Skip to main content

A Framework for Analyzing Vulnerability of Critical Infrastructures Under Localized Attacks

  • Conference paper
  • First Online:
  • 743 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 660))

Abstract

Critical infrastructures (CIs) are usually spatially embedded, which makes them more susceptible to localized attacks where a set of components located within a localized area are damaged. This paper presents a framework for analyzing vulnerability of CIs under localized attack. Both functional and geographic interdependencies among CIs are considered. Multi-layer networks are employed to establish the functional interdependency. A novel attack failure model, i.e., localized failure model, is proposed to model geographic interdependency and quantify the failure probabilities of components under localized attack. Vulnerability of CIs is investigated from three perspectives, including analyzing the system-level vulnerability, identifying the critical infrastructure components and geographical locations. Our framework can help stakeholders increase their knowledge of vulnerability of CIs under localized attack and protect them more efficiently.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kröger, W.: Critical infrastructures at risk: a need for a new conceptual approach and extended analytical tools. Reliab. Eng. Syst. Saf. 93, 1781–1787 (2008)

    Article  Google Scholar 

  2. Hewitt, K.: Regions of Risk: a Geographical Introduction to Disasters. Routledge, London (2014)

    Google Scholar 

  3. Eusgeld, I., Kröger, W., Sansavini, G., Schläpfera, M., Ziob, E.: The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures. Reliab. Eng. Syst. Saf. 94, 954–963 (2009)

    Article  Google Scholar 

  4. Hellström, T.: Critical infrastructure and systemic vulnerability: towards a planning framework. Safety. Sci. 45, 415–430 (2007)

    Article  Google Scholar 

  5. Faturechi, R., Miller-Hooks, E.: Measuring the performance of transportation infrastructure systems in disasters: a comprehensive review. J. Infrastruct. Syst. 21, 04014025 (2014)

    Article  Google Scholar 

  6. Barthélemy, M.: Spatial networks. Phys. Rep. 499, 1–101 (2011)

    Article  MathSciNet  Google Scholar 

  7. Bashan, A., Berezin, Y., Buldyrev, S.V., Havlin, S.: The extreme vulnerability of interdependent spatially embedded networks. Nat. Phys. 9, 667–672 (2013)

    Article  Google Scholar 

  8. Berezin, Y., Bashan, A., Danziger, M.M., Li, D.Q., Havlin, S.: Localized attacks on spatially embedded networks with dependencies. Sci. Rep. 5, 8934 (2015)

    Article  Google Scholar 

  9. Shao, S., Huang, X., Stanley, H.E., Havlin, S.: Percolation of localized attack on complex networks. New J. Phys. 17, 023049 (2015)

    Article  MathSciNet  Google Scholar 

  10. Yuan, X., Shao, S., Stanley, H.E., Havlin, S.: How breadth of degree distribution influences network robustness: comparing localized and random attacks. Phys. Rev. E 92, 032122 (2015)

    Article  Google Scholar 

  11. Dong, G.G., Du, R.J., Hao, H.F., Tian, L.X.: Modified localized attack on complex network. Europhys. Lett. 113, 28002 (2016)

    Article  Google Scholar 

  12. Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst. 21, 11–25 (2001)

    Article  Google Scholar 

  13. Eusgeld, I., Nan, C., Dietz, S.: “System-of-systems” approach for interdependent critical infrastructures. Reliab. Eng. Syst. Saf. 96, 679–686 (2011)

    Article  Google Scholar 

  14. Marrone, S., Nardone, R., Tedesco, A., et al.: Vulnerability modeling and analysis for critical infrastructure protection applications. Int. J. Crit. Infr. Prot. 6, 217–227 (2013)

    Article  Google Scholar 

  15. Wang, S.L., Hong, L., Chen, X.: Vulnerability analysis of interdependent infrastructure systems: a methodological framework. Physica A 391, 3323–3335 (2012)

    Article  Google Scholar 

  16. Liu, H., Davidson, R.A., Apanasovich, T.V.: Spatial generalized linear mixed models of electric power outages due to hurricanes and ice storms. Reliab. Eng. Syst. Saf. 93, 897–912 (2008)

    Article  Google Scholar 

  17. Wang, J.W., Rong, L.L.: Cascade-based attack vulnerability on the US power grid. Safety Sci. 47, 1332–1336 (2009)

    Article  Google Scholar 

  18. Simonsen, I., Buzna, L., Peters, K., Bornholdt, S., Helbing, D.: Transient dynamics increasing network vulnerability to cascading failures. Phys. Rev. Lett. 100, 218701 (2008)

    Article  Google Scholar 

  19. Ouyang, M.: Review on modeling and simulation of interdependent critical infrastructure systems. Reliab. Eng. Syst. Saf. 121, 43–60 (2014)

    Article  Google Scholar 

  20. Pederson, P., Dudenhoeffer, D., Hartley, S., Permann, M.: Critical Infrastructure Interdependency Modeling: a Survey of US and International Research. Idaho National Laboratory, pp. 1–20 (2006)

    Google Scholar 

  21. Buldyrev, S.V., Parshani, R., Paul, G., Stanley, H.E., Havlin, S.: Catastrophic cascade of failures in interdependent networks. Nature 464, 1025–1028 (2010)

    Article  Google Scholar 

  22. Shekhtman, L.M., Danziger, M.M., Havlin, S.: Recent advances on failure and recovery in networks of networks. Chaos, Solitons Fract. 90, 28–36 (2016)

    Article  Google Scholar 

  23. Li, W., Bashan, A., Buldyrev, S.V., Stanley, H.E., Havlin, S.: Cascading failures in interdependent lattice networks: the critical role of the length of dependency links. Phys. Rev. Lett. 108, 228702 (2012)

    Article  Google Scholar 

  24. Shekhtman, L.M., Berezin, Y., Danziger, M.M., Havlin, S.: Robustness of a network formed of spatially embedded networks. Phys. Rev. E 90, 012809 (2014)

    Article  Google Scholar 

  25. Ouyang, M.: Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks. Reliab. Eng. Syst. Saf. 154, 106–116 (2016)

    Article  Google Scholar 

  26. Ouyang, M., Hong, L., Mao, Z.J., Yu, M.H., Fei, Q.: A methodological approach to analyze vulnerability of interdependent infrastructures. Simul. Model. Pract. Theor. 17, 817–828 (2009)

    Article  Google Scholar 

  27. Hong, S., Zhang, X., Zhu, J., Zhao, T.D., Wang, B.Q.: Suppressing failure cascades in interconnected networks: considering capacity allocation pattern and load redistribution. Mod. Phys. Lett. B 30, 1650049 (2016)

    Article  Google Scholar 

  28. Wang, J.W., Rong, L.L., Zhang, L., Zhang, Z.Z.: Attack vulnerability of scale-free networks due to cascading failures. Physica A 387, 6671–6678 (2008)

    Article  Google Scholar 

  29. Haimes, Y.Y.: On the definition of vulnerabilities in measuring risks to infrastructures. Risk Anal. 26, 293–296 (2006)

    Article  Google Scholar 

  30. Johansson, J., Hassel, H.: An approach for modelling interdependent infrastructures in the context of vulnerability analysis. Reliab. Eng. Syst. Saf. 95, 1335–1344 (2010)

    Article  Google Scholar 

  31. Ouyang, M., Pan, Z.Z., Hong, L., Zhao, L.J.: Correlation analysis of different vulnerability metrics on power grids. Physica A 396, 204–211 (2014)

    Article  Google Scholar 

  32. Apostolakis, G.E., Lemon, D.M.: A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Anal. 25, 361–376 (2005)

    Article  Google Scholar 

Download references

Acknowledgments

This work is partially supported by the National Natural Science Foundation of China under Grant Nos.71371039 and 71501022.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to KeSheng Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Yan, K., Rong, L., Lu, T., Ni, Z. (2016). A Framework for Analyzing Vulnerability of Critical Infrastructures Under Localized Attacks. In: Chen, J., Nakamori, Y., Yue, W., Tang, X. (eds) Knowledge and Systems Sciences. KSS 2016. Communications in Computer and Information Science, vol 660. Springer, Singapore. https://doi.org/10.1007/978-981-10-2857-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2857-1_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2856-4

  • Online ISBN: 978-981-10-2857-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics