Skip to main content
Log in

Detecting a Security Disturbance in Multi Commodity Stochastic Networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Here is a multi-criteria approach to identify and evaluate network-flow monitoring strategies in a stochastic environment. We propose an analytical approach for assessing flow disturbance, based on limited sampling of arc-flow information in multi commodity, or multiple origin-destination (O–D), networks. A disturbance is defined here as abnormal network traffic beyond routine fluctuations. The network is characterized by arcs that are available with certain probabilities, suggesting a busy packet-switching/circuit-switching network, or simply network with failing components. Given the huge state space of such stochastic networks, our first objective is to bound the expected flow for computational efficiency. This is accomplished by extending available single-commodity-network results to the multi commodity case. The second objective is to determine the best placement of flow monitors to obtain the most accurate estimates of traffic flow, as represented by O–D pair traffic volumes in order to detect a disturbance. We followed a multi-criteria approach in defining and evaluating all possible monitor-placement strategies satisfying monitor availability. To assess a traffic pattern, O–D volumes are estimated using the l p -metric for p = 1, 2 and ∞, representing a decision-maker's risk-preference structure. The final objective is to define a disturbance metric providing confident assessments on the occurrence of a flow disturbance. In this regard, we use linear-regression to generate confidence intervals around the expected flow for each O–D pair. This is supplemented by the Fisher Method of Randomization, a non-parametric test, for small networks. Unlike the Fisher-test results, it appears the linear-regression “disturbance metric” is very sensitive to detecting “disturbance.” Preliminary results suggest that among the three l p metrics in O–D estimation, it appears that the best is the l2-metric, which provides the appropriate sensitivity and accuracy. Counter to intuition, it is also observed that the “disturbance” estimation error generally decreases as the number of sampled arcs decreases.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Y.P. Aneja and K.P.K. Nair, Multi commodity network flows with probabilistic losses, Management Science 28 (1982) 1080–1086.

    Google Scholar 

  2. C. Antoniou, M. Ben-Akiva and H.N. Koutsopoulos, Incorporating automated vehicle identification data into origin-destination estimation, Transportation Research Record 1882 (2004) 37–44.

    Google Scholar 

  3. T.G. Bailey, Response surface analysis of stochastic network performance. MS Thesis. School of Engineering, Air Force Institute of Technology (1988) Wright-Patterson AFB, Ohio.

  4. M. Ball, Complexity of network reliability computations. Networks, 10 (1980) 153–165.

    Google Scholar 

  5. M.S. Bazaraa, et al., Linear Programming and Network Flows, 2nd Edn. (Wiley, New York, New York, 1990).

    Google Scholar 

  6. O. Berman, R.C. Larson and N. Fouska, Optimal location of discretionary service facilities, Transportation Science 26(3) (1992) 201–211.

    Google Scholar 

  7. O. Berman, D. Bertsimas and R.C. Larson, Locating discretionary service facilities, II: maximizing market size, minimizing inconvenience, Operations Research 43(4) (1995) 623–632.

    Google Scholar 

  8. O. Berman, D. Krass and C.W. Xu, Locating discretionary service facilities based on probabilistic customer flows, Transportation Science 29(3) (1995) 276–290.

    Google Scholar 

  9. L. Bianco, G. Confessore and P. Reverberi, A network based model for traffic sensor location with implications on O/D matrix estimates, Transportation Science 35(1) (2001) 50–60.

    Article  Google Scholar 

  10. J.V. Bradley, Distribution-Free Statistical Tests, (Prentice-Hall, Englewood Cliffs, NJ 1968).

    Google Scholar 

  11. A. Brooke, et al., GAMS: A User's Guide, The International bank for reconstruction and development/The World Bank (1988).

  12. M. Carey and C. Hendrickson, Bounds on expected performance of networks with links subject to failure, Networks 14 (1984) 439–456.

    Google Scholar 

  13. Y. Chan and M.Y. Rahi, An l p -norm origin-destination estimation method that minimizes site-specific data requirements. Transportation Research Record 1413 (1993) 30–140.

    Google Scholar 

  14. Y. Chan, E. Regan and W. Pan, Inferring an origin-destination matrix directly from network flow sampling, Transportation Planning and Technology 11 (1986) 27–46.

    Google Scholar 

  15. Y. Chan, E. Yim and A. Marsh, Exact and approximate improvement to the throughput of a stochastic network, IEEE Transactions in Reliability 46(4) (1997) 473–486.

    Google Scholar 

  16. H.-Y Chang, On real time intrusion detection and source identification. PhD dissertation, North Carolina State University, (2000) Raleigh, North Carolina.

  17. A. Chen, P. Chootinan and S. Pavinvongvuth, Multiobjective model for locating automatic vehicle identification readers. Transportation Research Record 1886 (2004) 49–58.

    Google Scholar 

  18. P. Chootinan, A. Chen and H.Yang, A Bi-objective traffic counting location problem for origin-destination trip table estimation, Transportmetrica 1(1) (2005) 65–80.

    Google Scholar 

  19. W.J. Conover, Practical Non-parametric Statistics, 2nd Edn., (Wiley, New York, New York 1980).

    Google Scholar 

  20. K.J. Cormican, D. Morton and K.R. Wood, Stochastic network interdiction, Operations Research 46(2) (1998) 184–197.

    Google Scholar 

  21. R. Evren, Interactive compromise programming, Journal of the Operational Research Society 38(2) (1987) 163–172.

    Google Scholar 

  22. C. Gedeon, M. Florian and T.G. Crainic, Determining origin-destination matrices and optimal multiproduct flows for freight transportation over multimodal networks, Transportation Research B 27B(5) (1993) 351–368.

    Google Scholar 

  23. D.P. Gerakoulis, A parameter for vulnerability evaluation of packet switched communication networks. IEEE Global Telecommunications Conference 2 (1991) 944–948.

    Google Scholar 

  24. F. Harary, Graph Theory (Addison-Wesley, Reading, Massachusetts 1972).

    Google Scholar 

  25. C.-C. Hsieh and Y.T. Chen, Resource allocation decisions under various demands and cost requirements in an unreliable flow network, Computers and Operations Research 32 (2005) 2771–2784

    Google Scholar 

  26. E. Israeli and R.K. Wood, Shortest-path network interdiction, Networks 40(2) (2002) 97–111.

    Article  Google Scholar 

  27. H. Kalyoncu and B. Sankur, Estimation of survivability of communication networks, Electronic Letters 28(19) (1992) 1790–1791.

    Google Scholar 

  28. Y.-K. Lin and J. Yuan, Flow reliability of a probabilistic capacitated-flow network in multiple node pairs case, Computers and Industrial Engineering 45(3) (2003) 417–428.

    Article  Google Scholar 

  29. D. Lyle, Y. Chan and E. Head, Improving information-network performance: Reliability versus invulnerability, IIE Transactions 31 (1999) 909–919.

    Article  Google Scholar 

  30. M. Minoux, Network synthesis and optimum network design problems: Models, solution methods and applications, Networks 19 (1989) 315–317.

    Google Scholar 

  31. P.M. Murray-Tuite and H. Mahmassani, Methodology for determining vulnerable links in a transportation network. Transportation Research Record 1882 (2004) 88–96.

    Google Scholar 

  32. G.L. Nemhauser and L.A. Wolsey, Integer and Combinatorial Optimization (Wiley, New York, New York 1988).

    Google Scholar 

  33. J. Neter, et al., Applied Linear Statistical Models, 3rd Ed, (Irwin, Homewood, Illinois 1990).

    Google Scholar 

  34. L.M. Rasmussen, Zero-one programming with multiple criteria, European Journal of Operational Research 26 (1986) 83–95.

    Article  Google Scholar 

  35. A. Robinson, Assessing the vulnerability of multi-commodity networks with failing components: MS Thesis Air Force Institute of Technology, Department of Operational Sciences, (1994) Wright-Patterson AFB, Ohio, (including Thesis Extension, which is obtainable via E-mail: ychan@alum.MIT.edu)

  36. S. Ross, A First Course in Probability, 2nd Edn., (Macmillan, New York, New York, 1984).

    Google Scholar 

  37. G.T. Ross and R.M. Soland, A multicriteria approach to the location of public facilities, European Journal of Operational Research 4 (1980) 307–321.

    Google Scholar 

  38. M.H. Schneider and S. A. Zenios, A comparative study of algorithms for matrix balancing. Operations Research 38 (1990) 441–449.

    Google Scholar 

  39. L. Roshan Sharma, Network Topology Optimization. Van Nostrand Reinhold, New York, New York (1990).

    Google Scholar 

  40. R.D. Shier, Network Reliability and Algebraic Structures, Oxford University Press, (Oxford, United Kingdom. Stathopoulos 1991).

  41. A. Stathopoulos, T. Tsekeris, Enhanced dynamic origin-destination matrix updating with long-term flow Information. Transportation Research Record 1882 (2004) 159–166.

    Google Scholar 

  42. U.S. Department of Defense. DoD Briefings, 22 Sept. and 15 Dec. 1993.

  43. G.J.G. Upton and B. Fingleton. Spatial Data Analysis by Example (Wiley, New York, New York, 1985).

    Google Scholar 

  44. T.D. Wallace and J.L. Silver, Econometrics: An Introduction. (Addison-Wesley, Reading, Massachusetts 1988).

    Google Scholar 

  45. H. Yang, J. Zhou, Optimal traffic counting locations for origin-destination matrix estimation. Transportation Research B 32B(2) (1998) 109–126.

    Google Scholar 

  46. Yu, P.-L., Multiple-Criteria Decision Making (Plenum Press, New York, New York 1985).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yupo Chan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Robinson, A.R., Chan, Y. & Dietz, D.C. Detecting a Security Disturbance in Multi Commodity Stochastic Networks. Telecommun Syst 31, 11–27 (2006). https://doi.org/10.1007/s11235-006-5520-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-006-5520-3

Keywords

Navigation