HotSpots: Failure Cascades on Heterogeneous Critical Infrastructure Networks

Critical Infrastructure Systems such as transportation, water and power grid systems are vital to our national security, economy, and public safety. Recent events, like the 2012 hurricane Sandy, show how the interdependencies among different CI networks lead to catastrophic failures among the whole system. Hence, analyzing these CI networks, and modeling failure cascades on them becomes a very important problem. However, traditional models either do not take multiple CIs or the dynamics of the system into account, or model it simplistically. In this paper, we study this problem using a heterogeneous network viewpoint. We first construct heterogeneous CI networks with multiple components using national-level datasets. Then we study novel failure maximization problems on these networks, to compute critical nodes in such systems. We then provide HotSpots, a scalable and effective algorithm for these problems, based on careful transformations. Finally, we conduct extensive experiments on real CIS data from multiple US states, and show that our method HotSpots outperforms non-trivial baselines, gives meaningful results and that our approach gives immediate benefits in providing situational-awareness during large-scale failures.

[1]  Jingrui He,et al.  On the Connectivity of Multi-layered Networks: Models, Measures and Optimal Control , 2015, 2015 IEEE International Conference on Data Mining.

[2]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[3]  Xinghuo Yu,et al.  A Maximum-Flow-Based Complex Network Approach for Power System Vulnerability Analysis , 2013, IEEE Transactions on Industrial Informatics.

[4]  Melissa R. Allen,et al.  Application of Hybrid Geo-Spatially Granular Fragility Curves to Improve Power Outage Predictions , 2014 .

[5]  S. Buldyrev,et al.  Interdependent networks with identical degrees of mutually dependent nodes. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[6]  Yushuai Li,et al.  Critical Nodes Identification of Power Systems Based on Controllability of Complex Networks , 2015 .

[7]  Haim Kaplan,et al.  A new, simpler linear-time dominators algorithm , 1998, TOPL.

[8]  Lei Xie,et al.  FASCINATE: Fast Cross-Layer Dependency Inference on Multi-layered Networks , 2016, KDD.

[9]  Eytan Modiano,et al.  Robustness of Bidirectional Interdependent Networks: Analysis and Design , 2016, ArXiv.

[10]  Supriya Chinthavali,et al.  Reliable communication models in interdependent critical infrastructure networks , 2016, 2016 Resilience Week (RWS).

[11]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[12]  Le Song,et al.  Estimating Diffusion Network Structures: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm , 2014, ICML.

[13]  Supriya Chinthavali,et al.  Automating natural disaster impact analysis: An open resource to visually estimate a hurricane's impact on the electric grid , 2013, 2013 Proceedings of IEEE Southeastcon.

[14]  Andreas Krause,et al.  Cost-effective outbreak detection in networks , 2007, KDD '07.

[15]  M. L. Fisher,et al.  An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..

[16]  Barry J. Goodno,et al.  Seismic response of critical interdependent networks , 2007 .

[17]  Le Song,et al.  Estimating Diffusion Networks: Recovery Conditions, Sample Complexity and Soft-thresholding Algorithm , 2016, J. Mach. Learn. Res..

[18]  Christos Faloutsos,et al.  On the Vulnerability of Large Graphs , 2010, 2010 IEEE International Conference on Data Mining.

[19]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[20]  Réka Albert,et al.  Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[21]  Wei Chen,et al.  Robust Influence Maximization , 2016, KDD.

[22]  Christian Borgs,et al.  Maximizing Social Influence in Nearly Optimal Time , 2012, SODA.

[23]  Arunabha Sen,et al.  Identification of K most vulnerable nodes in multi-layered network using a new model of interdependency , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[24]  Min Ouyang,et al.  Review on modeling and simulation of interdependent critical infrastructure systems , 2014, Reliab. Eng. Syst. Saf..