Advertisement

Journal of Geographical Systems

, Volume 9, Issue 2, pp 103–117 | Cite as

Critical network infrastructure analysis: interdiction and system flow

  • Alan T. Murray
  • Timothy C. Matisziw
  • Tony H. Grubesic
Original Article

Abstract

Effective management of critical network infrastructure requires the assessment of potential interdiction scenarios. Optimization approaches have been essential for identifying and evaluating such scenarios in networked systems. Although a primary function of any network is the distribution of flow between origins and destinations, the complexity and difficulty of mathematically abstracting interdiction impacts on connectivity or flow has been a challenge for researchers. This paper presents an optimization approach for identifying interdiction bounds with respect to connectivity and/or flow associated with a system of origins and destinations. Application results for telecommunications flow are presented, illustrating the capabilities of this approach.

Keywords

System Flow Kansas City Network Element Critical Infrastructure Flow Disruption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Albert R, Jeong H, Barabasi AL (2000) Error and attack tolerance of complex networks. Nature 406:378–382CrossRefGoogle Scholar
  2. Albert R, Albert I, Nakarado GL (2004) Structural vulnerability of the North American power grid. Phys Rev E 69:025103(R)Google Scholar
  3. Ball MO, Golden BL, Vohra RV (1989) Finding the most vital arcs in a network. Oper Res Lett 8:73–76CrossRefGoogle Scholar
  4. Barabasi AL, Albert R, Jeong H (2000) Scale-free characteristics of random networks: the topology of the worldwide web. Physica A 281:69–77CrossRefGoogle Scholar
  5. Barabasi AL, Ravasz E, Vicsek T (2001) Deterministic scale-free networks. Physica A 299:559–564CrossRefGoogle Scholar
  6. Baran P (1964) On distributed communications networks. IEEE Trans Commun Syst 12:1–9CrossRefGoogle Scholar
  7. Bell MGH (2000) A game theory approach to measuring the performance reliability of transport networks. Transport Res B 34:533–545CrossRefGoogle Scholar
  8. Carlier J, Li Y, Lutton J (1997) Reliability evaluation of large telecommunication networks. Discret Appl Math 76:61–80CrossRefGoogle Scholar
  9. Carreras BA, Lynch VE, Dobson I, Newman DE (2002) Critical points and transitions in an electric power transmission model for cascading failure blackouts. Chaos 12:985–994CrossRefGoogle Scholar
  10. Chassin DP, Posse C (2005) Evaluating North American electric grid reliability using the Barabasi-Albert Network Model. Physica A 355:667–677CrossRefGoogle Scholar
  11. Church RL, Scaparra MP, Middleton RS (2004) Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geograph 94:491–502CrossRefGoogle Scholar
  12. Corley HW, Chang H (1974) Finding the n most vital nodes in a flow network. Manage Sci 21:362–364Google Scholar
  13. Corley HW, Sha DY (1982) Most vital links and nodes in weighted networks. Oper Res Lett 1:157–360CrossRefGoogle Scholar
  14. Crucitti P, Latora V, Marchiori M (2004) Model for cascading failures in complex networks. Phys Rev E 69:045104(R)Google Scholar
  15. Department of Homeland Security (DHS) (2004) Sharing information to protect the economy. URL: http://www.dhs.gov/dhspublic/interapp/editorial/editorial_0566.xml
  16. Department of Homeland Security (DHS) (2005) Sharing information to protect the economy. URL: http://www.dhs.gov/dhspublic/display?theme = 73&content = 1375
  17. Doyle JC, Alderson DL, Li L, Low S, Roughan M, Shalunov S, Tanaka R, Willinger W (2005) The ‘robust yet fragile’ nature of the Internet. Proc Natl Acad Sci 102:14497–14502CrossRefGoogle Scholar
  18. Executive Order 1995Critical Infrastructure Protection. Federal Register, July 17, 1996. vol 61, no. 138. pp 37347–37350. Reference is on p 37347Google Scholar
  19. Grubesic TH, Murray AT (2006) Vital nodes, interconnected infrastructures and the geographies of network reliability. Ann Assoc Am Geograph 96:64–83CrossRefGoogle Scholar
  20. Grubesic TH, O’Kelly ME, Murray AT (2003) A geographic perspective on commercial Internet survivability. Telemat Inform 20:51–69CrossRefGoogle Scholar
  21. Grubesic TH, Murray AT, Mefford J (2006) Continuity in critical network infrastructures: accounting for nodal disruptions. In: Murray A, Grubesic T (eds) Reliability and vulnerability in critical infrastructure: a quantitative geographic perspective. Springer, HeidelbergGoogle Scholar
  22. Hodgson MJ, Rosing KE, Zhang J (1996) Locating vehicle inspection stations to protect a transportation network. Geograph Anal 28:299–314CrossRefGoogle Scholar
  23. Holme P, Kim BJ, Yoon CN, Han SK (2002) Attack vulnerability of complex networks. Phys Rev E 65:056109Google Scholar
  24. Houck DJ, Kim E, O’Reilly GP, Picklesimer DD, Uzunalioglu H (2004) A network survivability model for critical national infrastructures. Bell Labs Tech J 8:153–172CrossRefGoogle Scholar
  25. Kalvenes J, Kennington J, Olinick E (2004) Hierarchical cellular network design with channel allocation. Eur J OperRes 160:3–18CrossRefGoogle Scholar
  26. Latora V, Marchiori M (2005) Vulnerability and protection of infrastructure networks. Phys Rev E 71:015103(R)Google Scholar
  27. Matisziw TC, Murray AT, Grubesic TH (2005). Assessing network interdiction and potential risk to O–D interaction (submitted for publication)Google Scholar
  28. Myung Y-S, Kim H-J (2004) A cutting plane algorithm for computing k-edge survivability of a network. Eur J Oper Res 156:579–589CrossRefGoogle Scholar
  29. Nardellia E, Proiettia G, Widmayer P (2003) Finding the most vital node of a shortest path. Theor Comput Sci 296:167–177CrossRefGoogle Scholar
  30. Office of Management and Budget (OMB) (2006). Homeland security. URL: http://www.whitehouse.gov/omb/pdf/Homeland-06.pdf
  31. Palmer CR, Siganos G, Faloutsos M, Faloutsos C, Gibbons PB (2001) The connectivity and fault-tolerance of the Internet topology. URL: http://citeseer.ist.psu.edu/444798.htmlGoogle Scholar
  32. Ratliff HD, Sicilia GT, Lubore SH (1975) Finding the n most vital links in flow networks. Manage Sci 2:531–539Google Scholar
  33. ReVelle CS, Rosing KE (2000) Defendens imperium Romanum: a classical problem in military strategy. Am Math Mon 107(7):585–594CrossRefGoogle Scholar
  34. Salmeron J, Wood K, Baldick R (2004) Analysis of electric grid security under terrorist threat. IEEE Trans Pow Syst 19:905–912CrossRefGoogle Scholar
  35. Soni S, Pirkul H (2000) Design of survivable networks with connectivity requirements. Telecommun Syst 20:133–149CrossRefGoogle Scholar
  36. White House (2003) The national strategy for the physical protection of critical infrastructures and key assets. URL: http://www.whitehouse.gov/pcipb/physical_strategy.pdf
  37. Wollmer R (1964) Removing arcs from a network. Oper Res 12:934–940CrossRefGoogle Scholar
  38. Wood KR (1993) Deterministic network interdiction. Math Comput Modell 17:1–18CrossRefGoogle Scholar

Copyright information

© Springer-Verlag 2006

Authors and Affiliations

  • Alan T. Murray
    • 1
  • Timothy C. Matisziw
    • 2
  • Tony H. Grubesic
    • 3
  1. 1.Center for Urban and Regional Analysis, and Department of GeographyThe Ohio State UniversityColumbusUSA
  2. 2.Center for Urban and Regional AnalysisThe Ohio State UniversityColumbusUSA
  3. 3.Department of GeographyIndiana UniversityBloomingtonUSA

Personalised recommendations