Technical Papers
Mar 26, 2019

Interdiction-Based Approaches to Identify Damage in Disrupted Critical Infrastructures with Dependencies

Publication: Journal of Infrastructure Systems
Volume 25, Issue 2

Abstract

In this paper, we consider a problem in which the decision maker only has access to outage reports from service receivers in critical infrastructures with dependencies among them, and our objective is to determine inspection plans to identify the damaged components that lead to the reported outages. This situation could occur, for example, if a cyberattack on the human-machine interface of the infrastructures occurs at the same time a natural hazard damages physical components. The demand nodes within these infrastructure networks may have an outage either from damage that occurred within their infrastructure or due to cascading failures across infrastructures. We present network interdiction-based approaches to identify a set of components to inspect that replicates the service outages reported across the infrastructures. These approaches can be applied in an iterative nature where a particular approach first identifies a set of components across infrastructures to inspect, and then, based on the feedback received from the inspections, determines an updated set of components to inspect. Performance criteria of the proposed approaches are the percentage of successful inspections, which represents the percentage of inspection resources used to successfully identify damaged components. As a benchmark, we applied a breadth-first search (BFS) approach to the problem, which mimics a top-down inspection policy for identifying damaged components within an infrastructure. We tested our approaches on realistic infrastructure systems and demonstrated that they far outperform the BFS approach.

Get full access to this article

View all available purchase options and get full access to this article.

Acknowledgments

This work was partially supported by National Science Foundation (NSF) Grant CMMI-1254245.

References

Ahuja, R., T. Magnanti, and J. Orlin. 1993. Network flows: Theory, algorithms, and applications. Englewood Cliffs, NJ: Prentice Hall.
Baycik, N. O., T. C. Sharkey, and C. E. Rainwater. 2018. “Interdicting layered physical and information flow networks.” IISE Trans. 50 (4): 316–331. https://doi.org/10.10.1080/24725854.2017.1401754.
Bompard, E., T. Huang, Y. Wu, and M. Cremenescu. 2013. “Classification and trend analysis of threats origins to the security of power systems.” Int. J. Electr. Power Energy Syst. 50: 50–64. https://doi.org/10.10.1016/j.ijepes.2013.02.008.
Brown, G., M. Carlyle, J. Salmerón, and K. Wood. 2006. “Defending critical infrastructure.” Interfaces 36 (6): 530–544. https://doi.org/10.10.1287/inte.1060.0252.
Cavdaroglu, B., E. Hammel, J. E. Mitchell, T. C. Sharkey, and W. A. Wallace. 2013. “Integrating restoration and scheduling decisions for disrupted interdependent infrastructure systems.” Ann. Oper. Res. 203 (1): 279–294. https://doi.org/10.10.1007/s10479-011-0959-3.
Çelik, M. 2016. “Network restoration and recovery in humanitarian operations: Framework, literature review, and research directions.” Surv. Oper. Res. Manage. Sci. 21 (2): 47–61. https://doi.org/10.10.1016/j.sorms.2016.12.001.
Chittester, C. G., and Y. Y. Haimes. 2004. “Risks of terrorism to information technology and to critical interdependent infrastructures.” J. Homeland Secur. Emergency Manage. 1 (4): 1075. https://doi.org/10.2202/1547-7355.1075.
González, A. D., L. Dueñas-Osorio, M. Sánchez-Silva, and A. L. Medaglia. 2016. “The interdependent network design problem for optimal infrastructure system restoration.” Comput.-Aided Civ. Infrastruct. Eng. 31 (5): 334–350. https://doi.org/10.10.1111/mice.12171.
Heath, E. A. 2016. “Optimization approaches to problems in network mitigation and restoration.” Ph.D. thesis, Dept. of Mathematics, Rensselaer Polytechnic Institute.
Kobayashi, M. 2014. “Experience of infrastructure damage caused by the Great East Japan Earthquake and countermeasures against future disasters.” IEEE Commun. Mag. 52 (3): 23–29. https://doi.org/10.10.1109/MCOM.2014.6766080.
Lee, E. E., J. E. Mitchell, and W. A. Wallace. 2007. “Restoration of services in interdependent infrastructure systems: A network flows approach.” IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev. 37 (6): 1303–1317. https://doi.org/10.10.1109/TSMCC.2007.905859.
Lewis, J., and S. Baker. 2013. “Introduction.” In The economic impact of cyber crime and cyber espionage, 103–117. Washington, DC: Center for Strategic and International Studies.
Loggins, R. A., and W. A. Wallace. 2015. “Rapid assessment of hurricane damage and disruption to interdependent civil infrastructure systems.” J. Infrastruct. Syst. 21 (4): 04015005. https://doi.org/10.10.1061/(ASCE)IS.1943-555X.0000249.
Mansfield, M., and W. Linzey. 2013. Hurricane Sandy multistate outage & restoration report. Annapolis, MD: National Association of State Energy Officials.
Mora-Florez, J., J. Melendez, and G. Carrillo-Caicedo. 2008. “Comparison of impedance based fault location methods for power distribution systems.” Electr. Power Syst. Res. 78 (4): 657–666. https://doi.org/10.1016/j.epsr.2007.05.010.
NCCIC (National Cybersecurity and Communications Integration Center). 2013. ICS-CERT incidence response activity. Trends in incident response in 2013. Washington, DC: NCCIC.
Nguyen, H., and T. C. Sharkey. 2017. “A computational approach to determine damage in infrastructure networks from outage reports.” Optim. Lett. 11 (4): 753–770. https://doi.org/10.10.1007/s11590-016-1044-2.
Nurre, S. G., B. Cavdaroglu, J. E. Mitchell, T. C. Sharkey, and W. A. Wallace. 2012. “Restoring infrastructure systems: An integrated network design and scheduling (INDS) problem.” Eur. J. Oper. Res. 223 (3): 794–806. https://doi.org/10.10.1016/j.ejor.2012.07.010.
Nurre, S. G., and T. C. Sharkey. 2018. “Online scheduling problems with flexible release dates: Applications to infrastructure restoration.” Comput. Oper. Res. 92: 1–16. https://doi.org/10.10.1016/j.cor.2017.11.014.
O’Rourke, T. D. 2007. “Critical infrastructure, interdependencies, and resilience.” Bridge-Washington-Nat. Acad. Eng. 37 (1): 22–29.
Ouyang, M. 2014. “Review on modeling and simulation of interdependent critical infrastructure systems.” Remote Sens. Appl.: Soc. Environ. 121: 43–60. https://doi.org/10.10.1016/j.ress.2013.06.040.
Paté-Cornell, M., M. Kuypers, M. Smith, and P. Keller. 2018. “Cyber risk management for critical infrastructure: A risk analysis model and three case studies.” Risk Anal. 38 (2): 226–241. https://doi.org/10.10.1111/risa.12844.
Peng, Y., T. Lu, J. Liu, Y. Gao, X. Guo, and F. Xie. 2013. “Cyber-physical system risk assessment.” In Proc., 2013 Ninth Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, 442–447. Piscataway, NJ: IEEE.
Rinaldi, S. M., J. P. Peerenboom, and T. K. Kelly. 2001. “Identifying, understanding, and analyzing critical infrastructure interdependencies.” IEEE Control Syst. 21 (6): 11–25. https://doi.org/10.10.1109/37.969131.
Royset, J. O., and R. K. Wood. 2007. “Solving the bi-objective maximum-flow network-interdiction problem.” INFORMS J. Comput. 19 (2): 175–184. https://doi.org/10.10.1287/ijoc.1060.0191.
Saha, M. M., J. J. Izykowski, and E. Rosolowski. 2009. Fault location on power networks. London: Springer.
Sharkey, T. C., B. Cavdaroglu, H. Nguyen, J. Holman, J. E. Mitchell, and W. A. Wallace. 2015a. “Interdependent network restoration: On the value of information-sharing.” Eur. J. Oper. Res. 244 (1): 309–321. https://doi.org/10.10.1016/j.ejor.2014.12.051.
Sharkey, T. C., S. G. Nurre, H. Nguyen, J. H. Chow, J. E. Mitchell, and W. A. Wallace. 2015b. “Identification and classification of restoration interdependencies in the wake of Hurricane Sandy.” J. Infrastruct. Syst. 22 (1): 04015007. https://doi.org/10.10.1061/(ASCE)IS.1943-555X.0000262.
Slay, J., and M. Miller. 2007. “Lessons learned from the Maroochy water breach.” In Proc., Int. Conf. on Critical Infrastructure Protection, 73–82. New York: Springer.
Smith, J. C. 2011. “Basic interdiction models.” In Encyclopedia of operations research and management science, edited by J. Cochran. Hoboken, NJ: Wiley.
US Department of Commerce. 2013. Economic impact of Hurricane Sandy potential economic activity lost and gained in New Jersey and New York. Washington, DC: US Dept. of Commerce.
van Eeten, M., A. Nieuwenhuijs, E. Luiijf, M. Klaver, and E. Cruz. 2011. “The state and the threat of cascading failure across critical infrastructures: The implications of empirical evidence from media incident reports.” Public Administration 89 (2): 381–400. https://doi.org/10.10.1111/j.1467-9299.2011.01926.x.
Wood, R. K. 1993. “Deterministic network interdiction.” Math. Comput. Model. 17 (2): 1–18. https://doi.org/10.10.1016/0895-7177(93)90236-R.

Information & Authors

Information

Published In

Go to Journal of Infrastructure Systems
Journal of Infrastructure Systems
Volume 25Issue 2June 2019

History

Received: Mar 17, 2018
Accepted: Nov 9, 2018
Published online: Mar 26, 2019
Published in print: Jun 1, 2019
Discussion open until: Aug 26, 2019

Permissions

Request permissions for this article.

Authors

Affiliations

N. Orkun Baycik [email protected]
Assistant Professor, Harry F. Byrd, Jr. School of Business, Shenandoah Univ., Winchester, VA 22601 (corresponding author). Email: [email protected]; [email protected]
Thomas C. Sharkey
Associate Professor, Industrial and Systems Engineering, Rensselaer Polytechnic Institute, Troy, NY 12180.

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share