A methodological framework for vulnerability analysis of interdependent infrastructure systems under deliberate attacks

Abstract In this paper, we give a methodological framework to analyze vulnerability of interdependent infrastructure systems under deliberate attacks. Meanwhile, the intelligence of attackers is considered and a method of critical attack area identification according to community detection is proposed as well. The Interdependent power and gas system in Wuhan, China is taken as the example. We determine the vulnerabilities of different critical areas in both independent and interdependent scenarios. In the meantime, percolation theory are utilized and different coupling strengths are considered to further analyze the vulnerabilities. It is found that the disruption of only a few vertices may lead to complete collapsing for some critical areas and the vulnerabilities increase when systems become interdependent. Therefore, greater protection should be given to critical areas of a network in order to reduce the vulnerabilities when deliberate attacks occur. The proposed method could help decision makers develop mitigation techniques and optimal protection strategies.

[1]  Min Ouyang,et al.  Review on modeling and simulation of interdependent critical infrastructure systems , 2014, Reliab. Eng. Syst. Saf..

[2]  Irene Eusgeld,et al.  Adopting HLA standard for interdependency study , 2011, Reliab. Eng. Syst. Saf..

[3]  Michael North Toward Strength and Stability , 2001 .

[4]  Tao Jia,et al.  Control Capacity and A Random Sampling Method in Exploring Controllability of Complex Networks , 2013, Scientific Reports.

[5]  Min Ouyang,et al.  Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks , 2016, Reliab. Eng. Syst. Saf..

[6]  Shlomo Havlin,et al.  Eradicating catastrophic collapse in interdependent networks via reinforced nodes , 2016, Proceedings of the National Academy of Sciences.

[7]  Min Ouyang,et al.  Vulnerability analysis of interdependent infrastructure systems under edge attack strategies , 2013 .

[8]  Huan Feng,et al.  A system dynamic modeling approach for evaluating municipal solid waste generation, landfill capacity and related cost management issues. , 2010, Waste management.

[9]  Vito Latora,et al.  Controlling centrality in complex networks , 2011, Scientific Reports.

[10]  Derek P Molle,et al.  Defending Critical Infrastructure as Cyber Key Terrain , 2016 .

[11]  Terje Aven,et al.  On Some Recent Definitions and Analysis Frameworks for Risk, Vulnerability, and Resilience , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[12]  Min Ouyang,et al.  Vulnerability effects of passengers' intermodal transfer distance preference and subway expansion on complementary urban public transportation systems , 2017, Reliab. Eng. Syst. Saf..

[13]  Ligang He,et al.  An uncertainty assessment of interdependent infrastructure systems and infrastructure sectors with natural disasters analysis , 2012, Int. J. Syst. Syst. Eng..

[14]  Jian-Wei Wang,et al.  Robustness of the western United States power grid under edge attack strategies due to cascading failures , 2011 .

[15]  Yun Li,et al.  Cascading load model in interdependent networks with coupled strength , 2015 .

[16]  John E. Mitchell,et al.  Restoration of Services in Interdependent Infrastructure Systems: A Network Flows Approach , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[17]  Min Ouyang,et al.  Vulnerability assessment and mitigation for the Chinese railway system under floods , 2015, Reliab. Eng. Syst. Saf..

[18]  Xiang-Sun Zhang,et al.  Potts model based on a Markov process computation solves the community structure problem effectively , 2012, Physical review. E, Statistical, nonlinear, and soft matter physics.

[19]  Enrico Zio,et al.  Challenges in the vulnerability and risk analysis of critical infrastructures , 2016, Reliab. Eng. Syst. Saf..

[20]  E. J. Stacey,et al.  UPFC-unified power flow controller: theory, modeling, and applications , 1998 .

[21]  Wei Li,et al.  Cascading Failures in Interdependent Lattice Networks: The Critical Role of the Length of Dependency Links , 2012, Physical review letters.

[22]  Per Hokstad,et al.  A method for risk modeling of interdependencies in critical infrastructures , 2011, Reliab. Eng. Syst. Saf..

[23]  Amir Bashan,et al.  Localized attacks on spatially embedded networks with dependencies , 2015, Scientific Reports.

[24]  Hui-Jia Li,et al.  Social significance of community structure: Statistical view , 2015, Physical review. E, Statistical, nonlinear, and soft matter physics.

[25]  James P. Peerenboom,et al.  Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .

[26]  Min Ouyang,et al.  Comparisons of complex network based models and direct current power flow model to analyze power grid vulnerability under intentional attacks , 2014 .

[27]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[28]  M. Ouyang Comparisons of purely topological model, betweenness based model and direct current power flow model to analyze power grid vulnerability. , 2013, Chaos.