Please use this identifier to cite or link to this item:
|Title:||Risk Mitigation Strategies for Critical Infrastructures Based on Graph Centrality Analysis|
|Authors:||STERGIOPOULOS George; KOTZANIKOLAOU Panayiotis; THEOCHARIDOU MARIANTHI; GRITZALIS Dimitris|
|Citation:||INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION vol. 10 p. 34-44|
|Publisher:||ELSEVIER SCIENCE BV|
|Type:||Articles in periodicals and books|
|Abstract:||Dependency risk graphs have been proposed as a tool for analyzing cascading failures due to critical infrastructure dependency chains. However, dependency chain analysis is not by itself adequate to develop an efficient risk mitigation strategy – one that specifies which critical infrastructures should have high priority for applying mitigation controls in order to achieve an optimal reduction in the overall risk. This paper extends previous dependency risk analysis research to implement efficient risk mitigation. This is accomplished by exploring the relation between dependency risk paths and graph centrality characteristics. Graph centrality metrics are applied to design and evaluate the effectiveness of alternative risk mitigation strategies. The experimental evaluations are based on random graphs that simulate common critical infrastructure dependency characteristics as identified by recent empirical studies. The experimental results are used to specify an algorithm that prioritizes critical infrastructure nodes for applying controls in order to achieve efficient risk mitigation.|
|JRC Directorate:||Space, Security and Migration|
Files in This Item:
There are no files associated with this item.
Items in repository are protected by copyright, with all rights reserved, unless otherwise indicated.