2013
DOI: 10.1145/2461256.2461276
|View full text |Cite
|
Sign up to set email alerts
|

Consequence analysis of complex events on critical U.S. infrastructure

Abstract: How to mitigate a cyber-physical attack that disables the transportation network and releases a cloud of chlorine gas.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…While the complex systems arising within each sector are understood to varying degrees, systems of complex systems are very poorly understood, and it is clear that modeling and simulation will play a critical role in studying their behavior. The importance of interactions among infrastructures has similarly been recognized in creating cities that are more resilient to natural and human-caused disasters and emergencies, and integration of infrastructure simulations remains an important challenge today [Adam et al 2013].…”
Section: Creating Rapidly Composable Distributed Simulationsmentioning
confidence: 99%
“…While the complex systems arising within each sector are understood to varying degrees, systems of complex systems are very poorly understood, and it is clear that modeling and simulation will play a critical role in studying their behavior. The importance of interactions among infrastructures has similarly been recognized in creating cities that are more resilient to natural and human-caused disasters and emergencies, and integration of infrastructure simulations remains an important challenge today [Adam et al 2013].…”
Section: Creating Rapidly Composable Distributed Simulationsmentioning
confidence: 99%
“…A methodology for analysing the compromise of a deployed tactical network has been proposed by Asman et al (2011). Homeland security applications were approached in Kotenko (2007), in some work on multi-agent modelling and simulation of cyber-attacks and cyber-defence; a recent work on how to mitigate a cyber-physical attack that disables the transportation network and releases a cloud of chlorine gas has been published by the US Department of Homeland Security, whose security analysts developed simulation models and tools to analyse the consequences of complex events on critical US infrastructure and resources (Adam et al, 2013); the analysis of ICT infrastructures respect cyber security issues could be addressed even by risk analysis and Monte Carlo simulation using high performance computing (HPC) to solve the computational workload (Baiardi et al, 2011); therefore in most of the cases it could be necessary to include the stochastic components with functional and operational models; for instance this paper addresses the point of combining actions over the real with the cyber battlefield in a coordinated way, indeed this point is supposed to have a major impact on future war operations (Jakobson, 2004).…”
Section: State Of the Art Overviewmentioning
confidence: 99%
“…In addition to such geo-localized data, inference tools need to be developed to efficiently determine share risk groups and improve network design even for medium-sized operator networks. A noteworthy example in this direction is [1].…”
Section: Going Beyond a Graph Representationmentioning
confidence: 99%