Modeling of threats to critical infrastructure objects for the creation of defenses against swarm attacks by strike drones

Oleg Fedorovich, Oleg Zamirets, Andrei Popov, Oleksii Hubka, Yuliia Malieieva, Andrii Rybka

Abstract


Modern technologies used in hybrid warfare allow the enemy to perform large-scale attacks on critical infrastructure (e.g., transport, energy, industrial enterprises, etc.), which affects the country's economy. The use of unmanned aerial vehicles (UAVs) by the enemy in the form of swarms of strike drones has significantly increased the risk of damage to critical infrastructure objects (CIOs), which degrade over time and have dangerous vulnerabilities. Therefore, modeling defensive measures to protect CIOs from massive enemy air attacks is important. The subject of this study is the creation of mathematical and simulation models for planning preventive measures in CIO defense. This research aims to create a set of models that can be used to analyze and identify threatening vulnerabilities of critical infrastructure objects triggered by wave attacks of enemy strike drones and to plan appropriate preventive defensive actions under limited capabilities. The tasks to be solved are as follows: conduct a systematic analysis of the sequence of actions for planning CIO defense; identify the most threatening vulnerabilities of CIOs that could be attacked by the enemy; make a rational distribution of defense capabilities to protect CIO, taking into account the enemy’s capabilities to create strike capabilities using combat drones; and develop a multi-agent simulation model to analyze possible CIO damage from massive attacks by strike drones. Mathematical methods and models used: system analysis of preventive measures for CIO defense; qualitative assessment of CIO indicators to identify threatening vulnerabilities; lexicographic ordering of options to identify a set of relevant CIOs that need to be defended; integer (Boolean) optimization for the rational distribution of limited defense capabilities across locations of threatening CIO vulnerabilities; multi-agent simulation modeling of enemy wave drone attacks to analyze CIO damage. The following results were achieved: a logical sequence of preventive measures for CIO defense has been formed; a set of threatening vulnerabilities in CIO has been identified; the strike potential and capabilities of the enemy in terms of CIO vulnerability have been analyzed; the necessary defense potential for protecting CIO has been formed; various scenarios of strike drone attacks and possible CIO damage have been modeled; and a rational distribution of anti-drone means has been carried out to reduce the risks of CIO damage. Conclusions: the proposed set of models allows us to justify the logical sequence of preventive measures to defend CIOs against massive wave attacks by enemy strike drones. This will ensure the effective use of existing anti-drone defense measures against enemy attacks, even under conditions of limited capabilities. The scientific novelty of the proposed approach lies in the justification of protective measures for critical infrastructure against massive wave attacks by enemy strike drones based on a set of original and new mathematical and simulation models.

Keywords


critical infrastructure vulnerabilities; preventive measures for defense; wave attacks by strike drones; qualitative assessment of vulnerabilities; lexicographic ordering of options; optimization of defense potential distribution; multi-agent modeling of

Full Text:

PDF

References


Castrillo, V. U., Manco, A., Pascarella, D., & Gigante, G. A Review of Counter-UAS Technologies for Cooperative Defensive Teams of Drones. Drones, 2022, vol. 6, is. 3, article no. 65. DOI: 10.3390/drones6030065.

.Chauhan, D., Kagathara, H., Mewada, H. Patel, S., Kavaiya, S., & Barb, G. Nation’s Defense: A Comprehensive Review of Anti-Drone Systems and Strategies. IEEE Access, 2025, vol. 13, pp. 53476-53505. DOI: 10.1109/ACCESS.2025.3550338.

Osinga, F. P. B., & Roorda, M. P. From Douhet to Drones, Air Warfare, and the Evolution of Targeting. In: Ducheine, P., Schmitt, M., Osinga, F. (eds) Targeting: The Challenges of Modern Warfare. T.M.C. Asser Press, The Hague, 2016, pp. 27-76. DOI: 10.1007/978-94-6265-072-5_3.

Luo, X., Wu, Y., & Wang, F. Target Detection Method of UAV Aerial Imagery Based on Improved YOLOv5. Remote Sensing, 2022, no. 14(19), article no. 5063. DOI: 10.3390/rs14195063.

Fedorovych, O., Kritskiy, D., Malieiev, L., Rybka, K., & Rybka, A. Military logistics planning models for enemy targets attack by a swarm of combat drones. Radioelectronic and Computer Systems, 2024, no. 1, pp. 207-216. DOI: 10.32620/reks.2024.1.16.

Zmysłowski, D., Skokowski, P., & Kelner, J. M. Anti-drone sensors, effectors, and systems – a concise overview. TransNav: International Journal on Marine Navigation and Safety of Sea Transportation, 2023, no. 17(2), pp 455-461. DOI: 10.12716/1001.17.02.23.

Tytarenko, O., & Vlasenko, Ye. Protypovitriana oborona v rosiisko-ukrainskii viini: uroky ta rekomendatsii [Air defenсe in the russian-ukrainian war: lessons and recommendations]. Povitriana mits Ukrainy – Air power of Ukraine, 2024, no. 1(6), pp. 49–55. DOI: 10.33099/2786-7714-2024-1-6-49-55. (in Ukrainian).

Shin, M. J., Yoon, S. S., & Euom, I. C. A Study on the Method of Vulnerability Analysis of Critical Infrastructure Facilities. Journal of the Korea Institute of Information Security & Cryptology, 2022, no. 32(2), pp. 243-253. DOI: 10.13089/JKIISC.2022.32.2.243.

Pytel, M., & Cieśla, M. Use of Territorial Defense Forces (TDF) in combat operations. Scientific Journal of the Military University of Land Forces, 2021, no. 53(1 (199), pp. 61-72. DOI: 10.5604/01.3001.0014.8110.

Semenenko, O., Deineha, O., Voronchenko, I., Borysiuk, S., Mytchenko, S., & Taran, O. On the Question of Transformation of Forms and Methods of Military Actions in the Conditions of Hybrid Wars. Social Development and Security, 2021, vol. 11, no. 2, pp. 256-271, DOI:10.33445/sds.2021.11.2.22.

Kang, H., Joung, J., Kim, J., Kang J., & Cho, Y.S. Protect Your Sky: A Survey of Counter Unmanned Aerial Vehicle Systems. IEEE Access, 2020, vol. 8, pp. 168671-168710. DOI: 10.1109/ACCESS.2020.3023473.

Tyurin, V,. Martyniuk, O., Mirnenko, V., Open'ko P., & Korenivska, I. General Approach to Counter Unmanned Aerial Vehicles. IEEE 5th International Conference Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD), Kiev, Ukraine, 2019, pp. 75-78, DOI: 10.1109/APUAVD47061.2019.8943859.

Fedorovich, O., Lukhanin, M., Prokhorov, O., Slomchynskyi, O., Hubka, O., & Leshchenko, Yu. Simulation of arms distribution strategies by combat zones to create military parity of forces. Radioelectronic and computer systems, 2023, no. 4, pp. 209-220. DOI: 10.32620/reks.2023.4.1.

Lyu, C., & Zhan, R. Global Analysis of Active Defense Technologies for Unmanned Aerial Vehicle. IEEE Aerospace and Electronic Systems Magazine, 2022, vol. 37, no. 1, pp. 6-31. DOI: 10.1109/MAES.2021.3115205.

Park, S., Kim, H. T., Lee, S., Joo H., & Kim, H. Survey on Anti-Drone Systems: Components, Designs, and Challenges, IEEE Access, 2021, vol. 9, pp. 42635-42659. DOI: 10.1109/ACCESS.2021.3065926.

Kim, J., Choi, J., & Kwon, H. A study on the development directions of a smart counter-drone defense system based on the future technological environment. KSII Transactions on Internet and Information Systems (TIIS), 2024, no. 18(7), pp. 1929-1952. DOI: 10.3837/tiis.2024.07.011.

Di Pietro, R., Raponi, S., Caprolu, M., & Cresci, S. Critical Infrastructure. In: New Dimensions of Information Warfare. Advances in Information Security, 2021, vol 84, pp. 157-196. Springer, Cham. DOI: 10.1007/978-3-030-60618-3_5.

Dreis, Yu., & Derkach, O. L. Bazova mnozhyna uzahalnenykh kryteriiiv vidnesennia ob’iektiv do krytychnoi infrastruktury derzhavy [Basic set of generalized criteria for assigning objects to the critical infrastructure of state]. Bezpeka informatsii –Ukrainian Scientific Journal of Information Security, 2021, vol. 27, no. 1, pp. 13–20. Available at: http://repository.mu.edu.ua/jspui/handle/123456789/5217. (accessed 12.3.2025). (in Ukrainian).

Enrico, Zio. Challenges in the vulnerability and risk analysis of critical infrastructures. Reliability Engineering & System Safety, 2016, vol. 152, pp. 137-150. DOI: 10.1016/j.ress.2016.02.009.

Ewa, W. O., Ugwu, O. O. & Okafor, F. O. Resilient–vulnerability analysis of critical infrastructure, key resources, assets, and facilities. Innovative Infrastructure Solutions, 2024, no. 9, article no. 109 DOI: 10.1007/s41062-024-01405-9.

Yevseiev, S., Melenti, Y., Voitko, O., Hrebeniuk, V., Korchenko, A., Mykus, S., & Chopenko, D. A development of a concept for building critical infrastructure facilities security system. Eastern-European Journal of Enterprise Technologies, 2021, vol. 3, no. 111(9), pp. 63–83. DOI: 10.15587/1729-4061.2021.233533.

Llinas, J. & Sentz, K. Knowing the Enemy, Dealing with Deception, and Situation/Threat Estimation. 2024 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), Montreal, QC, Canada, 2024, pp. 31-38. DOI: 10.1109/CogSIMA61085.2024.10554049.

Shalyhin, A. A., Nerubatskyi, V. O., & Smyk, S. I. Metodychnyi pidkhid do otsinky boiovykh potentsialiv bezpilotnykh aviatsiinykh kompleksiv, yikh pidrozdiliv i uhrupovan [Methods of assessment of combat potentials of unmanned aircraft systems, their divisions and groups]. Nauka i tekhnika Povitrianykh Syl Zbroinykh Syl Ukrainy – Science and technology of the Air Forse of Ukraine, 2021, no. 2 (43), pp. 73-79. DOI: 10.30748/nitps.2021.43.10. (in Ukrainian).

Shovkoshytnyi, I., & Vasylenko, O. Vybir pokaznykiv otsiniuvannia efektyvnosti zastosuvannia roiv udarnykh bezpilotnykh litalnykh aparativ dlya urazhennia nestatsionarnykh hrupovykh tsilei [Selection of indicators for assessing the effectiveness of the use of swarms of striking unmanned aerial vehicles to defeat non-stationary group targets]. Povitriana mits Ukrainy – Air power of Ukraine, 2024, no. 2(7), pp. 61–72. DOI: 10.33099/2786-7714-2024-2-7-61-72. (in Ukrainian).

Horbenko, V., & Kireienko, V. Metodyka vyznachennia vazhlyvosti ob’iektiv protypovitrianoi oborony v protsesi planuvannia operatsiy z vykorystanniam metodu faktornoho analizu [Method of determining the importance of air defense objects in the operations planning process using the method of factor analysis]. Povitriana mits Ukrainy – Air power of Ukraine, 2024, no. 2(7), pp. 36–42. DOI: 10.33099/2786-7714-2024-2-7-36-42. (in Ukrainian).

Lenkov, S., Kryvtsun, V., Miroshnichenko, O., Holushko, S., & Koltsov, R. Analiz stanu rozvytku pytannia zakhystu ob’iektiv krytychnoi infrastruktury z vykorystanniam inzhenernykh boieprypasiv [Analysis of the state of development of the issue of protection of critical infrastructure facilities using engineered munitions]. Pidvodni Tekhnolohii – Underwater technologies: Industrial and Civil Engineering, 2023, no. 13, pp. 81–91. DOI: 10.32347/uwt.2023.13.1803. (in Ukrainian).

Koval, M. V., Koval, V. V., Kotsuruba, V. I., & Bilyk, A. S. Orhanizatsiino-tekhnichni zasady po-budovy systemy inzhenernoho zakhystu ob’iektiv krytychnoi infrastruktury enerhetychnoi haluzi Ukrainy [Organizational and technical principles of construction of a system of engineering protection of critical infrastructure objects of the energy industry of Ukraine]. Nauka i oborona – Science and Defence, 2022, no. 3-4, pp. 11-16. DOI: 10.33099/2618-1614-2022-20-3-4-11-16. (in Ukrainian).

Pavlov, D., Sukonko, S., & Salna, N. Mozhlyvosti ta problemni pytannia udoskonalennia zakhystu obʼiektiv infrastruktury u suchasnykh umovakh. [Opportunities and problems in improving the protection of critical infrastructure objects in modern conditions]. Chest i zakon – Honor and Law, 2022, no. 4(83), pp. 67-74. DOI: 10.33405/2078-7480/2022/4/83/272291. (in Ukrainian).

Pascarella, D., Gigante, G., Vozella, A., Bieber, P., Dubot, T., Martinavarro, E., Barraco, G., & Li Calzi, G. A Methodological Framework for the Risk Assessment of Drone Intrusions in Airports. Aerospace, 2022, no. 9(12), article no. 747. DOI: 10.3390/aerospace9120747.

Savchenko, I. O., & Matsko, P. I. Systemnyi pidkhid do pidtrymky pryiniattia rishen shchodo zahroz krytychnii infrastrukturi z vykorystanniam metodiv ekspertnoho otsiniuvannia [A systematic approach to supporting decision-making on threats to the critical infrastructure using expert assessment methods]. Vcheni zapysky, Tavriiskoho natsionalnoho universytetu imeni V.I. Vernadskoho – Scientific Notes of V.I. Vernadsky Taurida National University, 2025, vol. 36 (75), no. 2, part 2, pp. 199-205. DOI: 10.32782/2663-5941/2025.2.2/27. (in Ukrainian).




DOI: https://doi.org/10.32620/aktt.2025.4.11