Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3132847.3132867acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

HotSpots: Failure Cascades on Heterogeneous Critical Infrastructure Networks

Published: 06 November 2017 Publication History

Abstract

Critical Infrastructure Systems such as transportation, water and power grid systems are vital to our national security, economy, and public safety. Recent events, like the 2012 hurricane Sandy, show how the interdependencies among different CI networks lead to catastrophic failures among the whole system. Hence, analyzing these CI networks, and modeling failure cascades on them becomes a very important problem. However, traditional models either do not take multiple CIs or the dynamics of the system into account, or model it simplistically. In this paper, we study this problem using a heterogeneous network viewpoint. We first construct heterogeneous CI networks with multiple components using national-level datasets. Then we study novel failure maximization problems on these networks, to compute critical nodes in such systems. We then provide HotSpots, a scalable and effective algorithm for these problems, based on careful transformations. Finally, we conduct extensive experiments on real CIS data from multiple US states, and show that our method HotSpots outperforms non-trivial baselines, gives meaningful results and that our approach gives immediate benefits in providing situational-awareness during large-scale failures.

References

[1]
Homeland security infrastructure program (HSIP). https://gii.dhs.gov/HIFLD/hsip-guest.
[2]
Hurricane electrical assessment damage outage tool (HEADOUT). http://www.gss.anl.gov/wp-content/uploads/2015/09/MORS_Presentation_Talaber_WG21_and_WG31_060415.pdf.
[3]
U.S. energy information administration (EIA). https://www.eia.gov/.
[4]
U.S. hurricane mapping. https://hurricanemapping.com/.
[5]
S. Abraham, H. Dhaliwal, R. J. Efford, L. J. Keen, A. McLellan, J. Manley, K. Vollman, N. J. Diaz, T. Ridge, et al. Final report on the august 14, 2003 blackout in the united states and canada: Causes and recommendations. US-Canada Power System Outage Task Force, 2004.
[6]
R. Albert, I. Albert, and G. L. Nakarado. Structural vulnerability of the north american power grid. Phys. Rev. E, 69:025103, feb 2004.
[7]
M. Allen, S. Fernandez, O. Omitaomu, and K. Walker. Application of hybrid geo-spatially granular fragility curves to improve power outage predictions. J Geogr Nat Disast, 4(127):2167--0587, 2014.
[8]
A. M. Barker, E. B. Freer, O. A. Omitaomu, S. J. Fernandez, S. Chinthavali, and J. B. Kodysh. Automating natural disaster impact analysis: An open resource to visually estimate a hurricane's impact on the electric grid. In Southeastcon, pages 1--3, 2013.
[9]
C. Borgs, M. Brautbar, J. Chayes, and B. Lucier. Maximizing social influence in nearly optimal time. In SODA, pages 946--957, Philadelphia, PA, USA, 2014.
[10]
W. N. Bryan. Hurricane Sandy Situation Report. U.S. Department of Energy Office of Electricity Delivery & Energy Reliability, 2012.
[11]
A. L. Buchsbaum, H. Kaplan, A. Rogers, and J. R. Westbrook. A new, simpler linear-time dominators algorithm. ACM Trans. Program. Lang. Syst., 20(6):1265--1296, 1998.
[12]
S. V. Buldyrev, N. W. Shere, and G. A. Cwilich. Interdependent networks with identical degree of mutually dependent nodes. Physical Review, 83(1), 2011.
[13]
C. Chen, J. He, N. Bliss, and H. Tong. On the connectivity of multi-layered networks: Models, measures and optimal control. In ICDM. IEEE, 2015.
[14]
C. Chen, H. Tong, L. Xie, L. Ying, and Q. He. Fascinate: Fast cross-layer dependency inference on multi-layered networks. In KDD. ACM, 2016.
[15]
W. Chen, T. Lin, Z. Tan, M. Zhao, and X. Zhou. Robust influence maximization. In KDD. ACM, 2016.
[16]
H. Daneshmand, M. Gomez-Rodriguez, L. Song, and B. Schoelkopf. Estimating diffusion network structures: Recovery conditions, sample complexity & soft-thresholding algorithm. In ICML, pages 793--801, 2014.
[17]
S. Duan, S. Lee, S. Chinthavali, and M. Shankar. Reliable communication models in interdependent critical infrastructure networks. In Resilience Week (RWS), 2016, pages 152--157. IEEE, 2016.
[18]
L. Dueñas-Osorio, J. I. Craig, and B. J. Goodno. Seismic response of critical interdependent networks. Earthquake Engineering and Structural Dynamics, 36(2):285--306, 2007.
[19]
A. Dwivedi and X. Yu. A maximum-flow-based complex network approach for power system vulnerability analysis. IEEE Transactions on Industrial Informatics, 9(1):81--88, 2013.
[20]
D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In KDD. ACM, 2003.
[21]
J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost-effective outbreak detection in networks. In KDD. ACM, 2007.
[22]
Y.-S. Li, D.-Z. Ma, H.-G. Zhang, and Q.-Y. Sun. Critical nodes identification of power systems based on controllability of complex networks. Applied Sciences, 5(3):622--636, 2015.
[23]
G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of approximations for maximizing submodular set functions i. Mathematical Programming, 14(1):265--294, 1978.
[24]
M. Ouyang. Review on modeling and simulation of interdependent critical infrastructure systems. Reliability Engineering and System Safety, 121:43--60, 2014.
[25]
M. Parandehgheibi and E. Modiano. Robustness of bidirectional interdependent networks: Analysis and design. arXiv preprint arXiv:1605.01262, 2016.
[26]
A. Sen, A. Mazumder, J. Banerjee, A. Das, and R. Compton. Identification of k most vulnerable nodes in multi-layered network using a new model of interdependency. In INFOCOM WKSHPS, pages 831--836. IEEE, 2014.
[27]
H. Tong, B. A. Prakash, C. Tsourakakis, T. Eliassi-Rad, C. Faloutsos, and D. H. Chau. On the vulnerability of large graphs. In Data Mining (ICDM), 2010 IEEE 10th International Conference on, pages 1091--1096. IEEE, 2010.
[28]
U.S. Department of Energy. The Water-Energy Nexus: Challenges and Opportunities, June 2014.
[29]
Y. Yuan, Z. Li, and K. Ren. Modeling load redistribution attacks in power systems. IEEE Transactions on Smart Grid, 2(2):382--390, 2011.

Cited By

View all
  • (2023)Measures and Optimization for Robustness and Vulnerability in Disconnected NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.327997918(3350-3362)Online publication date: 2023
  • (2021)Fast Connectivity Minimization on Large-Scale NetworksACM Transactions on Knowledge Discovery from Data10.1145/344234215:3(1-25)Online publication date: 3-May-2021
  • (2021)When Smart Systems Fail: The Ethics of Cyber–Physical Critical Infrastructure RiskIEEE Transactions on Technology and Society10.1109/TTS.2021.30586052:1(6-14)Online publication date: Mar-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '17: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management
November 2017
2604 pages
ISBN:9781450349185
DOI:10.1145/3132847
Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 November 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. critical infrastructure systems
  2. failure cascade modeling
  3. failure maximization
  4. heterogeneous graph

Qualifiers

  • Research-article

Conference

CIKM '17
Sponsor:

Acceptance Rates

CIKM '17 Paper Acceptance Rate 171 of 855 submissions, 20%;
Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)23
  • Downloads (Last 6 weeks)5
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Measures and Optimization for Robustness and Vulnerability in Disconnected NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.327997918(3350-3362)Online publication date: 2023
  • (2021)Fast Connectivity Minimization on Large-Scale NetworksACM Transactions on Knowledge Discovery from Data10.1145/344234215:3(1-25)Online publication date: 3-May-2021
  • (2021)When Smart Systems Fail: The Ethics of Cyber–Physical Critical Infrastructure RiskIEEE Transactions on Technology and Society10.1109/TTS.2021.30586052:1(6-14)Online publication date: Mar-2021
  • (2021)Efficient Contingency Analysis in Power Systems via Network Trigger Nodes2021 IEEE International Conference on Big Data (Big Data)10.1109/BigData52589.2021.9671465(1964-1973)Online publication date: 15-Dec-2021
  • (2020)Mapping Network States using Connectivity Queries2020 IEEE International Conference on Big Data (Big Data)10.1109/BigData50022.2020.9378355(778-787)Online publication date: 10-Dec-2020
  • (2020)Assessment Methods of Network Resilience for Cyber-Human-Physical SystemsASCE-ASME Journal of Risk and Uncertainty in Engineering Systems, Part A: Civil Engineering10.1061/AJRUA6.00010216:1Online publication date: Mar-2020
  • (2018)Attributed Multi-layer Network Embedding2018 IEEE International Conference on Big Data (Big Data)10.1109/BigData.2018.8621900(3701-3710)Online publication date: Dec-2018

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media