...
首页> 外文期刊>Journal of Infrastructure Systems >Interdiction-Based Approaches to Identify Damage in Disrupted Critical Infrastructures with Dependencies
【24h】

Interdiction-Based Approaches to Identify Damage in Disrupted Critical Infrastructures with Dependencies

机译:基于中断的方法来识别具有依赖关系的受破坏的关键基础设施中的损坏

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper, we consider a problem in which the decision maker only has access to outage reports from service receivers in critical infrastructures with dependencies among them, and our objective is to determine inspection plans to identify the damaged components that lead to the reported outages. This situation could occur, for example, if a cyberattack on the human-machine interface of the infrastructures occurs at the same time a natural hazard damages physical components. The demand nodes within these infrastructure networks may have an outage either from damage that occurred within their infrastructure or due to cascading failures across infrastructures. We present network interdiction-based approaches to identify a set of components to inspect that replicates the service outages reported across the infrastructures. These approaches can be applied in an iterative nature where a particular approach first identifies a set of components across infrastructures to inspect, and then, based on the feedback received from the inspections, determines an updated set of components to inspect. Performance criteria of the proposed approaches are the percentage of successful inspections, which represents the percentage of inspection resources used to successfully identify damaged components. As a benchmark, we applied a breadth-first search (BFS) approach to the problem, which mimics a top-down inspection policy for identifying damaged components within an infrastructure. We tested our approaches on realistic infrastructure systems and demonstrated that they far outperform the BFS approach.
机译:在本文中,我们考虑了一个问题,决策者只能从关键基础架构中具有相关性的服务接收者那里获得服务报告,而我们的目标是确定检查计划,以识别导致报告停机的损坏组件。例如,如果在自然灾害损害物理组件的同时发生了对基础设施的人机界面的网络攻击,则可能会发生这种情况。这些基础结构网络中的需求节点可能因其基础结构内部发生的损坏或由于跨基础结构的级联故障而中断。我们提出了基于网络拦截的方法来识别一组要检查的组件,这些组件可以复制跨基础结构报告的服务中断。这些方法可以迭代的方式应用,其中特定方法首先在跨基础架构中标识要检查的一组组件,然后基于从检查中收到的反馈来确定要检查的一组更新组件。所提出方法的性能标准是成功检查的百分比,它表示用于成功识别损坏组件的检查资源的百分比。作为基准,我们对问题采用了广度优先搜索(BFS)的方法,该方法模仿了从上到下的检查策略,用于识别基础架构中的损坏组件。我们在现实的基础架构系统上测试了我们的方法,并证明它们远胜过BFS方法。

著录项

  • 来源
    《Journal of Infrastructure Systems》 |2019年第2期|04019013.1-04019013.19|共19页
  • 作者单位

    Shenandoah Univ, Harry Byrd Jr Sch Business, Winchester, VA 22601 USA;

    Rensselaer Polytech Inst, Ind & Syst Engn, Troy, NY 12180 USA;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号