Top Banner
Exploring Optimization Methodologies for Systematic Identification of Optimal Defense Measures for Mitigating CB Attacks Roshan Rammohan, Molly McCuskey Mahmoud Reda Taha, Tim Ross and Frank Gilfeather University of New Mexico Ram Prasad New Mexico State University
40

Exploring Optimization Methodologies for Systematic ...

Jan 24, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Exploring Optimization Methodologies for Systematic ...

Exploring Optimization Methodologies for Systematic Identification of Optimal Defense Measures for Mitigating CB Attacks

Roshan Rammohan, Molly McCuskeyMahmoud Reda Taha, Tim Ross and Frank GilfeatherUniversity of New Mexico

Ram PrasadNew Mexico State University

Page 2: Exploring Optimization Methodologies for Systematic ...

OutlineOutlineThe general architecture

How the analytic tool relates to the architecture

Optimization mode: the problem

Optimization Techniques With Example Application

Conclusions

Page 3: Exploring Optimization Methodologies for Systematic ...

The General architectureThe General architecture

Page 4: Exploring Optimization Methodologies for Systematic ...

$ $ $ $ $ $ $ $

$

Consequences “No Investment”

Total $ S&T

θ θ θ θ θ θ θ θ

Defense Measures “θ”

Cex

Attack Class

Consequences

All possible individual engagements

“Effectiveness”

Page 5: Exploring Optimization Methodologies for Systematic ...

The Analytic Tool The Analytic Tool ““Exploration ModeExploration Mode””

Cn, $Xn

C2, $X2

C1, $X1

θi

Ln

L2

L1

e

e

eI1

In

I2EGM

Agg

rega

tion

Func

tion

Cex :

⎥⎥⎥⎥⎥

⎢⎢⎢⎢⎢

4

3

2

1

CCCC

( )θ,L,IfC =EGM: Engagement Generation Module

Page 6: Exploring Optimization Methodologies for Systematic ...

The Analytic Tool: The Analytic Tool: ““Optimization ModeOptimization Mode””

What is the optimal way to distribute $X to N (mitigating variables) defense measures in order to reduce damage (consequences) of a CB attack?

Problem Statement

Page 7: Exploring Optimization Methodologies for Systematic ...

The Analytic Tool: The Analytic Tool: ““Optimization ModeOptimization Mode””

Cn, $Xn

C2, $X2

C1, $X1

θi

Ln

L2

L1

e

e

eRank

Ordering

“CI”

Rank Ordering

“MCOM”

I1

In

I2Yes

GA or RM

No

New Iteration

EGM

Mee

t Obj

ectiv

e Fu

nctio

n?

⎥⎥⎥⎥⎥⎥⎥⎥⎥⎥

⎢⎢⎢⎢⎢⎢⎢⎢⎢⎢

^

n

^

n

^

n

^

2

^

2

^

2

^

1

^

1

^

1

x

.

...

C

.

.xC

xC

θ

θ

θ

Option I

Option II

Page 8: Exploring Optimization Methodologies for Systematic ...

Analytic ToolboxAnalytic Toolbox

Component I:

EGM

Component II:

Optimization Module

Component III:

Rank OrderingModule

Three main components

Focus of this talkFocus of this talk

Page 9: Exploring Optimization Methodologies for Systematic ...

Component II: Optimization ModuleComponent II: Optimization Module

Mathematically, we can describe the relation as

x: all input parameters

θ : all defense measures

( ),xf= θC

C: all consequences

Page 10: Exploring Optimization Methodologies for Systematic ...

The optimization module targets finding the optimal defense measures ( ) and their associated cost ( ) that achieves a predefined set of consequences (Cex) considering all possible attacking engagementss.

^X$

Page 11: Exploring Optimization Methodologies for Systematic ...

x

θ

C

If we have a bimodal surface ( ),xf= θC

Predefined level of

consequences

Page 12: Exploring Optimization Methodologies for Systematic ...

The challenge is that the function that can describe the relationship between CB attack parameters(attack target, attacker, etc), the defense measures and the attack consequences is unknownunknown

Page 13: Exploring Optimization Methodologies for Systematic ...

When the function is unknown, a well known technique is to minimize the error (squared error) between the desired output and the model’s output.

predefined consequences EGM output

Objective function

( ),xf− θ( )∑=

=n

1k

2)(E θ desiredC

Page 14: Exploring Optimization Methodologies for Systematic ...

Two optimization approaches can be used here

Stochastic approximation

-Robbins Munro Optimization (RM)

Search Methods (Derivative free optimization)

- Genetic Algorithms (GA)

- Simulated Annealing (SA)

Page 15: Exploring Optimization Methodologies for Systematic ...

-This method is designed to find the roots of an unknown function f (θ) when the value of f(θ) can be provided for any specified θ

- By replacing f(θ) by its derivative f(θ)', the optimal defense measures to achieve pre-specified consequences (C0)can be found.

- The first technique is Robbins Munro (RM) as a technique to perform stochastic optimization.

Page 16: Exploring Optimization Methodologies for Systematic ...

Capabilities of RM

-Due to the use of a numerical gradient in determining the rate of convergence, this method has high ability to adapt to local rates of change of the function along its many parameters.

Limitations of RM

- There is an implicit assumption about the function being unimodal.

Page 17: Exploring Optimization Methodologies for Systematic ...

Genetic Algorithms (GA) mimics laws of Natural Evolution which emphasizes “survival of the fittest”.

In GA a “population” that contains different possible solutions to the problem is created.

Page 18: Exploring Optimization Methodologies for Systematic ...

1001011001100010101001001001100101111101

. . .

. . .

. . .

. . .

Currentgeneration

1001011001100010101001001001110101111001

. . .

. . .

. . .

. . .

Nextgeneration

The process is repeated until evolution happens“a solution is found!”

Selection

Crossover

Mutation

Elitism

Genetic Algorithms (GA)

Page 19: Exploring Optimization Methodologies for Systematic ...

Capabilities of GA

- In contrast to traditional techniques, GA is the most likely technique to find global peaks than traditional techniques.

Limitations of GA

-Unlike traditional optimization methods, GA is not the best module for handling continuous variables

- Relative fitness depends on probabilistic criteria of the variables that might be unknown.

Page 20: Exploring Optimization Methodologies for Systematic ...

Comparison between GA and RM

-We have conducted a series of research experimentsto compare efficiency of the RM and GA for functions with different levels of complexity.

- We examined the methods on two, three, four dimensional multivariates.

- We present here example results for optimizing a two dimensional multivariate Gaussian functions.

Page 21: Exploring Optimization Methodologies for Systematic ...

Comparison between GA and RM

Two dimensional multivariate Gaussian functions

Page 22: Exploring Optimization Methodologies for Systematic ...

Comparison between GA and RM

-35.27

-4.71

-12.89

y

0.4220.1983rd Iteration1000 iterations

0.7530.8152nd Iteration1000 iterations

0.4220.8161st Iteration1000 iterations

RM

x2x1Iteration #Method

LM

LM

GM

-34.840.4400.1912nd Iteration50 generations

-35.270.4230.1981st Iteration50 generationsGA

GM

GM

Page 23: Exploring Optimization Methodologies for Systematic ...

Comparison between GA and RM

-It became obvious that RM is very sensitive to the starting point of the search. This is why RM algorithm fell in almost all local minima

- On the contrary, GA is not sensitive to initial startand its temporal performance is better than RM.

- However, it is well known that there is no optimal choice for optimization methods, they are problem-dependent and thus further research is needed.

Page 24: Exploring Optimization Methodologies for Systematic ...

Example Application of GAExample Application of GAGA for Optimal Defense Measures Identification

- Here we used the EGM using ANFIS as the relation model and examined using GA to identify the optimal defense measures ( ) for a given attack engagements.

- We operated the DS tool in- Exploration mode to validate EGM- Optimization model to examine GA

Page 25: Exploring Optimization Methodologies for Systematic ...

Exploration ModeEngagement Description

CB attack on a U.S. Air force in the Persian Gulf- Preparator: Hostile foreign state

- Motivation: Interrupt Strategic functions

- Military facilities: Flight operation and support

-Chemical/Biological agent: Vx

- Dispersal mechanism: Missile warhead: Cluster

- Point of Release: 2km SE of personnel area

- Other characteristics…..

Page 26: Exploring Optimization Methodologies for Systematic ...

Exploration Mode

557Model

655772Model7

70377

150-350

Var 1

346263Model

Expected

Expected

Expected

55Days of Int.

6065Cost(US $ M)

150-250150-250Casualties

Var 3Var 2Consequences

- EGM sensitivity to defense measures was examined.

Page 27: Exploring Optimization Methodologies for Systematic ...

Two stage GATwo stage GA

Page 28: Exploring Optimization Methodologies for Systematic ...

Optimization Mode

- Predefined consequences include

7Days of Int.

170

70

430

Cost of Add. S&T $M

Remediation Cost $M

Casualties

Predefined level of Consequences

Page 29: Exploring Optimization Methodologies for Systematic ...

Optimization ResultsOptimization ResultsThe output of the optimization module was 250possible combinations of defense measures that will

- Achieve a level of minimum consequences

- Limit the S&T dollars to the total available fund

The question becomes

Which solution to choose?

Page 30: Exploring Optimization Methodologies for Systematic ...

Possible solutionsPossible solutions

Page 31: Exploring Optimization Methodologies for Systematic ...

Possible solutionsPossible solutions

Page 32: Exploring Optimization Methodologies for Systematic ...

Possible solutionsPossible solutions

Page 33: Exploring Optimization Methodologies for Systematic ...

Possible solutionsPossible solutions

Page 34: Exploring Optimization Methodologies for Systematic ...

Possible solutionsPossible solutions

Page 35: Exploring Optimization Methodologies for Systematic ...

In our problem, ranking criteria are interactive. In such a situation, it is proved in decision theory that nonlinear aggregation operators are more efficient.

A few possible techniquesA few possible techniques

- Choquet Integral (CI)

- Multi criteria decision making (MCDM)

Rank orderingRank ordering

Page 36: Exploring Optimization Methodologies for Systematic ...

Consequences If optimal defense Consequences If optimal defense measures are implementedmeasures are implemented

Threshold : 430

Page 37: Exploring Optimization Methodologies for Systematic ...

Consequences If optimal defense Consequences If optimal defense measures are implementedmeasures are implemented

Geo-political impact : 4

Page 38: Exploring Optimization Methodologies for Systematic ...

-We demonstrated the possible use of derivative-free optimization as an efficient system for optimization for finding the optimal S&Tinvestments to minimize the consequences of CB attacks

-A two step optimization using GA proved more efficient than a one-stage optimization methods in performing the analysis

- The optimization tool showed good accuracy in finding the optimal defense measures to minimize consequences due to CB attacks

- Research is currently on-going to integrate this method with rank ordering module.

ConclusionsConclusions

Page 39: Exploring Optimization Methodologies for Systematic ...

This research is funded by Defense Threat Reduction Agency (DTRA).

The authors gratefully acknowledge this funding.

AcknowledgmentAcknowledgment

Page 40: Exploring Optimization Methodologies for Systematic ...

Questions