Finding critical nodes in infrastructure networks

被引:29
作者
Faramondi, Luca [1 ,2 ]
Setola, Roberto [1 ,2 ]
Panzieri, Stefano [3 ]
Pascucci, Federica [3 ]
Oliva, Gabriele [1 ,2 ]
机构
[1] Univ Campus Biomed Roma, Dept Engn, Automat Control Unit, Via Alvaro del Portillo 21, I-00128 Rome, Italy
[2] Consorzio Nazl Interuniv Trasporti & Logis NITEL, Via Spalato 11, I-00198 Rome, Italy
[3] Univ Rome Tre, Dept Engn, Via Vasca Navale 79, I-00146 Rome, Italy
关键词
Critical Infrastructure Networks; Critical Nodes; Attacker Perspective; Attacker Profiling; DETECTING CRITICAL NODES; VULNERABILITY; ATTACK;
D O I
10.1016/j.ijcip.2017.11.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is well known that profiling attacker behavior is an effective way to obtain insights into network attacks and to identify the systems and components that must be protected. This paper presents a novel integer linear programming formulation that models the strategy of an attacker who targets a set of nodes with the goal of compromising or destroying them. The attacker model considers the infliction of the greatest possible damage with minimal attacker effort. Specifically, it is assumed that the attacker is guided by three conflicting objectives: (i) maximization of the number of disconnected components; (ii) minimization of the size of the largest connected component; and (iii) minimization of the attack cost. Compared with other research in the area, the proposed formulation is much more descriptive but has less complexity; thus, it is very useful for predicting attacks and identifying the entities that must be protected. Since exact solutions of the formulation are computationally expensive for large problems, a heuristic algorithm is presented to obtain approximate solutions. Simulation results using a U.S. airport network dataset demonstrate the effectiveness and utility of the proposed approach. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:3 / 15
页数:13
相关论文
共 26 条
[21]   On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability [J].
Shen, Yilin ;
Nguyen, Nam P. ;
Xuan, Ying ;
Thai, My T. .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2013, 21 (03) :963-973
[22]   Risk mitigation strategies for critical infrastructures based on graph centrality analysis [J].
Stergiopoulos, George ;
Kotzanikolaou, Panayiotis ;
Theocharidou, Marianthi ;
Gritzalis, Dimitris .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 10 :34-44
[23]   An Experimental Evaluation of Multi-objective Evolutionary Algorithms for Detecting Critical Nodes in Complex Networks [J].
Ventresca, Mario ;
Harrison, Kyle Robert ;
Ombuki-Berman, Beatrice M. .
APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2015, 2015, 9028 :164-176
[24]   Vulnerability analysis of interdependent infrastructure systems under edge attack strategies [J].
Wang, Shuliang ;
Hong, Liu ;
Ouyang, Min ;
Zhang, Jianhua ;
Chen, Xueguang .
SAFETY SCIENCE, 2013, 51 (01) :328-337
[25]   Vulnerability of complex networks under intentional attack with incomplete information [J].
Wu, J. ;
Deng, H. Z. ;
Tan, Y. J. ;
Zhu, D. Z. .
JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2007, 40 (11) :2665-2671
[26]   A quantitative approach for assessing the critical nodal and linear elements of a railway infrastructure [J].
Zhang, Zili ;
Li, Xiangyang ;
Li, Hengyun .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 8 :3-15