Abstract
Using a graph-theoretic approach, a generalizable operator model for critical infrastructure is discussed and formulated. This model is used to simulate diverse attacker-defender scenarios, and the computational and modelling challenges of such scenarios are discussed. A basic illustration of the model considers different attack strategies as a function of the attacker’s budget, and a more complex illustration uses data from the Anytown model. The applicability of the model to more complex analyses is discussed, and the reader is cautioned that network elements cannot be prioritized by criticality.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahuja, R.K., Magnanti, T.L., Orlin, J.B.: Network Flows: Theory, Algorithms and Applications. Prentice Hall, Englewood Cliffs (1993)
Alcaraz, C., Lopez, J.: Wide-area situational awareness for critical infrastructure protection. Computer 46(4), 30–37 (2013)
Alderson, D.L., Brown, G.G., Carlyle, W.M., Cox Jr, L.A.: Sometimes there is no “most-vital” arc: assessing and improving the operational resilience of systems. Mil. Oper. Res. 18(1), 21–37 (2013)
Alderson, D.L., Brown, G.G., Carlyle, W.M., Wood, R.K.: Solving defender-attacker-defender models for infrastructure defense. Technical Report, Naval Postgraduate School Monterey CA Department of Operations Research (2011)
Anderson, R., Fuloria, S.: Security economics and critical national infrastructure. In: Economics of Information Security and Privacy, pp. 55–66. Springer, Berlin (2010)
Brown, G., Carlyle, M., Salmerón, J., Wood, K.: Defending critical infrastructure. Interfaces 36(6), 530–544 (2006)
Collado, R.A., Papp, D.: Network Interdiction–Models, Applications, Unexplored Directions. Rutcor Res Rep, RRR4, Rutgers University, New Brunswick (2012)
Frederick, S., Hillier, L., Gerald, J.: Introduction to Operations Research. McGraw-Hill Education, New York (2014)
Golany, B., Kaplan, E.H., Marmur, A., Rothblum, U.G.: Nature plays with dice–terrorists do not: allocating resources to counter strategic versus probabilistic risks. Eur. J. Oper. Res. 192(1), 198–208 (2009)
Gordon, L.A., Loeb, M.P., Lucyshyn, W., Zhou, L.: Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model. J. Inf. Secur. 6(1), 24 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Bürgy, R. (2020). Networks of Critical Infrastructures: Cost Estimation and Defense of Attacks. In: Keupp, M. (eds) The Security of Critical Infrastructures. International Series in Operations Research & Management Science, vol 288. Springer, Cham. https://doi.org/10.1007/978-3-030-41826-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-41826-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-41825-0
Online ISBN: 978-3-030-41826-7
eBook Packages: Business and ManagementBusiness and Management (R0)