On Hardening Problems in Critical Infrastructure Systems
نویسندگان
چکیده
The power and communication networks are highly interdependent and form a part of the critical infrastructure of a country. Similarly, dependencies exist within the networks itself. It is essential to have a model which captures these dependencies precisely. Previous research has proposed certain models but these models have certain limitations. The limitations of the aforementioned models have been overcome by the Implicative Interdependency Model, which uses Boolean Logic to denote the dependencies. This paper formulates the Entity Hardening problem and the Targeted Entity Hardening problem using the Implicative Interdependency Model. The Entity Hardening problem describes a situation where an operator, with a limited budget, must decide which entities to harden, which in turn would minimize the damage, provided a set of entities fail initially. The Targeted Entity Hardening problem is a restricted version of the Entity Hardening problem. This problem presents a scenario where, the protection of certain entities is of higher priority. If these entities were to be nonfunctional, the economic and societal damage would be higher when compared to other entities being nonfunctional. It has been shown that both problems are NP-Complete. An Integer Linear Program (ILP) has been devised to find the optimal solution. A heuristic has been described whose accuracy is found by comparing its performance with the optimal solution using real-world and simulated data.
منابع مشابه
Telemedicine: an Essential Requirement for the Health Care Providers, with Emphasis on Legal Aspects
Telemedicine is the use of telecommunication and information technologies in order to provide clinical health care at a distance. These technologies allow communications between patient and medical staff with convenience as well as the transmission of medical, imaging and health informatics data from one site to another. It is also used to save lives in critical care and emergency situations. A...
متن کاملIEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification
Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...
متن کاملDoes “Flattening the Curve” Affect Critical Care Services Delivery for COVID-19? A Global Health Perspective
During this coronavirus disease 2019 (COVID-19) global pandemic, nations are taking bold measures to mitigate the spread of Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) infections in order to avoid the overwhelming its critical care facilities. While these “flattening the curve” initiatives are showing signs of impeding the potential surge in COVID-19 cases, it is not known whet...
متن کاملRisk Analysis and Probabilistic Survivability Assessment (RAPSA): An Assessment Approach for Power Substation Hardening
1 Portions of this work were funded by grant #60NANB1D0116 from the National Institute of Standards and Technology, U.S. Dept. of Commerce. Abstract In this paper we present a new cyber security assessment approach, which merges Survivability System Analysis (SSA) with Probability Risk Assessment (PRA). The method adds quantitative information to the process oriented SSA method, which assists w...
متن کاملResilience of Transportation Infrastructure Systems : Quantification and Optimization
Title of Document: RESILIENCE OF TRANSPORTATION INFRASTRUCTURE SYSTEMS: QUANTIFICATION AND OPTIMIZATION Reza Faturechi, Doctor of Philosophy, 2013 Directed By: Professor, Elise Miller-Hooks, Department of Civil and Environmental Engineering Transportation systems are critical lifelines for society, but are at risk from natural or human-caused hazards. To prevent significant loss from disaster e...
متن کامل