Heuristic algorithms; Linear programming; Measurement; Optimization; Upper bound;
Conference_Titel :
MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011
Conference_Location :
Baltimore, MD
Print_ISBN :
978-1-4673-0079-7
DOI :
10.1109/MILCOM.2011.6127492