Computational & Technology Resources
an online resource for computational,
engineering & technology publications |
|
Civil-Comp Proceedings
ISSN 1759-3433 CCP: 82
PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON THE APPLICATION OF ARTIFICIAL INTELLIGENCE TO CIVIL, STRUCTURAL AND ENVIRONMENTAL ENGINEERING Edited by: B.H.V. Topping
Paper 30
Emerging Security Patterns: Co-evolution of Terrorist and Security Scenarios Z. Skolicki+, T. Arciszewski*, M.H. Houck* and K. De Jong+
+Department of Computer Science
Z. Skolicki, T. Arciszewski, M.H. Houck, K. De Jong, "Emerging Security Patterns: Co-evolution of Terrorist and Security Scenarios", in B.H.V. Topping, (Editor), "Proceedings of the Eighth International Conference on the Application of Artificial Intelligence to Civil, Structural and Environmental Engineering", Civil-Comp Press, Stirlingshire, UK, Paper 30, 2005. doi:10.4203/ccp.82.30
Keywords: homeland security, emergence, patterns, terrorism, co-evolution, evolutionary computation, water distribution system.
Summary
The ultimate objective of the reported research is to develop proactive infrastructure
security, which will include a better and more complete understanding of a given
infrastructure system than a terrorist attack planner might have. The use of
Information Technology can counterbalance the danger of unknown and unexpected
terrorist threats. This paper focuses on the security improvements to an already
existing infrastructure system, and identifies its vulnerabilities and available
counter-measures. The proposed approach is based on the use of co-evolutionary
algorithms, a concept from evolutionary computation, for the generation of both
terrorist and security scenarios [2,3,4,7,11,12,13,14].
Water distribution systems are particularly vulnerable to terrorist attacks because of their ubiquity [5,8,9,10]. A hypothetical network for a small town has been modelled with EPANet [6], which is a public domain, water distribution system-modelling program developed by the U.S. Environmental Protection Agency's Water Supply and Water Resources Division. It was used as an evaluator in the broader framework of the evolutionary tool called SecurityMax/Water [1], developed in the Information Technology and Engineering School at George Mason University. The effects of contaminating and securing selected hydrants in the system have been studied. A number of experiments, run with various evolutionary and co-evolutionary settings, are reported in the paper. The results of these experiments reveal emerging security patterns regarding the locations of "dangerous" fire hydrants, unique for a given water distribution system. Also, the interaction between terrorist and security scenarios is clearly visible. In the reported experiments, the terrorist scenarios were able to "avoid" security scenarios by employing only local modifications, however the security scenarios were able to follow and to some degree counteract the terrorist scenarios. Moreover, they were able to find dangerous regions in the network. Although the patterns of security scenarios were not entirely surprising, we can easily imagine a situation when the security scenarios use a totally different search space than the terrorist scenarios. In this context, the methodological results of our approach are more universal than the example presented in the paper. Understanding how different characteristics of a given problem influence the dynamics of co-evolution, as well as modelling situations in which terrorists modify their actions in response to possible security scenarios, are considered as further research directions. References
purchase the full-text of this paper (price £20)
go to the previous paper |
|