Exploring the vulnerability of network infrastructure to disruption

  • Timothy C. Matisziw
  • Alan T. Murray
  • Tony H. Grubesic
Original Paper


Disruption of network facilities (nodes or arcs) resulting in loss of system functionality is of particular concern in the operation of critical network infrastructures. In preparing for events such as natural disasters, accidents, and/or sabotage, numerous disruption possibilities exist for any network and efforts to safeguard against the most destructive of those are often sought. Although, many approaches exist for identifying network vulnerabilities, mathematical programming and simulation are typically used as exploratory approaches for uncovering potentially important disruption scenarios. Mathematical programming approaches can identify bounds on network vulnerability while simulation can provide important insights to complement these bounds, as well as provide insights in cases where mathematical programming is not practical. This research presents a simulation methodology for evaluating network vulnerability to disruption. A case study illustrates the complexities associated with planning for such events.

JEL Classification

C61 R53 R40 O21 


  1. Church RL, Scaparra MP, Middleton RS (2004) Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geogr 94(3): 491–502CrossRefGoogle Scholar
  2. Grubesic TH, Matisziw TC, Murray AT, Snediker D (2008) Comparative approaches for assessing network vulnerability. Int Reg Sci Rev 31(1): 88–112CrossRefGoogle Scholar
  3. Grubesic TH, O’Kelly ME, Murray AT (2003) A Geographic perspective on commercial internet survivability. Telematics Informatics 20(1): 51–69CrossRefGoogle Scholar
  4. Israeli E, Wood RK (2002) Shortest-path network interdiction. Networks 40(2): 97–111CrossRefGoogle Scholar
  5. Jenelius E, Petersen T, Mattsson L-G (2005) Importance and exposure in road network vulnerability analysis. Transport Res Part A 40: 537–560Google Scholar
  6. Matisziw TC, Murray AT (2008) Modeling s–t path availability to support disaster ulnerability assessment of network infrastructure. Comput Oper Res (in press.) doi: 10.1016/j.cor.2007.09.004
  7. Murray AT, Matisziw TC, Grubesic TH (2008) Multimethodological approaches to network vulnerability analysis. Growth Change (in press)Google Scholar
  8. Murray AT, Matisziw TC, Grubesic TH (2007) Critical network infrastructure analysis: interdiction and system flow. J Geogr Syst 9: 103–117CrossRefGoogle Scholar
  9. Ratliff DH, Sicilia GT, Lubore SH (1975) Finding the n most vital links in flow networks. Manage Sci 21(5): 531–539CrossRefGoogle Scholar
  10. Salmeron J, Wood K, Baldick R (2004) Analysis of electric grid security under terrorist threat. IEEE Trans Power Syst 19(2): 905–912CrossRefGoogle Scholar
  11. Wood KR (1993) Deterministic network interdiction. Math Comp Model 17(2): 1–18CrossRefGoogle Scholar

Copyright information

© Springer-Verlag 2008

Authors and Affiliations

  • Timothy C. Matisziw
    • 1
  • Alan T. Murray
    • 2
  • Tony H. Grubesic
    • 3
  1. 1.Department of Geography and Department of Civil & Environmental EngineeringUniversity of Missouri-ColumbiaColumbiaUSA
  2. 2.School of Geographical SciencesArizona State UniversityTempeUSA
  3. 3.Department of GeographyIndiana UniversityIndianapolisUSA

Personalised recommendations