Evaluating the effects of cascading failures in a network of critical infrastructures

2015 ◽  
Vol 6 (3) ◽  
pp. 221 ◽  
Author(s):  
William Hurst ◽  
Áine MacDermott
2018 ◽  
Vol 13 (4) ◽  
pp. 537-549
Author(s):  
Diego F. Rueda ◽  
Eusebi Calle ◽  
Xiangrong Wang ◽  
Robert E. Kooij

Interconnection between telecommunication networks and other critical infrastructures is usually established through nodes that are spatially close, generating a geographical interdependency. Previous work has shown that in general, geographically interdependent networks are more robust with respect to cascading failures when the interconnection radius (r) is large. However, to obtain a more realistic model, the allocation of interlinks in geographically interdependent networks should consider other factors. In this paper, an enhanced interconnection model for geographically interdependent networks is presented. The model proposed introduces a new strategy for interconnecting nodes between two geographical networks by limiting the number of interlinks. Results have shown that the model yields promising results to maintain an acceptable level in network robustness under cascading failures with a decrease in the number of interlinks.


2019 ◽  
Vol 30 (07) ◽  
pp. 1940007 ◽  
Author(s):  
Fang Zhou ◽  
Yanchao Du ◽  
Yongbo Yuan ◽  
Mingyuan Zhang

Critical infrastructures are tightly connected and extremely fragile multilayer coupled networks. This paper discusses the cross-networks impact of subnetworks and global network of networks on robustness by taking a critical infrastructures with three-layer interdependent networks as an example. The percolation theory is applied to capture the flow characteristics of cascading failures and evaluate the robustness of multilayer networks. And further discuss and compare the situation of each subnetwork affecting or being affected. The quantitative evaluation model of the interaction of multilayer networks is proposed based on cascading failures, where the influence expansion matrix and the dependency matrix are obtained. The results show that the power network has a high influence on other networks, and it is difficult to be affected. Meanwhile the influence ability of water network and gas network is limited.


2021 ◽  
Vol 11 (16) ◽  
pp. 7228
Author(s):  
Edward Staddon ◽  
Valeria Loscri ◽  
Nathalie Mitton

With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical Infrastructure applications. We believe this can be a guide to aid further researchers in their choice of adapted categorisation approaches. Indeed, adapting appropriated categorisation leads to a quicker attack detection, identification, and recovery. It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Muhammad Adnan ◽  
Muhammad Gufran Khan ◽  
Arslan Ahmed Amin ◽  
Muhammad Rayyan Fazal ◽  
Wen Shan Tan ◽  
...  

2021 ◽  
Vol 21 (4) ◽  
pp. 1-22
Author(s):  
Safa Otoum ◽  
Burak Kantarci ◽  
Hussein Mouftah

Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.), in which their owners volunteer them as storage and computing power resources, has become an essential mechanism for resource management in numerous applications. The growth of the volume and variety of data traffic on the Internet leads to concerns on the robustness of cyberphysical systems especially for critical infrastructures. Therefore, the implementation of an efficient Intrusion Detection System for gathering such sensory data has gained vital importance. In this article, we present a comparative study of Artificial Intelligence (AI)-driven intrusion detection systems for wirelessly connected sensors that track crucial applications. Specifically, we present an in-depth analysis of the use of machine learning, deep learning and reinforcement learning solutions to recognise intrusive behavior in the collected traffic. We evaluate the proposed mechanisms by using KDD’99 as real attack dataset in our simulations. Results present the performance metrics for three different IDSs, namely the Adaptively Supervised and Clustered Hybrid IDS (ASCH-IDS), Restricted Boltzmann Machine-based Clustered IDS (RBC-IDS), and Q-learning based IDS (Q-IDS), to detect malicious behaviors. We also present the performance of different reinforcement learning techniques such as State-Action-Reward-State-Action Learning (SARSA) and the Temporal Difference learning (TD). Through simulations, we show that Q-IDS performs with detection rate while SARSA-IDS and TD-IDS perform at the order of .


Sign in / Sign up

Export Citation Format

Share Document