Comparative Approaches for Assessing Network Vulnerability

A common theme in analysis and evaluation of network-based critical infrastructure is the assessment of system vulnerability. Graph theoretic, simulation, and optimization-based techniques have played a significant role in examining potential network vulnerabilities given the insights they can provide for mitigating facility loss and prioritizing fortification efforts. Central to these approaches is the concept of facility (arc—node) importance or criticality to system survivability. Assessments of network vulnerability can dramatically differ based on how facility importance is characterized. In this review, various approaches for assessing facility importance and network vulnerability are examined. The key differences in these approaches are the ways in which a facility's role in maintaining network operability is evaluated given arc—node disruption. Comparative results suggest significant differences exist among measures of facility importance and network performance. Furthermore, the subsequent incongruities in these measures and their implications need to be clearly understood to support interdiction risk and vulnerability assessment for critical infrastructures.

[1]  A. Shimbel Structural parameters of communication networks , 1953 .

[2]  Richard D. Wollmer,et al.  Removing Arcs from a Network , 1964 .

[3]  K. Parthasarathy Enumeration of paths in digraphs , 1964 .

[4]  P. Haggett Network Analysis In Geography , 1971 .

[5]  Richard D. Wollmer Algorithms for Targeting Strikes in a Lines-of-Communication Network , 1970, Oper. Res..

[6]  Alan W. McMasters,et al.  Optimal interdiction of a supply network , 1970 .

[7]  H. W. Corley,et al.  Finding the n Most Vital Nodes in a Flow Network , 1974 .

[8]  Delbert Ray Fulkerson,et al.  Maximizing the minimum source-sink path subject to a budget constraint , 1977, Math. Program..

[9]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[10]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[11]  B. Golden A problem in network interdiction , 1978 .

[12]  H. W. Corley,et al.  Most vital links and nodes in weighted networks , 1982, Oper. Res. Lett..

[13]  R. Vohra,et al.  Finding the most vital arcs in a network , 1989 .

[14]  차동완,et al.  Optimal Design of a Distributed Network with a Two-Level Hierarchical Structure , 1990 .

[15]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .

[16]  Martin Grötschel,et al.  Capacity and Survivability Models for Telecommunication Networks , 1997 .

[17]  Shahid H. Bokhari,et al.  Graph-Theoretic Concepts , 1997 .

[18]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[19]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[20]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[21]  Cohen,et al.  Resilience of the internet to random breakdowns , 2000, Physical review letters.

[22]  M. O'Kelly,et al.  Backbone Topology, Access, and the Commercial Internet, 1997–2000 , 2002 .

[23]  T. J. Kim,et al.  Economic impacts of transportation network changes: Implementation of a combined transportation network and input-output model , 2002 .

[24]  V. E. Lynch,et al.  Critical points and transitions in an electric power transmission model for cascading failure blackouts. , 2002, Chaos.

[25]  Joao Antonio Pereira,et al.  Linked: The new science of networks , 2002 .

[26]  Jie Wu,et al.  Small Worlds: The Dynamics of Networks between Order and Randomness , 2003 .

[27]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[28]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[29]  White House Administrative Office The national strategy for the physical protection of critical infrastructures and key assets , 2003 .

[30]  Morton E. O'Kelly,et al.  A geographic perspective on commercial Internet survivability , 2003, Telematics Informatics.

[31]  Kevin Curran,et al.  The effects of badly behaved routers on Internet congestion , 2003, Int. J. Netw. Manag..

[32]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[33]  Massimo Marchiori,et al.  A topological analysis of the Italian electric power grid , 2004 .

[34]  Young-Soo Myung,et al.  Discrete Optimization A cutting plane algorithm for computing k-edge survivability of a network , 2004 .

[35]  Soundar R. T. Kumara,et al.  Survivability of multiagent-based supply networks: a topological perspect , 2004, IEEE Intelligent Systems.

[36]  Réka Albert,et al.  Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[37]  Richard L. Church,et al.  Identifying Critical Infrastructure: The Median and Covering Facility Interdiction Problems , 2004 .

[38]  Massimo Marchiori,et al.  Model for cascading failures in complex networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[39]  Luciano da Fontoura Costa,et al.  Reinforcing the resilience of complex networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[40]  S. Havlin,et al.  Optimization of network robustness to waves of targeted and random attacks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[41]  T. J. Kim,et al.  Assessment of economic impacts from unexpected events with an interregional commodity flow and multimodal transportation network model , 2005 .

[42]  S. Low,et al.  The "robust yet fragile" nature of the Internet. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[43]  Massimo Marchiori,et al.  Vulnerability and protection of infrastructure networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[44]  Walter Willinger,et al.  Understanding Internet topology: principles, models, and validation , 2005, IEEE/ACM Transactions on Networking.

[45]  Alan T. Murray,et al.  Vital Nodes, Interconnected Infrastructures, and the Geographies of Network Survivability , 2006 .

[46]  Morton E. O'Kelly,et al.  Internet Reliability with Realistic Peering , 2006 .

[47]  A. Barab Deterministic scale-free networks , 2007 .

[48]  Richard L. Church,et al.  Analysis of Facility Systems’ Reliability When Subject to Attack or a Natural Disaster , 2007 .

[49]  Alan T. Murray,et al.  Critical infrastructure : reliability and vulnerability , 2007 .

[50]  Alan T. Murray,et al.  Bounding Network Interdiction Vulnerability Through Cutset Identification , 2007 .

[51]  Richard L. Church,et al.  Protecting Critical Assets: The r-interdiction median problem with fortification , 2007 .

[52]  Alan T. Murray,et al.  Continuity in critical network infrastructures: Accounting for nodal disruptions , 2007 .

[53]  Alan T. Murray,et al.  Critical network infrastructure analysis: interdiction and system flow , 2007, J. Geogr. Syst..

[54]  Jyrki T. J. Penttinen,et al.  Optimization of the Network , 2009 .

[55]  S. Murnion,et al.  Modeling distance decay effects in Web server information flows , 2010 .

[56]  Anne FINDING THE n MOST VITAL LINKS IN FLOW NETWORKS , 2022 .