An Integrated Methodology For Critical Infrastructure Modeling And Simulation

  • William Tolone
  • Seok-Won Lee
  • Wei-Ning Xiang
  • Joshua Blackwell
  • Cody Yeager
  • Andrew Schumpert
  • Wray Johnson
Conference paper
Part of the The International Federation for Information Processing book series (IFIPAICT, volume 290)

Integral to effective critical infrastructure analysis is the assessment of infrastructure vulnerabilities, which provides insights into potential disruptions that can enhance protection plans and response and recovery operations. Effective critical infrastructures analysis, however, must account for the complex, multi-dimensional characteristics of infrastructures and the dependencies between infrastructures. This paper presents a new methodology for integrated modeling and simulation that supports such analysis. An integrated analysis environment that embodies this new methodology is presented as a proof of concept.


Modeling simulation geospatial analysis ontological analysis 


  1. 1.
    E. Casalicchio, E. Galli and S. Tucci, Federated agent-based modeling and simulation approach to study interdependencies in IT critical infrastructures, Proceedings of the Eleventh IEEE International Symposium on Distributed Simulation and Real-Time Applications, pp. 182–189, 2007.Google Scholar
  2. 2.
    A. Chaturvedi, A society of simulation approach to dynamic integration of simulations, Proceedings of the Winter Simulation Conference, pp. 2125– 2131, 2006.Google Scholar
  3. 3.
    D. Dudenhoeffer, M. Permann and M. Manic, CIMS: A framework for infrastructure interdependency modeling and analysis, Proceedings of the Winter Simulation Conference, pp. 478–485, 2006.Google Scholar
  4. 4.
    ESRI, ArcGIS Network Analyst, Redlands, California ( ware/arcgis/extensions/networkanalyst/index.html).
  5. 5.
    F. Flentge and U. Beyer, The ISE metamodel for critical infrastructures, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp 323–336, 2007.Google Scholar
  6. 6.
    O. Gursesli and A. Desrochers, Modeling infrastructure interdependencies using Petri nets, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 2, pp. 1506–1512, 2003.Google Scholar
  7. 7.
    C. Lo and A. Yeung, Concepts and Techniques of Geographic Information Systems, Prentice Hall, Upper Saddle River, New Jersey, 2007.Google Scholar
  8. 8.
    J. Locke, An Essay Concerning Human Understanding ( /books?id=cjYIAAAAQAAJ), 1690.
  9. 9.
    J. Marti, J. Hollman, C. Ventura and J. Jatskevich, Design for survival: Real-time infrastructures coordination, presented at the International Workshop on Complex Network and Infrastructure Protection, 2006.Google Scholar
  10. 10.
    P. Pederson, D. Dudenhoeffer, S. Hartley and M. Permann, Critical Infrastructure Interdependency Modeling: A Survey of U.S. and International Research, Report No. INL/EXT-06-11464, Critical Infrastructure Protection Division, Idaho National Laboratory, Idaho Falls, Idaho, 2006.Google Scholar
  11. 11.
    PowerWorld Corporation, PowerWorld Simulator, Champaign, Illinois (
  12. 12.
    S. Rinaldi, J. Peerenboom and T. Kelly, Identifying, understanding and analyzing critical infrastructure interdependencies, IEEE Control Systems, vol. 21(6), pp. 11–25,2001.Google Scholar
  13. 13.
    L. Suchman, Plans and Situated Actions: The Problem of Human-Machine Communication, Cambridge University Press, Cambridge, United Kingdom, 1987.Google Scholar
  14. 14.
    N. Svendsen and S. Wolthusen, Multigraph dependency models for heterogeneous critical infrastructures, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp 337–350, 2007.Google Scholar
  15. 15.
    The White House, National Strategy for Homeland Security, Washington, DC (, 2002.
  16. 16.
    W. Tolone, D. Wilson, A. Raja, W. Xiang, H. Hao, S. Phelps and W. Johnson, Critical infrastructure integration modeling and simulation, Proceedings of the Second Symposium on Intelligence and Security Informatics (LNCS 3073), Springer, Berlin-Heidelberg, Germany, pp. 214–225, 2004.CrossRefGoogle Scholar
  17. 17.
    A. Weeks, An Assessment of Validation Methods for Critical Infrastructure Protection Modeling and Simulation, M.A. Thesis, Department of Geography and Earth Sciences, University of North Carolina at Charlotte, Charlotte, North Carolina, 2006.Google Scholar
  18. 18.
    A. Weeks, A. Schumpert, S. Lee, W. Tolone and W. Xiang, A new approach to verification and validation in CIP modeling and simulation, presented at the Twenty-Sixth International ESRI User Conference, 2006.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • William Tolone
    • 1
  • Seok-Won Lee
    • 1
  • Wei-Ning Xiang
    • 1
  • Joshua Blackwell
    • 1
  • Cody Yeager
    • 1
  • Andrew Schumpert
    • 1
  • Wray Johnson
    • 1
  1. 1.CharlotteUSA

Personalised recommendations