Co-evolution of terrorist and security scenarios for water distribution systems

  • Authors:
  • Z. Skolicki;T. Arciszewski;M. H. Houck;K. De Jong

  • Affiliations:
  • Department of Computer Science, Mail Stop 4A5, George Mason University, Fairfax, VA 22030-4444, United States;Department of Civil, Environmental and Infrastructure Engineering, Mail Stop 4A6, George Mason University, Fairfax, VA 22030-4444, United States;Department of Civil, Environmental and Infrastructure Engineering, Mail Stop 4A6, George Mason University, Fairfax, VA 22030-4444, United States;Department of Computer Science, Mail Stop 4A5, George Mason University, Fairfax, VA 22030-4444, United States

  • Venue:
  • Advances in Engineering Software
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Identification of vulnerabilities of water distribution systems and identification of appropriate counter-measures are important components of homeland security. These are difficult and time consuming tasks. This paper provides a new approach to resolve these problems in complex infrastructure systems. It is based on the use of co-evolutionary computation for the generation of both terrorist and security scenarios. The basic concepts of co-evolutionary computation are briefly explained. The concept of co-evolutionary generation of terrorist and security scenarios is introduced in the context of a hypothetical water distribution system for a small town. A tool developed at George Mason University is used for a number of experiments that reveal a variety of emerging security patterns. The experiments show that these patterns may be helpful in effectively protecting the network.