150 likes | 158 Views
This paper explores the development and security of critical infrastructure in the context of interconnected stem networks. It introduces a modeling platform called CNL (Complex Network Language) to analyze and study the security of interconnected complex networks. The paper also discusses the vulnerabilities and attack schemes of the CNL network structures. The proposed model allows for a better understanding of the security issues in critical infrastructure networks.
E N D
INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical University, Irkutsk, RF troufan@istu.edu
1. Introduction Development and support of infrastructure and security of critical infrastructure are among vital issues of governance in public and private sectors. Modern infrastructure looks like a set of interconnected structural elements that forms a kind of a complex network. Even for complex networks which had been studied intensively for a decade, their exploration still concentrates on the platform of single non-interacting network. It has been recognized that there is a need in elaboration in reliable and transparent tools for studying interconnected complex networks[1-2].
1. Introduction (continuation) Visualization of interconnected Internet AS (autonomous system )-level topologies of South Korea (left) and Japan (right). The size of nodes represents their internal degree, and label of nodes is AS number [http://bgp.potaroo.net/cidr/autnums.html.]. Visualization: Pajek (Batagelj and Mrvar, 2013). See ref. [3]
2. Modeling Platform Within the context of a complex network methodology a conception introducing CNL[4] as stem networks with its intrinsicmultilayered thematic and dynamic nature hasbeen applied.
2. Modeling Platform(continuation 1) The CNL describes a stem network or S-network [5] by the triple (S, T, C), where Sis nonempty set of stems ; T is a nonempty set of thematic layers- which are nonoverlapping sets of stems; C = (C1, C2, ..., Ct)is a set of binary relations on the S, where Ci corresponds thematic layer Ti. In present work the CNL defined as a group of S-networks {S B1, SB2, .. SBm}, describes on beds B ={B1, B2, .. Bm} with thematic layers T ={TB1, TB2, .. TBm}. SB2 SB1 TB21 TB12 TB21 TB21 TB21 TB11
2. Modeling Platform(continuation 2) The associations that explain functioning of real objects - multiplets (pairs, triples, ..), including nonrepeatable stems of different beds (Sm, Sk; Sm, Sk, Sl;…) are called bouquets.
2. Modeling Platform(continuation 3) Bouquets include Stems which firm nodes of networks of the same nature( for example , airlines, railways, boat lines bus lines…). Simple terminology has been applied with aim to bridge diverse disciplines and clusters around CNL.
D-link B-link C-link 2. Modeling Platform(continuation 4) Links - between the stems inside a bouquet represent binary relations (interactions) such as "dependence" ( D-links), which differ from couplings - "connections" (C-links) that govern the interaction between the stems of a bed; couplings of "bindings"- type (B-links ) describe the relationship between the nodes of the same stem
Bouquet of 2 stems , each in its bed is linked with multithread connections 2. Modeling Platform(continuation 5) The "connections" (C-links) govern the interaction between the stems of a bed; These might be multithreaded couplings
Capacities 2. Modeling Platform(continuation 6) Such a detailing of links promotes clarification while modeling attacks on separate elements of a network (nodes, stems, bouquets, beds, layers, links-bindings, links- connections, and links-dependencies ) and their combinations. In order to study the problems of security and sustainable development of systems it is important to take into account internal properties of stems - capacities.
Capacities 2. Modeling Platform(continuation 7) First, capacities are needed to hold loads in a network in terms of centralities ( degree centrality load, bridge centrality load, vicinity centrality load…). Second, those provide safety and security while countering diverse attacks. Time factor t is also included into consideration for reflecting CNL dynamics.
Vulnerability Source of threat Attack Damage 2. Modeling Platform(continuation 8) Attack schemes of the CNL network structures in context of security problems has been reviewed in frame of a simple analysis of signs of major offensive actions, which are important for study of critical infrastructures described by s-networks. The well-known statement of information security theory has been taken into account , the fact that the attack is a pair of "source of threat - vulnerability of a target" , the pair that implements a threat into action and brings to damage.
3. Findings The proposed model allows the following. Elements of critical infrastructure network are considered as stems that stand-alone or interconnected and interdependent within and across countries, states, regions, and local territories. Most facilities of critical infrastructure are proprietary of the private sector or federal, regional, or local governments, and might be stratified into diverse layers on pertinent beds while connected to other systems of the same or different field. All these clarify CNL security issues and promote CNL security strategies. MDG eight goals with 21 targets might be considered accordingly as bouquets and subbouquets . Same concerns a new set of Goals building on the achievements of the MDGs.
4 Summary An advanced supercomplex network model with its qualitative description has been proposed as an extension of previously introduced conception of comprehensive network lace. The model includes multiplets of elements (stems, beds, layers, nodes, links-bindings, links-connections, and links-dependencies) in order to formalize interactions of transportation - technological, socio-organizational and biosocial systems. Clarification of concomitant security problems has been provided.
References 1. J.Gao, S. V. Buldyrev, H.E. Stanley, S. Havlin. Networks formed from interdependentnetworks. Nature Physics . vol. 8, Pp 40–48 (2012). doi:10.1038/nphys2180,http://www.nature.com/nphys/journal/v8/n1/pdf/nphys2180.pdf 2. M. Dickison, S. Havlin, H. E. Stanley. Epidemics on interconnected networks. PHYSICAL REVIEW E 85, 066109 (2012). http://argento.bu.edu/hes/articles/dhs12.pdf 3. F. Tan, J. Wu, Y. Xia, C. K. Tse. Traffic congestion in interconnected complex networks. Phys. Rev. E 89, 062813 (2014). http://arxiv.org/pdf/1401.0412v2.pdf 4. A.Tikhomirov, A. Trufanov. New network models to improve the processes of state regulations.– 42 p. (2012), http://www.pitt.edu/~super1/lecture/lec43841/index.htm (in Russian) 5. A.Tikhomirov, A.Trufanov, L. Nosyreva, E. Nosyreva. Mathematical description ofstem networks Proceedings of XVII Baikal All-Russian Conference. vol. 3. Pp.149- 153 .Irkutsk (2012) (in Russian)