Identifying vulnerabilities in critical infrastructures by network analysis

Autor: Lam, Chi Yung, Lin, Jiaying, Sim, Mong Soon, Tai, Kang
Zdroj: International Journal of Critical Infrastructures; January 2013, Vol. 9 Issue: 3 p190-210, 21p
Abstrakt: By modelling the relationships and how disruption cascades within a complex infrastructure network, vulnerabilities can be identified and recovery/response efforts planned. A simulation approach is applied in this paper to identify critical components in a given infrastructure system represented as a graph comprising nodes and links. The network is modelled using NetLogo, a multi-agent programming environment. One- and two-node attack scenarios are programmed to investigate the impact of different node failures in the network, with the ensuing disruption quantified by a giant component metric. In the one-node attack, the minimum, final and average sizes of the giant component unanimously identified the same critical node while the two-node attack simulation identified different node pairs as critical. Which pair should be considered most critical will depend on policy goals to be met. This simulation approach can aid policymakers in deciding which infrastructures require higher protection and how recovery strategies should be planned.
Databáze: Supplemental Index