Finding critical nodes in infrastructure networks

被引:29
作者
Faramondi, Luca [1 ,2 ]
Setola, Roberto [1 ,2 ]
Panzieri, Stefano [3 ]
Pascucci, Federica [3 ]
Oliva, Gabriele [1 ,2 ]
机构
[1] Univ Campus Biomed Roma, Dept Engn, Automat Control Unit, Via Alvaro del Portillo 21, I-00128 Rome, Italy
[2] Consorzio Nazl Interuniv Trasporti & Logis NITEL, Via Spalato 11, I-00198 Rome, Italy
[3] Univ Rome Tre, Dept Engn, Via Vasca Navale 79, I-00146 Rome, Italy
关键词
Critical Infrastructure Networks; Critical Nodes; Attacker Perspective; Attacker Profiling; DETECTING CRITICAL NODES; VULNERABILITY; ATTACK;
D O I
10.1016/j.ijcip.2017.11.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is well known that profiling attacker behavior is an effective way to obtain insights into network attacks and to identify the systems and components that must be protected. This paper presents a novel integer linear programming formulation that models the strategy of an attacker who targets a set of nodes with the goal of compromising or destroying them. The attacker model considers the infliction of the greatest possible damage with minimal attacker effort. Specifically, it is assumed that the attacker is guided by three conflicting objectives: (i) maximization of the number of disconnected components; (ii) minimization of the size of the largest connected component; and (iii) minimization of the attack cost. Compared with other research in the area, the proposed formulation is much more descriptive but has less complexity; thus, it is very useful for predicting attacks and identifying the entities that must be protected. Since exact solutions of the formulation are computationally expensive for large problems, a heuristic algorithm is presented to obtain approximate solutions. Simulation results using a U.S. airport network dataset demonstrate the effectiveness and utility of the proposed approach. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:3 / 15
页数:13
相关论文
共 26 条
[1]   Error and attack tolerance of complex networks [J].
Albert, R ;
Jeong, H ;
Barabási, AL .
NATURE, 2000, 406 (6794) :378-382
[2]  
Arulselvan A, 2011, SPRINGER SER OPTIM A, V46, P79, DOI 10.1007/978-1-4419-0534-5_4
[3]   Detecting critical nodes in sparse graphs [J].
Arulselvan, Ashwin ;
Commander, Clayton W. ;
Elefteriadou, Lily ;
Pardalos, Panos M. .
COMPUTERS & OPERATIONS RESEARCH, 2009, 36 (07) :2193-2200
[4]   Localized attacks on spatially embedded networks with dependencies [J].
Berezin, Yehiel ;
Bashan, Amir ;
Danziger, Michael M. ;
Li, Daqing ;
Havlin, Shlomo .
SCIENTIFIC REPORTS, 2015, 5
[5]   Defending critical infrastructure [J].
Brown, Gerald ;
Carlyle, Matthew ;
Salmeron, Javier ;
Wood, Kevin .
INTERFACES, 2006, 36 (06) :530-544
[6]  
Brown GG, 2005, Emerging theory, methods, and applications, P102
[7]   Locating critical lines in high-voltage electrical power grids [J].
Crucitti, P ;
Latora, V ;
Marchiori, M .
FLUCTUATION AND NOISE LETTERS, 2005, 5 (02) :L201-L208
[8]   Branch and cut algorithms for detecting critical nodes in undirected graphs [J].
Di Summa, Marco ;
Grosso, Andrea ;
Locatelli, Marco .
COMPUTATIONAL OPTIMIZATION AND APPLICATIONS, 2012, 53 (03) :649-680
[9]   On New Approaches of Assessing Network Vulnerability: Hardness and Approximation [J].
Dinh, Thang N. ;
Xuan, Ying ;
Thai, My T. ;
Pardalos, Panos M. ;
Znati, Taieb .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (02) :609-619
[10]  
Directive N, 2016, NETWORK INFORM SYSTE