On auxiliary entity allocation problem in multi-layered interdependent critical infrastructures

Joydeep Banerjee, Arunabha Sen, Chenyang Zhou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Operation of critical infrastructures are highly interdependent on each other. Such dependencies causes failure in these infrastructures to cascade on an initial failure event. Owing to this vulnerability it is imperative to incorporate efficient strategies for their protection. Modifying dependencies by adding additional dependency implications using entities (termed as auxiliary entities) is shown to mitigate this issue to a certain extent. With this finding, in this article we introduce the Auxiliary Entity Allocation problem. The objective is to maximize protection in Power and Communication infrastructures using a budget in number of dependency modifications using the auxiliary entities. The problem is proved to be NP-complete in general case. We provide an optimal solution using Integer Linear program and a heuristic for a restricted case. The efficacy of heuristic with respect to the optimal is judged through experimentation using real world data sets with heuristic deviating 6.75% from optimal on average.

Original languageEnglish (US)
Title of host publicationCritical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers
PublisherSpringer Verlag
Pages25-37
Number of pages13
Volume10242 LNCS
ISBN (Print)9783319713670
DOIs
StatePublished - Jan 1 2017
Event11th International Conference on Critical Information Infrastructures Security, CRITIS 2016 - Paris, France
Duration: Oct 10 2016Oct 12 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10242 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other11th International Conference on Critical Information Infrastructures Security, CRITIS 2016
CountryFrance
CityParis
Period10/10/1610/12/16

Fingerprint

Critical infrastructures
Critical Infrastructure
Communication
Heuristics
Infrastructure
Integer Program
Vulnerability
Linear Program
Experimentation
Cascade
Efficacy
NP-complete problem
Optimal Solution
Maximise

Keywords

  • Auxiliary entity
  • Dependency modification
  • IIM model
  • Interdependent network
  • K most vulnerable entities

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Banerjee, J., Sen, A., & Zhou, C. (2017). On auxiliary entity allocation problem in multi-layered interdependent critical infrastructures. In Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers (Vol. 10242 LNCS, pp. 25-37). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10242 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-71368-7_3

On auxiliary entity allocation problem in multi-layered interdependent critical infrastructures. / Banerjee, Joydeep; Sen, Arunabha; Zhou, Chenyang.

Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers. Vol. 10242 LNCS Springer Verlag, 2017. p. 25-37 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10242 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Banerjee, J, Sen, A & Zhou, C 2017, On auxiliary entity allocation problem in multi-layered interdependent critical infrastructures. in Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers. vol. 10242 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10242 LNCS, Springer Verlag, pp. 25-37, 11th International Conference on Critical Information Infrastructures Security, CRITIS 2016, Paris, France, 10/10/16. https://doi.org/10.1007/978-3-319-71368-7_3
Banerjee J, Sen A, Zhou C. On auxiliary entity allocation problem in multi-layered interdependent critical infrastructures. In Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers. Vol. 10242 LNCS. Springer Verlag. 2017. p. 25-37. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-71368-7_3
Banerjee, Joydeep ; Sen, Arunabha ; Zhou, Chenyang. / On auxiliary entity allocation problem in multi-layered interdependent critical infrastructures. Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers. Vol. 10242 LNCS Springer Verlag, 2017. pp. 25-37 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{903f95ecc90f4c0987fec98f38515263,
title = "On auxiliary entity allocation problem in multi-layered interdependent critical infrastructures",
abstract = "Operation of critical infrastructures are highly interdependent on each other. Such dependencies causes failure in these infrastructures to cascade on an initial failure event. Owing to this vulnerability it is imperative to incorporate efficient strategies for their protection. Modifying dependencies by adding additional dependency implications using entities (termed as auxiliary entities) is shown to mitigate this issue to a certain extent. With this finding, in this article we introduce the Auxiliary Entity Allocation problem. The objective is to maximize protection in Power and Communication infrastructures using a budget in number of dependency modifications using the auxiliary entities. The problem is proved to be NP-complete in general case. We provide an optimal solution using Integer Linear program and a heuristic for a restricted case. The efficacy of heuristic with respect to the optimal is judged through experimentation using real world data sets with heuristic deviating 6.75{\%} from optimal on average.",
keywords = "Auxiliary entity, Dependency modification, IIM model, Interdependent network, K most vulnerable entities",
author = "Joydeep Banerjee and Arunabha Sen and Chenyang Zhou",
year = "2017",
month = "1",
day = "1",
doi = "10.1007/978-3-319-71368-7_3",
language = "English (US)",
isbn = "9783319713670",
volume = "10242 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "25--37",
booktitle = "Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers",
address = "Germany",

}

TY - GEN

T1 - On auxiliary entity allocation problem in multi-layered interdependent critical infrastructures

AU - Banerjee, Joydeep

AU - Sen, Arunabha

AU - Zhou, Chenyang

PY - 2017/1/1

Y1 - 2017/1/1

N2 - Operation of critical infrastructures are highly interdependent on each other. Such dependencies causes failure in these infrastructures to cascade on an initial failure event. Owing to this vulnerability it is imperative to incorporate efficient strategies for their protection. Modifying dependencies by adding additional dependency implications using entities (termed as auxiliary entities) is shown to mitigate this issue to a certain extent. With this finding, in this article we introduce the Auxiliary Entity Allocation problem. The objective is to maximize protection in Power and Communication infrastructures using a budget in number of dependency modifications using the auxiliary entities. The problem is proved to be NP-complete in general case. We provide an optimal solution using Integer Linear program and a heuristic for a restricted case. The efficacy of heuristic with respect to the optimal is judged through experimentation using real world data sets with heuristic deviating 6.75% from optimal on average.

AB - Operation of critical infrastructures are highly interdependent on each other. Such dependencies causes failure in these infrastructures to cascade on an initial failure event. Owing to this vulnerability it is imperative to incorporate efficient strategies for their protection. Modifying dependencies by adding additional dependency implications using entities (termed as auxiliary entities) is shown to mitigate this issue to a certain extent. With this finding, in this article we introduce the Auxiliary Entity Allocation problem. The objective is to maximize protection in Power and Communication infrastructures using a budget in number of dependency modifications using the auxiliary entities. The problem is proved to be NP-complete in general case. We provide an optimal solution using Integer Linear program and a heuristic for a restricted case. The efficacy of heuristic with respect to the optimal is judged through experimentation using real world data sets with heuristic deviating 6.75% from optimal on average.

KW - Auxiliary entity

KW - Dependency modification

KW - IIM model

KW - Interdependent network

KW - K most vulnerable entities

UR - http://www.scopus.com/inward/record.url?scp=85036605144&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85036605144&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-71368-7_3

DO - 10.1007/978-3-319-71368-7_3

M3 - Conference contribution

AN - SCOPUS:85036605144

SN - 9783319713670

VL - 10242 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 25

EP - 37

BT - Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers

PB - Springer Verlag

ER -