Social network analysis of the vulnerabilities of interdependent critical infrastructures
نویسندگان
چکیده
Interdependency among critical infrastructures contributes to vulnerabilities of those infrastructures. In this paper, the vulnerabilities of critical infrastructures are identified and analysed using social network analysis. In the analysis of network centrality, the importance of each critical infrastructure, in terms of its contribution to infrastructure interdependency, is ranked. The findings show that electricity and telecommunication are the two most important critical infrastructures that contribute to infrastructure interdependency, which further render the infrastructure network vulnerable to cascading damage. An example system is given to illustrate the ideas and results presented in this paper.
منابع مشابه
Towards a Complex Networks Modeling of Interdependent Critical Infrastructures
Power Systems Reliability and Security highlight the need to identify and understand vulnerabilities that emerge from the interaction of two interdependent Critical Infrastructures: Information and Communication Technologies (ICT) and Power Systems. Modeling the physical, logical, cyber and geographical relations can give some information about the interactions between both infrastructures to e...
متن کاملInterdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملPolicy Based Management for Critical Infrastructure Protection
Our current societies are fully dependent on large complex critical infrastructures (LCCIs). These LCCIs are large scale distributed systems that are highly interdependent, both physically and in their greater reliance on the information infrastructure, which logically introduce vulnerabilities. Failures, accidents, physical or cyber attacks can provoke major damages which can proliferate by ca...
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کاملRecent Progress on the Resilience of Complex Networks
Many complex systems in the real world can be modeled as complex networks, which has captured in recent years enormous attention from researchers of diverse fields ranging from natural sciences to engineering. The extinction of species in ecosystems and the blackouts of power girds in engineering exhibit the vulnerability of complex networks, investigated by empirical data and analyzed by theor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJCIS
دوره 4 شماره
صفحات -
تاریخ انتشار 2008