Multigraph Dependency Models for Heterogeneous Infrastructures

  • Nils Svendsen
  • Stephen Wolthusen
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 253)

The identification and mitigation of interdependencies among critical infrastructure elements such as telecommunications, energy and transportation are important steps in any protection strategy and are applicable in preventive and operative settings. This paper presents a graph-theoretical model and framework for analyzing dependencies based on a multigraph approach and discusses algorithms for automatically identifying critical dependencies. These algorithms are applied to dependency structures that simulate the scale-free structures found in many infrastructure networks as well as to networks augmented by random graphs.

Keywords: Infrastructure interdependencies, multigraph models, simulation


Critical Infrastructure Physical Review Letter Attack Scenario Node Removal Infrastructure Element 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. [1]
    R. Albert and A. Barabási, Statistical mechanics of complex networks, Reviews of Modern Physics, vol. 74(1), pp. 47-97, 2002.MathSciNetCrossRefzbMATHGoogle Scholar
  2. [2]
    R. Albert, H. Jeong and A. Barabási, Error and attack tolerance of complex networks, Nature, vol. 406, pp. 378-382, 2000.CrossRefGoogle Scholar
  3. [3]
    M. Amin, Toward self-healing infrastructure systems, IEEE Computer, vol. 33(8), pp. 44-53, 2000.CrossRefGoogle Scholar
  4. [4]
    D. Barton and K. Stamber, An Agent-Based Microsimulation of Critical Infrastructure Systems, Technical Report SAN02000-0808C, Sandia Na- tional Laboratories, Albuquerque, New Mexico, 2000.Google Scholar
  5. [5]
    A. Broder, R. Kumar, F. Maghoul, P. Raghavan, S. Rajagopalan, R. Stata, A. Tomkins and J. Wiener, Graph structure in the web, Computer Networks, vol. 33(1-6), pp. 309-320, 2000.CrossRefGoogle Scholar
  6. [6]
    D. Callaway, M. Newman, S. Strogatz and D. Watts, Network robustness and fragility: Percolation on random graphs, Physical Review Letters, vol. 85(25), pp. 5468-5471, 2000.CrossRefGoogle Scholar
  7. [7]
    B. Casselman, Networks, Notices of the American Mathematical Society, vol. 51(4), pp. 392-393, 2004.Google Scholar
  8. [8]
    Q. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker and W. Willinger, The origin of power laws in Internet topologies revisited, Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 608-617, 2002.CrossRefGoogle Scholar
  9. [9]
    R. Cohen, K. Erez, D. ben-Avraham and S. Havlin, Resilience of the In- ternet to random breakdowns, Physical Review Letters, vol. 85(21), pp. 4626-4628, 2000.CrossRefGoogle Scholar
  10. [10]
    R. Cohen, K. Erez, D. ben-Avraham and S. Havlin, Breakdown of the Internet under intentional attack, Physical Review Letters, vol. 86(16), pp. 3682-3685, 2001.CrossRefGoogle Scholar
  11. [11]
    S. Dorogovtsev and J. Mendes, Effect of the accelerating growth of communications networks on their structure, Physical Review E, vol. 63, pp. 025101-1-025101-4, 2001.CrossRefGoogle Scholar
  12. [12]
    S. Dorogovtsev and J. Mendes, Evolution of Networks, From Biological Nets to the Internet and WWW, Oxford University Press, Oxford, United Kingdom, 2003.CrossRefzbMATHGoogle Scholar
  13. [13]
    M. Faloutsos, P. Faloutsos and C. Faloutsos, On power law relationships of the Internet topology, Proceedings of the Conference on Applications, Technologies, Architectures and Protocols for Computer Communication, pp. 251-262, 1999.Google Scholar
  14. [14]
    R. Freeman, Fundamentals of Telecommunications, John Wiley, New York, 1999.CrossRefGoogle Scholar
  15. [15]
    K. Goh, B. Kahng and D. Kim, Spectra and eigenvectors of scale-free networks, Physical Review E, vol. 64, pp. 0519031-1-0519031-5, 2001.CrossRefGoogle Scholar
  16. [16]
    O. Hæsken, T. Olsen and H. Fridheim, Beskyttelse av Samfunnet (Bas) - Sluttrapport, Technical Report FFI/RAPPORT-97/01459, Norwegian Defence Research Establishment, Kjeller, Norway, 1997.Google Scholar
  17. [17]
    J. James and F. Mabry, Building trustworthy systems: Guided state estimation as a feasible approach for interpretation, decision and action based on sensor data, Proceedings of the Thirty-Seventh Annual Hawaii International Conference on System Sciences, p. 20056, 2004.Google Scholar
  18. [18]
    N. Karmarkar, A new polynomial time algorithm for linear programming, Combinatorica, vol. 4(4), pp. 373-395, 1984.MathSciNetCrossRefzbMATHGoogle Scholar
  19. [19]
    M. Newman, The structure and function of complex networks, SIAM Review, vol. 45(2), pp. 167-256, 2003.Google Scholar
  20. [20]
    M. North, Agent-based modeling of complex infrastructures, Proceedings of the Simulation of Social Agents: Architectures and Institutions Workshop, pp. 239-250, 2000.Google Scholar
  21. [21]
    R. Pastor-Satorras and A. Vespignani, Evolution and Structure of the Internet: a Statistical Physics Approach, Cambridge University Press, Cambridge, United Kingdom, 2004.CrossRefzbMATHGoogle Scholar
  22. [22]
    S. Rinaldi, Modeling and simulating critical infrastructures and their interdependencies, Proceedings of the Thirty-Seventh Annual Hawaii International Conference on System Sciences, p. 20054. 1, 2004.Google Scholar
  23. [23]
    W. Schmitz, Analysis and Assessment for Critical Infrastructure Protection (ACIP), Final Report, IST-2001-37257 Deliverable D7. 5, ACIP Consortium, Ottobrunn, Germany, 2003.Google Scholar
  24. [24]
    K. Sullivan, J. Knight, X. Du and S. Geist, Information survivability control systems, Proceedings of the Twenty-First International Conference on Software Engineering, pp. 184-192, 1999.Google Scholar
  25. [25]
    N. Svendsen and S. Wolthusen, Connectivity models of interdependency in mixed-type critical infrastructure networks, Information Security Technical Report, vol. 12(1), pp. 44-55, 2007.CrossRefGoogle Scholar
  26. [26]
    W. Thomas, M. North, C. Macal and J. Peerenboom, From Physics to Fi- nances: Complex Adaptive Systems Representation of Infrastructure Inter- dependencies, Technical Report, Naval Surface Warfare Center, Dahlgren, Virginia, 2003.Google Scholar
  27. [27]
    D. Watts and S. Strogatz, Collective dynamics of small-world networks, Nature, vol. 393, pp. 440-442, 1998.CrossRefGoogle Scholar
  28. [28]
    S. Yook, H. Jeong and A. Barabási, Modeling the Internet’s large-scale topology, Proceedings of the National Academy of Sciences, vol. 99(21), pp. 13382-13386, 2002.CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Nils Svendsen
    • 1
  • Stephen Wolthusen
    • 2
  1. 1.Norwegian Information Security LaboratoryGjøvik University CollegeNorway
  2. 2.Information Security at the Norwegian Information Security LaboratoryGjøvik University CollegeNorway

Personalised recommendations