First Blog: A Test.#

I have a hypothesis on network interdiction solutions that may be relevant for future research. Here’s an attempt to describe it.

What is a network interdiction model?#

A network interdiction model is an approach to determine the vulnerability of a system. Network interdiction models focus on identifying the worst-case disruptions to a network given a specified number of node or arc failures. For example, for a given power system network, a network interdiction model could be used to identify the set of k arcs (e.g., power lines, transformers) that, if failed, produce the worst-case disruption in power delivery to customers. An equivalent interdiction model can identify the k nodes (e.g., buses, generators) that produce worst-case disruptions if failed.

Network interdiction models are not limited to use for electric power, but can be used for any critical infrastructure system that can be represented as a network. In general, critical infrastructure systems fall into two categories based on how they provide function: utilities and services. Utility systems function by flowing a resource from sources of supply to sources of demand limited by system connectivity and physical laws. Examples of utility systems include electricity, fuel, water, and communications. Each of these systems provide a function dictated by resource flows that follow strict rules either set by physical laws (e.g., resistance/reactance, pressure/head, and bandwidth) or by engineered design (e.g., routing algorithms). In contrast, service systems function by providing a service at a series of locations over a given time or distance. Examples of service systems include healthcare, supply chains, finance, and education. These systems are differentiated from utilities as their function is often dictated more by human capabilities and deicision-making to convert a limited resource into a productive service. Importantly, all of these different systems can be represented as network… which is the key point of this paragraph and should be much earlier.

Hence, interdiction models.

Without an interdiction model, it is difficult to identify the nodes and arcs that produce worst case failures for several reasons. First, when a failure occurs in a critical infrastructure system, operations do not remain static, but instead react to try and continue to provide function. to prove that one failure set is indeed worse than another is a combinatorial problem. which leads means the number

These models are sometimes referred to as attacker-defender and attacker-operator for bi-level models and

Ideas:

What is an interdiction model? What kinds of networks relate to critical infrastructure? What does interdiction modeling tell us? Why is this important.

The implications#

Some issues#

Conclusion#