A Framework for Analyzing Vulnerability of Critical Infrastructures Under Localized Attacks

  • KeSheng YanEmail author
  • LiLi Rong
  • Tao Lu
  • ZiJian Ni
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 660)


Critical infrastructures (CIs) are usually spatially embedded, which makes them more susceptible to localized attacks where a set of components located within a localized area are damaged. This paper presents a framework for analyzing vulnerability of CIs under localized attack. Both functional and geographic interdependencies among CIs are considered. Multi-layer networks are employed to establish the functional interdependency. A novel attack failure model, i.e., localized failure model, is proposed to model geographic interdependency and quantify the failure probabilities of components under localized attack. Vulnerability of CIs is investigated from three perspectives, including analyzing the system-level vulnerability, identifying the critical infrastructure components and geographical locations. Our framework can help stakeholders increase their knowledge of vulnerability of CIs under localized attack and protect them more efficiently.


Critical infrastructures Interdependencies Localized attack Localized failure model Cascading failures 



This work is partially supported by the National Natural Science Foundation of China under Grant Nos.71371039 and 71501022.


  1. 1.
    Kröger, W.: Critical infrastructures at risk: a need for a new conceptual approach and extended analytical tools. Reliab. Eng. Syst. Saf. 93, 1781–1787 (2008)CrossRefGoogle Scholar
  2. 2.
    Hewitt, K.: Regions of Risk: a Geographical Introduction to Disasters. Routledge, London (2014)Google Scholar
  3. 3.
    Eusgeld, I., Kröger, W., Sansavini, G., Schläpfera, M., Ziob, E.: The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures. Reliab. Eng. Syst. Saf. 94, 954–963 (2009)CrossRefGoogle Scholar
  4. 4.
    Hellström, T.: Critical infrastructure and systemic vulnerability: towards a planning framework. Safety. Sci. 45, 415–430 (2007)CrossRefGoogle Scholar
  5. 5.
    Faturechi, R., Miller-Hooks, E.: Measuring the performance of transportation infrastructure systems in disasters: a comprehensive review. J. Infrastruct. Syst. 21, 04014025 (2014)CrossRefGoogle Scholar
  6. 6.
    Barthélemy, M.: Spatial networks. Phys. Rep. 499, 1–101 (2011)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Bashan, A., Berezin, Y., Buldyrev, S.V., Havlin, S.: The extreme vulnerability of interdependent spatially embedded networks. Nat. Phys. 9, 667–672 (2013)CrossRefGoogle Scholar
  8. 8.
    Berezin, Y., Bashan, A., Danziger, M.M., Li, D.Q., Havlin, S.: Localized attacks on spatially embedded networks with dependencies. Sci. Rep. 5, 8934 (2015)CrossRefGoogle Scholar
  9. 9.
    Shao, S., Huang, X., Stanley, H.E., Havlin, S.: Percolation of localized attack on complex networks. New J. Phys. 17, 023049 (2015)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Yuan, X., Shao, S., Stanley, H.E., Havlin, S.: How breadth of degree distribution influences network robustness: comparing localized and random attacks. Phys. Rev. E 92, 032122 (2015)CrossRefGoogle Scholar
  11. 11.
    Dong, G.G., Du, R.J., Hao, H.F., Tian, L.X.: Modified localized attack on complex network. Europhys. Lett. 113, 28002 (2016)CrossRefGoogle Scholar
  12. 12.
    Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst. 21, 11–25 (2001)CrossRefGoogle Scholar
  13. 13.
    Eusgeld, I., Nan, C., Dietz, S.: “System-of-systems” approach for interdependent critical infrastructures. Reliab. Eng. Syst. Saf. 96, 679–686 (2011)CrossRefGoogle Scholar
  14. 14.
    Marrone, S., Nardone, R., Tedesco, A., et al.: Vulnerability modeling and analysis for critical infrastructure protection applications. Int. J. Crit. Infr. Prot. 6, 217–227 (2013)CrossRefGoogle Scholar
  15. 15.
    Wang, S.L., Hong, L., Chen, X.: Vulnerability analysis of interdependent infrastructure systems: a methodological framework. Physica A 391, 3323–3335 (2012)CrossRefGoogle Scholar
  16. 16.
    Liu, H., Davidson, R.A., Apanasovich, T.V.: Spatial generalized linear mixed models of electric power outages due to hurricanes and ice storms. Reliab. Eng. Syst. Saf. 93, 897–912 (2008)CrossRefGoogle Scholar
  17. 17.
    Wang, J.W., Rong, L.L.: Cascade-based attack vulnerability on the US power grid. Safety Sci. 47, 1332–1336 (2009)CrossRefGoogle Scholar
  18. 18.
    Simonsen, I., Buzna, L., Peters, K., Bornholdt, S., Helbing, D.: Transient dynamics increasing network vulnerability to cascading failures. Phys. Rev. Lett. 100, 218701 (2008)CrossRefGoogle Scholar
  19. 19.
    Ouyang, M.: Review on modeling and simulation of interdependent critical infrastructure systems. Reliab. Eng. Syst. Saf. 121, 43–60 (2014)CrossRefGoogle Scholar
  20. 20.
    Pederson, P., Dudenhoeffer, D., Hartley, S., Permann, M.: Critical Infrastructure Interdependency Modeling: a Survey of US and International Research. Idaho National Laboratory, pp. 1–20 (2006)Google Scholar
  21. 21.
    Buldyrev, S.V., Parshani, R., Paul, G., Stanley, H.E., Havlin, S.: Catastrophic cascade of failures in interdependent networks. Nature 464, 1025–1028 (2010)CrossRefGoogle Scholar
  22. 22.
    Shekhtman, L.M., Danziger, M.M., Havlin, S.: Recent advances on failure and recovery in networks of networks. Chaos, Solitons Fract. 90, 28–36 (2016)CrossRefGoogle Scholar
  23. 23.
    Li, W., Bashan, A., Buldyrev, S.V., Stanley, H.E., Havlin, S.: Cascading failures in interdependent lattice networks: the critical role of the length of dependency links. Phys. Rev. Lett. 108, 228702 (2012)CrossRefGoogle Scholar
  24. 24.
    Shekhtman, L.M., Berezin, Y., Danziger, M.M., Havlin, S.: Robustness of a network formed of spatially embedded networks. Phys. Rev. E 90, 012809 (2014)CrossRefGoogle Scholar
  25. 25.
    Ouyang, M.: Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks. Reliab. Eng. Syst. Saf. 154, 106–116 (2016)CrossRefGoogle Scholar
  26. 26.
    Ouyang, M., Hong, L., Mao, Z.J., Yu, M.H., Fei, Q.: A methodological approach to analyze vulnerability of interdependent infrastructures. Simul. Model. Pract. Theor. 17, 817–828 (2009)CrossRefGoogle Scholar
  27. 27.
    Hong, S., Zhang, X., Zhu, J., Zhao, T.D., Wang, B.Q.: Suppressing failure cascades in interconnected networks: considering capacity allocation pattern and load redistribution. Mod. Phys. Lett. B 30, 1650049 (2016)CrossRefGoogle Scholar
  28. 28.
    Wang, J.W., Rong, L.L., Zhang, L., Zhang, Z.Z.: Attack vulnerability of scale-free networks due to cascading failures. Physica A 387, 6671–6678 (2008)CrossRefGoogle Scholar
  29. 29.
    Haimes, Y.Y.: On the definition of vulnerabilities in measuring risks to infrastructures. Risk Anal. 26, 293–296 (2006)CrossRefGoogle Scholar
  30. 30.
    Johansson, J., Hassel, H.: An approach for modelling interdependent infrastructures in the context of vulnerability analysis. Reliab. Eng. Syst. Saf. 95, 1335–1344 (2010)CrossRefGoogle Scholar
  31. 31.
    Ouyang, M., Pan, Z.Z., Hong, L., Zhao, L.J.: Correlation analysis of different vulnerability metrics on power grids. Physica A 396, 204–211 (2014)CrossRefGoogle Scholar
  32. 32.
    Apostolakis, G.E., Lemon, D.M.: A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Anal. 25, 361–376 (2005)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2016

Authors and Affiliations

  1. 1.Institute of Systems EngineeringDalian University of TechnologyDalianPeople’s Republic of China

Personalised recommendations