Abstract
A nation’s Critical Infrastructures (CI) is vital to the trustworthy functioning of the economic, health care, and social sectors of the nation. Any disruption to CI will adversely affect the economy, and peaceful functioning of the government. Above all, it will adversely affect the morale and confidence of the citizens. Hence, protecting CI of a nation must be given top priority. Fundamental to protection mechanisms are risk and vulnerability analysis. Based on their outcomes protection mechanisms can be planned, designed, and implemented. In this paper we offer a concise template representation for critical assets, and explain a methodology for vulnerability assessment and risk analysis. We point out the potential role of agents, and deep learning methods in the development and commissioning of future cyber defense solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alcaraz, C., Lopez, J.: Wide-area situational awareness for critical infrastructure protection. IEEE Comput. 46, 30–37 (2013)
Arboleda, C.A., Abraham, D.M., Richard, J.P., Lublitz, R.: Vulnerability assessment of healthcare facilities during disaster events. J. Infrastruct. Syst. 15(3), 149–161 (2009)
Baker III., G.H.: A vulnerability assessment methodology for critical infrastructure facilities. In: DHS Symposium, R&D Partnerships in Homeland Security, USA, pp. 1–15 (2005)
Bea, R., Mitroff, I., Farber, D., Foster, H., Roberts, K.H.: A new approach to risk: the implications of E3. Risk Manage. 11, 30–43 (2009)
Bengio, Y.: Learning deep architectures for AI. Found. Trends Mach. Learn. 2(1), 1–27 (2009)
Canadian Government Report. Critical Infrastructure. http://www.publicsafety.gc.ca/cnt/ntnl-scrt/crtcl-nfrstrctr/index-en.aspx
Eusgeld, J., Kroger, W., Sansavini, G., Schläpfer, M., Zio, E.: The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures. Reliab. Eng. Syst. Saf. 94(5), 954–963 (2009)
Filippini, R.: Mastering complexity and risks in modern infrastructures: a paradigm shift. GRF Davos Planet@Risk 3(2), October 2015
Giannopoulos, G., Filippini, R., Schimmer, M.: Risk assessment methodologies for Critical Infrastructure Protection. Part I: A state of the art. In: European Commission Joint Research Centre, Institute for the Protection and Security of the Citizen (2012)
The Hacker News. http://thehackernews.com/search/label/car
Hellstrom, T.: Critical infrastructure and systemic vulnerability: towards a planning framework. Saf. Sci. 45(3), 415–430 (2007)
Homeland Security. What is Critical Infrastructure? http://www.dhs.gov/what-criticalinfrastructure
Ibanez, E., Gkritza, K., McCalley, J., Aliprantis, D., Brown, R., Somani, A., Wang, L.: Interdependencies between energy and transportation systems for national long term planning. In: Gopalakrishnan, K., Peeta, S. (eds.) Sustainable & Resilient Critical Infrastructure Symposium. Springer-Verlag, Heidelberg (2010)
Jamshidi, M. (ed.): Systems of Systems Engineering. Innovations for the 21st Century. John Wiley and Sons, New York (2008)
Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Interdependencies between critical infrastructures: analyzing the risk of cascading effects. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 104–115. Springer, Heidelberg (2013)
Lazari, A.: European Critical Infrastructure. Springer Publications. ISBN 978-3-319-07496-2 ISBN 978-3-319-07497-9 (eBook) (2014)
Patrascu, A.: Cyber protection of critical infrastructures using supervised learning. In: 20th International Conference on Control Systems and Computer Science, Bucharest, May 2015, pp. 461–468 (2015)
Pederson, P., Dudenhoeffer, D., Hartley, S., Permann, M.: Critical Infrastructure Interdependeny Modeling. A Survey of U.S. and International Research, INL, INL/EXT-06-11464 (2006)
Peters, J.C., Kumar, A., Zheng, H., Agarwal, S., Peeta, S.: Integrated Framework to Capture the Interdependencies between Transportation and Energey Sectors due to Policy Decisions. USDOT Region V Regional University Transportation Center Final Project, NEXTRANS Project No. 079PY04, Purdue University, West Lafayette, IN, USA (2014)
The President’s National Security Telecommunications Advisory Committee. Information Assurance Task Force for Power Risk Assessment (1997). http://www.securitymanagement.com/library/iatf.html
Quyang, M., Hong, L., Maoa, Z., Yua, M., Qi, F.: A methodological approach to analyze vulnerability of interdependent infrastructures. Simul. Model. Pract. Theory 17(5), 817–828 (2009)
Rice, M., Shenoim, S. (eds.): Critical Infrastructure Protection IX, IFIPAICT 466 (2015)
Rosato, V., Issacharoff, L., Tiriticco, F., Meloni, S., De Porcellinis, S., Setola, R.: Modelling interdependent infrastructures using interacting dynamical models. Int. J. Critical Infrastruct. 4(1–2), 63–79 (2008)
SANS Institute: Can Hackers turn Lights Off? The Vulnerability of the US Power Grid to Electronic Attack. Technical Report, SANS Institute (The Information Security Reading Room) (2001)
Stapelberg, R.F.: Infrastructure Systems Interdependencies and Risk Information Decision Making (RIDM). Syst. Cybern. Inform. 6(5), 21–27 (2008)
Stergiopoulos, G., Kotzanikolaou, P., Theocharidou, M., Lykou, G., Gritzalis, D.: Time-based critical infrastructure dependency analysis for large-scale and cross-sectorial failures. Int. J. Critical Infrastructures Protection 12, 46–60 (2016)
Acknowledgement
We thank the reviewers for their insightful comments that helped us to improve the paper to the current form.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Wan, K., Alagar, V. (2016). Risk and Vulnerability Analysis of Critical Infrastructure. In: Huang, DS., Han, K., Hussain, A. (eds) Intelligent Computing Methodologies. ICIC 2016. Lecture Notes in Computer Science(), vol 9773. Springer, Cham. https://doi.org/10.1007/978-3-319-42297-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-42297-8_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42296-1
Online ISBN: 978-3-319-42297-8
eBook Packages: Computer ScienceComputer Science (R0)