Skip to main content

Performance Analysis of Single and Multi-objective Approaches for the Critical Node Detection Problem

Faramondi, L. and Oliva, G. and Setola, R. and Pascucci, F. and Esposito Amideo, Annunziata and Scaparra, Maria Paola (2017) Performance Analysis of Single and Multi-objective Approaches for the Critical Node Detection Problem. In: Sforza, Antonio and Sterle, Claudio, eds. Optimization and Decision Science: Methodologies and Applications. Springer Proceedings in Mathematics & Statistics . Springer, pp. 315-324. ISBN 978-3-319-67307-3. E-ISBN 978-3-319-67308-0. (doi:10.1007/978-3-319-67308-0_32) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)

PDF - Author's Accepted Manuscript
Restricted to Repository staff only
Contact us about this Publication Download (651kB)
[img]
Official URL
https://doi.org/10.1007/978-3-319-67308-0_32

Abstract

Critical infrastructures are network-based systems which are prone to various types of threats (e.g., terroristic or cyber-attacks). Therefore, it is paramount to devise modelling frameworks to assess their ability to withstand external disruptions and to develop protection strategies aimed at improving their robustness and security. In this paper, we compare six modelling approaches for identifying the most critical nodes in infrastructure networks. Three are well-established approaches in the literature, while three are recently proposed frameworks. All the approaches take the perspective of an attacker whose ultimate goal is to inflict maximum damage to a network with minimal effort. Specifically, they assume that a saboteur must decide which nodes to disable so as to disrupt network connectivity as much as possible. The formulations differ in terms of the attacker objectives and connectivity metrics (e.g., trade-off between inflicted damage and attack cost, pair-wise connectivity, size and number of disconnected partitions). We apply the six formulations to the IEEE24 and IEEE118 Power Systems and conduct a comparative analysis of the solutions obtained with different parameters settings. Finally, we use frequency analysis to determine the most critical nodes with respect to different attack strategies.

Item Type: Book section
DOI/Identification number: 10.1007/978-3-319-67308-0_32
Uncontrolled keywords: Critical infrastructures, Network vulnerability, Critical node detection problem
Subjects: H Social Sciences > HA Statistics > HA33 Management Science
Divisions: Faculties > Social Sciences > Kent Business School
Faculties > Social Sciences > Kent Business School > Management Science
Faculties > Social Sciences > Kent Business School > Centre for Logistics and Heuristic Organisation (CLHO)
Depositing User: Maria Paola Scaparra
Date Deposited: 15 Nov 2017 14:53 UTC
Last Modified: 01 Aug 2019 10:42 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/64447 (The current URI for this page, for reference purposes)
Esposito Amideo, Annunziata: https://orcid.org/0000-0002-7284-9690
Scaparra, Maria Paola: https://orcid.org/0000-0002-2725-5439
  • Depositors only (login required):

Downloads

Downloads per month over past year