Skip to main content

Risk and Vulnerability Analysis of Critical Infrastructure

  • Conference paper
  • First Online:
Intelligent Computing Methodologies (ICIC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9773))

Included in the following conference series:

  • 3084 Accesses

Abstract

A nation’s Critical Infrastructures (CI) is vital to the trustworthy functioning of the economic, health care, and social sectors of the nation. Any disruption to CI will adversely affect the economy, and peaceful functioning of the government. Above all, it will adversely affect the morale and confidence of the citizens. Hence, protecting CI of a nation must be given top priority. Fundamental to protection mechanisms are risk and vulnerability analysis. Based on their outcomes protection mechanisms can be planned, designed, and implemented. In this paper we offer a concise template representation for critical assets, and explain a methodology for vulnerability assessment and risk analysis. We point out the potential role of agents, and deep learning methods in the development and commissioning of future cyber defense solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alcaraz, C., Lopez, J.: Wide-area situational awareness for critical infrastructure protection. IEEE Comput. 46, 30–37 (2013)

    Article  Google Scholar 

  2. Arboleda, C.A., Abraham, D.M., Richard, J.P., Lublitz, R.: Vulnerability assessment of healthcare facilities during disaster events. J. Infrastruct. Syst. 15(3), 149–161 (2009)

    Article  Google Scholar 

  3. Baker III., G.H.: A vulnerability assessment methodology for critical infrastructure facilities. In: DHS Symposium, R&D Partnerships in Homeland Security, USA, pp. 1–15 (2005)

    Google Scholar 

  4. Bea, R., Mitroff, I., Farber, D., Foster, H., Roberts, K.H.: A new approach to risk: the implications of E3. Risk Manage. 11, 30–43 (2009)

    Article  Google Scholar 

  5. Bengio, Y.: Learning deep architectures for AI. Found. Trends Mach. Learn. 2(1), 1–27 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  6. Canadian Government Report. Critical Infrastructure. http://www.publicsafety.gc.ca/cnt/ntnl-scrt/crtcl-nfrstrctr/index-en.aspx

  7. Eusgeld, J., Kroger, W., Sansavini, G., Schläpfer, M., Zio, E.: The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures. Reliab. Eng. Syst. Saf. 94(5), 954–963 (2009)

    Article  Google Scholar 

  8. Filippini, R.: Mastering complexity and risks in modern infrastructures: a paradigm shift. GRF Davos Planet@Risk 3(2), October 2015

    Google Scholar 

  9. Giannopoulos, G., Filippini, R., Schimmer, M.: Risk assessment methodologies for Critical Infrastructure Protection. Part I: A state of the art. In: European Commission Joint Research Centre, Institute for the Protection and Security of the Citizen (2012)

    Google Scholar 

  10. The Hacker News. http://thehackernews.com/search/label/car

  11. Hellstrom, T.: Critical infrastructure and systemic vulnerability: towards a planning framework. Saf. Sci. 45(3), 415–430 (2007)

    Article  Google Scholar 

  12. Homeland Security. What is Critical Infrastructure? http://www.dhs.gov/what-criticalinfrastructure

  13. Ibanez, E., Gkritza, K., McCalley, J., Aliprantis, D., Brown, R., Somani, A., Wang, L.: Interdependencies between energy and transportation systems for national long term planning. In: Gopalakrishnan, K., Peeta, S. (eds.) Sustainable & Resilient Critical Infrastructure Symposium. Springer-Verlag, Heidelberg (2010)

    Google Scholar 

  14. Jamshidi, M. (ed.): Systems of Systems Engineering. Innovations for the 21st Century. John Wiley and Sons, New York (2008)

    Google Scholar 

  15. Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Interdependencies between critical infrastructures: analyzing the risk of cascading effects. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 104–115. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  16. Lazari, A.: European Critical Infrastructure. Springer Publications. ISBN 978-3-319-07496-2 ISBN 978-3-319-07497-9 (eBook) (2014)

    Google Scholar 

  17. Patrascu, A.: Cyber protection of critical infrastructures using supervised learning. In: 20th International Conference on Control Systems and Computer Science, Bucharest, May 2015, pp. 461–468 (2015)

    Google Scholar 

  18. Pederson, P., Dudenhoeffer, D., Hartley, S., Permann, M.: Critical Infrastructure Interdependeny Modeling. A Survey of U.S. and International Research, INL, INL/EXT-06-11464 (2006)

    Google Scholar 

  19. Peters, J.C., Kumar, A., Zheng, H., Agarwal, S., Peeta, S.: Integrated Framework to Capture the Interdependencies between Transportation and Energey Sectors due to Policy Decisions. USDOT Region V Regional University Transportation Center Final Project, NEXTRANS Project No. 079PY04, Purdue University, West Lafayette, IN, USA (2014)

    Google Scholar 

  20. The President’s National Security Telecommunications Advisory Committee. Information Assurance Task Force for Power Risk Assessment (1997). http://www.securitymanagement.com/library/iatf.html

  21. Quyang, M., Hong, L., Maoa, Z., Yua, M., Qi, F.: A methodological approach to analyze vulnerability of interdependent infrastructures. Simul. Model. Pract. Theory 17(5), 817–828 (2009)

    Article  Google Scholar 

  22. Rice, M., Shenoim, S. (eds.): Critical Infrastructure Protection IX, IFIPAICT 466 (2015)

    Google Scholar 

  23. Rosato, V., Issacharoff, L., Tiriticco, F., Meloni, S., De Porcellinis, S., Setola, R.: Modelling interdependent infrastructures using interacting dynamical models. Int. J. Critical Infrastruct. 4(1–2), 63–79 (2008)

    Article  Google Scholar 

  24. SANS Institute: Can Hackers turn Lights Off? The Vulnerability of the US Power Grid to Electronic Attack. Technical Report, SANS Institute (The Information Security Reading Room) (2001)

    Google Scholar 

  25. Stapelberg, R.F.: Infrastructure Systems Interdependencies and Risk Information Decision Making (RIDM). Syst. Cybern. Inform. 6(5), 21–27 (2008)

    Google Scholar 

  26. Stergiopoulos, G., Kotzanikolaou, P., Theocharidou, M., Lykou, G., Gritzalis, D.: Time-based critical infrastructure dependency analysis for large-scale and cross-sectorial failures. Int. J. Critical Infrastructures Protection 12, 46–60 (2016)

    Article  Google Scholar 

Download references

Acknowledgement

We thank the reviewers for their insightful comments that helped us to improve the paper to the current form.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vangalur Alagar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Wan, K., Alagar, V. (2016). Risk and Vulnerability Analysis of Critical Infrastructure. In: Huang, DS., Han, K., Hussain, A. (eds) Intelligent Computing Methodologies. ICIC 2016. Lecture Notes in Computer Science(), vol 9773. Springer, Cham. https://doi.org/10.1007/978-3-319-42297-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42297-8_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42296-1

  • Online ISBN: 978-3-319-42297-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics