A network survivability model for critical national infrastructures

被引:26
作者
Houck, DJ [1 ]
Kim, E [1 ]
O'Reilly, G [1 ]
Picklesimer, DD [1 ]
Uzunalioglu, H [1 ]
机构
[1] Lucent Technol, QoS Management & Assessment Grp, Holmdel, NJ 07733 USA
关键词
D O I
10.1002/bltj.10093
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical national infrastructures for power, finance, transportation, and other basic resources rely on information and telecommunications networks (voice, data, Internet) to provide services and conduct business. While these networks tend to be highly reliable, disasters may lead to extended outages requiring days/weeks to repair. These outages can cause loss of emergency services, financial transaction failures, power distribution and transportation inefficiencies, and other malfunctions, resulting in inconvenience, financial ruin for individuals or businesses, or even loss of life. In this paper, we describe the life cycle of a disaster first and then present an approach for modeling information network disasters and their impact on other national infrastructures. Central to the approach is a simulation engine that Bell Labs has developed. The engine uses publicly available data (e.g., demographics, census, infrastructures) and, coupled with Bell Labs' network design and operational expertise, it effectively models network performance. This is particularly useful in the analysis of failure scenarios during and after a network disaster, providing insight for improving networks, procedures, and policies. (C) 2004 Lucent Technologies Inc.
引用
收藏
页码:153 / 172
页数:20
相关论文
共 8 条
[1]  
Hines WilliamH., 1990, Probability and Statistics in Engineering and Management Science
[2]   DIRECT DISTANCE DIALING - CALL COMPLETION AND CUSTOMER RETRIAL BEHAVIOR [J].
LIU, KS .
BELL SYSTEM TECHNICAL JOURNAL, 1980, 59 (03) :295-311
[3]  
*PRES CRIT INFR PR, 2003, NAT STRAT PHYS PROT
[4]  
*PRES CRIT INFR PR, 2003, NAT STRAT SEC CYB
[5]  
*TELC ROUT ADM, LOC EXCH ROUT GUID D
[6]  
*TELC TECHN, 1993, TRNWT001358 TELC TEC
[7]  
TIPTON HF, 1999, INFORMATION SECURITY, V2, P499
[8]  
TIPTON HF, 2000, INFORMATION SECURITY, V1, P563