Abstract

Vulnerability assessment of interdependent infrastructure networks (IINs) must be conducted according to a specific situation such as the failure model, the scale of networks, interdependent relationships, infrastructure characteristics, and so on. This paper discusses the development of an interdependent network model for vulnerability assessment by combining the characteristics of community IINs and the design of the maximum flow comprehensive index (MFCI) to describe the performance of interdependent networks based on network flow theory. This study is based on the perspective of an infrastructure manager, and identifies the key nodes of interdependent networks by using the optimal attack strategy when dealing with potential external attacks (i.e., terrorism). It is assumed that attackers are sophisticated and will always choose the optimal attack strategy to maximize vulnerability and minimize the performance of interdependent networks. Because it is difficult to identify key nodes in interdependent networks, we proposed a probabilistic solution discovery algorithm (PSDA) that can accurately calculate the final failure state of interdependent networks regarding the interdependent relationships among networks and relationships inside a network. A case study was conducted to validate the proposed method: using MFCI and PSDA. Moreover, the assessment result was analyzed further with a view to improving infrastructure protection and identifying failure propagation paths. The main contributions of this paper are to propose a vulnerability assessment index system and construct a goal optimization with solving algorithm to provide decision support for the infrastructure managers.

Get full access to this article

View all available purchase options and get full access to this article.

Acknowledgments

The authors gratefully acknowledge the financial support received from the National Natural Science Foundation of China (Grant Nos. 71301175 and 71473285), China Scholarship Council (Grant No. 201606495019), Beijing Higher Education Young Elite Teacher Project (Grant No. YETP1001), CRBC research funding for Research on Contractor Risk Assessment of Highway Project in Montenegro, and Fundamental Research Funds for Central Universities. The authors also acknowledge Mr. Rentian Zhang from Poly Real Estate Group Co., Ltd., for his participation in the research.

References

Alexander, F., T. Katerina, and B. Roland. 2017. “Spatial exposure aspects contributing to vulnerability and resilience assessments of urban critical infrastructure in a flood and blackout context.” Nat. Hazards 86 (1): 151–176. https://doi.org/10.1007/s11069-016-2720-3.
Arboleda, C. A., D. M. Abraham, J. P. P. Richard, and R. Lubitz. 2009. “Vulnerability assessment of health care facilities during disaster events.” J. Infrastruct. Syst. 15 (3): 149–161. https://doi.org/10.1061/(ASCE)1076-0342(2009)15:3(149).
Baker, G. 2005. “A vulnerability assessment methodology for critical infrastructure sites.” In Proc., DHS Symp.: R&D Partnerships in Homeland Security Conf. 2005. West Lafayette, IN: Center for Education and Research in Information Assurance and Security, Purdue Univ.
Beccuti, M., S. Chiaradonna, F. D. Giandomenico, S. Donatelli, G. Dondossola, and G. Franceschinis. 2012. “Quantification of dependencies between electrical and information infrastructures.” Int. J. Crit. Infrastruct. Prot. 5 (1): 14–27. https://doi.org/10.1016/j.ijcip.2012.01.003.
Bier, V. M., L. A. Cox, and M. N. Azaiez. 2009. “Why both game theory and reliability theory are important in defending infrastructure against intelligent attacks.” In Vol. 128 of Game theoretic risk analysis of security threats, 1–11. Boston: Springer.
Cisneros-Saldana, J. I., S. Hosseinian, and S. Butenko. 2018. “Network-based optimization techniques for wind farm location decisions.” Front. Eng. Manage. 5 (4): 533–540. https://doi.org/10.15302/J-FEM-2018025.
Cook, J. L., and J. E. Ramirez-Marquez. 2009. “Optimal design of cluster-based ad-hoc networks using probabilistic solution discovery.” Reliab. Eng. Syst. Saf. 94 (2): 218–228. https://doi.org/10.1016/j.ress.2008.02.015.
Eusgeld, I., C. Nan, and S. Dietz. 2011. “’System-of-systems’ approach for interdependent critical infrastructures.” Reliab. Eng. Syst. Saf. 96 (6): 679–686. https://doi.org/10.1016/j.ress.2010.12.010.
Gouda, A., O. Hosny, and K. Nassar. 2017. “Optimal crew routing for linear repetitive projects using graph theory.” Autom. Constr. 81 (Sep): 411–421. https://doi.org/10.1016/j.autcon.2017.03.007.
Guo, H., C. Zheng, H. C. Iu, and T. Fernando. 2017. “A critical review of cascading failure analysis and modeling of power system.” Renewable Sustainable Energy Rev. 80 (Dec): 9–22. https://doi.org/10.1016/j.rser.2017.05.206.
Hausken, K. 2010. “Defense and attack of complex and dependent systems.” Reliab. Eng. Syst. Saf. 95 (1): 29–42. https://doi.org/10.1016/j.ress.2009.07.006.
Hernandez-Fajardo, I., and L. Dueñas-Osorio. 2013. “Probabilistic study of cascading failures in complex interdependent lifeline systems.” Reliab. Eng. Syst. Saf. 111 (Mar): 260–272. https://doi.org/10.1016/j.ress.2012.10.012.
Holden, R., D. V. Val, R. Burkhard, and S. Nodwell. 2013. “A network flow model for interdependent infrastructures at the local scale.” Saf. Sci. 53 (Mar): 51–60. https://doi.org/10.1016/j.ssci.2012.08.013.
Hu, F. 2018. “A probabilistic solution discovery algorithm for solving 0-1 knapsack problem.” Parallel Algorithms Appl. 33 (6): 618–626. https://doi.org/10.1080/17445760.2017.1314473.
Huang, G., J. H. Wang, C. Chen, C. X. Guo, and B. C. Zhu. 2017. “System resilience enhancement smart grid and beyond.” Front. Eng. Manage. 4 (3): 271–282. https://doi.org/10.15302/J-FEM-2017030.
Ii, E. E. L., J. E. Mitchell, and W. A. Wallace. 2007. “Restoration of services in interdependent infrastructure systems: A network flows approach.” IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 37 (6): 1303–1317. https://doi.org/10.1109/TSMCC.2007.905859.
Janssen, M. A. 2006. “An update on the scholarly networks on resilience, vulnerability, and adaptation within the human dimensions of global environmental change.” Global Environ. Change 16 (3): 240–252. https://doi.org/10.1016/j.gloenvcha.2006.04.001.
Johansson, J., and H. Hassel. 2010. “An approach for modelling interdependent infrastructures in the context of vulnerability analysis.” Reliab. Eng. Syst. Saf. 95 (12): 1335–1344. https://doi.org/10.1016/j.ress.2010.06.010.
Larocca, S., J. Johansson, H. Hassel, and S. Guikema. 2015. “Topological performance measures as surrogates for physical flow models for risk and vulnerability analysis for electric power systems.” Risk Anal. 35 (4): 608–623. https://doi.org/10.1111/risa.12281.
Levitin, G., and K. Hausken. 2010. “Influence of attacker’s target recognition ability on defense strategy in homogeneous parallel systems.” Reliab. Eng. Syst. Saf. 95 (5): 565–572. https://doi.org/10.1016/j.ress.2010.01.007.
Li, R., M. Huang, and X. Wang. 2013. “Resilient network design for fourth-party logistics based on hybrid probability solution discovery algorithm.” Control Decis. 28 (10): 1536–1540. https://doi.org/CNKI:SUN:KZYC.0.2013-10-018.
Li, S., S. Bozidar, and S. Giovanni. 2019a. “Resilience evaluation framework for integrated civil infrastructure–community systems under seismic hazard.” J. Infrastruct. Syst. 25 (2): 04019016. https://doi.org/10.1061/(ASCE)IS.1943-555X.0000492.
Li, Y. L., C. Zhang, C. Z. Jia, X. D. Li, and Y. M. Zhu. 2019b. “Joint optimization of workforce scheduling and routing for restoring a disrupted critical infrastructure.” Reliab. Eng. Syst. Saf. 191 (Nov): 106551. https://doi.org/10.1016/j.ress.2019.106551.
Liu, X., M. Dong, K. Ota, L. T. Yang, and A. Liu. 2016. “Trace malicious source to guarantee cyber security for mass monitor critical infrastructure.” J. Comput. Syst. Sci. 98 (Dec): 1–26. https://doi.org/10.1016/j.jcss.2016.09.008.
Meng, B., N. Li, and D. P. Fang. 2018. “Attributes, challenges and future directions of community resilience.” Front. Eng. Manage. 5 (3): 307–323. https://doi.org/10.15302/J-FEM-2018030.
Michaud, D., and G. E. Apostolakis. 2006. “Methodology for ranking the elements of water-supply networks.” J. Infrastruct. Syst. 12 (4): 230–242. https://doi.org/10.1061/(ASCE)1076-0342(2006)12:4(230).
Nicholson, C. D., K. Barker, and J. E. Ramirez-Marquez. 2016. “Flow-based vulnerability measures for network component importance: Experimentation with preparedness planning.” Reliab. Eng. Syst. Saf. 145 (Jan): 62–73. https://doi.org/10.1016/j.ress.2015.08.014.
Ouyang, M. 2014. “Review on modeling and simulation of interdependent critical infrastructure systems.” Reliab. Eng. Syst. Saf. 121 (Jan): 43–60. https://doi.org/10.1016/j.ress.2013.06.040.
Ouyang, M., and L. Dueñas-Osorio. 2011. “An approach to design interface topologies across interdependent urban infrastructure systems.” Reliab. Eng. Syst. Saf. 96 (11): 1462–1473. https://doi.org/10.1016/j.ress.2011.06.002.
Ouyang, M., L. Hong, Z. J. Mao, M. H. Yu, and F. Qi. 2009. “A methodological approach to analyze vulnerability of interdependent infrastructures.” Simul. Model. Pract. Theory 17 (5): 817–828. https://doi.org/10.1016/j.simpat.2009.02.001.
Pant, R., J. W. Hall, and S. P. Blainey. 2016. “Vulnerability assessment framework for interdependent critical infrastructures: Case-study for Great Britain’s rail network.” Eur. J. Transport Infrastruct. Res. 16 (1): 174–194. https://doi.org/10.18757/ejtir.2016.16.1.3120.
Patterson, S. A., and G. E. Apostolakis. 2007. “Identification of critical locations across multiple infrastructures for terrorist actions.” Reliab. Eng. Syst. Saf. 92 (9): 1183–1203. https://doi.org/10.1016/j.ress.2006.08.004.
Pederson, P., D. Dudenhoeffer, S. Hartley, and M. Permann. 2006. Critical infrastructure interdependency modeling: A survey of US and international research. Idaho Falls, ID: Idaho National Laboratory.
Pregnolato, M., A. Ford, C. Robson, V. Glenis, S. Barr, and R. Dawson. 2016. “Assessing urban strategies for reducing the impacts of extreme weather on infrastructure networks.” R. Soc. Open Sci. 3 (5): 160023. https://doi.org/10.1098/rsos.160023.
Ramirez-Marquez, J. E. 2008. “Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach.” Reliab. Eng. Syst. Saf. 93 (11): 1698–1709. https://doi.org/10.1016/j.ress.2008.01.003.
Ramirez-Marquez, J. E., and C. M. Rocco. 2008. “All-terminal network reliability optimization via probabilistic solution discovery.” Reliab. Eng. Syst. Saf. 93 (11): 1689–1697. https://doi.org/10.1016/j.ress.2008.01.001.
Ramirez-Marquez, J. E., and C. M. Rocco. 2009. “Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery.” Reliab. Eng. Syst. Saf. 94 (5): 913–921. https://doi.org/10.1016/j.ress.2008.10.006.
Ramirez-Marquez, J. E., and C. M. Rocco. 2010. “Evolutionary optimization technique for multi-state two-terminal reliability allocation in multi-objective problems.” IIE Trans. 42 (8): 539–552. https://doi.org/10.1080/07408170903459984.
Ramirez-Marquez, J. E., and C. M. Rocco. 2012. “Vulnerability based robust protection strategy selection in service networks.” Comput. Ind. Eng. 63 (1): 235–242. https://doi.org/10.1016/j.cie.2012.02.016.
Rocco, C. M., and J. E. Ramirez-Marquez. 2010. “A bi-objective approach for shortest-path network interdiction.” Comput. Ind. Eng. 59 (2): 232–240. https://doi.org/10.1016/j.cie.2010.04.004.
Rocco, C. M., J. E. Ramirez-Marquez, D. E. Salazar, and I. Hernandez. 2010. “Implementation of multi-objective optimization for vulnerability analysis of complex networks.” J. Risk Reliab. 224 (5): 87–95. https://doi.org/10.1243/1748006XJRR274.
Svendsen, N., and S. Wolthusen. 2007. “Connectivity models of interdependency in mixed-type critical infrastructure networks.” Inf. Secur. Tech. Rep. 12 (1): 44–55. https://doi.org/10.1016/j.istr.2007.02.005.
UNSC (United Nations Security Council). 2017. “Resolution 2341.” Accessed February 13, 2017. http://www.un.org/zh/documents/view_doc.asp?symbol=S/RES/2341(2017).
Wang, S., H. Liu, M. Ouyang, J. Zhang, and X. Chen. 2013. “Vulnerability analysis of interdependent infrastructure systems under edge attack strategies.” Saf. Sci. 51 (1): 328–337. https://doi.org/10.1016/j.ssci.2012.07.003.
Wang, S. L., H. Liu, and X. G. Chen. 2012. “Vulnerability analysis of interdependent infrastructure systems: A methodological framework.” Physica A 391 (11): 3323–3335. https://doi.org/10.1016/j.physa.2011.12.043.
Wu, B. C., A. P. Tang, and J. Wu. 2016. “Modeling cascading failures in interdependent infrastructures under terrorist attacks.” Reliab. Eng. Syst. Saf. 147 (Mar): 1–8. https://doi.org/10.1016/j.ress.2015.10.019.
Zhang, C., and J. E. Ramirez-Marquez. 2013. “Protecting critical infrastructures against intentional attacks: A two-stage game with incomplete information.” IIE Trans. 45 (3): 244–258. https://doi.org/10.1080/0740817X.2012.676749.
Zhang, C., J. E. Ramirez-Marquez, and Q. Li. 2018. “Locating and protecting facilities from intentional attacks using secrecy.” Reliab. Eng. Syst. Saf. 169 (Jan): 51–62. https://doi.org/10.1016/j.ress.2017.08.005.
Zhang, C., J. E. Ramirez-Marquez, and C. M. Rocco. 2011. “A holistic method for reliability performance assessment and critical components detection in complex networks.” IIE Trans. 43 (9): 661–675. https://doi.org/10.1080/0740817X.2010.546387.
Zhu, H. X., and C. Zhang. 2019. “Expanding a complex networked system for enhancing its reliability evaluated by a new efficient approach.” Reliab. Eng. Syst. Saf. 188 (Aug): 205–220. https://doi.org/10.1016/j.ress.2019.03.029.

Information & Authors

Information

Published In

Go to Journal of Infrastructure Systems
Journal of Infrastructure Systems
Volume 26Issue 2June 2020

History

Received: Dec 6, 2018
Accepted: Oct 22, 2019
Published online: Feb 25, 2020
Published in print: Jun 1, 2020
Discussion open until: Jul 25, 2020

Permissions

Request permissions for this article.

Authors

Affiliations

Associate Professor, School of Management Science and Engineering, Central Univ. of Finance and Economics, Beijing 100081, China. ORCID: https://orcid.org/0000-0002-0580-4791. Email: [email protected]
Postgraduate Research Assistant, School of Management Science and Engineering, Central Univ. of Finance and Economics, Beijing 100081, China. ORCID: https://orcid.org/0000-0003-2601-5393. Email: [email protected]
Professor, School of Management Science and Engineering, Central Univ. of Finance and Economics, Beijing 100081, China. Email: [email protected]
Assistant Professor, Bert S. Turner Dept. of Construction Management, Louisiana State Univ., Baton Rouge, LA 70803 (corresponding author). ORCID: https://orcid.org/0000-0002-9322-7778. Email: [email protected]
Associate Professor, Dept. of Industrial Engineering, Tsinghua Univ., Beijing 100084, China. Email: [email protected]
Postgraduate Research Assistant, School of Management Science and Engineering, Central Univ. of Finance and Economics, Beijing 100081, China. Email: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share