Author:
Ahmad Ishfaq,Clark Addison,Ali Muhammad,Lei Hansheng,Ferris David,Aved Alex
Abstract
AbstractA wide range of critical infrastructures are connected via wide area networks as well as the Internet-of-Thing (IoT). Apart from natural disasters, these infrastructures, providing services such as electricity, water, gas, and Internet, are vulnerable to terrorist attacks. Clearly, damages to these infrastructures can have dire consequences on economics, health services, security and safety, and various business sectors. An infrastructure network can be represented as a directed graph in which nodes and edges denote operation entities and dependencies between entities, respectively. A knowledgeable attacker who plans to harm the system would aim to use the minimum amount of effort, cost, or resources to yield the maximum amount of damage. Their best strategy would be to attack the most critical nodes of the infrastructure. From the defender’s side, the strategy would be to minimize the potential damage by investing resources in bolstering the security of the critical nodes. Thus, in the struggle between the attacker and defender, it becomes important for both the attacker and defender to identify which nodes are most critically significant to the system. Identifying critical nodes is a complex optimization problem. In this paper, we first present the problem model and then propose a solution for computing the optimal cost attack while considering the failure propagation. The proposed model represents one or multiple interconnected infrastructures. While considering the attack cost of each node, the proposed method computes the optimal attack that a rational attacker would make. Our problem model simulates one of two goals: maximizing the damage for a given attack budget or minimizing the cost for a given amount of damage. Our technique obtains solutions to optimize the objective functions by utilizing integer-linear programming while observing the constraints for each of the specified goals. The paper reports an extensive set of experiments using various graphs. The results show the efficacy of our technique in terms of its ability to obtain solutions with fast turnaround times.
Funder
Air Force Research Laboratory
Publisher
Springer Science and Business Media LLC
Reference32 articles.
1. Rosato V, Issacharoff L, Tiriticco F, Meloni S, Porcellinis S, Setola R. Modelling interdependent infrastructures using interacting dynamical models. Int J Crit Infrastruct. 2008;4(12):63–79.
2. Romero J. Lack of rain a leading cause of indian grid collapse. IEEE spectrum: technology, engineering, and science news. 2012. https://spectrum.ieee.org/energywise/energy/the-smarter-grid/disappointing-monsoon-season-wreaks-havoc-with-indias-grid.
3. Naik N, Jenkins P, Grace P, Song J. Comparing attack models for IT systems: lockheed martin’s cyber kill chain, MITRE ATT&CK framework and diamond model, 2022 IEEE International Symposium on Systems Engineering (ISSE), Vienna, Austria, 2022, pp. 1–7
4. Alderson DL, Brown GG, Carlyle WM. Operational models of infrastructure resilience. Risk Anal. 2015;35(4):562–86.
5. A dictionary of physics, 6th ed. Oxford [Angleterre]: Oxford University Press, 2009.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献