Title :
Intelligence and impact contests in defending a single object with imperfect false targets
Author :
Peng, R. ; Levitin, G. ; Xie, M. ; Ng, S.H.
Author_Institution :
Dept. of Ind. & Syst. Eng., Nat. Univ. of Singapore, Singapore, Singapore
Abstract :
Introducing false targets is a common approach to protect important facilities. In this paper we assume that the defender has deployed a single object that can be destroyed by the attacker and deployed several false targets in order to misinform the attacker. The false targets are imperfect and can be detected by the attacker independently. In order to detect the false targets the attacker allocates part of his budget into intelligence actions. The optimal resource distribution between target identification/disinformation and attack/ protection efforts is studied for the case of constrained defense and attack resources.
Keywords :
security of data; attack resources; constrained defense; false target detection; impact contests; intelligence actions; target attack; target disinformation; target identification; target protection; Cement industry; Computer vision; Concrete; Intelligent structures; Object detection; Protection; Reliability theory; Resource management; Robustness; Systems engineering and theory; Vulnerability; attack; contest success function; defense; disinformation; false targets;
Conference_Titel :
Industrial Engineering and Engineering Management, 2009. IEEM 2009. IEEE International Conference on
Conference_Location :
Hong Kong
Print_ISBN :
978-1-4244-4869-2
Electronic_ISBN :
978-1-4244-4870-8
DOI :
10.1109/IEEM.2009.5373140