Next Article in Journal
Fault Line Selection in Distribution Networks Based on Dual-Channel Time-Frequency Fusion Network
Previous Article in Journal
Shock Waves of the Gerdjikov–Ivanov Equation Using the Adomian Decomposition Schemes
Previous Article in Special Issue
Determination of Sequential Well Placements Using a Multi-Modal Convolutional Neural Network Integrated with Evolutionary Optimization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Improved Pareto Local Search-Based Evolutionary Algorithm for Multi-Objective Shortest-Path Network Counter-Interdiction Problem

1
School of Traffic and Transportation Engineering, Central South University, Changsha 410075, China
2
School of Automation, Central South University, Changsha 410083, China
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(16), 2683; https://doi.org/10.3390/math13162683
Submission received: 11 July 2025 / Revised: 16 August 2025 / Accepted: 17 August 2025 / Published: 20 August 2025
(This article belongs to the Special Issue Evolutionary Multi-Criteria Optimization: Methods and Applications)

Abstract

Most existing studies on the Shortest-Path Network Interdiction Problem (SPIP) adopt the attacker’s perspective, often overlooking the critical role of defender-oriented strategies. To support proactive defense, this paper introduces a novel problem named the Multi-Objective Shortest-Path Counter-Interdiction Problem (MO-SPCIP). The problem incorporates a backup-based defense strategy from the defender’s viewpoint and addresses the inherent trade-offs among minimizing the shortest path length, minimizing backup resource consumption, and maximizing the attacker’s resource usage. To solve this complex problem, we propose an Improved Pareto Local Search-based Evolutionary Algorithm (IPLSEA). The algorithm integrates several problem-specific components, including a tailored initial solution generation method, a customized solution representation, and specialized genetic operators. In addition, an improved Pareto Local Search (IPLS) is incorporated into the algorithm framework, allowing an adaptive and selective search. To further enhance local refinement, three problem-specific neighborhood search operations are designed and embedded within the Pareto Local Search. The experimental results demonstrate that IPLSEA significantly outperforms state-of-the-art algorithms in terms of its convergence quality and solution diversity, enabling a more robust performance in network counter-interdiction scenarios.

1. Introduction

Research on the Shortest-Path Network Interdiction Problem (SPIP) has achieved significant progress over time, particularly in modeling and algorithmic approaches from the attacker’s perspective [1]. Traditional SPIP assumes that an attacker seeks to maximize the shortest path length between designated nodes by disrupting critical network links or nodes under limited resources [2]. This attacker-centric viewpoint has found extensive applications in domains such as electrical grid analysis [3,4] and military affairs [5,6]. Notably, it serves as a valuable tool for assessing critical infrastructure vulnerability and evaluating a system’s resilience against potential disruptions.
However, a major limitation of existing SPIP studies lies in treating the network as a passive entity, overlooking the active defense strategies that are available to network defenders in real-world scenarios. In practice, network administrators possess both resources and technical capabilities to mitigate such attacks through methods like protecting key parts [7], backing up components [8,9,10], and repairing components [11]. This highlights the need for research focused on defender-oriented strategies, which offer both theoretical innovation and tangible operational benefits for real-world system protection.
This paper considers a backup-based defense strategy to mitigate the impacts of network interdiction, wherein backup links are activated to restore the shortest path connectivity following an attack. From the defender’s perspective, this involves navigating multiple competing objectives, including ensuring service availability via acceptable path lengths, minimizing the cost of deploying backup links, and maximizing the attacker’s resource expenditure by redirecting attacks toward less critical components. These objectives often conflict. For example, improving the path efficiency may demand greater resource investment, while cost reduction could compromise the performance. Moreover, effective attacker diversion requires strategic redundancy planning. These inherent trade-offs motivate our extension of the traditional SPIP into a multi-objective problem, i.e., Multi-Objective Shortest-Path Counter-Interdiction Problem (MO-SPCIP).
To solve multi-objective optimization problems like MO-SPCIP, two main kinds of approaches exist. The first kind of method is the weighted aggregation-based algorithms [12], which transform the problem into a single-objective formulation via weighted aggregation. However, the weighted aggregation-based algorithms require predefined preferences, often unavailable or uncertain in real-world settings. Another kind of method is the multi-objective evolutionary algorithms (MOEAs), which leverage Pareto dominance to generate a set of non-dominated solutions in a single run, making it more suitable for scenarios with unclear or evolving objective priorities [13]. In this paper, we adopt MOEAs due to their ability to provide a set of solutions to network administrators for flexible decisions without predefined preferences, which is more suitable for real-world applications.
Nevertheless, applying MOEAs to MO-SPCIP presents specific challenges. Particularly, MOEAs, as a class of metaheuristic algorithms, require problem-specific design adaptations to perform effectively [14]. Without such customizations, existing algorithms often struggle to generate high-quality solutions for real-world problems such as the proposed problem. On the other hand, it is still an open challenge for striking a balance between diversity and convergence during the multi-objective optimization process [15]. Ensuring the sufficient exploration of the solution space while maintaining convergence toward the Pareto front requires a carefully designed search mechanism. Therefore, we propose an enhanced MOEA named the Improved Pareto Local Search-based Evolutionary Algorithm (IPLSEA), which incorporates several problem-specific features, including tailored initial solution generation, customized solution representation, and specialized genetic operators. In addition, the algorithm integrates an Improved Pareto Local Search (IPLS) component into the framework to enhance local exploitation while maintaining global diversity.
The main contributions of this paper are as follows:
(i)
We propose a novel multi-objective optimization problem named MO-SPCIP. Different from most previous studies that focus on the attacker’s perspective, the proposed problem addresses the practical needs of network defense. By shifting the analytical focus to the defender’s perspective, the proposed problem simultaneously aims to minimize the post-attack shortest path length, reduce the consumption of defense resources, and maximize the attacker’s resource expenditure. Further, we present the mathematical model of MO-SPCIP.
(ii)
We develop an enhanced MOEA named the IPLSEA. Problem-specific components, including a tailored initial solution generation method, a customized solution representation, and specialized genetic operators, as well as an IPLS, are reasonably incorporated into the multi-objective evolutionary algorithm framework. In particular, different from the traditional Pareto Local Search (PLS) that exhaustively explores all individuals on the Pareto front, we propose an adaptive mechanism and three neighborhood search operations to make the Pareto Local Search more selective and effective.
(iii)
We conduct comprehensive experiments to evaluate the performance of the IPLSEA. The results demonstrate that the IPLSEA outperforms state-of-the-art algorithms in terms of its convergence quality, solution diversity, and approximation to the true Pareto front. Furthermore, the algorithm enables more effective backup planning strategies and significantly enhances network resilience in the face of attacks.
The rest of this paper is organized as follows: Section 2 reviews related work, Section 3 presents the model of MO-SPCIP, Section 4 details the IPLSEA, Section 5 reports the computational results, and Section 6 concludes the paper.

2. Related Works

The network interdiction problem focuses on disrupting critical network components to degrade the system performance or functionality. This research area has garnered considerable attention due to its relevance in diverse domains such as military operations [16], infectious disease containment [17], border security [18], hazardous materials transportation [19], and critical infrastructure protection in supply chains [20], power grids [4], and aviation systems [21]. Existing research primarily focuses on fundamental objectives such as shortest-path interdiction [22], maximum flow reduction [23], and connectivity degradation [24], resulting in a wide range of optimization models and algorithmic solutions.
Particularly, in the SPIP, an attacker aims to increase the shortest path length between designated source and target nodes by strategically removing or degrading links or nodes. Recent research has significantly advanced both the modeling and solution techniques for this problem. Key modeling extensions incorporate uncertainty [25], incomplete information [26], and temporal dynamics [27]. For instance, Holzmann et al. [25] developed a random attack strategy where defenders only possess probabilistic knowledge of potential attacks. Yang et al. [26] proposed a randomized feedback-based greedy strategy for sequential shortest-path interdiction under conditions of limited feedback and incomplete cost information. Bochkarev et al. [27] integrated temporal dynamics into their interdiction model. Ho et al. [28] applied a Monte Carlo Tree Search (MCTS) to optimize the balance between exploration and exploitation in strategy evaluation. Huang et al. [29] introduced a reinforcement learning framework incorporating pointer networks to manage variable-sized outputs. Ma et al. [30] developed an innovative algorithm that reformulates the SPIP as a generalized iterative set cover problem and employed an adaptive mechanism to enhance both the computational speed and solution accuracy.
While attackers dominate the focus of much of the literature, defenders of networks are rarely concerned. In the limited studies that consider the defender’s perspective, the defenders usually have access to resources and technical capabilities that enable the implementation of protective measures such as protecting key parts [7], backup components [8,9,10], and repair components [11] to mitigate the impact of attacks. For instance, Xu [7] et al. identified critical nodes to strengthen the protection of key areas, and the study demonstrates that safeguarding these nodes significantly enhances the model robustness. Banner and Orda [10] proposed the use of dedicated backup networks to protect against single-link failures, allowing for quick recovery without excessive resource allocation. Johnston et al. [8] extended this approach to handle multiple random failures. These efforts underscore the need to examine defense strategies from the defender’s perspective, especially those that incorporate pre-deployed link backups for rapid path restoration after an attack, as is the approach that this paper adopts. He and Oki [9] proposed a novel resource allocation model which provides probabilistic protection against multiple physical device failures while minimizing the required backup capacity. Moshiri et al. [11] combined hyperbolic geometry with link prediction techniques and developed a recovery strategy for complex networks to protect the network functionality and overall robustness.
Furthermore, in designing defense strategies, defenders often face competing objectives. For example, Royset [31] considered minimizing both the total interdiction cost and maximum flow in the maximum-flow network-interdiction problem, addressing this multi-objective optimization problem by decomposing it into a series of single-objective subproblems. Ramírez-Márquez et al. [32] introduced the network recovery time as a third objective and applied a probability-driven evolutionary algorithm to solve the problem. These conflicting objectives present significant challenges for the solution methods. In particular, when the number of objectives increases to three or more, the performance of traditional MOEAs often degrades due to difficulties in maintaining convergence and diversity. Many studies have been carried out to solve this issue [33,34,35,36,37]. For instance, Agrawal et al. [37] proposed a two-stage evolutionary algorithm that combines nearest neighbor and 2-opt heuristics with NSGA-II through a hybrid local search approach (HLS-EA), first generating Pareto frontier corner solutions via single-objective optimization and then using them as seeds in SHLS-EA to effectively solve multi-objective Euclidean TSP problems. Li et al. [36] proposed a Pareto front (PF) model-based local search method that first constructed a predicted PF model to identify sparse regions for targeted exploration, then integrated surrogate model optima to accelerate extreme point discovery, ultimately enhancing a surrogate-assisted multi-objective evolutionary algorithm’s convergence toward the true PF. Luo et al. [35] proposed an innovative hybrid multi-objective genetic algorithm that integrated a Pareto Local Search with greedy-based heuristic initialization and adaptive strategies to optimize truck–drone collaborative routing while balancing cost and customer satisfaction. Lv and Shen [34] developed an improved genetic algorithm with specialized local search and problem-specific operators to better optimize production and inventory scheduling for the maintenance of spare parts across three key objectives. Kolaee et al. [33] developed a novel genetic algorithm with a local search that optimized both the cost and attractiveness for medical tourism trips while considering patient preferences and time constraints.
In summary, most existing research has predominantly focused on the attacker’s perspective, with limited attention given to the defender’s viewpoint. Only a few recent studies have considered multiple optimization objectives despite their importance for addressing real-world defense scenarios. Moreover, current multi-objective optimization algorithms often struggle to balance the solution diversity and convergence, which hampers their effectiveness. To address these challenges, this paper introduces a novel multi-objective shortest-path counter-interdiction problem that simultaneously aims to minimize the post-attack shortest path length, reduce defense resource consumption, and maximize the attacker’s resource expenditure. To solve this problem, we develop a hybrid evolutionary algorithm that integrates problem-specific components with an improved Pareto Local Search. The hybrid strategy could help balance the diversity and convergence of solutions during the optimization process.

3. Problem Definition and Formulation

In this paper, we consider a backup-based defense strategy to mitigate the impacts of network interdictions. Particularly, the defender will preconfigure backup links that can be activated once an attack has occurred during the network deployment phase. After an attack, the primary network is integrated with the backup network, allowing the defender to recompute the shortest path between a source node and a target node. These backup links are treated as protected resources, meaning they are immune to attack. This also reflects real-world protection mechanisms, such as physical isolation and redundant path hardening, which are commonly used to ensure the resilience and reliability of critical communication infrastructure.
By leveraging backup links, the defender can substantially reduce the shortest path length after an attack. This concept is illustrated with a simple example below. Consider the network shown in Figure 1, where the defender attempts to transmit a message from node s to node t . Each link is labeled with its transmission delay, and the defender’s objective is to minimize the message delivery time. Parenthetical values indicate the increased delays for traversing links when the links are attacked. The attacker’s goal is to maximize the shortest message delivery time. Before any attack, the shortest transmission path of the network is s → 3 → t (shown as a green solid line), with a total delay of nine. Then, as shown in Figure 2, when the attacker is allowed to interdict up to three links, the optimal attack strategy (marked by red solid lines) intercepts links ( s , 1), ( s , 3), and ( s , t ). In this context, the defender’s shortest available path becomes s → 1 → t , resulting in a total delay of 14. Suppose the defender has preconfigured a protected backup link ( s , 2) with a transmission delay of four, as shown in Figure 3. Since this link cannot be attacked, the attacker’s best strategy shifts to targeting (2, t ). Consequently, the defender’s new shortest path becomes s → 2 → t , with a total delay of 7, demonstrating how backup links can halve the post-attack delay from 14 to 7.
However, the practical deployment of backup links involves critical trade-offs, including ensuring acceptable path lengths after an attack to maintain service continuity, managing the cost of deploying and maintaining backup resources, and maximizing the attacker’s resource expenditure to divert attacks from vital components. These considerations motivate the formulation of the Multi-Objective Shortest-Path Counter-Interdiction Problem (MO-SPCIP), which aims to minimize the post-attack shortest path length, minimize the defender’s backup resource usage, and maximize the attacker’s resource consumption, simultaneously. The notations used for the formulation are detailed in Table 1.
In addition, to facilitate the modeling, some assumptions are provided as follows:
(i)
All problem data are fully known to both the attacker and the defender.
(ii)
The attacker acts first, selecting which links to interdict. Afterward, the defender applies the backup strategy.
(iii)
The interaction is modeled as a zero-sum game between attacker and defender.
(iv)
The game is played in a single round with no repetitions or learning.
Assumption (i) means that the network information is fully known to the attacker and the defender. This assumption is valid in domains such as smart grids and critical infrastructure, where attackers and defenders can theoretically access complete network information through monitoring or topological analysis [38]. Assumption (ii) reflects scenarios where interdiction events occur before defensive rerouting is possible, such as the coordinated sabotage of transportation or communication links, or targeted cyberattacks that disrupt network edges before rerouting protocols activate. This ordering is consistent with Stackelberg-type leader–follower dynamics commonly used in interdiction planning models [39]. Assumption (iii) simplifies the strategy analysis and makes it easier to derive Nash or optimal response solutions. In certain sudden attacks, such as a node injection causing the entire CPS chain to fail, attacks and defenses often end in a single interaction without the need for multiple rounds of adjustments [40]. Assumption (iv) allows for a focus on immediate strategic trade-offs without the complexity of iterative learning. Although the above assumptions enhance the traceability of the problem model, we have to admit that these assumptions may inevitably reduce the fidelity to certain operational contexts. For instance, network interdiction and defense often occur over multiple stages, with both sides adapting to observed actions. Assumption (iv) may limit the model’s applicability in environments with ongoing attacks or evolving defensive strategies. More realistic assumptions could be considered in further extensions of the proposed model.
The model of MO-SPCIP is shown below:
M I N   f 1 = max x k   min y k , z k k A c k + x k d k y k
MIN   f 2 = k B q k z k
M A X   f 3 = k L r k x k
s . t .   k F S ( i ) y k k R S i y k = 1   f o r   i = s 0   i N s , t 1   f o r   i = t
y k z k , k A
k B q k z k M
k L r k x k R
x k 0 , 1 , k L
x k = 0 , k B
y k 0 , 1 , k A
z k = 1 ,   k L
z k 0 , 1 ,   k B
Objective (1) aims to minimize the shortest path between the designated source and target nodes after the network has been attacked. Objective (2) represents minimizing the backup resource consumption by the defender, while Objective (3) focuses on maximizing the resource consumption by the attacker. Constraint (4) denotes the complete path constraint. Constraint (5) enforces that the defender cannot traverse links that are not backed up. Constraint (6) imposes a limit on the total amount of backup resources that can be deployed. Constraint (7) represents the attacker’s interdiction resource consumption limitation, restricting the number of links that can be interdicted. Constraints (8) and (9) ensure that the attacker can only interdict links in L , because the backup links deployed by the defender cannot be interdicted. This corresponds to the protection mechanism for backups in reality. Constraint (10) defines the range of variables y k . By setting z k in the original network to one through Constraints (11), we correspond with Constraint (5) so that all links in the original network can be selected for the passage. Constraint (12) indicates that defenders can choose to backup all links except those in the initial network, which corresponds to the backup strategy in reality.

4. Solution Approach

To address the proposed MO-SPCIP, this paper proposes a Pareto Local Search-Enhanced Evolutionary Algorithm (IPLSEA) to enhance both the convergence precision and distributional diversity of solutions. The framework and important components of IPLSEA are detailed in the following.

4.1. Framework of IPLSEA

Algorithm 1 outlines the procedure of the IPLSEA. The inputs of the algorithm include the target network G , population size N , maximum iteration count T , crossover rate c _ r , and mutation rate m _ r . The output is an approximate Pareto optimal solution set P F * .
At the initialization stage, the algorithm will generate a set of the initial population based on the initial method detailed in Section 4.2 (line 1). Following the initialization, the evolutionary process iterates until reaching the maximum iteration count T (lines 3–19). In each iteration, the offspring population Q t is generated using problem-specific genetic operators detailed in Section 4.3 (line 4). Then, by combining the parent population P t and offspring population Q t with the candidate population R t , the algorithm selects a new population P t + 1 from the candidate population R t via nondominated sorting and crowding distance computation (lines 8–18). The nondominated sorting and crowding distance computation are commonly used techniques in multi-objective optimization algorithms such as NSGA-II, which could refer to [41], and the specific process of nondominated sorting can be seen in Section 4.3. When a set of solutions is added to the first Pareto front, an Improved Pareto Local Search (IPLS) is triggered with a probability p r o b to refine P F * , further enhancing the local convergence (line 12). The IPLS is an extension of the conventional Pareto Local Search (PLS) proposed in this study, which will be detailed in Section 4.5. The probability p r o b increases linearly by 1 / T per generation. This adaptive mechanism creates a dynamic exploration–exploitation balance where early phases emphasize a global search through a lower trigger probability while later phases prioritize local refinement with a higher trigger probability of an IPLS.
Algorithm 1: Framework of IPLSEA
Input: Network G , population size N , generations T , crossover rate c _ r , mutation rate m _ r .
Output: Pareto front solutions P F * .
1: Initialize :   P 1 Initialize Population G , N ,   P F * Nondominated sorting P 1 0 ,
                    p r o b   0
2: t   1
3: while   t   T  do
4:   Q t   Genetic operation ( P t )
5:   R t Q t P t
6:  Nondominated sorting R t
7:   P t + 1 ,   i ← 1
8:  while  P t + 1 + F i     N  do
9:    if i = 1 then
10:         P F * ← Update P F * , F 1
11:      if r a n d   <   p r o b  then
12:         P F * ← IPLS P F *
13:       F 1 P F *
14:    Crowding distance F i
15:     P t + 1 P t + 1 F i
16:     i i + 1
17:  Sort F i , N
18:   P t + 1 P t + 1 F i 1 : N P t + 1
19:   t t + 1 , p r o b     p r o b + 1/ T

4.2. Initial Solution Generation

The strategy for generating initial solutions plays a critical role in obtaining high-quality outcomes. To balance the population diversity with algorithmic efficiency, we design a problem-specific initial solution generation method. In this approach, half of the initial population is generated randomly, while the other half is constructed based on key path information.
Particularly, for the random generation process, a subset of candidate backup links is randomly selected and designated as backup links. This promotes diversity in the initial population. We define a parameter ρ ϵ [ 0,1 ] to control the proportion of candidate backup links to be selected as backup links. For the path-based generation, we define candidate backup links that are connected to either the source node or the target node as key links. These links are likely to have a higher impact on path recovery. During the construction of each individual in this part of the population, a random number of key links is selected. This process continues until half of the initial population is generated using this strategy. Figure 4 illustrates the concept of key links, in which solid black lines represent the original network, dashed lines represent candidate backup links, and red dashed lines indicate key links used during the initial solution generation process. Furthermore, during initial solution generation, the total resource consumption of the selected backup links must not exceed the available resource constraint, ensuring that each solution is feasible with respect to the resource limits.
To facilitate computation, the solution is represented using a binary encoding scheme, where the length of the binary vector corresponds to the number of candidate backup links. Each bit in the vector indicates whether a backup link is selected (marked by 1) or not selected (marked by 0). In the example shown in Figure 5, the solution includes 10 candidate backup links, with selected links marked by 1 and non-selected links by 0.

4.3. Nondominated Sorting

Algorithm 2 introduces the procedure of nondominated sorting. The input of the algorithm is a set of individuals P where each individual has m objectives. The output is a set of Pareto fronts F sorted by their nondomination level. First, two data structures are initialized for each individual in the population. One is the dominance set S i , which keeps track of all solutions dominated by individual p i . The other is the d o m C o u n t i , which records how many individuals dominate p i . Both structures start as empty or zero (lines 1–3). Then, the algorithm compares every pair of individuals to determine dominance based on the multi-objective rule. Specifically, if an individual p i is not worse than individual p j in all objectives and strictly better in at least one, p i is said to dominate p j . In this case, p j is added to S i and d o m C o u n t i is increased by one. If p j dominates p i instead, the dominance set and domination count are updated accordingly (lines 4–10). After pairwise comparisons, the algorithm identifies the first Pareto front by selecting solutions with zero d o m C o u n t (lines 11–14). Next, the algorithm builds subsequent fronts iteratively. For each individual in the current front, the d o m C o u n t of every solution in its dominance set is decreased by one. Whenever an individual’s d o m C o u n t reaches zero, it is assigned to the next Pareto front. This process repeats until every individual is assigned to a front (lines 15–24).
Algorithm 2: Nondominated sorting
Input: Population P = p 1 , p 2 , p n   w i t h   m   o b j e c t i v e s .
Output: Set of Pareto fronts F = F 1 , F 2 , sorted by nondomination level.
1: for each p i in P  do
2:   S i
3:     d o m C o u n t i   0
4: for each pair p i , p j with i j do
5:  if  p i p j  then
6:       S i S i p j
7:     d o m C o u n t j     d o m C o u n t j + 1
8:  else if  p j p i  then
9:     S j S j p i
10:     d o m C o u n t i     d o m C o u n t i + 1
11:   F 1
12: for each p i in P do
13:  if  d o m C o u n t i = 0 then
14:     a d d p i   t o   F 1
15:   t   ← 1
16: while  F t    do
17:     Q
18:  for each p i F t do
19:    for each p j S i do
20:         d o m C o u n t j     d o m C o u n t j 1
21:       if   d o m C o u n t j = 0 then
22:         a d d p j   t o   Q
23:     t   t + 1
24:     F t Q
25: return  F

4.4. Genetic Operations

Through crossover and mutation operators, the algorithm could perform genetic recombination and local perturbation on individuals in the current population. Based on the solution structure introduced above, this section describes tailored crossover and mutation operations for the proposed algorithm.
(i)
Crossover
The algorithm will randomly select two parent individuals from the current population and perform the crossover operation based on these two parents. A preset crossover probability ( c _ r ) is used to decide whether to perform the crossover operation. If the execution condition is satisfied, a uniform crossover is performed on the parent individuals. Otherwise, the two parent individuals will be directly copied as offspring individuals. An example of the crossover operation is in Figure 6. For each bit of the individual’s genes (i.e., the selection state of each link), the values of the corresponding bits are exchanged between Parent 1 and Parent 2 with a probability of 0.5 to construct two child individuals.
(ii)
Mutation
To further increase the diversity of the population, we propose three kinds of mutation operations, including add_backup, remove_backup, and random_flip. The algorithm will randomly select one of the mutation operations each time during offspring generation. The illustrations of the three mutation operations are shown in Figure 7.
  • add_backup
This operation randomly selects a link that is not currently backed up and attempts to add a backup to the current solution, while ensuring that the total resource constraint is not violated. Specifically, the operation traverses the set of non-backed-up links and filters out those candidate links that would still satisfy the resource constraints if included. A link from the filtered set is then randomly selected and added as a backup. This mutation operation could enhance the solution diversity and introduce local perturbations without violating the feasibility.
b.
remove_backup
This operation randomly selects a currently backed-up link and reverses its status, removing the backup designation. It is a deterministic and computationally efficient operation. By recovering potentially over-allocated resources, it helps maintain solution feasibility and creates more space for subsequent optimization. This operator is particularly useful for escaping local optima by freeing up resources for more promising backup configurations.
c.
random_flip
This operation creates a neighborhood solution by randomly selecting a link index in the solution structure and flipping its binary state (e.g., changing a 0 to 1 or a 1 to 0). Unlike the other two operations, this one does not check resource constraints, which allows it to introduce greater diversity into the population. It is especially effective during the early stages of the algorithm, when global exploration is critical for covering a diverse regions of the search space.

4.5. Improved Pareto Local Search

To maintain a balance between convergence and diversity, we propose an Improved Pareto Local Search (IPLS). Unlike traditional a Pareto Local Search [42], which exhaustively explores all individuals on the Pareto front, IPLS introduces a more selective and efficient mechanism. It is adaptively triggered during the optimization process based on a generation-dependent probability and operates exclusively on previously unexplored solutions within the current non-dominated set. Furthermore, we design three problem-specific neighborhood search operations, i.e., heuristic_add, greedy_remove, and swap_backup, to guide the local search effectively, as shown in Figure 8. For each newly examined solution, the algorithm sequentially applies these three operations to generate neighborhood solutions. The IPLS could ensure the systematic exploration of the solution space without redundant computational overhead. The three designed neighborhood search operations are introduced as follows.
  • heuristic_add
    The heuristic_add operation leverages network topology information to guide the selection of backup links. It will add a key link that satisfies resource constraints to the current solution each time. To determine a reasonable key link, we define a scoring metric, as shown in Equation (13), where D e g r e e ( n o d e 1 ) and D e g r e e ( n o d e 2 ) are node degrees of the two nodes and r e d g e is the resource cost of a feasible and non-backed-up key link. The degree of a node indicates the number of other nodes it is connected to (i.e., its connectivity). The key link with a higher degree will be preferred. The rationale behind this metric is that high-degree nodes often serve as critical network hubs intersecting multiple shortest paths, making their connecting links highly valuable for structural resilience. By accounting for both structural significance and resource efficiency, this operation aims to maximize the structural benefit per unit of resource, thereby improving the efficiency of the backup configuration.
      s c o r e = D e g r e e ( n o d e 1 ) + D e g r e e ( n o d e 2 ) 1 + r e d g e
  • greedy_remove
    The operation employs a greedy strategy to remove an existing backup link that contributes least to the network performance from a solution. Particularly, this operation will evaluate the impact of removing each existing backup link, where the impact is measured by the resulting increase in the shortest path length. Then, the link with minimal negative impact will be removed. This operation allows for the recovery of redundant resources while preserving the overall quality of the solution, creating space for further optimization.
  • swap_backup
    The swap_backup operation performs a state exchange by randomly selecting one backed-up link and one non-backed-up link, and swapping their backup statuses. This operation does not perform feasibility verification, but it ensures that total resource consumption remains constant. By exploring different resource configurations under a fixed resource budget, this operator enables the search to uncover better-performing solutions while preserving the underlying structure of the solution space, thereby introducing diversity without violating feasibility constraints.
    The framework of the IPLS is displayed in Algorithm 3. The inputs of the algorithm include Pareto front solutions P F * , maximum iterations p l s I t e r , and three specific neighborhood search operators n e i g h O p s . The output is an improved Pareto front P F * . Initially, the algorithm will identify the solutions new to P F * . Following the initialization, the search process iterates until reaching the maximum iteration count or no new solutions (lines 3–19). In each iteration, the algorithm performs the search operator in n e i g h O p s one by one on each new solution in P F n e w * (lines 4–6). If the obtained new solution is not dominated by any solutions in P F * , it will be considered to be a potential and added to n e x t N e w and P F * for the next iteration. Meanwhile, the solutions in P F *     dominated by the new solution will be eliminated.
Algorithm 3: IPLS
Input: Pareto front solutions P F * , maximum iterations p l s I t e r ,
        neighborhood operators   n e i g h O p s
Output: Improved Pareto front P F * .
1: Initialize: i t e r ← 1, P F n e w * ← Find solutions new to P F *
2: while  P F n e w *     and i t e r   <   p l s I t e r  do
3:     n e x t N e w
4:  for each s in P F n e w *  do
5:    for each o p     n e i g h O p s  do
6:         s   o p s
7:         i s D o m   F a l s e
8:       for each e     P F *  do
9:        if dominates ( e , s ) then
10:           i s D o m   T r u e
11:         break
12:       if  ¬ i s D o m then
13:         for each e     P F *  do
14:            if dominates ( s , e ) then
15:                 P F *   P F * \ e
16:           P F *   P F *     s
17:           n e x t N e w   n e x t N e w     s
18:     P F n e w *   n e x t N e w
19:     i t e r i t e r + 1
20: return  P F *

5. Computational Experiments

In this section, we design various typical undirected network topologies as experimental scenarios to verify the effectiveness and superiority of the proposed IPLSEA in solving MO-SPCIP through comparison experiments, ablation experiments, and parameter sensitivity analysis experiments.

5.1. Experimental Design

(i)
Instances
This study employs four characteristic undirected network topologies as experimental scenarios, as shown in Table 2.
  • Erdős–Rényi Random Network (ER)
The Erdős–Rényi (ER) network [43] is generated by connecting each pair of nodes with a uniform probability, resulting in a random graph where the degree distribution approximately follows a Poisson distribution. In this study, two ER network instances are constructed. The first instance, ER1, consists of 8 nodes with a connection probability of 0.5. The second instance, ER2, contains 20 nodes, also with a connection probability of 0.5. These random topologies provide a baseline for testing the algorithm performance in uniformly connected environments.
b.
Barabási–Albert Scale-Free Network (BA)
The Barabási–Albert (BA) network [44] is built using a preferential attachment mechanism, where new nodes are more likely to connect to existing nodes with higher degrees. This results in a scale-free topology characterized by a power-law degree distribution. Two test instances are created for this study. In BA1, the network begins with a 3-node star, and 5 nodes are added sequentially, each forming 3 connections ( m = 3). In BA2, the network starts with a 5-node star (node 0 as the hub), and 12 nodes are added with 2 to 4 connections per node ( m ≈ 3 on average). These networks model real-world systems where hubs naturally emerge.
c.
Watts–Strogatz Small-World Network (WS)
The Watts–Strogatz (WS) network [45] is constructed from a regular ring lattice, where each node is connected to its k _ w s nearest neighbors, and a fraction of the links is randomly rewired with probability p _ w s . This results in a small-world topology that combines high clustering with short average path lengths. Two instances are used. WS1 is a 7-node torus where each node connects to 4 neighbors ( k _ w s = 4) with a rewiring probability of 0.3. WS2 is a 20-node torus with k _ w s = 8 and p _ w s = 0.3. These instances are used to evaluate the algorithm performance in networks with both local and global connectivity features.
d.
Real-World Network
The real-world networks used in this study are derived from the standard Sioux Falls transportation network dataset and a highway subnetwork extracted from the entire Eastern Massachusetts network dataset (EMS) [46]. These networks preserve the original node–link structure and realistic link weights. They serve as practical benchmarks to evaluate the algorithm’s effectiveness under real-world topological and operational constraints, offering valuable insights into its applicability beyond synthetic network models.
The initial and backup link weights of all networks are uniformly set to random integers between 1 and 12. In terms of the resource allocation, the interdicting resources and backup resources are configured in proportion according to the link weight at a ratio of 5:12 units. The incremental length after a link is interdicted is set to a random value between 1 and 5. For each instance, the total amount of backup resources is set to 30.
(ii)
Performance Metrics
Two principal metrics are employed to evaluate the algorithm performance from complementary perspectives: the inverted generational distance (IGD) [47] for convergence assessment and hypervolume (HV) [48] for diversity measurement.
  • IGD
The IGD quantifies the average minimum Euclidean distance between points on the true Pareto front ( P ) and solutions in the obtained set ( Q ):
  I G D P , Q = 1 P v p d v , Q ,
where d v , Q calculates the Euclidean distance between points. Smaller IGD values indicate better convergence. For small networks (ER1, BA1, and WS1), the true Pareto front is obtained via a brute-force search. For larger networks, we construct an approximate front by combining all algorithm results and performing non-dominated sorting.
b.
HV
The HV measures the volume of the objective space dominated by the solution set with respect to a reference point z * :
  H V = δ i = 1 S v i
where δ denotes the Lebesgue measure, S is the non-dominated solution set, and each v i represents a solution vector. Larger HV values indicate better diversity and convergence. The reference point z * is determined by identifying the maximum value in each objective dimension across all normalized solutions and adding a 0.1 offset to ensure strict domination. This offset guarantees all solutions lie within the measurable hypervolume.
(iii)
Comparison Algorithms and Parameter Settings
The comparison algorithms used in this study include three classical multi-objective evolutionary algorithms, i.e., NSGA-II [41], NSGA-III [49], and SPEA2 [50], and two state-of-the-art algorithms, i.e., the Hybrid Multi-Objective Modified-NSGA-II Variable Neighborhood Search (MO-NSGA-VNS) [14] and Dual-Population-based Constrained MOEAs (DPCPRA) [51].
Based on preliminary experiments presented in Section 5.4, the parameters for each algorithm are set as shown in Table 3 for a fair comparison, where ρ is the proportion of candidate backup links selected during initial solution generation, p l s I t e r is the maximum number of iterations in the improved Pareto Local Search, c _ r is the crossover rate in genetic operations, and m _ r is the mutation rate in genetic operations. In addition, for all algorithms, the number of populations was 200, and the number of generations was 50. All computations were conducted on a 64-bit Windows operating system with Intel(R) Core (TM) i7-10700K, 3.8 GHz, and 64 GB RAM.

5.2. Comparison Experiments

Each algorithm was run independently 30 times in 8 experimental scenarios and the results obtained are shown in Table 4 and Table 5, respectively.
According to the results, the IPLSEA demonstrates consistent and significant performance advantages across most tested networks. In three small-scale networks (ER1, BA1, and WS1), the IPLSEA and MO-NSGA-VNS successfully identify an entire true Pareto front, achieving an identical and best performance in both the IGD and HV. For larger and more complex networks, IPLSEA maintains a good performance compared to benchmark and state-of-the-art algorithms. In terms of the IGD, it achieves the lowest mean values in ER2, BA2, WS2, Sioux Falls, and EMS. For instance, in BA2, it records 0.0249, significantly outperforming NSGA-II (0.0898) and SPEA2 (0.0790), demonstrating its ability to generate solution sets that better approximate the true Pareto frontier. The HV results further confirm this advantage, with the IPLSEA achieving the highest hypervolume values in all but one tested network. In addition, the IPLSEA exhibits better robustness, with minimal standard deviations across different networks. For example, in BA2, the HV standard deviation is only 0.0012 and the IGD standard deviation is 0.0020, highlighting its stable performance across multiple independent runs. These comprehensive results establish IPLSEA’s dual advantage in both the solution quality and robustness, particularly for complex network optimization problems like MO-SPCIP.
For detailed analysis, BA2 serves as an illustrative example, containing 30 main links and 180 optional backup links, with attributes detailed in Table 6. The cost represents resources required to interdict the corresponding link and d represents the increased delay of passing through the corresponding link. With backup resource constraints set to 30 units and pivot nodes selected as 0 (source) and 19 (destination), the network’s size precludes the exhaustive determination of true Pareto frontiers. Instead, this study constructs an approximate frontier through the non-dominated sorting of all algorithm results, yielding 41 solutions, as shown in Figure 9. The shortest path length is 9, which corresponds to backup resource 8 and interdicting resource 0, where the attacker does not interdict and, at this time, the backup path of the defender is (0, 19) and the shortest path is also (0, 19). The longest path length is 38, which corresponds to both the backup resource and interdicting resource 0 and 39, representing no backup, as shown in Figure 10, where the red solid line indicates the attacker’s interdicting link and the green solid line indicates the defender’s shortest path. The minimum value of the backup resource is 0 and the maximum value is 30. When the defense chooses to backup (7, 19), (10, 19), (3, 16), and (0, 16), all 30 backup resources are used up, as shown in Figure 11, and then the attacker interdicts the links (3, 10), (0, 2), (2, 10), and (7, 16) with 36 resources and the defender chooses (0, 16), (16, 7), and (7, 19) with the length of 17. The minimum value of interdicting resources is 0 and the maximum is 40.
The comparative results for the BA2 network are presented in Figure 12 and Table 7 and Table 8, demonstrating IPLSEA’s superior performance across both evaluation metrics. Regarding the IGD values, the IPLSEA achieves an optimal performance with a mean of 0.0249, significantly outperforming control algorithms such as the MO-NSGA-VNS (0.0740) and DPCPRA (0.070). This substantial advantage reflects IPLSEA’s enhanced approximation capability to the true Pareto frontier.
In HV metrics, the IPLSEA maintains its leading position with a mean value of 0.7244, the highest among all compared algorithms, coupled with exceptional stability evidenced by its minimal standard deviation (0.0012). This combination of a high hypervolume and low variability confirms the algorithm’s robust solution quality and reliable performance. The MO-NSGA-VNS and DPCPRA show stable but inferior results. These comprehensive results underscore IPLSEA’s dual advantage in both solution quality and algorithmic stability for multi-objective network optimization challenges.
We also provide the computational complexity analysis of the IPLSEA and its comparison algorithms. IPLSEA’s complexity is mainly determined by nondominated sorting, with a single generation being approximately O ( M N 2 ) and the overall complexity being O ( T M N 2 ) , where N is the population size, M is the number of objectives, and T is the number of iterations. In comparison, the classical NSGA-II and NSGA-III also have the same dominant complexity. NSGA-III adds reference point processing, but the overall complexity remains O ( T M N 2 ) . SPEA2 calculates the distance matrix between individuals, with a complexity of O ( T M N 2 ) . DPCPRA adopts a two-population structure, with a complexity approximately twice that of non-dominated sorting, still belonging to the O ( T M N 2 ) level. MO-NSGA-VNS introduces a neighborhood search, with a complexity approximately equal to O ( T M N 2 + N L ) , where the local search overhead   L is typically smaller than the non-dominated sorting overhead. Overall, the IPLSEA has comparable complexity to these algorithms, and the addition of a local search helps improve the performance without significantly increasing the computational burden.

5.3. Ablation Experiments

The ablation experiments are designed to evaluate the effectiveness of key components within the IPLSEA by comparing the performance of three algorithmic variants. These include the RIA, which removes the initial solution construction module from the IPLSEA, RIPLS, which excludes the IPLS operator from the IPLSEA, and EA, which removes both components from the IPLSEA. Each variant is compared against the full IPLSEA, as well as two strong baseline methods: SPEA2 and MO-NSGA-VNS. All algorithms are evaluated on the Sioux Falls network through 15 independent runs, using IGD and HV metrics.
Figure 13’s results demonstrate RIA’s significant superiority over the RIPLSA and EA and RIPLSA’s superiority over EA, confirming that both the structured initialization and IPLS operator enhance the algorithmic performance, with the IPLS operator showing particularly pronounced benefits. However, both variants underperform relative to the full IPLSEA, as evidenced by their degraded IGD and HV values. RIA’s notably poorer results inversely validate the critical role of the proposed IPLS operator in maintaining solution quality. These findings collectively establish that the IPLSEA’s synergistic integration of structured initialization and a targeted local search delivers an optimal performance for network optimization challenges.

5.4. Parameter Sensitivity Analysis

In order to find a suitable combination of algorithm parameters and analyze the impacts of the algorithm parameters, 10 combinations of algorithm parameters were designed based on practical experience and 30 independent experimental runs on the BA2 network were conducted. The algorithm parameters involved were as follows: ρ (the proportion of candidate backup links selected during initial solution generation), p l s I t e r (the maximum number of iterations in the improved Pareto Local Search), c _ r (the crossover rate in genetic operations), and m _ r (the mutation rate in genetic operations). The results corresponding to different parameter combinations are shown in Table 9.
The results indicate that setting the value of ρ to 0.1 yields a better solution set. As p l s I t e r increases from 1 to 5, the IGD values show an overall downward trend, but the improvement rate decreases significantly when p l s I t e r r exceeds 3, indicating diminishing marginal returns from additional iterations. c _ r primarily affects the results at extreme values (e.g., 0.6 or 0.9), while the moderate value of 0.8 typically exhibits stable performance. m _ r shows little variation within the range of 0.1–0.5, and 0.3 has a relatively balanced performance in most combinations. Overall, the parameter combination ( ρ = 0.1, p l s I t e r = 3, c _ r = 0.8, m _ r = 0.3) performs nearly as well as the optimal combination ( ρ = 0.1, p l s I t e r = 5, c _ r = 0.8, m _ r = 0.3) on the IGD, with only a minimal difference between the two. However, the former has a significant advantage in computational cost, so this combination was selected as the default configuration for experiments.
To investigate the impact of backup resource allocation on the algorithm performance, we conducted 30 independent experimental runs on the Sioux Falls network instance for each of the following backup resource levels: 5, 15, 25, 30, 35, 40, and 45 units. We identified optimal compromise solutions through a normalized distance metric relative to the ideal point [37] to analyze the effects systematically. This approach involves normalizing each objective value against the ideal point and selecting the Pareto-optimal solution with the minimal Euclidean distance as the best compromise.
Figure 14 shows the average results. Adding more backup resources can shorten the path length, but uses more backup resources. Both the path length and resource use eventually level off. The attacker’s resource use stays about the same no matter how many backup resources are available.

6. Conclusions

This paper addresses a multi-objective shortest-path interdiction problem under proactive defense strategies, where defenders pre-emptively configure backup links to mitigate attacks. The formulation simultaneously optimizes three objectives, including minimizing the post-attack shortest path length, minimizing backup resource consumption, and maximizing attacker resource utilization. To solve this challenging problem, we developed a specialized multi-objective evolutionary algorithm named the IPLSEA. The proposed algorithm features a problem-specific solution structure, initial population generation, and genetic operations. Furthermore, an IPLS based on an adaptive mechanism and multiple problem-specific neighborhood search operations is incorporated into the algorithm framework to further improve the performance of the algorithm.
A comprehensive experimental evaluation demonstrates the IPLSEA’s superiority over state-of-the-art competitive algorithms, with a dominant performance in both the IGD and HV metrics. Ablation experiments confirm that both the initial solution generation method and IPLS significantly enhance the algorithm performance, with the IPLS contributing particularly substantial improvements. Sensitivity analysis experiments reveal that increased backup resources yield progressively shorter achievable path lengths until reaching a stabilization threshold, while attacker resource expenditure remains largely independent of backup availability.
Although the IPLSEA performs well in experiments, it still faces some challenges in practical applications. First, the network topology and link state data are often incomplete or noisy, which can affect the accuracy of defense strategies. Second, as the network scale and target numbers increase, the computational load of the algorithm also rises significantly, potentially failing to meet real-time response requirements, necessitating parallel computing or hardware acceleration to enhance the efficiency. Additionally, some real-world network environments change frequently, so the algorithm must have the ability to quickly adjust and adapt. Finally, there is often information asymmetry between attackers and defenders, which increases the difficulty of the strategy formulation. Future work could focus on optimizing the computational efficiency of the algorithm and designing defense mechanisms that can adapt to dynamic and asymmetric information environments to ensure that the algorithm can be better applied to real-world scenarios.

Author Contributions

Conceptualization, R.G., G.W. and C.M.; methodology, R.G. and Q.L.; validation, R.G.; formal analysis, R.G.; investigation, R.G.; resources, R.G.; data curation, R.G.; writing—original draft preparation, R.G.; writing—review and editing, G.W., Q.L. and C.M.; supervision, C.M.; project administration, Q.L.; funding acquisition, Q.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was jointly funded by the China Postdoctoral Science Foundation (Grant No. GZC20242042 and Grant No. 2024M763698) and the Natural Science Foundation of Hunan Province (Grant No. 2025JJ10007).

Data Availability Statement

Data are contained within this article.

Conflicts of Interest

The author declares no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
SPIPShortest-Path Network Interdiction Problem
MO-SPCIPMulti-Objective Shortest-Path Counter-Interdiction Problem
MOEAsMulti-Objective Evolutionary Algorithms
IPLSImproved Pareto Local Search
IPLSEAImproved Pareto Local Search-based Evolutionary Algorithm
EMSEastern Massachusetts network dataset
MO-NSGA-VNSHybrid Multi-Objective Modified-NSGA-II Variable Neighborhood Search
DPCPRADual-Population-based Constrained MOEAs

References

  1. Smith, J.C.; Song, Y. A survey of network interdiction models and algorithms. Eur. J. Oper. Res. 2020, 283, 797–811. [Google Scholar] [CrossRef]
  2. Israeli, E.; Wood, R.K. Shortest-path network interdiction. Netw. Int. J. 2002, 40, 97–111. [Google Scholar] [CrossRef]
  3. López-Lezama, J.M.; Galeano, J.C.C.; Trujillo, E.R. Assessment of the electric grid interdiction problem considering different network models. J. Appl. Sci. Eng. 2020, 20, 175–183. [Google Scholar]
  4. Sundar, K.; Mastin, A.; Garcia, M.; Bent, R.; Watson, J.-P. Exact and Heuristic Approaches for the Stochastic Nk Interdiction in Power Grids. In Proceedings of the 2024 18th International Conference on Probabilistic Methods Applied to Power Systems (PMAPS), Auckland, New Zealand, 24–26 June 2024; pp. 1–6. [Google Scholar]
  5. Brown, G.G.; Carlyle, W.M.; Harney, R.C.; Skroch, E.M.; Wood, R.K. Interdicting a nuclear-weapons project. Oper. Res. 2009, 57, 866–877. [Google Scholar] [CrossRef]
  6. Michalopoulos, D.P.; Morton, D.P.; Barnes, J.W. Prioritizing network interdiction of nuclear smuggling. In Stochastic Programming: Applications in Finance, Energy, Planning and Logistics; World Scientific: Singapore, 2013; pp. 313–346. [Google Scholar]
  7. Xu, S.; Xia, Y.; Ouyang, M. Effect of resource allocation to the recovery of scale-free networks during cascading failures. Phys. A Stat. Mech. Its Appl. 2020, 540, 123157. [Google Scholar] [CrossRef]
  8. Johnston, M.; Lee, H.-W.; Modiano, E. A robust optimization approach to backup network design with random failures. IEEE/ACM Trans. Netw. 2014, 23, 1216–1228. [Google Scholar] [CrossRef]
  9. He, F.; Oki, E. Backup allocation model with probabilistic protection for virtual networks against multiple facility node failures. IEEE Trans. Netw. Serv. Manag. 2021, 18, 2943–2959. [Google Scholar] [CrossRef]
  10. Banner, R.; Orda, A. Designing Low-Capacity Backup Networks for Fast Restoration; IEEE: Piscataway, NJ, USA, 2010. [Google Scholar]
  11. Moshiri, M.; Safaei, F.; Samei, Z. A novel recovery strategy based on link prediction and hyperbolic geometry of complex networks. J. Complex Netw. 2021, 9, cnab007. [Google Scholar] [CrossRef]
  12. Caramia, M.; Dell’Olmo, P.; Caramia, M.; Dell’Olmo, P. Multi-objective optimization. In Multi-Objective Management in Freight Logistics: Increasing Capacity, Service Level, Sustainability, and Safety with Optimization Algorithms; Springer: Cham, Switzerland, 2020; pp. 21–51. [Google Scholar]
  13. Cheshmehgaz, H.R.; Haron, H.; Sharifi, A. The review of multiple evolutionary searches and multi-objective evolutionary algorithms. Artif. Intell. Rev. 2015, 43, 311–343. [Google Scholar] [CrossRef]
  14. Granata, D.; Sgalambro, A. A hybrid modified-NSGA-II VNS algorithm for the multi-objective critical disruption Path Problem. Comput. Oper. Res. 2023, 160, 106363. [Google Scholar] [CrossRef]
  15. Gao, X.; He, F.; Zhang, S.; Luo, J.; Fan, B. A fast nondominated sorting-based MOEA with convergence and diversity adjusted adaptively. J. Supercomput. 2024, 80, 1426–1463. [Google Scholar] [CrossRef]
  16. Bailey, M.D.; Shechter, S.M.; Schaefer, A.J. SPAR: Stochastic programming with adversarial recourse. Oper. Res. Lett. 2006, 34, 307–315. [Google Scholar] [CrossRef]
  17. Habboush, Y.; Yarrarapu, S.N.S.; Guzman, N. Infection control. In StatPearls [Internet]; StatPearls Publishing: Treasure Island, FL, USA, 2018. [Google Scholar]
  18. Zhang, J.; Zhuang, J.; Behlendorf, B. Stochastic shortest path network interdiction with a case study of Arizona–Mexico border. Reliab. Eng. Syst. Saf. 2018, 179, 62–73. [Google Scholar] [CrossRef]
  19. Kheirkhah, A.; Navidi, H.; Messi Bidgoli, M. A bi-level network interdiction model for solving the hazmat routing problem. Int. J. Prod. Res. 2016, 54, 459–471. [Google Scholar] [CrossRef]
  20. Wein, L.M.; Liu, Y. Analyzing a bioterror attack on the food supply: The case of botulinum toxin in milk. Proc. Natl. Acad. Sci. USA 2005, 102, 9984–9989. [Google Scholar] [CrossRef]
  21. Ghaffarinasab, N.; Atayi, R. An implicit enumeration algorithm for the hub interdiction median problem with fortification. Eur. J. Oper. Res. 2018, 267, 23–39. [Google Scholar] [CrossRef]
  22. Borrero, J.S.; Sauré, D.; Trigo, N. Optimal sequential stochastic shortest path interdiction. Eur. J. Oper. Res. 2025, 326, 641–655. [Google Scholar] [CrossRef]
  23. Bentoumi, I.; Furini, F.; Mahjoub, A.R.; Martin, S. Integer linear programming formulations for the maximum flow blocker problem. Eur. J. Oper. Res. 2025, 324, 742–758. [Google Scholar] [CrossRef]
  24. Scaparra, M.P.; Church, R.L. A bilevel mixed-integer program for critical infrastructure protection planning. Comput. Oper. Res. 2008, 35, 1905–1923. [Google Scholar] [CrossRef]
  25. Holzmann, T.; Smith, J.C. The shortest path interdiction problem with randomized interdiction strategies: Complexity and algorithms. Oper. Res. 2021, 69, 82–99. [Google Scholar] [CrossRef]
  26. Yang, J.; Borrero, J.S.; Prokopyev, O.A.; Sauré, D. Sequential shortest path interdiction with incomplete information and limited feedback. Decis. Anal. 2021, 18, 218–244. [Google Scholar] [CrossRef]
  27. Bochkarev, A.A.; Smith, J.C. Monte Carlo tree search for dynamic shortest-path interdiction. Networks 2024, 84, 398–419. [Google Scholar] [CrossRef]
  28. Ho, Y.; Carbajal, A.; Escamilla, L.; Pinar, A. Neuromorphic Monte Carlo Tree Search Methods for Shortest Path Interdiction. In Proceedings of the 2024 International Conference on Neuromorphic Systems (ICONS), Arlington, VA, USA, 30 July–2 August 2024; pp. 307–311. [Google Scholar]
  29. Huang, D.; Mao, Z.; Fang, K.; Chen, L. Solving the shortest path interdiction problem via reinforcement learning. Int. J. Prod. Res. 2023, 61, 31–48. [Google Scholar] [CrossRef]
  30. Ma, C.; Zuo, T.; Zhang, H.-F. Network shortest path interdiction problem based on generalized set coverage. IEEE Trans. Netw. Sci. Eng. 2023, 11, 2191–2203. [Google Scholar] [CrossRef]
  31. Royset, J.O.; Wood, R.K. Solving the bi-objective maximum-flow network-interdiction problem. Inf. J. Comput. 2007, 19, 175–184. [Google Scholar] [CrossRef]
  32. Ramirez-Marquez, J.E. Bi and tri-objective optimization in the deterministic network interdiction problem. Reliab. Eng. Syst. Saf. 2010, 95, 887–896. [Google Scholar] [CrossRef]
  33. Kolaee, M.H.; Al-e-Hashem, S.M.J.M.; Jabbarzadeh, A. A local search-based non-dominated sorting genetic algorithm for solving a multi-objective medical tourism trip design problem considering the attractiveness of trips. Eng. Appl. Artif. Intell. 2023, 124, 106630. [Google Scholar] [CrossRef]
  34. Lv, L.; Shen, W. An improved NSGA-II with local search for multi-objective integrated production and inventory scheduling problem. J. Manuf. Syst. 2023, 68, 99–116. [Google Scholar] [CrossRef]
  35. Luo, Q.; Wu, G.; Ji, B.; Wang, L.; Suganthan, P.N. Hybrid multi-objective optimization approach with Pareto local search for collaborative truck-drone routing problems considering flexible time windows. IEEE Trans. Intell. Transp. Syst. 2021, 23, 13011–13025. [Google Scholar] [CrossRef]
  36. Li, F.; Gao, L.; Shen, W. Surrogate-assisted multi-objective evolutionary optimization with Pareto front model-based local search method. IEEE Trans. Cybern. 2022, 54, 173–186. [Google Scholar] [CrossRef]
  37. Agrawal, A.; Ghune, N.; Prakash, S.; Ramteke, M. Evolutionary algorithm hybridized with local search and intelligent seeding for solving multi-objective Euclidian TSP. Expert Syst. Appl. 2021, 181, 115192. [Google Scholar] [CrossRef]
  38. Shan, X.G.; Zhuang, J. A game-theoretic approach to modeling attacks and defenses of smart grids at three levels. Reliab. Eng. Syst. Saf. 2020, 195, 106683. [Google Scholar] [CrossRef]
  39. Chen, L.; Wang, Z.; Li, F.; Guo, Y.; Geng, K. A stackelberg security game for adversarial outbreak detection in the internet of things. Sensors 2020, 20, 804. [Google Scholar] [CrossRef] [PubMed]
  40. Liao, Z.; Shi, J.; Zhang, Y.; Wang, S.; Sun, Z. A survey of resilient coordination for cyber-physical systems against malicious attacks. arXiv 2024, arXiv:2402.10505. [Google Scholar] [CrossRef]
  41. Doerr, B.; Ivan, T.; Krejca, M.S. Speeding up the NSGA-II with a simple tie-breaking rule. In Proceedings of the AAAI Conference on Artificial Intelligence, Philadelphia, PA, USA, 25 February–4 March 2025; pp. 26964–26972. [Google Scholar]
  42. Lust, T.; Teghem, J. Two-phase Pareto local search for the biobjective traveling salesman problem. J. Heuristics 2010, 16, 475–510. [Google Scholar] [CrossRef]
  43. Mohandas, K.; Suchecki, K.; Hołyst, J.A. Paradise-disorder transition in structural balance dynamics on Erdös-Rényi graphs. Phys. Rev. E 2025, 111, 024310. [Google Scholar] [CrossRef]
  44. Xie, F.; Zhao, Z.; Yang, P. Higher Order Preference on the Evolution of Cooperation on Barabási–Albert Scale-Free Network. In Proceedings of the International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, Guiyang, China, 24–26 July 2021; pp. 137–149. [Google Scholar]
  45. Alimohammadi, Y.; Işık, S.; Saberi, A. Local Limits of Small World Networks. arXiv 2025, arXiv:2501.11226. [Google Scholar]
  46. Transportation Networks for Research. Available online: https://github.com/bstabler/TransportationNetworks (accessed on 12 August 2024).
  47. Deb, K.; Pratap, A.; Agarwal, S.; Meyarivan, T. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 2002, 6, 182–197. [Google Scholar] [CrossRef]
  48. Lopes, G.; Klamroth, K.; Paquete, L. A greedy Hypervolume Polychotomic Scheme for multiobjective combinatorial optimization. Comput. Oper. Res. 2025, 183, 107140. [Google Scholar] [CrossRef]
  49. Deb, K.; Jain, H. An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part I: Solving problems with box constraints. IEEE Trans. Evol. Comput. 2013, 18, 577–601. [Google Scholar] [CrossRef]
  50. Zitzler, E.; Laumanns, M.; Thiele, L. SPEA2: Improving the strength Pareto evolutionary algorithm. TIK Rep. 2001, 103. [Google Scholar] [CrossRef]
  51. Qiao, K.; Chen, Z.; Qu, B.; Yu, K.; Yue, C.; Chen, K.; Liang, J. A dual-population evolutionary algorithm based on dynamic constraint processing and resources allocation for constrained multi-objective optimization problems. Expert Syst. Appl. 2024, 238, 121707. [Google Scholar] [CrossRef]
Figure 1. Example network.
Figure 1. Example network.
Mathematics 13 02683 g001
Figure 2. Network after being interdicted by an attacker.
Figure 2. Network after being interdicted by an attacker.
Mathematics 13 02683 g002
Figure 3. Interdicted network with pre-deployed backup resources.
Figure 3. Interdicted network with pre-deployed backup resources.
Mathematics 13 02683 g003
Figure 4. Diagram of key links.
Figure 4. Diagram of key links.
Mathematics 13 02683 g004
Figure 5. Representation of the solution structure.
Figure 5. Representation of the solution structure.
Mathematics 13 02683 g005
Figure 6. Schematic diagram of the crossover operator.
Figure 6. Schematic diagram of the crossover operator.
Mathematics 13 02683 g006
Figure 7. Schematic diagram of the mutation operations: (a) add_backup, (b) remove_backup, and (c) random_flip.
Figure 7. Schematic diagram of the mutation operations: (a) add_backup, (b) remove_backup, and (c) random_flip.
Mathematics 13 02683 g007
Figure 8. Schematic diagram of neighborhood search operations: (a) heuristic_add, (b) greedy_remove, and (c) swap_backup.
Figure 8. Schematic diagram of neighborhood search operations: (a) heuristic_add, (b) greedy_remove, and (c) swap_backup.
Mathematics 13 02683 g008
Figure 9. Approximate Pareto front of BA2.
Figure 9. Approximate Pareto front of BA2.
Mathematics 13 02683 g009
Figure 10. Decision result when there is no backup.
Figure 10. Decision result when there is no backup.
Mathematics 13 02683 g010
Figure 11. Decision result when backup resources are fully consumed.
Figure 11. Decision result when backup resources are fully consumed.
Mathematics 13 02683 g011
Figure 12. IGD and HV metrics results of all algorithms for the BA2 network.
Figure 12. IGD and HV metrics results of all algorithms for the BA2 network.
Mathematics 13 02683 g012
Figure 13. Comparison results chart of the ablation experiment.
Figure 13. Comparison results chart of the ablation experiment.
Mathematics 13 02683 g013
Figure 14. Change in optimal compromise solution with the change of total backup resources.
Figure 14. Change in optimal compromise solution with the change of total backup resources.
Mathematics 13 02683 g014
Table 1. Notation description.
Table 1. Notation description.
NotationDescription
G Initial network without backup and attack
N Set of nodes in G
L Set of links in G
A Set of all links constituted by the nodes in N
B Set of backup links, B A
r k Cost required to interdict link k , k L
c k Delay of passing through link k , k A
d k Increased delay of passing through link k after it is interdicted, k L
q k Resources required to backup link k , k B
F S i Forward set of node i , i N
R S ( i ) Backward set of node i , i N
R Total affordable cost of interdiction
M Total available amount of backup resources
s Source node of the shortest path
t Target node of the shortest path
x k   x k = 1 if link k is interdicted by the attacker, 0 otherwise ,   k L
y k   y k = 1 if link k is chosen by the defender, 0 otherwise ,   k A
z k   z k = 1 if link k is backed up, 0 otherwise ,   k B
Table 2. Structural information of the networks.
Table 2. Structural information of the networks.
NetworkNumber of NodesNumber of Original LinksNumber of Backupable Links
ER181216
ER22015238
BA181216
BA22030160
WS18217
WS22080110
Sioux Falls2338215
Eastern Massachusetts741292572
Table 3. Parameter settings.
Table 3. Parameter settings.
Algorithm ρ p l s I t e r c _ r m _ r
NSGA-II//0.80.3
NSGA-III//0.80.3
SPEA2//0.80.3
DPCPRA//0.80.3
MO-NSGA-VNS//0.80.3
IPLSEA0.130.80.3
Table 4. IGD results of six algorithms (lower is better).
Table 4. IGD results of six algorithms (lower is better).
NetworkNSGA-IINSGA-IIISPEA2DPCPRAMO-NSGA-VNSIPLSEA
MeanStdMeanStdMeanStdMeanStdMeanStdMeanStd
ER10.0178 0.0145 0.0059 0.0061 0.0013 0.0049 0.0012 0.0039 0.00000.0000 0.00000.0000
ER20.0811 0.0482 0.0711 0.0700 0.1236 0.0558 0.0760 0.0646 0.0575 0.0546 0.03500.0414
BA20.08980.02740.13410.02570.0810.02430.0790.02320.0740.01630.02490.002
WS10.0172 0.0243 0.0256 0.0582 0.0384 0.0677 0.0222 0.0581 0.00000.0000 0.00000.0000
WS20.1542 0.0152 0.1212 0.0226 0.1097 0.0416 0.1021 0.0384 0.0874 0.0187 0.07250.0075
Sioux Falls0.1200 0.0133 0.1401 0.0037 0.1209 0.0540 0.0853 0.0527 0.0507 0.0104 0.03370.0160
EMS0.19780.03620.20550.00690.14920.01900.16070.03310.13780.00420.13210.0187
Bolded values indicate the bestresults in each case.
Table 5. HV results of six algorithms (higher is better).
Table 5. HV results of six algorithms (higher is better).
NetworkNSGA-IINSGA-IIISPEA2DPCPRAMO-NSGA-VNSIPLSEA
MeanStdMeanStdMeanStdMeanStdMeanStdMeanStd
ER10.7385 0.0052 0.7411 0.0030 0.7445 0.0019 0.7447 0.0014 0.74500.0000 0.74500.0000
ER20.3136 0.0137 0.3047 0.0152 0.2936 0.0290 0.3042 0.0240 0.3070 0.0204 0.31520.0131
BA10.0756 0.0267 0.0746 0.0262 0.0795 0.0247 0.0814 0.0233 0.09310.0000 0.09310.0000
BA20.6820 0.0155 0.6738 0.0174 0.6928 0.0140 0.6934 0.0120 0.7000 0.0054 0.72440.0012
WS10.2553 0.0047 0.2516 0.0189 0.2480 0.0224 0.2522 0.0190 0.25870.0000 0.25870.0000
WS20.6803 0.0331 0.7230 0.0227 0.6911 0.0270 0.7135 0.0358 0.7484 0.0096 0.75690.0046
Sioux Falls0.7643 0.0099 0.7270 0.0046 0.7669 0.0643 0.8054 0.0610 0.8429 0.0197 0.87050.0112
EMS0.24230.05200.23580.01420.26690.03270.27060.00340.31540.02060.29670.0261
Bolded values indicate the best results in each case.
Table 6. Attributes of BA2.
Table 6. Attributes of BA2.
No.Node to NodeLengthCostdNo.Node to NodeLengthCostd
10, 11151164, 141594
20, 2881175, 158101
30, 31191186, 161074
40, 41354197, 164114
50, 5662208, 16751
61, 6873219, 171054
71, 74842210, 1711103
81, 89832311, 171352
92, 8131032412, 1913103
102, 97612513, 181374
112, 106642614, 18484
123, 1051142715, 18994
133, 1112942816, 191591
143, 127542917, 1911104
154, 138933018, 1914101
Table 7. IGD results of BA2 (lower is better).
Table 7. IGD results of BA2 (lower is better).
AlgorithmMeanStdMinMax
NSGA-II0.0898 0.0274 0.0527 0.1451
NSGA-III0.1341 0.0257 0.0933 0.1896
SPEA20.0810 0.02320.0441 0.1181
DPCPRA0.0790 0.02430.0441 0.1451
MO-NSGA-VNS0.0740 0.0163 0.0573 0.1068
IPLSEA0.0249 0.0020 0.0230 0.0276
Table 8. HV results of BA2 (higher is better).
Table 8. HV results of BA2 (higher is better).
AlgorithmMeanStdMinMax
NSGA-II0.6820 0.0155 0.6438 0.7056
NSGA-III0.6738 0.0174 0.6355 0.6960
SPEA20.6928 0.01200.67440.7114
DPCPRA0.6934 0.01400.64380.7114
MO-NSGA-VNS0.7000 0.0054 0.6908 0.7053
IPLSEA0.7244 0.0012 0.7228 0.7262
Table 9. IGD results of BA2 with different combinations of algorithm parameters.
Table 9. IGD results of BA2 with different combinations of algorithm parameters.
ρ p l s I t e r c _ r m _ r Average IGD Value
0.110.80.30.0566
0.130.60.30.0570
0.130.80.10.0359
0.130.80.30.0255
0.130.80.50.0341
0.130.90.30.0277
0.150.80.30.0236
0.230.80.30.0368
0.330.80.30.0398
0.0530.80.30.0297
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mao, C.; Gao, R.; Luo, Q.; Wu, G. An Improved Pareto Local Search-Based Evolutionary Algorithm for Multi-Objective Shortest-Path Network Counter-Interdiction Problem. Mathematics 2025, 13, 2683. https://doi.org/10.3390/math13162683

AMA Style

Mao C, Gao R, Luo Q, Wu G. An Improved Pareto Local Search-Based Evolutionary Algorithm for Multi-Objective Shortest-Path Network Counter-Interdiction Problem. Mathematics. 2025; 13(16):2683. https://doi.org/10.3390/math13162683

Chicago/Turabian Style

Mao, Chenghui, Ronghuan Gao, Qizhang Luo, and Guohua Wu. 2025. "An Improved Pareto Local Search-Based Evolutionary Algorithm for Multi-Objective Shortest-Path Network Counter-Interdiction Problem" Mathematics 13, no. 16: 2683. https://doi.org/10.3390/math13162683

APA Style

Mao, C., Gao, R., Luo, Q., & Wu, G. (2025). An Improved Pareto Local Search-Based Evolutionary Algorithm for Multi-Objective Shortest-Path Network Counter-Interdiction Problem. Mathematics, 13(16), 2683. https://doi.org/10.3390/math13162683

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop