Social network analysis of the vulnerabilities of interdependent critical infrastructures

نویسندگان

  • Wenjun Chris Zhang
  • X. Liu
  • Choon-Lee Chai
  • Ralph Deters
  • Dong Liu
  • Dmytro Dyachuk
  • Y. L. Tu
  • Zaheer Baber
چکیده

Interdependency among critical infrastructures contributes to vulnerabilities of those infrastructures. In this paper, the vulnerabilities of critical infrastructures are identified and analysed using social network analysis. In the analysis of network centrality, the importance of each critical infrastructure, in terms of its contribution to infrastructure interdependency, is ranked. The findings show that electricity and telecommunication are the two most important critical infrastructures that contribute to infrastructure interdependency, which further render the infrastructure network vulnerable to cascading damage. An example system is given to illustrate the ideas and results presented in this paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a Complex Networks Modeling of Interdependent Critical Infrastructures

Power Systems Reliability and Security highlight the need to identify and understand vulnerabilities that emerge from the interaction of two interdependent Critical Infrastructures: Information and Communication Technologies (ICT) and Power Systems. Modeling the physical, logical, cyber and geographical relations can give some information about the interactions between both infrastructures to e...

متن کامل

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

Policy Based Management for Critical Infrastructure Protection

Our current societies are fully dependent on large complex critical infrastructures (LCCIs). These LCCIs are large scale distributed systems that are highly interdependent, both physically and in their greater reliance on the information infrastructure, which logically introduce vulnerabilities. Failures, accidents, physical or cyber attacks can provoke major damages which can proliferate by ca...

متن کامل

An Ant Colony Optimization Algorithm for Network Vulnerability Analysis

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

متن کامل

Recent Progress on the Resilience of Complex Networks

Many complex systems in the real world can be modeled as complex networks, which has captured in recent years enormous attention from researchers of diverse fields ranging from natural sciences to engineering. The extinction of species in ecosystems and the blackouts of power girds in engineering exhibit the vulnerability of complex networks, investigated by empirical data and analyzed by theor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJCIS

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2008