DOE Office of Scientific and Technical Information (OSTI.GOV)
Chinthavali, Supriya; Shankar, Mallikarjun
Critical Infrastructure systems(CIs) such as energy, water, transportation and communication are highly interconnected and mutually dependent in complex ways. Robust modeling of CIs interconnections is crucial to identify vulnerabilities in the CIs. We present here a national-scale Infrastructure Vulnerability Analysis System (IVAS) vision leveraging Se- mantic Big Data (SBD) tools, Big Data, and Geographical Information Systems (GIS) tools. We survey existing ap- proaches on vulnerability analysis of critical infrastructures and discuss relevant systems and tools aligned with our vi- sion. Next, we present a generic system architecture and discuss challenges including: (1) Constructing and manag- ing a CI network-of-networks graph,more » (2) Performing analytic operations at scale, and (3) Interactive visualization of ana- lytic output to generate meaningful insights. We argue that this architecture acts as a baseline to realize a national-scale network based vulnerability analysis system.« less
AVQS: attack route-based vulnerability quantification scheme for smart grid.
Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.
AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification. PMID:25152923
Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh
We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. Wemore » develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.« less
Multiple perspective vulnerability analysis of the power network
NASA Astrophysics Data System (ADS)
Wang, Shuliang; Zhang, Jianhua; Duan, Na
2018-02-01
To understand the vulnerability of the power network from multiple perspectives, multi-angle and multi-dimensional vulnerability analysis as well as community based vulnerability analysis are proposed in this paper. Taking into account of central China power grid as an example, correlation analysis of different vulnerability models is discussed. Then, vulnerabilities produced by different vulnerability metrics under the given vulnerability models and failure scenarios are analyzed. At last, applying the community detecting approach, critical areas of central China power grid are identified, Vulnerable and robust communities on both topological and functional perspective are acquired and analyzed. The approach introduced in this paper can be used to help decision makers develop optimal protection strategies. It will be also useful to give a multiple vulnerability analysis of the other infrastructure systems.
2013-12-01
AbdelWahab, “ 2G / 3G Inter-RAT Handover Performance Analysis,” Second European Conference on Antennas and Propagation, pp. 1, 8, 11–16, Nov. 2007. [19] J...RADIO GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS TRANSMITTER DEVELOPMENT FOR HETEROGENEOUS NETWORK VULNERABILITY TESTING by Carson C. McAbee... MOBILE COMMUNICATIONS TRANSMITTER DEVELOPMENT FOR HETEROGENEOUS NETWORK VULNERABILITY TESTING 5. FUNDING NUMBERS 6. AUTHOR(S) Carson C. McAbee
Small vulnerable sets determine large network cascades in power grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Yang; Nishikawa, Takashi; Motter, Adilson E.
The understanding of cascading failures in complex systems has been hindered by the lack of realistic large-scale modeling and analysis that can account for variable system conditions. By using the North American power grid, we identified, quantified, and analyzed the set of network components that are vulnerable to cascading failures under any out of multiple conditions. We show that the vulnerable set consists of a small but topologically central portion of the network and that large cascades are disproportionately more likely to be triggered by initial failures close to this set. These results elucidate aspects of the origins and causesmore » of cascading failures relevant for grid design and operation and demonstrate vulnerability analysis methods that are applicable to a wider class of cascade-prone networks.« less
Small vulnerable sets determine large network cascades in power grids
Yang, Yang; Nishikawa, Takashi; Motter, Adilson E.
2017-11-17
The understanding of cascading failures in complex systems has been hindered by the lack of realistic large-scale modeling and analysis that can account for variable system conditions. By using the North American power grid, we identified, quantified, and analyzed the set of network components that are vulnerable to cascading failures under any out of multiple conditions. We show that the vulnerable set consists of a small but topologically central portion of the network and that large cascades are disproportionately more likely to be triggered by initial failures close to this set. These results elucidate aspects of the origins and causesmore » of cascading failures relevant for grid design and operation and demonstrate vulnerability analysis methods that are applicable to a wider class of cascade-prone networks.« less
NV: Nessus Vulnerability Visualization for the Web
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harrison, Lane; Spahn, Riley B; Iannacone, Michael D
2012-01-01
Network vulnerability is a critical component of network se- curity. Yet vulnerability analysis has received relatively lit- tle attention from the security visualization community. In this paper we describe nv, a web-based Nessus vulnerability visualization. Nv utilizes treemaps and linked histograms to allow system administrators to discover, analyze, and man- age vulnerabilities on their networks. In addition to visual- izing single Nessus scans, nv supports the analysis of sequen- tial scans by showing which vulnerabilities have been fixed, remain open, or are newly discovered. Nv was also designed to operate completely in-browser, to avoid sending sensitive data to outside servers.more » We discuss the design of nv, as well as provide case studies demonstrating vulnerability analysis workflows which include a multiple-node testbed and data from the 2011 VAST Challenge.« less
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.
Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing
2017-01-01
Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.
Measuring Road Network Vulnerability with Sensitivity Analysis
Jun-qiang, Leng; Long-hai, Yang; Liu, Wei-yi; Zhao, Lin
2017-01-01
This paper focuses on the development of a method for road network vulnerability analysis, from the perspective of capacity degradation, which seeks to identify the critical infrastructures in the road network and the operational performance of the whole traffic system. This research involves defining the traffic utility index and modeling vulnerability of road segment, route, OD (Origin Destination) pair and road network. Meanwhile, sensitivity analysis method is utilized to calculate the change of traffic utility index due to capacity degradation. This method, compared to traditional traffic assignment, can improve calculation efficiency and make the application of vulnerability analysis to large actual road network possible. Finally, all the above models and calculation method is applied to actual road network evaluation to verify its efficiency and utility. This approach can be used as a decision-supporting tool for evaluating the performance of road network and identifying critical infrastructures in transportation planning and management, especially in the resource allocation for mitigation and recovery. PMID:28125706
Topological Vulnerability Analysis
NASA Astrophysics Data System (ADS)
Jajodia, Sushil; Noel, Steven
Traditionally, network administrators rely on labor-intensive processes for tracking network configurations and vulnerabilities. This requires a great deal of expertise, and is error prone because of the complexity of networks and associated security data. The interdependencies of network vulnerabilities make traditional point-wise vulnerability analysis inadequate. We describe a Topological Vulnerability Analysis (TVA) approach that analyzes vulnerability dependencies and shows all possible attack paths into a network. From models of the network vulnerabilities and potential attacker exploits, we compute attack graphs that convey the impact of individual and combined vulnerabilities on overall security. TVA finds potential paths of vulnerability through a network, showing exactly how attackers may penetrate a network. From this, we identify key vulnerabilities and provide strategies for protection of critical network assets.
Analysis of Network Vulnerability Under Joint Node and Link Attacks
NASA Astrophysics Data System (ADS)
Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting
2018-03-01
The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.
NASA Astrophysics Data System (ADS)
Ji, Xingpei; Wang, Bo; Liu, Dichen; Dong, Zhaoyang; Chen, Guo; Zhu, Zhenshan; Zhu, Xuedong; Wang, Xunting
2016-10-01
Whether the realistic electrical cyber-physical interdependent networks will undergo first-order transition under random failures still remains a question. To reflect the reality of Chinese electrical cyber-physical system, the "partial one-to-one correspondence" interdependent networks model is proposed and the connectivity vulnerabilities of three realistic electrical cyber-physical interdependent networks are analyzed. The simulation results show that due to the service demands of power system the topologies of power grid and its cyber network are highly inter-similar which can effectively avoid the first-order transition. By comparing the vulnerability curves between electrical cyber-physical interdependent networks and its single-layer network, we find that complex network theory is still useful in the vulnerability analysis of electrical cyber-physical interdependent networks.
Risk assessment by dynamic representation of vulnerability, exploitation, and impact
NASA Astrophysics Data System (ADS)
Cam, Hasan
2015-05-01
Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.
Advanced Fault Diagnosis Methods in Molecular Networks
Habibi, Iman; Emamian, Effat S.; Abdi, Ali
2014-01-01
Analysis of the failure of cell signaling networks is an important topic in systems biology and has applications in target discovery and drug development. In this paper, some advanced methods for fault diagnosis in signaling networks are developed and then applied to a caspase network and an SHP2 network. The goal is to understand how, and to what extent, the dysfunction of molecules in a network contributes to the failure of the entire network. Network dysfunction (failure) is defined as failure to produce the expected outputs in response to the input signals. Vulnerability level of a molecule is defined as the probability of the network failure, when the molecule is dysfunctional. In this study, a method to calculate the vulnerability level of single molecules for different combinations of input signals is developed. Furthermore, a more complex yet biologically meaningful method for calculating the multi-fault vulnerability levels is suggested, in which two or more molecules are simultaneously dysfunctional. Finally, a method is developed for fault diagnosis of networks based on a ternary logic model, which considers three activity levels for a molecule instead of the previously published binary logic model, and provides equations for the vulnerabilities of molecules in a ternary framework. Multi-fault analysis shows that the pairs of molecules with high vulnerability typically include a highly vulnerable molecule identified by the single fault analysis. The ternary fault analysis for the caspase network shows that predictions obtained using the more complex ternary model are about the same as the predictions of the simpler binary approach. This study suggests that by increasing the number of activity levels the complexity of the model grows; however, the predictive power of the ternary model does not appear to be increased proportionally. PMID:25290670
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-05-03
This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-01-01
This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
Identifying and tracking attacks on networks: C3I displays and related technologies
NASA Astrophysics Data System (ADS)
Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.
2003-09-01
Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.
Vulnerability Analysis and Evaluation of Urban Road System in Tianjin
NASA Astrophysics Data System (ADS)
Liu, Y. Q.; Wu, X.
In recent years, with the development of economy, the road construction of our country has entered into a period of rapid growth. The road transportation network has been expanding and the risk of disasters is increasing. In this paper we study the vulnerability of urban road system in Tianjin. After analyzed many risk factors of the urban road system security, including road construction, road traffic and the natural environment, we proposed an evaluation index of vulnerability of urban road system and established the corresponding evaluation index system. Based on the results of analysis and comprehensive evaluation, appropriate improvement measures and suggestions which may reduce the vulnerability of the road system and improve the safety and reliability of the road system are proposed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pollet, J.
2006-07-01
This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-criticalmore » networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)« less
Failure Analysis of Network Based Accessible Pedestrian Signals in Closed-Loop Operation
DOT National Transportation Integrated Search
2011-03-01
The potential failure modes of a network based accessible pedestrian system were analyzed to determine the limitations and benefits of closed-loop operation. The vulnerabilities of the system are accessed using the industry standard process known as ...
Assessment of Critical Events Corridors through Multivariate Cascading Outages Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Makarov, Yuri V.; Samaan, Nader A.; Diao, Ruisheng
2011-10-17
Massive blackouts of electrical power systems in North America over the past decade has focused increasing attention upon ways to identify and simulate network events that may potentially lead to widespread network collapse. This paper summarizes a method to simulate power-system vulnerability to cascading failures to a supplied set of initiating events synonymously termed as Extreme Events. The implemented simulation method is currently confined to simulating steady state power-system response to a set of extreme events. The outlined method of simulation is meant to augment and provide a new insight into bulk power transmission network planning that at present remainsmore » mainly confined to maintaining power system security for single and double component outages under a number of projected future network operating conditions. Although one of the aims of this paper is to demonstrate the feasibility of simulating network vulnerability to cascading outages, a more important goal has been to determine vulnerable parts of the network that may potentially be strengthened in practice so as to mitigate system susceptibility to cascading failures. This paper proposes to demonstrate a systematic approach to analyze extreme events and identify vulnerable system elements that may be contributing to cascading outages. The hypothesis of critical events corridors is proposed to represent repeating sequential outages that can occur in the system for multiple initiating events. The new concept helps to identify system reinforcements that planners could engineer in order to 'break' the critical events sequences and therefore lessen the likelihood of cascading outages. This hypothesis has been successfully validated with a California power system model.« less
A graph-based system for network-vulnerability analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.
1998-06-01
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
NASA Astrophysics Data System (ADS)
Chen, Junhua
2013-03-01
To cope with a large amount of data in current sensed environments, decision aid tools should provide their understanding of situations in a time-efficient manner, so there is an increasing need for real-time network security situation awareness and threat assessment. In this study, the state transition model of vulnerability in the network based on semi-Markov process is proposed at first. Once events are triggered by an attacker's action or system response, the current states of the vulnerabilities are known. Then we calculate the transition probabilities of the vulnerability from the current state to security failure state. Furthermore in order to improve accuracy of our algorithms, we adjust the probabilities that they exploit the vulnerability according to the attacker's skill level. In the light of the preconditions and post-conditions of vulnerabilities in the network, attack graph is built to visualize security situation in real time. Subsequently, we predict attack path, recognize attack intention and estimate the impact through analysis of attack graph. These help administrators to insight into intrusion steps, determine security state and assess threat. Finally testing in a network shows that this method is reasonable and feasible, and can undertake tremendous analysis task to facilitate administrators' work.
A user exposure based approach for non-structural road network vulnerability analysis
Jin, Lei; Wang, Haizhong; Yu, Le; Liu, Lin
2017-01-01
Aiming at the dense urban road network vulnerability without structural negative consequences, this paper proposes a novel non-structural road network vulnerability analysis framework. Three aspects of the framework are mainly described: (i) the rationality of non-structural road network vulnerability, (ii) the metrics for negative consequences accounting for variant road conditions, and (iii) the introduction of a new vulnerability index based on user exposure. Based on the proposed methodology, a case study in the Sioux Falls network which was usually threatened by regular heavy snow during wintertime is detailedly discussed. The vulnerability ranking of links of Sioux Falls network with respect to heavy snow scenario is identified. As a result of non-structural consequences accompanied by conceivable degeneration of network, there are significant increases in generalized travel time costs which are measurements for “emotionally hurt” of topological road network. PMID:29176832
Comparison analysis on vulnerability of metro networks based on complex network
NASA Astrophysics Data System (ADS)
Zhang, Jianhua; Wang, Shuliang; Wang, Xiaoyuan
2018-04-01
This paper analyzes the networked characteristics of three metro networks, and two malicious attacks are employed to investigate the vulnerability of metro networks based on connectivity vulnerability and functionality vulnerability. Meanwhile, the networked characteristics and vulnerability of three metro networks are compared with each other. The results show that Shanghai metro network has the largest transport capacity, Beijing metro network has the best local connectivity and Guangzhou metro network has the best global connectivity, moreover Beijing metro network has the best homogeneous degree distribution. Furthermore, we find that metro networks are very vulnerable subjected to malicious attacks, and Guangzhou metro network has the best topological structure and reliability among three metro networks. The results indicate that the proposed methodology is feasible and effective to investigate the vulnerability and to explore better topological structure of metro networks.
Why do vulnerability cycles matter in financial networks?
NASA Astrophysics Data System (ADS)
Silva, Thiago Christiano; Tabak, Benjamin Miranda; Guerra, Solange Maria
2017-04-01
We compare two widely employed models that estimate systemic risk: DebtRank and Differential DebtRank. We show that not only network cyclicality but also the average vulnerability of banks are essential concepts that contribute to widening the gap in the systemic risk estimates of both approaches. We find that systemic risk estimates are the same whenever the network has no cycles. However, in case the network presents cyclicality, then we need to inspect the average vulnerability of banks to estimate the underestimation gap. We find that the gap is small regardless of the cyclicality of the network when its average vulnerability is large. In contrast, the observed gap follows a quadratic behavior when the average vulnerability is small or intermediate. We show results using an econometric exercise and draw guidelines both on artificial and real-world financial networks.
Grid Transmission Expansion Planning Model Based on Grid Vulnerability
NASA Astrophysics Data System (ADS)
Tang, Quan; Wang, Xi; Li, Ting; Zhang, Quanming; Zhang, Hongli; Li, Huaqiang
2018-03-01
Based on grid vulnerability and uniformity theory, proposed global network structure and state vulnerability factor model used to measure different grid models. established a multi-objective power grid planning model which considering the global power network vulnerability, economy and grid security constraint. Using improved chaos crossover and mutation genetic algorithm to optimize the optimal plan. For the problem of multi-objective optimization, dimension is not uniform, the weight is not easy given. Using principal component analysis (PCA) method to comprehensive assessment of the population every generation, make the results more objective and credible assessment. the feasibility and effectiveness of the proposed model are validated by simulation results of Garver-6 bus system and Garver-18 bus.
Analysis of Network Address Shuffling as a Moving Target Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carroll, Thomas E.; Crouse, Michael B.; Fulp, Errin W.
2014-06-10
Address shuffling is a type of moving target defense that prevents an attacker from reliably contacting a system by periodically remapping network addresses. Although limited testing has demonstrated it to be effective, little research has been conducted to examine the theoretical limits of address shuffling. As a result, it is difficult to understand how effective shuffling is and under what circumstances it is a viable moving target defense. This paper introduces probabilistic models that can provide insight into the performance of address shuffling. These models quantify the probability of attacker success in terms of network size, quantity of addresses scanned,more » quantity of vulnerable systems, and the frequency of shuffling. Theoretical analysis will show that shuffling is an acceptable defense if there is a small population of vulnerable systems within a large network address space, however shuffling has a cost for legitimate users. These results will also be shown empirically using simulation and actual traffic traces.« less
A preliminary analysis of quantifying computer security vulnerability data in "the wild"
NASA Astrophysics Data System (ADS)
Farris, Katheryn A.; McNamara, Sean R.; Goldstein, Adam; Cybenko, George
2016-05-01
A system of computers, networks and software has some level of vulnerability exposure that puts it at risk to criminal hackers. Presently, most vulnerability research uses data from software vendors, and the National Vulnerability Database (NVD). We propose an alternative path forward through grounding our analysis in data from the operational information security community, i.e. vulnerability data from "the wild". In this paper, we propose a vulnerability data parsing algorithm and an in-depth univariate and multivariate analysis of the vulnerability arrival and deletion process (also referred to as the vulnerability birth-death process). We find that vulnerability arrivals are best characterized by the log-normal distribution and vulnerability deletions are best characterized by the exponential distribution. These distributions can serve as prior probabilities for future Bayesian analysis. We also find that over 22% of the deleted vulnerability data have a rate of zero, and that the arrival vulnerability data is always greater than zero. Finally, we quantify and visualize the dependencies between vulnerability arrivals and deletions through a bivariate scatterplot and statistical observations.
Design of a Forecasting Service System for Monitoring of Vulnerabilities of Sensor Networks
NASA Astrophysics Data System (ADS)
Song, Jae-Gu; Kim, Jong Hyun; Seo, Dong Il; Kim, Seoksoo
This study aims to reduce security vulnerabilities of sensor networks which transmit data in an open environment by developing a forecasting service system. The system is to remove or monitor causes of breach incidents in advance. To that end, this research first examines general security vulnerabilities of sensor networks and analyzes characteristics of existing forecasting systems. Then, 5 steps of a forecasting service system are proposed in order to improve security responses.
Chopra, Shauhrat S; Dillon, Trent; Bilec, Melissa M; Khanna, Vikas
2016-05-01
Modern society is increasingly dependent on the stability of a complex system of interdependent infrastructure sectors. It is imperative to build resilience of large-scale infrastructures like metro systems for addressing the threat of natural disasters and man-made attacks in urban areas. Analysis is needed to ensure that these systems are capable of withstanding and containing unexpected perturbations, and develop heuristic strategies for guiding the design of more resilient networks in the future. We present a comprehensive, multi-pronged framework that analyses information on network topology, spatial organization and passenger flow to understand the resilience of the London metro system. Topology of the London metro system is not fault tolerant in terms of maintaining connectivity at the periphery of the network since it does not exhibit small-world properties. The passenger strength distribution follows a power law, suggesting that while the London metro system is robust to random failures, it is vulnerable to disruptions on a few critical stations. The analysis further identifies particular sources of structural and functional vulnerabilities that need to be mitigated for improving the resilience of the London metro network. The insights from our framework provide useful strategies to build resilience for both existing and upcoming metro systems. © 2016 The Author(s).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Sangkeun; Chen, Liangzhe; Duan, Sisi
Abstract Critical Infrastructures (CIs) such as energy, water, and transportation are complex networks that are crucial for sustaining day-to-day commodity flows vital to national security, economic stability, and public safety. The nature of these CIs is such that failures caused by an extreme weather event or a man-made incident can trigger widespread cascading failures, sending ripple effects at regional or even national scales. To minimize such effects, it is critical for emergency responders to identify existing or potential vulnerabilities within CIs during such stressor events in a systematic and quantifiable manner and take appropriate mitigating actions. We present here amore » novel critical infrastructure monitoring and analysis system named URBAN-NET. The system includes a software stack and tools for monitoring CIs, pre-processing data, interconnecting multiple CI datasets as a heterogeneous network, identifying vulnerabilities through graph-based topological analysis, and predicting consequences based on what-if simulations along with visualization. As a proof-of-concept, we present several case studies to show the capabilities of our system. We also discuss remaining challenges and future work.« less
Vulnerability survival analysis: a novel approach to vulnerability management
NASA Astrophysics Data System (ADS)
Farris, Katheryn A.; Sullivan, John; Cybenko, George
2017-05-01
Computer security vulnerabilities span across large, enterprise networks and have to be mitigated by security engineers on a routine basis. Presently, security engineers will assess their "risk posture" through quantifying the number of vulnerabilities with a high Common Vulnerability Severity Score (CVSS). Yet, little to no attention is given to the length of time by which vulnerabilities persist and survive on the network. In this paper, we review a novel approach to quantifying the length of time a vulnerability persists on the network, its time-to-death, and predictors of lower vulnerability survival rates. Our contribution is unique in that we apply the cox proportional hazards regression model to real data from an operational IT environment. This paper provides a mathematical overview of the theory behind survival analysis methods, a description of our vulnerability data, and an interpretation of the results.
Graph modeling systems and methods
Neergaard, Mike
2015-10-13
An apparatus and a method for vulnerability and reliability modeling are provided. The method generally includes constructing a graph model of a physical network using a computer, the graph model including a plurality of terminating vertices to represent nodes in the physical network, a plurality of edges to represent transmission paths in the physical network, and a non-terminating vertex to represent a non-nodal vulnerability along a transmission path in the physical network. The method additionally includes evaluating the vulnerability and reliability of the physical network using the constructed graph model, wherein the vulnerability and reliability evaluation includes a determination of whether each terminating and non-terminating vertex represents a critical point of failure. The method can be utilized to evaluate wide variety of networks, including power grid infrastructures, communication network topologies, and fluid distribution systems.
Analysis, calculation and utilization of the k-balance attribute in interdependent networks
NASA Astrophysics Data System (ADS)
Liu, Zheng; Li, Qing; Wang, Dan; Xu, Mingwei
2018-05-01
Interdependent networks, where two networks depend on each other, are becoming more and more significant in modern systems. From previous work, it can be concluded that interdependent networks are more vulnerable than a single network. The robustness in interdependent networks deserves special attention. In this paper, we propose a metric of robustness from a new perspective-the balance. First, we define the balance-coefficient of the interdependent system. Based on precise analysis and derivation, we prove some significant theories and provide an efficient algorithm to compute the balance-coefficient. Finally, we propose an optimal solution to reduce the balance-coefficient to enhance the robustness of the given system. Comprehensive experiments confirm the efficiency of our algorithms.
Method and tool for network vulnerability analysis
Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM
2006-03-14
A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."
Rautureau, S; Dufour, B; Durand, B
2012-07-01
The networks generated by live animal movements are the principal vector for the propagation of infectious agents between farms, and their topology strongly affects how fast a disease may spread. The structural characteristics of networks may thus provide indicators of network vulnerability to the spread of infectious disease. This study applied social network analysis methods to describe the French swine trade network. Initial analysis involved calculating several parameters to characterize networks and then identifying high-risk subgroups of holdings for different time scales. Holding-specific centrality measurements ('degree', 'betweenness' and 'ingoing infection chain'), which summarize the place and the role of holdings in the network, were compared according to the production type. In addition, network components and communities, areas where connectedness is particularly high and could influence the speed and the extent of a disease, were identified and analysed. Dealer holdings stood out because of their high centrality values suggesting that these holdings may control the flow of animals in part of the network. Herds with growing units had higher values for degree and betweenness centrality, representing central positions for both spreading and receiving disease, whereas herds with finishing units had higher values for in-degree and ingoing infection chain centrality values and appeared more vulnerable with many contacts through live animal movements and thus at potentially higher risk for introduction of contagious diseases. This reflects the dynamics of the swine trade with downward movements along the production chain. But, the significant heterogeneity of farms with several production units did not reveal any particular type of production for targeting disease surveillance or control. Besides, no giant strong connected component was observed, the network being rather organized according to communities of small or medium size (<20% of network size). Because of this fragmentation, the swine trade network appeared less structurally vulnerable than ruminant trade networks. This fragmentation is explained by the hierarchical structure, which thus limits the structural vulnerability of the global trade network. However, inside communities, the hierarchical structure of the swine production system would favour the spread of an infectious agent (especially if introduced in breeding herds).
Security Investment in Contagious Networks.
Hasheminasab, Seyed Alireza; Tork Ladani, Behrouz
2018-01-16
Security of the systems is normally interdependent in such a way that security risks of one part affect other parts and threats spread through the vulnerable links in the network. So, the risks of the systems can be mitigated through investments in the security of interconnecting links. This article takes an innovative look at the problem of security investment of nodes on their vulnerable links in a given contagious network as a game-theoretic model that can be applied to a variety of applications including information systems. In the proposed game model, each node computes its corresponding risk based on the value of its assets, vulnerabilities, and threats to determine the optimum level of security investments on its external links respecting its limited budget. Furthermore, direct and indirect nonlinear influences of a node's security investment on the risks of other nodes are considered. The existence and uniqueness of the game's Nash equilibrium in the proposed game are also proved. Further analysis of the model in a practical case revealed that taking advantage of the investment effects of other players, perfectly rational players (i.e., those who use the utility function of the proposed game model) make more cost-effective decisions than selfish nonrational or semirational players. © 2018 Society for Risk Analysis.
An Analysis of Botnet Vulnerabilities
2007-06-01
Definition Currently, the primary defense against botnets is prompt patching of vulnerable systems and antivirus software . Network monitoring can identify...IRCd software , none were identified during this effort. AFIT iv For my wife, for her caring and support throughout the course of this...are software agents designed to automatically perform tasks. Examples include web-spiders that catalog the Internet and bots found in popular online
Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks
NASA Astrophysics Data System (ADS)
Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi
2016-09-01
The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems.
Information Assurance as a System of Systems in the Submarine Force
2013-09-01
cause and effect on overall ship mission and vulnerabilities . Organizational governance must raise the level of awareness as to network security...understand the cause and effect on overall ship mission and vulnerabilities . Organizational governance must raise the level of awareness as to network...Table 2. Assessment Scale– Vulnerability Severity (After NIST 800–30 Rev1 2012, F-2
ESB-based Sensor Web integration for the prediction of electric power supply system vulnerability.
Stoimenov, Leonid; Bogdanovic, Milos; Bogdanovic-Dinic, Sanja
2013-08-15
Electric power supply companies increasingly rely on enterprise IT systems to provide them with a comprehensive view of the state of the distribution network. Within a utility-wide network, enterprise IT systems collect data from various metering devices. Such data can be effectively used for the prediction of power supply network vulnerability. The purpose of this paper is to present the Enterprise Service Bus (ESB)-based Sensor Web integration solution that we have developed with the purpose of enabling prediction of power supply network vulnerability, in terms of a prediction of defect probability for a particular network element. We will give an example of its usage and demonstrate our vulnerability prediction model on data collected from two different power supply companies. The proposed solution is an extension of the GinisSense Sensor Web-based architecture for collecting, processing, analyzing, decision making and alerting based on the data received from heterogeneous data sources. In this case, GinisSense has been upgraded to be capable of operating in an ESB environment and combine Sensor Web and GIS technologies to enable prediction of electric power supply system vulnerability. Aside from electrical values, the proposed solution gathers ambient values from additional sensors installed in the existing power supply network infrastructure. GinisSense aggregates gathered data according to an adapted Omnibus data fusion model and applies decision-making logic on the aggregated data. Detected vulnerabilities are visualized to end-users through means of a specialized Web GIS application.
ESB-Based Sensor Web Integration for the Prediction of Electric Power Supply System Vulnerability
Stoimenov, Leonid; Bogdanovic, Milos; Bogdanovic-Dinic, Sanja
2013-01-01
Electric power supply companies increasingly rely on enterprise IT systems to provide them with a comprehensive view of the state of the distribution network. Within a utility-wide network, enterprise IT systems collect data from various metering devices. Such data can be effectively used for the prediction of power supply network vulnerability. The purpose of this paper is to present the Enterprise Service Bus (ESB)-based Sensor Web integration solution that we have developed with the purpose of enabling prediction of power supply network vulnerability, in terms of a prediction of defect probability for a particular network element. We will give an example of its usage and demonstrate our vulnerability prediction model on data collected from two different power supply companies. The proposed solution is an extension of the GinisSense Sensor Web-based architecture for collecting, processing, analyzing, decision making and alerting based on the data received from heterogeneous data sources. In this case, GinisSense has been upgraded to be capable of operating in an ESB environment and combine Sensor Web and GIS technologies to enable prediction of electric power supply system vulnerability. Aside from electrical values, the proposed solution gathers ambient values from additional sensors installed in the existing power supply network infrastructure. GinisSense aggregates gathered data according to an adapted Omnibus data fusion model and applies decision-making logic on the aggregated data. Detected vulnerabilities are visualized to end-users through means of a specialized Web GIS application. PMID:23955435
A Methodology for Assessing the Seismic Vulnerability of Highway Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cirianni, Francis; Leonardi, Giovanni; Scopelliti, Francesco
2008-07-08
Modern society is totally dependent on a complex and articulated infrastructure network of vital importance for the existence of the urban settlements scattered on the territory. On these infrastructure systems, usually indicated with the term lifelines, are entrusted numerous services and indispensable functions of the normal urban and human activity.The systems of the lifelines represent an essential element in all the urbanised areas which are subject to seismic risk. It is important that, in these zones, they are planned according to opportune criteria based on two fundamental assumptions: a) determination of the best territorial localization, avoiding, within limits, the placesmore » of higher dangerousness; b) application of constructive technologies finalized to the reduction of the vulnerability.Therefore it is indispensable that in any modern process of seismic risk assessment the study of the networks is taken in the rightful consideration, to be integrated with the traditional analyses of the buildings.The present paper moves in this direction, dedicating particular attention to one kind of lifeline: the highway system, proposing a methodology of analysis finalized to the assessment of the seismic vulnerability of the system.« less
Topological Analysis of Wireless Networks (TAWN)
2016-05-31
transmissions from any other node. Definition 1. A wireless network vulnerability is its susceptibility to becoming disconnected when a single source of...19b. TELEPHONE NUMBER (Include area code) 31-05-2016 FINAL REPORT 12-02-2015 -- 31-05-2016 Topological Analysis of Wireless Networks (TAWN) Robinson...Release, Distribution Unlimited) N/A The goal of this project was to develop topological methods to detect and localize vulnerabilities of wireless
Lin, Yuxin; Chen, Feifei; Shen, Li; Tang, Xiaoyu; Du, Cui; Sun, Zhandong; Ding, Huijie; Chen, Jiajia; Shen, Bairong
2018-05-21
Prostate cancer (PCa) is a fatal malignant tumor among males in the world and the metastasis is a leading cause for PCa death. Biomarkers are therefore urgently needed to detect PCa metastatic signature at the early time. MicroRNAs are small non-coding RNAs with the potential to be biomarkers for disease prediction. In addition, computer-aided biomarker discovery is now becoming an attractive paradigm for precision diagnosis and prognosis of complex diseases. In this study, we identified key microRNAs as biomarkers for predicting PCa metastasis based on network vulnerability analysis. We first extracted microRNAs and mRNAs that were differentially expressed between primary PCa and metastatic PCa (MPCa) samples. Then we constructed the MPCa-specific microRNA-mRNA network and screened microRNA biomarkers by a novel bioinformatics model. The model emphasized the characterization of systems stability changes and the network vulnerability with three measurements, i.e. the structurally single-line regulation, the functional importance of microRNA targets and the percentage of transcription factor genes in microRNA unique targets. With this model, we identified five microRNAs as putative biomarkers for PCa metastasis. Among them, miR-101-3p and miR-145-5p have been previously reported as biomarkers for PCa metastasis and the remaining three, i.e. miR-204-5p, miR-198 and miR-152, were screened as novel biomarkers for PCa metastasis. The results were further confirmed by the assessment of their predictive power and biological function analysis. Five microRNAs were identified as candidate biomarkers for predicting PCa metastasis based on our network vulnerability analysis model. The prediction performance, literature exploration and functional enrichment analysis convinced our findings. This novel bioinformatics model could be applied to biomarker discovery for other complex diseases.
Developing an intelligence analysis process through social network analysis
NASA Astrophysics Data System (ADS)
Waskiewicz, Todd; LaMonica, Peter
2008-04-01
Intelligence analysts are tasked with making sense of enormous amounts of data and gaining an awareness of a situation that can be acted upon. This process can be extremely difficult and time consuming. Trying to differentiate between important pieces of information and extraneous data only complicates the problem. When dealing with data containing entities and relationships, social network analysis (SNA) techniques can be employed to make this job easier. Applying network measures to social network graphs can identify the most significant nodes (entities) and edges (relationships) and help the analyst further focus on key areas of concern. Strange developed a model that identifies high value targets such as centers of gravity and critical vulnerabilities. SNA lends itself to the discovery of these high value targets and the Air Force Research Laboratory (AFRL) has investigated several network measures such as centrality, betweenness, and grouping to identify centers of gravity and critical vulnerabilities. Using these network measures, a process for the intelligence analyst has been developed to aid analysts in identifying points of tactical emphasis. Organizational Risk Analyzer (ORA) and Terrorist Modus Operandi Discovery System (TMODS) are the two applications used to compute the network measures and identify the points to be acted upon. Therefore, the result of leveraging social network analysis techniques and applications will provide the analyst and the intelligence community with more focused and concentrated analysis results allowing them to more easily exploit key attributes of a network, thus saving time, money, and manpower.
NASA Astrophysics Data System (ADS)
Chopra, Shauhrat S.; Khanna, Vikas
2015-10-01
Natural disasters in 2011 yielded close to 55 billion in economic damages alone in the United States (US), which highlights the need to reduce impacts of such disasters or other deliberate attacks. The US Department of Homeland Security (DHS) identifies a list of 16 Critical Infrastructure Sectors (CIS) whose incapacity due to disruptions would have a debilitating impact on the nation's economy. The goal of this work is to understand the implications of interdependencies among CIS on the resilience of the US economic system as a whole. We develop a framework that combines the empirical economic input-output (EIO) model with graph theory based techniques for understanding interdependencies, interconnectedness and resilience in the US economic system. By representing the US economy as a network, we are able to analyze its topology by separately looking at its unweighted and weighted forms. Topological analysis of the US EIO network suggests that it exhibits small world properties for the unweighted case, and in the weighted case, the throughput of industry sectors follows a power-law with an exponential cutoff. Implications of these topological properties are discussed in the paper. We also simulate hypothetical disruptions on CIS in order to identify industrial sectors that experience the largest economic impacts, and to quantify systemic vulnerability in economic terms. In addition, insights from community detection and hypothetical disruption scenarios help assess vulnerability of individual industrial communities to disruptions on individual CIS. These methodologies also provide insights regarding the extent of coupling between each CIS in the US EIO network. Based on our analysis, we observe that excessive interconnectedness and interdependencies of CIS results in high systemic vulnerability. This information can guide policymakers to design policies that improve resilience of economic networks, and evaluate policies that might indirectly increase coupling between CIS.
An adaptive neural swarm approach for intrusion defense in ad hoc networks
NASA Astrophysics Data System (ADS)
Cannady, James
2011-06-01
Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.
Cascading Failures and Recovery in Networks of Networks
NASA Astrophysics Data System (ADS)
Havlin, Shlomo
Network science have been focused on the properties of a single isolated network that does not interact or depends on other networks. In reality, many real-networks, such as power grids, transportation and communication infrastructures interact and depend on other networks. I will present a framework for studying the vulnerability and the recovery of networks of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes like certain locations play a role in two networks -multiplex. This may happen recursively and can lead to a cascade of failures and to a sudden fragmentation of the system. I will present analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. I will show, that the general theory has many novel features that are not present in the classical network theory. When recovery of components is possible global spontaneous recovery of the networks and hysteresis phenomena occur and the theory suggests an optimal repairing strategy of system of systems. I will also show that interdependent networks embedded in space are significantly more vulnerable compared to non embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences.Thus, analyzing data of real network of networks is highly required to understand the system vulnerability. DTRA, ONR, Israel Science Foundation.
NASA Astrophysics Data System (ADS)
Azevedo, Hátylas; Moreira-Filho, Carlos Alberto
2015-11-01
Biological networks display high robustness against random failures but are vulnerable to targeted attacks on central nodes. Thus, network topology analysis represents a powerful tool for investigating network susceptibility against targeted node removal. Here, we built protein interaction networks associated with chemoresistance to temozolomide, an alkylating agent used in glioma therapy, and analyzed their modular structure and robustness against intentional attack. These networks showed functional modules related to DNA repair, immunity, apoptosis, cell stress, proliferation and migration. Subsequently, network vulnerability was assessed by means of centrality-based attacks based on the removal of node fractions in descending orders of degree, betweenness, or the product of degree and betweenness. This analysis revealed that removing nodes with high degree and high betweenness was more effective in altering networks’ robustness parameters, suggesting that their corresponding proteins may be particularly relevant to target temozolomide resistance. In silico data was used for validation and confirmed that central nodes are more relevant for altering proliferation rates in temozolomide-resistant glioma cell lines and for predicting survival in glioma patients. Altogether, these results demonstrate how the analysis of network vulnerability to topological attack facilitates target prioritization for overcoming cancer chemoresistance.
[Mapping environmental vulnerability from ETM + data in the Yellow River Mouth Area].
Wang, Rui-Yan; Yu, Zhen-Wen; Xia, Yan-Ling; Wang, Xiang-Feng; Zhao, Geng-Xing; Jiang, Shu-Qian
2013-10-01
The environmental vulnerability retrieval is important to support continuing data. The spatial distribution of regional environmental vulnerability was got through remote sensing retrieval. In view of soil and vegetation, the environmental vulnerability evaluation index system was built, and the environmental vulnerability of sampling points was calculated by the AHP-fuzzy method, then the correlation between the sampling points environmental vulnerability and ETM + spectral reflectance ratio including some kinds of conversion data was analyzed to determine the sensitive spectral parameters. Based on that, models of correlation analysis, traditional regression, BP neural network and support vector regression were taken to explain the quantitative relationship between the spectral reflectance and the environmental vulnerability. With this model, the environmental vulnerability distribution was retrieved in the Yellow River Mouth Area. The results showed that the correlation between the environmental vulnerability and the spring NDVI, the September NDVI and the spring brightness was better than others, so they were selected as the sensitive spectral parameters. The model precision result showed that in addition to the support vector model, the other model reached the significant level. While all the multi-variable regression was better than all one-variable regression, and the model accuracy of BP neural network was the best. This study will serve as a reliable theoretical reference for the large spatial scale environmental vulnerability estimation based on remote sensing data.
Vulnerability analysis methods for road networks
NASA Astrophysics Data System (ADS)
Bíl, Michal; Vodák, Rostislav; Kubeček, Jan; Rebok, Tomáš; Svoboda, Tomáš
2014-05-01
Road networks rank among the most important lifelines of modern society. They can be damaged by either random or intentional events. Roads are also often affected by natural hazards, the impacts of which are both direct and indirect. Whereas direct impacts (e.g. roads damaged by a landslide or due to flooding) are localized in close proximity to the natural hazard occurrence, the indirect impacts can entail widespread service disabilities and considerable travel delays. The change in flows in the network may affect the population living far from the places originally impacted by the natural disaster. These effects are primarily possible due to the intrinsic nature of this system. The consequences and extent of the indirect costs also depend on the set of road links which were damaged, because the road links differ in terms of their importance. The more robust (interconnected) the road network is, the less time is usually needed to secure the serviceability of an area hit by a disaster. These kinds of networks also demonstrate a higher degree of resilience. Evaluating road network structures is therefore essential in any type of vulnerability and resilience analysis. There are a range of approaches used for evaluation of the vulnerability of a network and for identification of the weakest road links. Only few of them are, however, capable of simulating the impacts of the simultaneous closure of numerous links, which often occurs during a disaster. The primary problem is that in the case of a disaster, which usually has a large regional extent, the road network may remain disconnected. The majority of the commonly used indices use direct computation of the shortest paths or time between OD (origin - destination) pairs and therefore cannot be applied when the network breaks up into two or more components. Since extensive break-ups often occur in cases of major disasters, it is important to study the network vulnerability in these cases as well, so that appropriate steps can be taken in order to make it more resilient. Performing such an analysis of network break-ups requires consideration of the network as a whole, ideally identifying all the cases generated by simultaneous closure of multiple links and evaluating them using various criteria. The spatial distribution of settlements, important companies and the overall population in the nodes of the network are several factors, apart from the topology of the network which could be taken into account when computing vulnerability indices and identifying the weakest links and/or weakest link combinations. However, even for small networks (i.e., hundreds of nodes and links), the problem of break-up identification becomes extremely difficult to resolve. The naive approaches of the brute force examination consequently fail and more elaborated algorithms have to be applied. We address the problem of evaluating the vulnerability of road networks in our work by simulating the impacts of the simultaneous closure of multiple roads/links. We present an ongoing work on a sophisticated algorithm focused on the identification of network break-ups and evaluating them by various criteria.
Sea level rise impacts on wastewater treatment systems along the U.S. coasts
NASA Astrophysics Data System (ADS)
Hummel, M.; Berry, M.; Stacey, M. T.
2017-12-01
As sea levels rise, coastal communities will experience more frequent and persistent nuisance flooding, and some low-lying areas may be permanently inundated. Critical components of lifeline infrastructure networks in these areas are also at risk of flooding, which could cause significant service disruptions that extend beyond the flooded zone. Thus, identifying critical infrastructure components that are vulnerable to sea level rise is an important first step in developing targeted investment in protective actions and enhancing the overall resilience of coastal communities. Wastewater treatment plants are typically located at low elevations near the coastline to minimize the cost of collecting consumed water and discharging treated effluent, which makes them particularly susceptible to coastal flooding. For this analysis, we used geographic information systems to assess the vulnerability of wastewater infrastructure to various sea level rise projections at the national level. We then estimated the number of people who would lose wastewater services, which could be more than three times as high as previous predictions of the number of people at risk of direct flooding due to sea level rise. We also considered several case studies of wastewater infrastructure in mid-sized cities to determine how topography and system configuration (centralized versus distributed) impact vulnerability. Overall, this analysis highlights the widespread vulnerability of wastewater infrastructure in the U.S. and demonstrates that local disruptions to infrastructure networks may have far-ranging impacts on areas that do not experience direct flooding.
Moving Target Techniques: Leveraging Uncertainty for CyberDefense
2015-12-15
cyberattacks is a continual struggle for system managers. Attackers often need only find one vulnerability (a flaw or bug that an attacker can exploit...additional parsing code itself could have security-relevant software bugs . Dynamic Network Techniques in the dynamic network domain change the...evaluation of MT techniques can benefit from a variety of evaluation approaches, including abstract analysis, modeling and simulation, test bed
Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence
DOE Office of Scientific and Technical Information (OSTI.GOV)
Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.
Increased coupling between critical infrastructure networks, such as power and communication systems, has important implications for the reliability and security of these systems. To understand the effects of power-communication coupling, several researchers have studied models of interdependent networks and reported that increased coupling can increase vulnerability. However, these conclusions come largely from models that have substantially different mechanisms of cascading failure, relative to those found in actual power and communication networks, and that do not capture the benefits of connecting systems with complementary capabilities. In order to understand the importance of these details, this paper compares network vulnerability in simplemore » topological models and in models that more accurately capture the dynamics of cascading in power systems. First, we compare a simple model of topological contagion to a model of cascading in power systems and find that the power grid model shows a higher level of vulnerability, relative to the contagion model. Second, we compare a percolation model of topological cascading in coupled networks to three different models of power networks coupled to communication systems. Again, the more accurate models suggest very different conclusions than the percolation model. In all but the most extreme case, the physics-based power grid models indicate that increased power-communication coupling decreases vulnerability. This is opposite from what one would conclude from the percolation model, in which zero coupling is optimal. Only in an extreme case, in which communication failures immediately cause grid failures, did we find that increased coupling can be harmful. Together, these results suggest design strategies for reducing the risk of cascades in interdependent infrastructure systems.« less
Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence
Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.; ...
2017-03-20
Increased coupling between critical infrastructure networks, such as power and communication systems, has important implications for the reliability and security of these systems. To understand the effects of power-communication coupling, several researchers have studied models of interdependent networks and reported that increased coupling can increase vulnerability. However, these conclusions come largely from models that have substantially different mechanisms of cascading failure, relative to those found in actual power and communication networks, and that do not capture the benefits of connecting systems with complementary capabilities. In order to understand the importance of these details, this paper compares network vulnerability in simplemore » topological models and in models that more accurately capture the dynamics of cascading in power systems. First, we compare a simple model of topological contagion to a model of cascading in power systems and find that the power grid model shows a higher level of vulnerability, relative to the contagion model. Second, we compare a percolation model of topological cascading in coupled networks to three different models of power networks coupled to communication systems. Again, the more accurate models suggest very different conclusions than the percolation model. In all but the most extreme case, the physics-based power grid models indicate that increased power-communication coupling decreases vulnerability. This is opposite from what one would conclude from the percolation model, in which zero coupling is optimal. Only in an extreme case, in which communication failures immediately cause grid failures, did we find that increased coupling can be harmful. Together, these results suggest design strategies for reducing the risk of cascades in interdependent infrastructure systems.« less
Leveraging Social Links for Trust and Privacy in Networks
NASA Astrophysics Data System (ADS)
Cutillo, Leucio Antonio; Molva, Refik; Strufe, Thorsten
Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows that they are subject to a number of vulnerabilities, ranging from cloning legitimate users to sybil attacks through privacy violations. Starting from these OSN vulnerabilities as the first step of a broader research activity, we came up with a new approach that is very promising in re-visiting security and privacy problems in distributed systems and networks. We suggest a solution that both aims at avoiding any centralized control and leverages on the real life trust between users, that is part of the social network application itself. An anonymization technique based on multi-hop routing among trusted nodes guarantees privacy in data access and, generally speaking, in all the OSN operations.
Statistics of software vulnerability detection in certification testing
NASA Astrophysics Data System (ADS)
Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.
2018-05-01
The paper discusses practical aspects of introduction of the methods to detect software vulnerability in the day-to-day activities of the accredited testing laboratory. It presents the approval results of the vulnerability detection methods as part of the study of the open source software and the software that is a test object of the certification tests under information security requirements, including software for communication networks. Results of the study showing the allocation of identified vulnerabilities by types of attacks, country of origin, programming languages used in the development, methods for detecting vulnerability, etc. are given. The experience of foreign information security certification systems related to the detection of certified software vulnerabilities is analyzed. The main conclusion based on the study is the need to implement practices for developing secure software in the development life cycle processes. The conclusions and recommendations for the testing laboratories on the implementation of the vulnerability analysis methods are laid down.
NASA Astrophysics Data System (ADS)
Mohammadi, Hadi
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to create and design a Security and Critical Patch Management Process (SCPMP) framework based on Systems Engineering (SE) principles. This framework will assist Information Technology Department Staff (ITDS) to reduce IT operating time and costs and mitigate the risk of security and vulnerability attacks. Further, this study evaluates implementation of the SCPMP in the networked computing systems of an academic environment in order to: 1. Meet patch management requirements by applying SE principles. 2. Reduce the cost of IT operations and PVM cycles. 3. Improve the current PVM methodologies to prevent networked computing systems from becoming the targets of security vulnerability attacks. 4. Embed a Maintenance Optimization Tool (MOT) in the proposed framework. The MOT allows IT managers to make the most practicable choice of methods for deploying and installing released patches and vulnerability remediation. In recent years, there has been a variety of frameworks for security practices in every networked computing system to protect computer workstations from becoming compromised or vulnerable to security attacks, which can expose important information and critical data. I have developed a new mechanism for implementing PVM for maximizing security-vulnerability maintenance, protecting OS and software packages, and minimizing SCPMP cost. To increase computing system security in any diverse environment, particularly in academia, one must apply SCPMP. I propose an optimal maintenance policy that will allow ITDS to measure and estimate the variation of PVM cycles based on their department's requirements. My results demonstrate that MOT optimizes the process of implementing SCPMP in academic workstations.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-13
... to, or access by, external systems and networks may result in security vulnerabilities to the... configuration may allow the exploitation of network security vulnerabilities resulting in intentional or..., Models ATR42-500 and ATR72-212A Airplanes; Aircraft Electronic System Security Protection From...
NASA Astrophysics Data System (ADS)
Xi, Huixing
2017-03-01
With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.
Assessing the Climate Resilience of Transport Infrastructure Investments in Tanzania
NASA Astrophysics Data System (ADS)
Hall, J. W.; Pant, R.; Koks, E.; Thacker, S.; Russell, T.
2017-12-01
Whilst there is an urgent need for infrastructure investment in developing countries, there is a risk that poorly planned and built infrastructure will introduce new vulnerabilities. As climate change increases the magnitudes and frequency of natural hazard events, incidence of disruptive infrastructure failures are likely to become more frequent. Therefore, it is important that infrastructure planning and investment is underpinned by climate risk assessment that can inform adaptation planning. Tanzania's rapid economic growth is placing considerable strain on the country's transportation infrastructure (roads, railways, shipping and aviation); especially at the port of Dar es Salaam and its linking transport corridors. A growing number of natural hazard events, in particular flooding, are impacting the reliability of this already over-used network. Here we report on new methodology to analyse vulnerabilities and risks due to failures of key locations in the intermodal transport network of Tanzania, including strategic connectivity to neighboring countries. To perform the national-scale risk analysis we will utilize a system-of-systems methodology. The main components of this general risk assessment, when applied to transportation systems, include: (1) Assembling data on: spatially coherent extreme hazards and intermodal transportation networks; (2) Intersecting hazards with transport network models to initiate failure conditions that trigger failure propagation across interdependent networks; (3) Quantifying failure outcomes in terms of social impacts (customers/passengers disrupted) and/or macroeconomic consequences (across multiple sectors); and (4) Simulating, testing and collecting multiple failure scenarios to perform an exhaustive risk assessment in terms of probabilities and consequences. The methodology is being used to pinpoint vulnerability and reduce climate risks to transport infrastructure investments.
Cyber Security Assessment Report: Adventium Labs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-31
Major control system components often have life spans of 15-20 years. Many systems in our Nation's critical infrastructure were installed before the Internet became a reality and security was a concern. Consequently, control systems are generally insecure. Security is now being included in the development of new control system devices; however, legacy control systems remain vulnerable. Most efforts to secure control systems are aimed at protecting network borers, but if an intruder gets inside the network these systems are vulnerable to a cyber attack.
NASA Astrophysics Data System (ADS)
Sangpenchan, R.
2011-12-01
This research explores the vulnerability of Thai rice production to simultaneous exposure by climate and socioeconomic change -- so-called "double exposure." Both processes influence Thailand's rice production system, but the vulnerabilities associated with their interactions are unknown. To understand this double exposure, I adopts a mixed-method, qualitative-quantitative analytical approach consisting of three phases of analysis involving a Vulnerability Scoping Diagram, a Principal Component Analysis, and the EPIC crop model using proxy datasets collected from secondary data sources at provincial scales.The first and second phases identify key variables representing each of the three dimensions of vulnerability -- exposure, sensitivity, and adaptive capacity indicating that the greatest vulnerability in the rice production system occurs in households and areas with high exposure to climate change, high sensitivity to climate and socioeconomic stress, and low adaptive capacity. In the third phase, the EPIC crop model simulates rice yields associated with future climate change projected by CSIRO and MIROC climate models. Climate change-only scenarios project the decrease in yields by 10% from the current productivity during 2016-2025 and 30% during 2045-2054. Scenarios applying both climate change and improved technology and management practices show that a 50% increase in rice production is possible, but requires strong collaboration between sectors to advance agricultural research and technology and requires strong adaptive capacity in the rice production system characterized by well-developed social capital, social networks, financial capacity, and infrastructure and household mobility at the local scale. The vulnerability assessment and climate and crop adaptation simulations used here provide useful information to decision makers developing vulnerability reduction plans in the face of concurrent climate and socioeconomic change.
Hidden Connectivity in Networks with Vulnerable Classes of Nodes
NASA Astrophysics Data System (ADS)
Krause, Sebastian M.; Danziger, Michael M.; Zlatić, Vinko
2016-10-01
In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally used to analyze connectivity in complex networks, but in its existing forms, it cannot treat the heterogeneity of multiple vulnerable classes. To analyze the connectivity under these constraints, we describe each class as a color and develop a "color-avoiding" percolation. We present an analytic theory for random networks and a numerical algorithm for all networks, with which we can determine which nodes are color-avoiding connected and whether the maximal set percolates in the system. We find that the interaction of topology and color distribution implies a rich critical behavior, with critical values and critical exponents depending both on the topology and on the color distribution. Applying our physics-based theory to the Internet, we show how color-avoiding percolation can be used as the basis for new topologically aware secure communication protocols. Beyond applications to cybersecurity, our framework reveals a new layer of hidden structure in a wide range of natural and technological systems.
A Vulnerability Assessment of the U.S. Small Business B2C E-Commerce Network Systems
ERIC Educational Resources Information Center
Zhao, Jensen J.; Truell, Allen D.; Alexander, Melody W.; Woosley, Sherry A.
2011-01-01
Objective: This study assessed the security vulnerability of the U.S. small companies' business-to-consumer (B2C) e-commerce network systems. Background: As the Internet technologies have been changing the way business is conducted, the U.S. small businesses are investing in such technologies and taking advantage of e-commerce to access global…
Virtual water trade and country vulnerability: A network perspective
NASA Astrophysics Data System (ADS)
Sartori, Martina; Schiavo, Stefano
2015-04-01
This work investigates the relationship between countries' participation in virtual water trade and their vulnerability to external shocks from a network perspective. In particular, we investigate whether (i) possible sources of local national crises may interact with the system, propagating through the network and affecting the other countries involved; (ii) the topological characteristics of the international agricultural trade network, translated into virtual water-equivalent flows, may favor countries' vulnerability to external crises. Our work contributes to the debate on the potential merits and risks associated with openness to trade in agricultural and food products. On the one hand, trade helps to ensure that even countries with limited water (and other relevant) resources have access to sufficient food and contribute to the global saving of water. On the other hand, there are fears that openness may increase the vulnerability to external shocks and thus make countries worse off. Here we abstract from political considerations about food sovereignty and independence from imports and focus instead on investigating whether the increased participation in global trade that the world has witnessed in the last 30 years has made the system more susceptible to large shocks. Our analysis reveals that: (i) the probability of larger supply shocks has not increased over time; (ii) the topological characteristics of the VW network are not such as to favor the systemic risk associated with shock propagation; and (iii) higher-order interconnections may reveal further important information about the structure of a network. Regarding the first result, fluctuations in output volumes, among the sources of shock analyzed here, are more likely to generate some instability. The first implication is that, on one side, past national or regional economic crises were not necessarily brought about or strengthened by global trade. The second, more remarkable, implication is that, on the other side, supporting a national policy of self-sufficiency in food production while progressively reducing the participation in international agricultural trade does not necessarily protect a country from economic instability. Moreover, it is well established in the literature that, over time, international food trade has favored more efficient use of water resources, at the global level. This fact, together with our conclusions, highlights the important role of international trade in driving the efficient allocation of water resources. To sum up, our evidence reveals that the increased globalization witnessed in the last 30 years is not associated with an increased frequency of adverse shocks (in either precipitation or food production). Furthermore, building on recent advances in network analysis that connect the stability of a complex system to the interaction between the distribution of shocks and the network topology, we find that the world is more interconnected, but not necessarily less stable.
Feature-based alert correlation in security systems using self organizing maps
NASA Astrophysics Data System (ADS)
Kumar, Munesh; Siddique, Shoaib; Noor, Humera
2009-04-01
The security of the networks has been an important concern for any organization. This is especially important for the defense sector as to get unauthorized access to the sensitive information of an organization has been the prime desire for cyber criminals. Many network security techniques like Firewall, VPN Concentrator etc. are deployed at the perimeter of network to deal with attack(s) that occur(s) from exterior of network. But any vulnerability that causes to penetrate the network's perimeter of defense, can exploit the entire network. To deal with such vulnerabilities a system has been evolved with the purpose of generating an alert for any malicious activity triggered against the network and its resources, termed as Intrusion Detection System (IDS). The traditional IDS have still some deficiencies like generating large number of alerts, containing both true and false one etc. By automatically classifying (correlating) various alerts, the high-level analysis of the security status of network can be identified and the job of network security administrator becomes much easier. In this paper we propose to utilize Self Organizing Maps (SOM); an Artificial Neural Network for correlating large amount of logged intrusion alerts based on generic features such as Source/Destination IP Addresses, Port No, Signature ID etc. The different ways in which alerts can be correlated by Artificial Intelligence techniques are also discussed. . We've shown that the strategy described in the paper improves the efficiency of IDS by better correlating the alerts, leading to reduced false positives and increased competence of network administrator.
Wang, Xiang; Öngür, Dost; Auerbach, Randy P.; Yao, Shuqiao
2016-01-01
Abstract Although it is generally accepted that cognitive factors contribute to the pathogenesis of major depressive disorder (MDD), there are missing links between behavioral and biological models of depression. Nevertheless, research employing neuroimaging technologies has elucidated some of the neurobiological mechanisms related to cognitive-vulnerability factors, especially from a whole-brain, dynamic perspective. In this review, we integrate well-established cognitive-vulnerability factors for MDD and corresponding neural mechanisms in intrinsic networks using a dual-process framework. We propose that the dynamic alteration and imbalance among the intrinsic networks, both in the resting-state and the rest-task transition stages, contribute to the development of cognitive vulnerability and MDD. Specifically, we propose that abnormally increased resting-state default mode network (DMN) activity and connectivity (mainly in anterior DMN regions) contribute to the development of cognitive vulnerability. Furthermore, when subjects confront negative stimuli in the period of rest-to-task transition, the following three kinds of aberrant network interactions have been identified as facilitators of vulnerability and dysphoric mood, each through a different cognitive mechanism: DMN dominance over the central executive network (CEN), an impaired salience network–mediated switching between the DMN and CEN, and ineffective CEN modulation of the DMN. This focus on interrelated networks and brain-activity changes between rest and task states provides a neural-system perspective for future research on cognitive vulnerability and resilience, and may potentially guide the development of new intervention strategies for MDD. PMID:27148911
Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence.
Korkali, Mert; Veneman, Jason G; Tivnan, Brian F; Bagrow, James P; Hines, Paul D H
2017-03-20
Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a "smart" power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained.
Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence
NASA Astrophysics Data System (ADS)
Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.; Bagrow, James P.; Hines, Paul D. H.
2017-03-01
Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a “smart” power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained.
Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence
Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.; Bagrow, James P.; Hines, Paul D. H.
2017-01-01
Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a “smart” power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained. PMID:28317835
Lack of security of networked medical equipment in radiology.
Moses, Vinu; Korah, Ipeson
2015-02-01
OBJECTIVE. There are few articles in the literature describing the security and safety aspects of networked medical equipment in radiology departments. Most radiologists are unaware of the security issues. We review the security of the networked medical equipment of a typical radiology department. MATERIALS AND METHODS. All networked medical equipment in a radiology department was scanned for vulnerabilities with a port scanner and a network vulnerability scanner, and the vulnerabilities were classified using the Common Vulnerability Scoring System. A network sniffer was used to capture and analyze traffic on the radiology network for exposure of confidential patient data. We reviewed the use of antivirus software and firewalls on the networked medical equipment. USB ports and CD and DVD drives in the networked medical equipment were tested to see whether they allowed unauthorized access. Implementation of the virtual private network (VPN) that vendors use to access the radiology network was reviewed. RESULTS. Most of the networked medical equipment in our radiology department used vulnerable software with open ports and services. Of the 144 items scanned, 64 (44%) had at least one critical vulnerability, and 119 (83%) had at least one high-risk vulnerability. Most equipment did not encrypt traffic and allowed capture of confidential patient data. Of the 144 items scanned, two (1%) used antivirus software and three (2%) had a firewall enabled. The USB ports were not secure on 49 of the 58 (84%) items with USB ports, and the CD or DVD drive was not secure on 17 of the 31 (55%) items with a CD or DVD drive. One of three vendors had an insecure implementation of VPN access. CONCLUSION. Radiologists and the medical industry need to urgently review and rectify the security issues in existing networked medical equipment. We hope that the results of our study and this article also raise awareness among radiologists about the security issues of networked medical equipment.
Kim, Seongkyun; Kim, Hyoungkyu; Kralik, Jerald D.; Jeong, Jaeseung
2016-01-01
Determining the fundamental architectural design of complex nervous systems will lead to significant medical and technological advances. Yet it remains unclear how nervous systems evolved highly efficient networks with near optimal sharing of pathways that yet produce multiple distinct behaviors to reach the organism’s goals. To determine this, the nematode roundworm Caenorhabditis elegans is an attractive model system. Progress has been made in delineating the behavioral circuits of the C. elegans, however, many details are unclear, including the specific functions of every neuron and synapse, as well as the extent the behavioral circuits are separate and parallel versus integrative and serial. Network analysis provides a normative approach to help specify the network design. We investigated the vulnerability of the Caenorhabditis elegans connectome by performing computational experiments that (a) “attacked” 279 individual neurons and 2,990 weighted synaptic connections (composed of 6,393 chemical synapses and 890 electrical junctions) and (b) quantified the effects of each removal on global network properties that influence information processing. The analysis identified 12 critical neurons and 29 critical synapses for establishing fundamental network properties. These critical constituents were found to be control elements—i.e., those with the most influence over multiple underlying pathways. Additionally, the critical synapses formed into circuit-level pathways. These emergent pathways provide evidence for (a) the importance of backward locomotion, avoidance behavior, and social feeding behavior to the organism; (b) the potential roles of specific neurons whose functions have been unclear; and (c) both parallel and serial design elements in the connectome—i.e., specific evidence for a mixed architectural design. PMID:27540747
Data management for geospatial vulnerability assessment of interdependencies in US power generation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shih, C.Y.; Scown, C.D.; Soibelman, L.
2009-09-15
Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts ofmore » a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.« less
Examining Food Risk in the Large using a Complex, Networked System-of-sytems Approach
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ambrosiano, John; Newkirk, Ryan; Mc Donald, Mark P
2010-12-03
The food production infrastructure is a highly complex system of systems. Characterizing the risks of intentional contamination in multi-ingredient manufactured foods is extremely challenging because the risks depend on the vulnerabilities of food processing facilities and on the intricacies of the supply-distribution networks that link them. A pure engineering approach to modeling the system is impractical because of the overall system complexity and paucity of data. A methodology is needed to assess food contamination risk 'in the large', based on current, high-level information about manufacturing facilities, corrunodities and markets, that will indicate which food categories are most at risk ofmore » intentional contamination and warrant deeper analysis. The approach begins by decomposing the system for producing a multi-ingredient food into instances of two subsystem archetypes: (1) the relevant manufacturing and processing facilities, and (2) the networked corrunodity flows that link them to each other and consumers. Ingredient manufacturing subsystems are modeled as generic systems dynamics models with distributions of key parameters that span the configurations of real facilities. Networks representing the distribution systems are synthesized from general information about food corrunodities. This is done in a series of steps. First, probability networks representing the aggregated flows of food from manufacturers to wholesalers, retailers, other manufacturers, and direct consumers are inferred from high-level approximate information. This is followed by disaggregation of the general flows into flows connecting 'large' and 'small' categories of manufacturers, wholesalers, retailers, and consumers. Optimization methods are then used to determine the most likely network flows consistent with given data. Vulnerability can be assessed for a potential contamination point using a modified CARVER + Shock model. Once the facility and corrunodity flow models are instantiated, a risk consequence analysis can be performed by injecting contaminant at chosen points in the system and propagating the event through the overarching system to arrive at morbidity and mortality figures. A generic chocolate snack cake model, consisting of fluid milk, liquid eggs, and cocoa, is described as an intended proof of concept for multi-ingredient food systems. We aim for an eventual tool that can be used directly by policy makers and planners.« less
Vulnerability of complex networks
NASA Astrophysics Data System (ADS)
Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco
2011-01-01
We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.
Li, Shancang; Tryfonas, Theo; Russell, Gordon; Andriotis, Panagiotis
2016-08-01
Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the overall security of a mobile system, it is important to assess the security risks posed by each mobile applications (apps), thus gaining a stronger understanding of any vulnerabilities present. This paper aims at developing a three-layer framework that assesses the potential risks which apps introduce within the Android mobile systems. A Bayesian risk graphical model is proposed to evaluate risk propagation in a layered risk architecture. By integrating static analysis, dynamic analysis, and behavior analysis in a hierarchical framework, the risks and their propagation through each layer are well modeled by the Bayesian risk graph, which can quantitatively analyze risks faced to both apps and mobile systems. The proposed hierarchical Bayesian risk graph model offers a novel way to investigate the security risks in mobile environment and enables users and administrators to evaluate the potential risks. This strategy allows to strengthen both app security as well as the security of the entire system.
NASA Astrophysics Data System (ADS)
Arosio, Marcello; Martina, Mario L. V.
2017-04-01
The emergent behaviour of the contemporary complex, socio-technical and interconnected society makes the collective risk greater than the sum of the parts and this requires a holistic, systematic and integrated approach. Although there have been major improvements in recent years, there are still some limitation in term of a holistic approach that is able to include the emergent value hidden in the connections between exposed elements and the interactions between the different spheres of the multi-hazards, vulnerability, exposure and resilience. To deal with these challenges it is necessary to consider the connections between the exposed elements (e.g. populations, schools, hospital, etc.) and to quantify the relative importance of the elements and their interconnections (e.g. the need of injured people to go to hospital or children to school). In a system (e.g. road, hospital and ecological network, etc.), or in a System of System (e.g. socio-technical urban service), there are critical elements that, beyond the intrinsic vulnerability, can be characterized by greater or lower vulnerability because of their physical, geographical, cyber or logical connections. To this aim, we propose in this study a comparative analysis between traditional reductionist approach and a new holistic approach to vulnerability assessment to natural hazards. The analysis considers a study case of a socio-economic complex system through an innovative approach based on the properties of graph G=(N,L). A graph consists of two sets N (nodes) and L (links): the nodes represent the single exposed elements (physical, social, environmental, etc.) to a hazard, while the links (or connections) represent the interaction between the elements. The final goal is to illustrate an application of this innovative approach of integrated collective vulnerability assessment.
Redshaw, Sarah; Ingham, Valerie; McCutcheon, Marion; Hicks, John; Burmeister, Oliver
2018-02-01
To assess the impact of network communications, community participation and elements of vulnerability on the perception of social cohesiveness in the Blue Mountains local government area (Blue Mountains LGA). A questionnaire was administered to residents of the Blue Mountains LGA. Econometric analysis of the resulting data was undertaken. Blue Mountains LGA, Australia. One thousand one hundred and three residents of the Blue Mountains LGA responded to the questionnaire. The responses enabled the construction of variables measuring individual perceptions of community cohesiveness, their network communications and community participation. Demographic data and data on the vulnerabilities of individuals were also collected. The data were used in an econometric model which identified that network communications and community participation impacted positively on perceptions of social cohesiveness while vulnerability factors had a negative impact. Remedial action to build community cohesiveness and network communications can be expected to have a positive impact on social cohesiveness. In developing strategies to build community cohesiveness and network communication, particular care needs to be taken to ensure the inclusion of those members of society who are regarded as the most vulnerable. © 2017 National Rural Health Alliance Inc.
Yu, Meichen; Engels, Marjolein M A; Hillebrand, Arjan; van Straaten, Elisabeth C W; Gouw, Alida A; Teunissen, Charlotte; van der Flier, Wiesje M; Scheltens, Philip; Stam, Cornelis J
2017-05-01
Although frequency-specific network analyses have shown that functional brain networks are altered in patients with Alzheimer's disease, the relationships between these frequency-specific network alterations remain largely unknown. Multiplex network analysis is a novel network approach to study complex systems consisting of subsystems with different types of connectivity patterns. In this study, we used magnetoencephalography to integrate five frequency-band specific brain networks in a multiplex framework. Previous structural and functional brain network studies have consistently shown that hub brain areas are selectively disrupted in Alzheimer's disease. Accordingly, we hypothesized that hub regions in the multiplex brain networks are selectively targeted in patients with Alzheimer's disease in comparison to healthy control subjects. Eyes-closed resting-state magnetoencephalography recordings from 27 patients with Alzheimer's disease (60.6 ± 5.4 years, 12 females) and 26 controls (61.8 ± 5.5 years, 14 females) were projected onto atlas-based regions of interest using beamforming. Subsequently, source-space time series for both 78 cortical and 12 subcortical regions were reconstructed in five frequency bands (delta, theta, alpha 1, alpha 2 and beta band). Multiplex brain networks were constructed by integrating frequency-specific magnetoencephalography networks. Functional connections between all pairs of regions of interests were quantified using a phase-based coupling metric, the phase lag index. Several multiplex hub and heterogeneity metrics were computed to capture both overall importance of each brain area and heterogeneity of the connectivity patterns across frequency-specific layers. Different nodal centrality metrics showed consistently that several hub regions, particularly left hippocampus, posterior parts of the default mode network and occipital regions, were vulnerable in patients with Alzheimer's disease compared to control subjects. Of note, these detected vulnerable hubs in Alzheimer's disease were absent in each individual frequency-specific network, thus showing the value of integrating the networks. The connectivity patterns of these vulnerable hub regions in the patients were heterogeneously distributed across layers. Perturbed cognitive function and abnormal cerebrospinal fluid amyloid-β42 levels correlated positively with the vulnerability of the hub regions in patients with Alzheimer's disease. Our analysis therefore demonstrates that the magnetoencephalography-based multiplex brain networks contain important information that cannot be revealed by frequency-specific brain networks. Furthermore, this indicates that functional networks obtained in different frequency bands do not act as independent entities. Overall, our multiplex network study provides an effective framework to integrate the frequency-specific networks with different frequency patterns and reveal neuropathological mechanism of hub disruption in Alzheimer's disease. © The Author (2017). Published by Oxford University Press on behalf of the Guarantors of Brain. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDonald, K; Curran, B
I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less
Appliance of Independent Component Analysis to System Intrusion Analysis
NASA Astrophysics Data System (ADS)
Ishii, Yoshikazu; Takagi, Tarou; Nakai, Kouji
In order to analyze the output of the intrusion detection system and the firewall, we evaluated the applicability of ICA(independent component analysis). We developed a simulator for evaluation of intrusion analysis method. The simulator consists of the network model of an information system, the service model and the vulnerability model of each server, and the action model performed on client and intruder. We applied the ICA for analyzing the audit trail of simulated information system. We report the evaluation result of the ICA on intrusion analysis. In the simulated case, ICA separated two attacks correctly, and related an attack and the abnormalities of the normal application produced under the influence of the attach.
High Assurance Models for Secure Systems
ERIC Educational Resources Information Center
Almohri, Hussain M. J.
2013-01-01
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
Error and attack tolerance of complex networks
NASA Astrophysics Data System (ADS)
Albert, Réka; Jeong, Hawoong; Barabási, Albert-László
2000-07-01
Many complex systems display a surprising degree of tolerance against errors. For example, relatively simple organisms grow, persist and reproduce despite drastic pharmaceutical or environmental interventions, an error tolerance attributed to the robustness of the underlying metabolic network. Complex communication networks display a surprising degree of robustness: although key components regularly malfunction, local failures rarely lead to the loss of the global information-carrying ability of the network. The stability of these and other complex systems is often attributed to the redundant wiring of the functional web defined by the systems' components. Here we demonstrate that error tolerance is not shared by all redundant systems: it is displayed only by a class of inhomogeneously wired networks, called scale-free networks, which include the World-Wide Web, the Internet, social networks and cells. We find that such networks display an unexpected degree of robustness, the ability of their nodes to communicate being unaffected even by unrealistically high failure rates. However, error tolerance comes at a high price in that these networks are extremely vulnerable to attacks (that is, to the selection and removal of a few nodes that play a vital role in maintaining the network's connectivity). Such error tolerance and attack vulnerability are generic properties of communication networks.
Flood impacts on a water distribution network
NASA Astrophysics Data System (ADS)
Arrighi, Chiara; Tarani, Fabio; Vicario, Enrico; Castelli, Fabio
2017-12-01
Floods cause damage to people, buildings and infrastructures. Water distribution systems are particularly exposed, since water treatment plants are often located next to the rivers. Failure of the system leads to both direct losses, for instance damage to equipment and pipework contamination, and indirect impact, since it may lead to service disruption and thus affect populations far from the event through the functional dependencies of the network. In this work, we present an analysis of direct and indirect damages on a drinking water supply system, considering the hazard of riverine flooding as well as the exposure and vulnerability of active system components. The method is based on interweaving, through a semi-automated GIS procedure, a flood model and an EPANET-based pipe network model with a pressure-driven demand approach, which is needed when modelling water distribution networks in highly off-design conditions. Impact measures are defined and estimated so as to quantify service outage and potential pipe contamination. The method is applied to the water supply system of the city of Florence, Italy, serving approximately 380 000 inhabitants. The evaluation of flood impact on the water distribution network is carried out for different events with assigned recurrence intervals. Vulnerable elements exposed to the flood are identified and analysed in order to estimate their residual functionality and to simulate failure scenarios. Results show that in the worst failure scenario (no residual functionality of the lifting station and a 500-year flood), 420 km of pipework would require disinfection with an estimated cost of EUR 21 million, which is about 0.5 % of the direct flood losses evaluated for buildings and contents. Moreover, if flood impacts on the water distribution network are considered, the population affected by the flood is up to 3 times the population directly flooded.
Robustness and Recovery of Lifeline Infrastructure and Ecosystem Networks
NASA Astrophysics Data System (ADS)
Bhatia, U.; Ganguly, A. R.
2015-12-01
Disruptive events, both natural and man-made, can have widespread impacts on both natural systems and lifeline infrastructure networks leading to the loss of biodiversity and essential functionality, respectively. Projected sea-level rise and climate change can further increase the frequency and severity of large-scale floods on urban-coastal megacities. Nevertheless, Failure in infrastructure systems can trigger cascading impacts on dependent ecosystems, and vice-versa. An important consideration in the behavior of the isolated networks and inter-connected networks following disruptive events is their resilience, or the ability of the network to "bounce back" to a pre-disaster state. Conventional risk analysis and subsequent risk management frameworks have focused on identifying the components' vulnerability and strengthening of the isolated components to withstand these disruptions. But high interconnectedness of these systems, and evolving nature of hazards, particularly in the context of climate extremes, make the component level analysis unrealistic. In this study, we discuss the complex network-based resilience framework to understand fragility and recovery strategies for infrastructure systems impacted by climate-related hazards. We extend the proposed framework to assess the response of ecological networks to multiple species loss and design the restoration management framework to identify the most efficient restoration sequence of species, which can potentially lead to disproportionate gains in biodiversity.
How to Perform a Security Audit: Is Your School's or District's Network Vulnerable?
ERIC Educational Resources Information Center
Dark, Melissa; Poftak, Amy
2004-01-01
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
Understanding resilience in industrial symbiosis networks: insights from network analysis.
Chopra, Shauhrat S; Khanna, Vikas
2014-08-01
Industrial symbiotic networks are based on the principles of ecological systems where waste equals food, to develop synergistic networks. For example, industrial symbiosis (IS) at Kalundborg, Denmark, creates an exchange network of waste, water, and energy among companies based on contractual dependency. Since most of the industrial symbiotic networks are based on ad-hoc opportunities rather than strategic planning, gaining insight into disruptive scenarios is pivotal for understanding the balance of resilience and sustainability and developing heuristics for designing resilient IS networks. The present work focuses on understanding resilience as an emergent property of an IS network via a network-based approach with application to the Kalundborg Industrial Symbiosis (KIS). Results from network metrics and simulated disruptive scenarios reveal Asnaes power plant as the most critical node in the system. We also observe a decrease in the vulnerability of nodes and reduction in single points of failure in the system, suggesting an increase in the overall resilience of the KIS system from 1960 to 2010. Based on our findings, we recommend design strategies, such as increasing diversity, redundancy, and multi-functionality to ensure flexibility and plasticity, to develop resilient and sustainable industrial symbiotic networks. Copyright © 2014 Elsevier Ltd. All rights reserved.
VMSoar: a cognitive agent for network security
NASA Astrophysics Data System (ADS)
Benjamin, David P.; Shankar-Iyer, Ranjita; Perumal, Archana
2005-03-01
VMSoar is a cognitive network security agent designed for both network configuration and long-term security management. It performs automatic vulnerability assessments by exploring a configuration"s weaknesses and also performs network intrusion detection. VMSoar is built on the Soar cognitive architecture, and benefits from the general cognitive abilities of Soar, including learning from experience, the ability to solve a wide range of complex problems, and use of natural language to interact with humans. The approach used by VMSoar is very different from that taken by other vulnerability assessment or intrusion detection systems. VMSoar performs vulnerability assessments by using VMWare to create a virtual copy of the target machine then attacking the simulated machine with a wide assortment of exploits. VMSoar uses this same ability to perform intrusion detection. When trying to understand a sequence of network packets, VMSoar uses VMWare to make a virtual copy of the local portion of the network and then attempts to generate the observed packets on the simulated network by performing various exploits. This approach is initially slow, but VMSoar"s learning ability significantly speeds up both vulnerability assessment and intrusion detection. This paper describes the design and implementation of VMSoar, and initial experiments with Windows NT and XP.
Culture, social networks and HIV vulnerability among men who have sex with men in Indonesia.
Fauk, Nelsensius Klau; Merry, Maria Silvia; Sigilipoe, Mitra Andhini; Putra, Sukma; Mwanri, Lillian
2017-01-01
The current study aimed to explore cultural and social network influence on HIV vulnerability among Men who have Sex with Men (MSM) population in Yogyakarta, Indonesia. A qualitative inquiry employing in-depth one-on-one interviews was carried out with 24 MSM participants in July 2015. Data were analysed using a framework analysis and guided by the Social Networks Theory (SNT) as a conceptual framework. Findings indicated that prohibitive cultural perspectives and norms against same-sex marriage made them to conceal their sexual orientation and thus secretively engaging in unprotected sex that increased their predisposition to HIV transmission. The prohibitive cultures were also instrumental in the formation of MSM sexual networks that provided supportive environment for HIV-risky sexual practices among network partners. These findings provide information that can be used to improve HIV/AIDS service practices and policies. However, further studies with large numbers of MSM would be needed to improve the understanding of other HIV vulnerability determinants, the unique needs of MSM, and what and how programs could be conducted to reduce HIV vulnerability among MSM population.
Vulnerability Analysis and Passenger Source Prediction in Urban Rail Transit Networks
Wang, Junjie; Li, Yishuai; Liu, Jingyu; He, Kun; Wang, Pu
2013-01-01
Based on large-scale human mobility data collected in San Francisco and Boston, the morning peak urban rail transit (URT) ODs (origin-destination matrix) were estimated and the most vulnerable URT segments, those capable of causing the largest service interruptions, were identified. In both URT networks, a few highly vulnerable segments were observed. For this small group of vital segments, the impact of failure must be carefully evaluated. A bipartite URT usage network was developed and used to determine the inherent connections between urban rail transits and their passengers' travel demands. Although passengers' origins and destinations were easy to locate for a large number of URT segments, a few show very complicated spatial distributions. Based on the bipartite URT usage network, a new layer of the understanding of a URT segment's vulnerability can be achieved by taking the difficulty of addressing the failure of a given segment into account. Two proof-of-concept cases are described here: Possible transfer of passenger flow to the road network is here predicted in the cases of failures of two representative URT segments in San Francisco. PMID:24260355
A Systems Approach to Agricultural Biosecurity.
Anand, Manish
This article highlights the importance of systems approaches in addressing agricultural biosecurity threats. On the basis of documentary analysis and stakeholder interaction, a brief survey of agricultural biosecurity threats and vulnerabilities from global and Indian perspectives is provided, followed by an exploration of technological and institutional capabilities. Finally, a perspective on the agricultural disease diagnostic networks is provided, drawing instances from global developments. Technical barriers to agroterrorism are lower than those to human-targeted bioterrorism, and the sector is unique as even a very small disease outbreak could prompt international export restrictions. Key vulnerabilities in the agriculture sector stem from, among others, the structure of agricultural production; insufficient monitoring, surveillance, and controls systems at the borders and in the food chain; inefficient systems for reporting unusual occurrences and outbreaks of disease; and lack of sufficiently trained human resources capable of recognizing or treating transboundary pathogens and diseases. An assessment of technology and institutions pertaining to crop and animal protection management suggests certain gaps. Investment in developing new technologies for civilian application in agriculture, as well as for legitimate actions pertaining to defense, detection, protection, and prophylaxis, and in upgrading laboratory facilities can increase the agricultural sector's level of preparedness for outbreaks. To address potential threats and vulnerabilities of agroterrorism effectively requires the development of a comprehensive strategy and a combined, interagency approach, ideally on an international level. It is proposed that a systems-oriented approach for developing knowledge and innovation networks and strengthening skills and capacities would enable a more resilient agricultural biosecurity system.
Vulnerability of water supply systems to cyber-physical attacks
NASA Astrophysics Data System (ADS)
Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi
2016-04-01
The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.
Vulnerability to shocks in the global seafood trade network
NASA Astrophysics Data System (ADS)
Gephart, Jessica A.; Rovenskaya, Elena; Dieckmann, Ulf; Pace, Michael L.; Brännström, Åke
2016-03-01
Trade can allow countries to overcome local or regional losses (shocks) to their food supply, but reliance on international food trade also exposes countries to risks from external perturbations. Countries that are nutritionally or economically dependent on international trade of a commodity may be adversely affected by such shocks. While exposure to shocks has been studied in financial markets, communication networks, and some infrastructure systems, it has received less attention in food-trade networks. Here, we develop a forward shock-propagation model to quantify how trade flows are redistributed under a range of shock scenarios and assess the food-security outcomes by comparing changes in national fish supplies to indices of each country’s nutritional fish dependency. Shock propagation and distribution among regions are modeled on a network of historical bilateral seafood trade data from UN Comtrade using 205 reporting territories grouped into 18 regions. In our model exposure to shocks increases with total imports and the number of import partners. We find that Central and West Africa are the most vulnerable to shocks, with their vulnerability increasing when a willingness-to-pay proxy is included. These findings suggest that countries can reduce their overall vulnerability to shocks by reducing reliance on imports and diversifying food sources. As international seafood trade grows, identifying these types of potential risks and vulnerabilities is important to build a more resilient food system.
A model for assessing the systemic vulnerability in landslide prone areas
NASA Astrophysics Data System (ADS)
Pascale, S.; Sdao, F.; Sole, A.
2010-07-01
The objectives of spatial planning should include the definition and assessment of possible mitigation strategies regarding the effects of natural hazards on the surrounding territory. Unfortunately, however, there is often a lack of adequate tools to provide necessary support to the local bodies responsible for land management. This paper deals with the conception, the development and the validation of an integrated numerical model for assessing systemic vulnerability in complex and urbanized landslide-prone areas. The proposed model considers this vulnerability not as a characteristic of a particular element at risk, but as a peculiarity of a complex territorial system, in which the elements are reciprocally linked in a functional way. It is an index of the tendency of a given territorial element to suffer damage (usually of a functional kind) due to its interconnections with other elements of the same territorial system. The innovative nature of this work also lies in the formalization of a procedure based on a network of influences for an adequate assessment of such "systemic" vulnerability. This approach can be used to obtain information which is useful, in any given situation of a territory hit by a landslide event, for the identification of the element which has suffered the most functional damage, ie the most "critical" element and the element which has the greatest repercussions on other elements of the system and thus a "decisive" role in the management of the emergency. This model was developed within a GIS system through the following phases: 1. the topological characterization of the territorial system studied and the assessment of the scenarios in terms of spatial landslide hazard. A statistical method, based on neural networks was proposed for the assessment of landslide hazard; 2. the analysis of the direct consequences of a scenario event on the system; 3. the definition of the assessment model of systemic vulnerability in landslide-prone areas. To highlight the potentialities of the proposed approach we have described a specific case study of landslide hazard in the local council area of Potenza.
Drivers and Pattern of Social Vulnerability to Flood in Metropolitan Lagos, Nigeria
NASA Astrophysics Data System (ADS)
Fasona, M.
2016-12-01
Lagos is Africa's second largest city and a city-state in southwest Nigeria. Population and economic activities in the city are concentrated in the greater Lagos metropolitan area - a group of barrier islands less than a thousand square kilometer. Several physical factors and critical human-environmental conditions contribute to high flood vulnerability across the city. Flood impact is highly denominated and the poor tend to suffer more due to higher risk of exposure and poor adaptive capacity. In this study we present the pattern of social vulnerability to flooding across the Lagos metropolis and argued that the pattern substantially reflects the pattern and severity of flooding impact on people across the metropolis. Twenty nine social indicators and experiences including poverty profile, housing conditions, education, population and demography, social network, and communication, among others, were considered. The data were collated through field survey and subjected to principal component analysis. The results were processed into raster surfaces using GIS for social vulnerability characterization at neighborhood levels. The results suggest the social status indicators, neighborhood standing and social networks indictors, the indicators of emergency responses and security, and the neighborhood conditions, in that order, are the most important determinants of social vulnerability. Six of the 16 LGAs in metropolitan Lagos have high social vulnerability. Neighborhoods that combine poor social status indicators and poor neighborhood standing and social networks are found to have high social vulnerability whereas other poor neighborhoods with strong social networks performed better. We conclude that improved human living condition and social network and communication in poor urban neighborhoods are important to reducing social vulnerability to flooding in the metropolis.
Dawson, David A; Purnell, Phil; Roelich, Katy; Busch, Jonathan; Steinberger, Julia K
2014-11-04
Renewable energy technologies, necessary for low-carbon infrastructure networks, are being adopted to help reduce fossil fuel dependence and meet carbon mitigation targets. The evolution of these technologies has progressed based on the enhancement of technology-specific performance criteria, without explicitly considering the wider system (global) impacts. This paper presents a methodology for simultaneously assessing local (technology) and global (infrastructure) performance, allowing key technological interventions to be evaluated with respect to their effect on the vulnerability of wider infrastructure systems. We use exposure of low carbon infrastructure to critical material supply disruption (criticality) to demonstrate the methodology. A series of local performance changes are analyzed; and by extension of this approach, a method for assessing the combined criticality of multiple materials for one specific technology is proposed. Via a case study of wind turbines at both the material (magnets) and technology (turbine generators) levels, we demonstrate that analysis of a given intervention at different levels can lead to differing conclusions regarding the effect on vulnerability. Infrastructure design decisions should take a systemic approach; without these multilevel considerations, strategic goals aimed to help meet low-carbon targets, that is, through long-term infrastructure transitions, could be significantly jeopardized.
ERIC Educational Resources Information Center
Mohammadi, Hadi
2014-01-01
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…
Construction of road network vulnerability evaluation index based on general travel cost
NASA Astrophysics Data System (ADS)
Leng, Jun-qiang; Zhai, Jing; Li, Qian-wen; Zhao, Lin
2018-03-01
With the development of China's economy and the continuous improvement of her urban road network, the vulnerability of the urban road network has attracted increasing attention. Based on general travel cost, this work constructs the vulnerability evaluation index for the urban road network, and evaluates the vulnerability of the urban road network from the perspective of user generalised travel cost. Firstly, the generalised travel cost model is constructed based on vehicle cost, travel time, and traveller comfort. Then, the network efficiency index is selected as an evaluation index of vulnerability: the network efficiency index is composed of the traffic volume and the generalised travel cost, which are obtained from the equilibrium state of the network. In addition, the research analyses the influence of traffic capacity decrease, road section attribute value, and location of road section, on vulnerability. Finally, the vulnerability index is used to analyse the local area network of Harbin and verify its applicability.
NASA Technical Reports Server (NTRS)
Gunawan, Ryan A.
2016-01-01
With the rapid development of the Internet, the number of malicious threats to organizations is continually increasing. In June of 2015, the United States Office of Personnel Management (OPM) had a data breach resulting in the compromise of millions of government employee records. The National Aeronautics and Space Administration (NASA) is not exempt from these attacks. Cyber security is becoming a critical facet to the discussion of moving forward with projects. The Spaceport Command and Control System (SCCS) project at the Kennedy Space Center (KSC) aims to develop the launch control system for the next generation launch vehicle in the coming decades. There are many ways to increase the security of the network it uses, from vulnerability management to ensuring operating system images are compliant with securely configured baselines recommended by the United States Government.
Semantic policy and adversarial modeling for cyber threat identification and avoidance
NASA Astrophysics Data System (ADS)
DeFrancesco, Anton; McQueary, Bruce
2009-05-01
Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.
Breakdown of interdependent directed networks.
Liu, Xueming; Stanley, H Eugene; Gao, Jianxi
2016-02-02
Increasing evidence shows that real-world systems interact with one another via dependency connectivities. Failing connectivities are the mechanism behind the breakdown of interacting complex systems, e.g., blackouts caused by the interdependence of power grids and communication networks. Previous research analyzing the robustness of interdependent networks has been limited to undirected networks. However, most real-world networks are directed, their in-degrees and out-degrees may be correlated, and they are often coupled to one another as interdependent directed networks. To understand the breakdown and robustness of interdependent directed networks, we develop a theoretical framework based on generating functions and percolation theory. We find that for interdependent Erdős-Rényi networks the directionality within each network increases their vulnerability and exhibits hybrid phase transitions. We also find that the percolation behavior of interdependent directed scale-free networks with and without degree correlations is so complex that two criteria are needed to quantify and compare their robustness: the percolation threshold and the integrated size of the giant component during an entire attack process. Interestingly, we find that the in-degree and out-degree correlations in each network layer increase the robustness of interdependent degree heterogeneous networks that most real networks are, but decrease the robustness of interdependent networks with homogeneous degree distribution and with strong coupling strengths. Moreover, by applying our theoretical analysis to real interdependent international trade networks, we find that the robustness of these real-world systems increases with the in-degree and out-degree correlations, confirming our theoretical analysis.
Game among interdependent networks: The impact of rationality on system robustness
NASA Astrophysics Data System (ADS)
Fan, Yuhang; Cao, Gongze; He, Shibo; Chen, Jiming; Sun, Youxian
2016-12-01
Many real-world systems are composed of interdependent networks that rely on one another. Such networks are typically designed and operated by different entities, who aim at maximizing their own payoffs. There exists a game among these entities when designing their own networks. In this paper, we study the game investigating how the rational behaviors of entities impact the system robustness. We first introduce a mathematical model to quantify the interacting payoffs among varying entities. Then we study the Nash equilibrium of the game and compare it with the optimal social welfare. We reveal that the cooperation among different entities can be reached to maximize the social welfare in continuous game only when the average degree of each network is constant. Therefore, the huge gap between Nash equilibrium and optimal social welfare generally exists. The rationality of entities makes the system inherently deficient and even renders it extremely vulnerable in some cases. We analyze our model for two concrete systems with continuous strategy space and discrete strategy space, respectively. Furthermore, we uncover some factors (such as weakening coupled strength of interdependent networks, designing a suitable topology dependence of the system) that help reduce the gap and the system vulnerability.
NASA Astrophysics Data System (ADS)
Pasi, Riccardo; Viavattene, Christophe; La Loggia, Goffredo
2016-04-01
Natural hazards damage assets and infrastructure inducing disruptions to urban functions and key daily services. These disruptions may be short or long with a variable spatial scale of impact. From an urban planning perspective, measuring these disruptions and their consequences at an urban scale is fundamental in order to develop more resilient cities. Whereas the assessment of physical vulnerabilities and direct damages is commonly addressed, new methodologies for assessing the systemic vulnerability at the urban scale are required to reveal these disruptions and their consequences. Physical and systemic vulnerability should be measured in order to reflect the multifaceted fragility of cities in the face of external stress, both in terms of the natural/built environment and socio-economic sphere. Additionally, a systemic approach allows the consideration of vulnerability across different spatial scales, as impacts may vary and be transmitted across local, regional or national levels. Urban systems are spatially distributed and the nature of this can have significant effects on flood impacts. The proposed approach identifies the vulnerabilities of flooding within urban contexts, including both in terms of single elementary units (buildings, infrastructures, people, etc.) and systemic functioning (urban functions and daily life networks). Direct losses are appraised initially using conventional methodologies (e.g. depth-damage functions). This aims to both understand the spatial distribution of physical vulnerability and associated losses and, secondly, to identify the most vulnerable building types and ways to improve the physical adaptation of our cities, proposing changes to building codes, design principles and other municipal regulation tools. The subsequent systemic approach recognises the city as a collection of sub-systems or functional units (such as neighbourhoods and suburbs) providing key daily services for inhabitants (e.g. healthcare facilities, schools, administration offices, food shops, leisure and cultural services etc.) and which are interconnected through transport networks. Moreover, each city is part of broader systems - which may or may not follow administrative boundaries - and, as such, need to be connected to its wider surroundings, in a multi-scalar perspective. The systemic analysis, herein limited to residential households, evaluates the presence, the distribution among functional units and the redundancy of key daily services. As such, systemic interdependences between neighbourhoods/suburbs and municipalities emerge, highlighting how systemic vulnerability spreads beyond the flooded areas. This aims to understand which planning patterns and existing mixed-use developments are more flood resilient (thereby informing future urban development/regeneration) and which infrastructure and assets have a key role within the urban system (and have therefore to be prioritised for protection). The methodology is currently developed through an extensive use of Geographic Information Systems (GIS) and applied to an Italian case study (Noale municipality, Venice). Current developments and on-going issues in its application and in the data collection (including the use of aerial survey data) will be discussed in the presentation.
Is It Time for a US Cyber Force?
2015-02-17
network of information technology (IT) and resident data, including the Internet , telecommunications networks, computer systems, and embedded processors...and controllers.13 JP 3-12 further goes on to explain cyberspace in terms of three layers: physical network, logical network, and cyber- persona .14...zero day) vulnerabilities against Microsoft operating system code using trusted hardware vendor certificates to cloak their presence. Though not
Securing Information with Complex Optical Encryption Networks
2015-08-11
Network Security, Network Vulnerability , Multi-dimentional Processing, optoelectronic devices 16. SECURITY CLASSIFICATION OF: 17. LIMITATION... optoelectronic devices and systems should be analyzed before the retrieval, any hostile hacker will need to possess multi-disciplinary scientific...sophisticated optoelectronic principles and systems where he/she needs to process the information. However, in the military applications, most military
Availability: A Metric for Nucleic Acid Strand Displacement Systems.
Olson, Xiaoping; Kotani, Shohei; Padilla, Jennifer E; Hallstrom, Natalya; Goltry, Sara; Lee, Jeunghoon; Yurke, Bernard; Hughes, William L; Graugnard, Elton
2017-01-20
DNA strand displacement systems have transformative potential in synthetic biology. While powerful examples have been reported in DNA nanotechnology, such systems are plagued by leakage, which limits network stability, sensitivity, and scalability. An approach to mitigate leakage in DNA nanotechnology, which is applicable to synthetic biology, is to introduce mismatches to complementary fuel sequences at key locations. However, this method overlooks nuances in the secondary structure of the fuel and substrate that impact the leakage reaction kinetics in strand displacement systems. In an effort to quantify the impact of secondary structure on leakage, we introduce the concepts of availability and mutual availability and demonstrate their utility for network analysis. Our approach exposes vulnerable locations on the substrate and quantifies the secondary structure of fuel strands. Using these concepts, a 4-fold reduction in leakage has been achieved. The result is a rational design process that efficiently suppresses leakage and provides new insight into dynamic nucleic acid networks.
DOT National Transportation Integrated Search
2017-04-30
Coastal communities are vulnerable to disruptions in their fuel distribution networks due to : tropical storms, hurricanes and associated flooding. These disruptions impact communities by : limiting fueling in the days following the storm potentially...
NASA Astrophysics Data System (ADS)
Zhang, Ding; Zhang, Yingjie
2017-09-01
A framework for reliability and maintenance analysis of job shop manufacturing systems is proposed in this paper. An efficient preventive maintenance (PM) policy in terms of failure effects analysis (FEA) is proposed. Subsequently, reliability evaluation and component importance measure based on FEA are performed under the PM policy. A job shop manufacturing system is applied to validate the reliability evaluation and dynamic maintenance policy. Obtained results are compared with existed methods and the effectiveness is validated. Some vague understandings for issues such as network modelling, vulnerabilities identification, the evaluation criteria of repairable systems, as well as PM policy during manufacturing system reliability analysis are elaborated. This framework can help for reliability optimisation and rational maintenance resources allocation of job shop manufacturing systems.
On the complex quantification of risk: systems-based perspective on terrorism.
Haimes, Yacov Y
2011-08-01
This article highlights the complexity of the quantification of the multidimensional risk function, develops five systems-based premises on quantifying the risk of terrorism to a threatened system, and advocates the quantification of vulnerability and resilience through the states of the system. The five premises are: (i) There exists interdependence between a specific threat to a system by terrorist networks and the states of the targeted system, as represented through the system's vulnerability, resilience, and criticality-impact. (ii) A specific threat, its probability, its timing, the states of the targeted system, and the probability of consequences can be interdependent. (iii) The two questions in the risk assessment process: "What is the likelihood?" and "What are the consequences?" can be interdependent. (iv) Risk management policy options can reduce both the likelihood of a threat to a targeted system and the associated likelihood of consequences by changing the states (including both vulnerability and resilience) of the system. (v) The quantification of risk to a vulnerable system from a specific threat must be built on a systemic and repeatable modeling process, by recognizing that the states of the system constitute an essential step to construct quantitative metrics of the consequences based on intelligence gathering, expert evidence, and other qualitative information. The fact that the states of all systems are functions of time (among other variables) makes the time frame pivotal in each component of the process of risk assessment, management, and communication. Thus, risk to a system, caused by an initiating event (e.g., a threat) is a multidimensional function of the specific threat, its probability and time frame, the states of the system (representing vulnerability and resilience), and the probabilistic multidimensional consequences. © 2011 Society for Risk Analysis.
Sarafijanović, Slavisa; Le Boudec, Jean-Yves
2005-09-01
In mobile ad hoc networks, nodes act both as terminals and information relays, and they participate in a common routing protocol, such as dynamic source routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper, we investigate the use of an artificial immune system (AIS) to detect node misbehavior in a mobile ad hoc network using DSR. The system is inspired by the natural immune system (IS) of vertebrates. Our goal is to build a system that, like its natural counterpart, automatically learns, and detects new misbehavior. We describe our solution for the classification task of the AIS; it employs negative selection and clonal selection, the algorithms for learning and adaptation used by the natural IS. We define how we map the natural IS concepts such as self, antigen, and antibody to a mobile ad hoc network and give the resulting algorithm for classifying nodes as misbehaving. We implemented the system in the network simulator Glomosim; we present detection results and discuss how the system parameters affect the performance of primary and secondary response. Further steps will extend the design by using an analogy to the innate system, danger signal, and memory cells.
Delgado, João; Pollard, Simon; Snary, Emma; Black, Edgar; Prpich, George; Longhurst, Phil
2013-08-01
Exotic animal diseases (EADs) are characterized by their capacity to spread global distances, causing impacts on animal health and welfare with significant economic consequences. We offer a critique of current import risk analysis approaches employed in the EAD field, focusing on their capacity to assess complex systems at a policy level. To address the shortcomings identified, we propose a novel method providing a systematic analysis of the likelihood of a disease incursion, developed by reference to the multibarrier system employed for the United Kingdom. We apply the network model to a policy-level risk assessment of classical swine fever (CSF), a notifiable animal disease caused by the CSF virus. In doing so, we document and discuss a sequence of analyses that describe system vulnerabilities and reveal the critical control points (CCPs) for intervention, reducing the likelihood of U.K. pig herds being exposed to the CSF virus. © 2012 Society for Risk Analysis.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-28
... network security vulnerabilities and increased risks potentially resulting in unsafe conditions for the... Gulfstream G280 Airplane; Isolation or Aircraft Electronic System Security Protection From Unauthorized... connectivity of the passenger service computer systems to the airplane critical systems and data networks. The...
1998-01-01
usually written up by Logistics or Maintenance (4790 is the Maintenance “ Bible ”). If need be, and if resources are available, one could collect all...Public domain) SATAN (System Administration Tool for Analyzing Networks) (Public Domain) STAT ( Security Test and Analysis Tool) (Harris Corporation...Service-Filtering Tools 1. TCP/IP wrapper program • Tools to Scan Hosts for Known Vulnerabilities 1. ISS (Internet Security Scanner) 2. SATAN (Security
Coastal vulnerability assessment using Fuzzy Logic and Bayesian Belief Network approaches
NASA Astrophysics Data System (ADS)
Valentini, Emiliana; Nguyen Xuan, Alessandra; Filipponi, Federico; Taramelli, Andrea
2017-04-01
Natural hazards such as sea surge are threatening low-lying coastal plains. In order to deal with disturbances a deeper understanding of benefits deriving from ecosystem services assessment, management and planning can contribute to enhance the resilience of coastal systems. In this frame assessing current and future vulnerability is a key concern of many Systems Of Systems SOS (social, ecological, institutional) that deals with several challenges like the definition of Essential Variables (EVs) able to synthesize the required information, the assignment of different weight to be attributed to each considered variable, the selection of method for combining the relevant variables. It is widely recognized that ecosystems contribute to human wellbeing and then their conservation increases the resilience capacities and could play a key role in reducing climate related risk and thus physical and economic losses. A way to fully exploit ecosystems potential, i.e. their so called ecopotential (see H2020 EU funded project "ECOPOTENTIAL"), is the Ecosystem based Adaptation (EbA): the use of ecosystem services as part of an adaptation strategy. In order to provide insight in understanding regulating ecosystem services to surge and which variables influence them and to make the best use of available data and information (EO products, in situ data and modelling), we propose a multi-component surge vulnerability assessment, focusing on coastal sandy dunes as natural barriers. The aim is to combine together eco-geomorphological and socio-economic variables with the hazard component on the base of different approaches: 1) Fuzzy Logic; 2) Bayesian Belief Networks (BBN). The Fuzzy Logic approach is very useful to get a spatialized information and it can easily combine variables coming from different sources. It provides information on vulnerability moving along-shore and across-shore (beach-dune transect), highlighting the variability of vulnerability conditions in the spatial dimension. According to the results using fuzzy operators, the analysis greatest weakness is the limited capacity to represent the relation among the different considered variables. The BBN approach, based on the definition of conditional probabilities, has allowed determining the trend of distributions of vulnerability along-shore, highlighting which parts of the coast are most likely to have higher or lower vulnerability than others. In BBN analysis, the greatest weakness emerge in the case of arbitrary definition of conditional probabilities (i.e. when there is a lack of information on the past hazardous events) because it is not possible to derive the individual contribution of each variable. As conclusion, the two approaches could be used together in the perspective of enhancing the multiple components in vulnerability assessment: the BBN as a preliminary assessment to provide a coarse description of the vulnerability distribution, and the Fuzzy Logic as an extended assessment to provide more space based information.
Mathematical Approaches to WMD Defense and Vulnerability Assessments of Dynamic Networks
2016-07-01
the last decade, and now tends to focus on a system -wide integration of fortification resources, strategically deployed to...create a robust system of networks. Given the presence of various networks, this goal seeks to determine which edges should be constructed to...controlling all aspects of his actions, with full knowledge of the system , and with the ability to jointly utilize all of
Response of power systems to the San Fernando Valley earthquake of 9 February 1971. Final report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schiff, A.J.; Yao, J.T.P.
1972-01-01
The impact of the San Fernando Valley earthquake on electric power systems is discussed. Particular attention focused on the following three areas; (1) the effects of an earthquake on the power network in the Western States, (2) the failure of subsystems and components of the power system, and (3) the loss of power to hospitals. The report includes sections on the description and functions of major components of a power network, existing procedures to protect the network, safety devices within the system which influence the network, a summary of the effects of the San Fernando Valley earthquake on the Westernmore » States Power Network, and present efforts to reduce the network vulnerability to faults. Also included in the report are a review of design procedures and practices prior to the San Fernando Valley earthquake and descriptions of types of damage to electrical equipment, dynamic analysis of equipment failures, equipment surviving the San Fernando Valley earthquake and new seismic design specifications. In addition, some observations and insights gained during the study, which are not directly related to power systems are discussed.« less
Architecture and Methods for Substation SCADA Cybersecurity: Best Practices
DOE Office of Scientific and Technical Information (OSTI.GOV)
Albunashee, Hamdi; Al Sarray, Muthanna; McCann, Roy
There are over 3000 electricity providers in the United States, encompassing investor and publicly owned utilities as well as electric cooperatives. There has been ongoing trends to increasingly automate and provide remote control and monitoring of electric energy delivery systems. The deployment of computer network technologies has increased the efficiency and reliability of electric power infrastructure. However, the increased use of digital communications has also increased the vulnerability to malicious cyber attacks [1]. In 2004 the National Research Councils (National Academies) formed a committee of specialists to address these vulnerabilities and propose possible solutions with an objective to prioritize themore » R&D needs for developing countermeasures. The committee addressed many potential concerns in the electric power delivery system and classified them based upon different criteria and presented recommendations to minimize the gap between the academic research directions and the needs of the electric utility industry. The complexity and diversity of the electric power delivery system in the U.S. has opened many ports for attackers and intruders [1]. This complexity and diversity is attributed to the fact that power delivery system is a network of substations, transmission and distribution lines, sub-networks of controlling, sensing and monitoring units, and human operator involvement for running the system [1]. Accordingly, any incident such as the occurrence of a fault or disturbance in this complex network cannot be deferred and should be resolved within an order of milliseconds, otherwise there is risk of large-scale outages similar to the occurrences in India and the U.S. in 2003 [2]. There are three main vulnerabilities in supervisory control and data acquisition (SCADA) systems commonly identified—physical vulnerability, cyber vulnerability and personal vulnerability [1]. In terms of cyber threats, SCADA systems are the most critical elements in the electric power grid in the U.S. Unauthorized access to a SCADA system could enable/disable unexpected equipment (such as disable the protection system or a circuit breaker) which could cause large scale disruptions of electric power delivery. This paper provides an overview of power system SCADA technologies in transmission substations (Section 2) and summarizes the best practices for implementing a cyber security program. After introducing SCADA system operations in Section 2, a description of the security challenges for SCADA systems is presented in Section 3. In Section 4, NECRC Critical Infrastructure Protection standards CIP-002 through CIP-009 are summarized. An overview of industry best practices is presented in Section 5.« less
NINJA: a noninvasive framework for internal computer security hardening
NASA Astrophysics Data System (ADS)
Allen, Thomas G.; Thomson, Steve
2004-07-01
Vulnerabilities are a growing problem in both the commercial and government sector. The latest vulnerability information compiled by CERT/CC, for the year ending Dec. 31, 2002 reported 4129 vulnerabilities representing a 100% increase over the 2001 [1] (the 2003 report has not been published at the time of this writing). It doesn"t take long to realize that the growth rate of vulnerabilities greatly exceeds the rate at which the vulnerabilities can be fixed. It also doesn"t take long to realize that our nation"s networks are growing less secure at an accelerating rate. As organizations become aware of vulnerabilities they may initiate efforts to resolve them, but quickly realize that the size of the remediation project is greater than their current resources can handle. In addition, many IT tools that suggest solutions to the problems in reality only address "some" of the vulnerabilities leaving the organization unsecured and back to square one in searching for solutions. This paper proposes an auditing framework called NINJA (acronym for Network Investigation Notification Joint Architecture) for noninvasive daily scanning/auditing based on common security vulnerabilities that repeatedly occur in a network environment. This framework is used for performing regular audits in order to harden an organizations security infrastructure. The framework is based on the results obtained by the Network Security Assessment Team (NSAT) which emulates adversarial computer network operations for US Air Force organizations. Auditing is the most time consuming factor involved in securing an organization's network infrastructure. The framework discussed in this paper uses existing scripting technologies to maintain a security hardened system at a defined level of performance as specified by the computer security audit team. Mobile agents which were under development at the time of this writing are used at a minimum to improve the noninvasiveness of our scans. In general, noninvasive scans with an adequate framework performed on a daily basis reduce the amount of security work load as well as the timeliness in performing remediation, as verified by the NINJA framework. A vulnerability assessment/auditing architecture based on mobile agent technology is proposed and examined at the end of the article as an enhancement to the current NINJA architecture.
U.K. Foot and Mouth Disease: A Systemic Risk Assessment of Existing Controls.
Delgado, João; Pollard, Simon; Pearn, Kerry; Snary, Emma L; Black, Edgar; Prpich, George; Longhurst, Phil
2017-09-01
This article details a systemic analysis of the controls in place and possible interventions available to further reduce the risk of a foot and mouth disease (FMD) outbreak in the United Kingdom. Using a research-based network analysis tool, we identify vulnerabilities within the multibarrier control system and their corresponding critical control points (CCPs). CCPs represent opportunities for active intervention that produce the greatest improvement to United Kingdom's resilience to future FMD outbreaks. Using an adapted 'features, events, and processes' (FEPs) methodology and network analysis, our results suggest that movements of animals and goods associated with legal activities significantly influence the system's behavior due to their higher frequency and ability to combine and create scenarios of exposure similar in origin to the U.K. FMD outbreaks of 1967/8 and 2001. The systemic risk assessment highlights areas outside of disease control that are relevant to disease spread. Further, it proves to be a powerful tool for demonstrating the need for implementing disease controls that have not previously been part of the system. © 2016 The Authors Risk Analysis published by Wiley Periodicals, Inc. on behalf of Society for Risk Analysis.
Loepfe, Lasse; Cabrales, Antonio; Sánchez, Angel
2013-01-01
The 2007-2008 financial crisis solidified the consensus among policymakers that a macro-prudential approach to regulation and supervision should be adopted. The currently preferred policy option is the regulation of capital requirements, with the main focus on combating procyclicality and on identifying the banks that have a high systemic importance, those that are "too big to fail". Here we argue that the concept of systemic risk should include the analysis of the system as a whole and we explore systematically the most important properties for policy purposes of networks topology on resistance to shocks. In a thorough study going from analytical models to empirical data, we show two sharp transitions from safe to risky regimes: 1) diversification becomes harmful with just a small fraction (~2%) of the shocks sampled from a fat tailed shock distributions and 2) when large shocks are present a critical link density exists where an effective giant cluster forms and most firms become vulnerable. This threshold depends on the network topology, especially on modularity. Firm size heterogeneity has important but diverse effects that are heavily dependent on shock characteristics. Similarly, degree heterogeneity increases vulnerability only when shocks are directed at the most connected firms. Furthermore, by studying the structure of the core of the transnational corporation network from real data, we show that its stability could be clearly increased by removing some of the links with highest centrality betweenness. Our results provide a novel insight and arguments for policy makers to focus surveillance on the connections between firms, in addition to capital requirements directed at the nodes.
A prototype forensic toolkit for industrial-control-systems incident response
NASA Astrophysics Data System (ADS)
Carr, Nickolas B.; Rowe, Neil C.
2015-05-01
Industrial control systems (ICSs) are an important part of critical infrastructure in cyberspace. They are especially vulnerable to cyber-attacks because of their legacy hardware and software and the difficulty of changing it. We first survey the history of intrusions into ICSs, the more serious of which involved a continuing adversary presence on an ICS network. We discuss some common vulnerabilities and the categories of possible attacks, noting the frequent use of software written a long time ago. We propose a framework for designing ICS incident response under the constraints that no new software must be required and that interventions cannot impede the continuous processing that is the norm for such systems. We then discuss a prototype toolkit we built using the Windows Management Instrumentation Command-Line tool for host-based analysis and the Bro intrusion-detection software for network-based analysis. Particularly useful techniques we used were learning the historical range of parameters of numeric quantities so as to recognize anomalies, learning the usual addresses of connections to a node, observing Internet addresses (usually rare), observing anomalous network protocols such as unencrypted data transfers, observing unusual scheduled tasks, and comparing key files through registry entries and hash values to find malicious modifications. We tested our methods on actual data from ICSs including publicly-available data, voluntarily-submitted data, and researcher-provided "advanced persistent threat" data. We found instances of interesting behavior in our experiments. Intrusions were generally easy to see because of the repetitive nature of most processing on ICSs, but operators need to be motivated to look.
NASA Astrophysics Data System (ADS)
Poulter, Benjamin; Goodall, Jonathan L.; Halpin, Patrick N.
2008-08-01
SummaryThe vulnerability of coastal landscapes to sea level rise is compounded by the existence of extensive artificial drainage networks initially built to lower water tables for agriculture, forestry, and human settlements. These drainage networks are found in landscapes with little topographic relief where channel flow is characterized by bi-directional movement across multiple time-scales and related to precipitation, wind, and tidal patterns. The current configuration of many artificial drainage networks exacerbates impacts associated with sea level rise such as salt-intrusion and increased flooding. This suggests that in the short-term, drainage networks might be managed to mitigate sea level rise related impacts. The challenge, however, is that hydrologic processes in regions where channel flow direction is weakly related to slope and topography require extensive parameterization for numerical models which is limited where network size is on the order of a hundred or more kilometers in total length. Here we present an application of graph theoretic algorithms to efficiently investigate network properties relevant to the management of a large artificial drainage system in coastal North Carolina, USA. We created a digital network model representing the observation network topology and four types of drainage features (canal, collector and field ditches, and streams). We applied betweenness-centrality concepts (using Dijkstra's shortest path algorithm) to determine major hydrologic flowpaths based off of hydraulic resistance. Following this, we identified sub-networks that could be managed independently using a community structure and modularity approach. Lastly, a betweenness-centrality algorithm was applied to identify major shoreline entry points to the network that disproportionately control water movement in and out of the network. We demonstrate that graph theory can be applied to solving management and monitoring problems associated with sea level rise for poorly understood drainage networks in advance of numerical methods.
A Probabilistic Risk Mitigation Model for Cyber-Attacks to PMU Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mousavian, Seyedamirabbas; Valenzuela, Jorge; Wang, Jianhui
The power grid is becoming more dependent on information and communication technologies. Complex networks of advanced sensors such as phasor measurement units (PMUs) are used to collect real time data to improve the observability of the power system. Recent studies have shown that the power grid has significant cyber vulnerabilities which could increase when PMUs are used extensively. Therefore, recognizing and responding to vulnerabilities are critical to the security of the power grid. This paper proposes a risk mitigation model for optimal response to cyber-attacks to PMU networks. We model the optimal response action as a mixed integer linear programmingmore » (MILP) problem to prevent propagation of the cyber-attacks and maintain the observability of the power system.« less
Vulnerability of countries to food-production crises propagating in the virtual water trade network
NASA Astrophysics Data System (ADS)
Tamea, S.; Laio, F.; Ridolfi, L.
2015-12-01
In recent years, the international trade of food and agricultural commodities has undergone a marked increase of exchanged volumes and an expansion of the trade network. This globalization of trade has both positive and negative effects, but the interconnectedness and external dependency of countries generate complex dynamics which are often difficult to understand and model. In this study we consider the volume of water used for the production of agricultural commodities, virtually exchanged among countries through commodity trade, i.e. the virtual water trade. Then, we set up a parsimonious mechanistic model describing the propagation, into the global trade network, of food-production crises generated locally by a social, economic or environmental event (such as war, economic crisis, drought, pest). The model, accounting for the network structure and the virtual water balance of all countries, bases on rules derived from observed virtual water flows and on data-based and statistically verified assumption. It is also tested on real case studies that prove its capability to capture the main features of crises propagation. The model is then employed as the basis for the development of an index of country vulnerability, measuring the exposure of countries to crises propagating in the virtual water trade network. Results of the analysis are discussed within the context of socio-economic and environmental conditions of countries, showing that not only water-scarce, but also wealthy and globalized countries, are among the most vulnerable to external crises. The temporal analysis for the period 1986-2011 reveals that the global average vulnerability has strongly increased over time, confirming the increased exposure of countries to external crises which may occur in the virtual water trade network.
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.
Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilitiesmore » which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.« less
North Europe power transmission system vulnerability during extreme space weather
NASA Astrophysics Data System (ADS)
Piccinelli, Roberta; Krausmann, Elisabeth
2018-01-01
Space weather driven by solar activity can induce geomagnetic disturbances at the Earth's surface that can affect power transmission systems. Variations in the geomagnetic field result in geomagnetically induced currents that can enter the system through its grounding connections, saturate transformers and lead to system instability and possibly collapse. This study analyzes the impact of extreme space weather on the northern part of the European power transmission grid for different transformer designs to understand its vulnerability in case of an extreme event. The behavior of the system was analyzed in its operational mode during a severe geomagnetic storm, and mitigation measures, like line compensation, were also considered. These measures change the topology of the system, thus varying the path of geomagnetically induced currents and inducing a local imbalance in the voltage stability superimposed on the grid operational flow. Our analysis shows that the North European power transmission system is fairly robust against extreme space weather events. When considering transformers more vulnerable to geomagnetic storms, only few episodes of instability were found in correspondence with an existing voltage instability due to the underlying system load. The presence of mitigation measures limited the areas of the network in which bus voltage instabilities arise with respect to the system in which mitigation measures are absent.
NASA Astrophysics Data System (ADS)
Tejedor, A.; Marra, W. A.; Addink, E. A.; Foufoula-Georgiou, E.; Kleinhans, M. G.
2016-12-01
Advancing quantitative understanding of the structure and dynamics of complex networks has transformed research in many fields as diverse as protein interactions in a cell to page connectivity in the World Wide Web and relationships in human societies. However, Geosciences have not benefited much from this new conceptual framework, although connectivity is at the center of many processes in hydro-geomorphology. One of the first efforts in this direction was the seminal work of Smart and Moruzzi (1971), proposing the use of graph theory for studying the intricate structure of delta channel networks. In recent years, this preliminary work has precipitated in a body of research that examines the connectivity of multiple-channel fluvial systems, such as delta networks and braided rivers. In this work, we compare two approaches recently introduced in the literature: (1) Marra et al. (2014) utilized network centrality measures to identify important channels in a braided section of the Jamuna River, and used the changes of bifurcations within the network over time to explain the overall river evolution; and (2) Tejedor et al. (2015a,b) developed a set of metrics to characterize the complexity of deltaic channel networks, as well as defined a vulnerability index that quantifies the relative change of sediment and water delivery to the shoreline outlets in response to upstream perturbations. Here we present a comparative analysis of metrics of centrality and vulnerability applied to both braided and deltaic channel networks to depict critical channels in those systems, i.e., channels where a change would contribute more substantially to overall system changes, and to understand what attributes of interest in a channel network are most succinctly depicted in what metrics. Marra, W. A., Kleinhans, M. G., & Addink, E. A. (2014). Earth Surface Processes and Landforms, doi:10.1002/esp.3482Smart, J. S., and V. L. Moruzzi (1971), Quantitative properties of delta channel networks, Tech. Rep. 3, 27 pp., IBM Thomas J. Watson Res. Cent., Yorktown, NYTejedor, A., Longjas, A., Zaliapin, I., & Foufoula-Georgiou, E. (2015a/b). Water Resources Research, doi:10.1002/2014WR016259 & doi:10.1002/2014WR016604
The Department of Defense energy vulnerabilities: Potential problems and observations
NASA Astrophysics Data System (ADS)
Freiwald, D. A.; Berger, M. E.; Roach, J. F.
1982-08-01
The Department of Defense is almost entirely dependent on civilian energy supplies to meet its needs in both peacetime and periods of heightened conflict. There are a number of potential vulnerabilities to the continual and timely supply of energy to both the civilian and military sectors. These include denial of the energy resources themselves, disruption of critical transportation networks, destruction of storage facilities, and interruption of electrical power. This report briefly reviews the present situation for provision of energy from the civilian sector to the military. General vulnerabilities of the existing energy supply system are identified, along with the potential for armed aggression (including terrorist and sabotage activities) against the energy network. Conclusions and some tentative observations are made as to a proper response to the existing vulnerabilities.
Assessing the risk posed by natural hazards to infrastructures
NASA Astrophysics Data System (ADS)
Eidsvig, Unni; Kristensen, Krister; Vidar Vangelsten, Bjørn
2015-04-01
The modern society is increasingly dependent on infrastructures to maintain its function, and disruption in one of the infrastructure systems may have severe consequences. The Norwegian municipalities have, according to legislation, a duty to carry out a risk and vulnerability analysis and plan and prepare for emergencies in a short- and long term perspective. Vulnerability analysis of the infrastructures and their interdependencies is an important part of this analysis. This paper proposes a model for assessing the risk posed by natural hazards to infrastructures. The model prescribes a three level analysis with increasing level of detail, moving from qualitative to quantitative analysis. This paper focuses on the second level, which consists of a semi-quantitative analysis. The purpose of this analysis is to perform a screening of the scenarios of natural hazards threatening the infrastructures identified in the level 1 analysis and investigate the need for further analyses, i.e. level 3 quantitative analyses. The proposed level 2 analysis considers the frequency of the natural hazard, different aspects of vulnerability including the physical vulnerability of the infrastructure itself and the societal dependency on the infrastructure. An indicator-based approach is applied, ranking the indicators on a relative scale. The proposed indicators characterize the robustness of the infrastructure, the importance of the infrastructure as well as interdependencies between society and infrastructure affecting the potential for cascading effects. Each indicator is ranked on a 1-5 scale based on pre-defined ranking criteria. The aggregated risk estimate is a combination of the semi-quantitative vulnerability indicators, as well as quantitative estimates of the frequency of the natural hazard and the number of users of the infrastructure. Case studies for two Norwegian municipalities are presented, where risk to primary road, water supply and power network threatened by storm and landslide is assessed. The application examples show that the proposed model provides a useful tool for screening of undesirable events, with the ultimate goal to reduce the societal vulnerability.
Finite Energy and Bounded Attacks on Control System Sensor Signals
DOE Office of Scientific and Technical Information (OSTI.GOV)
Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M
Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less
Shim, Kyusung; Do, Nhu Tri; An, Beongku
2017-01-01
In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selection scheme, called the proposed source relay selection (PSRS) scheme. Specifically, the PSRS scheme first selects the least vulnerable source and then selects the relay that maximizes the system secrecy capacity for the given selected source. Additionally, the maximal ratio combining (MRC) technique and the selection combining (SC) technique are considered at the eavesdropper, respectively. Investigating the system performance in terms of secrecy outage probability (SOP), closed-form expressions of the SOP are derived. The developed analysis is corroborated through Monte Carlo simulation. Numerical results show that the PSRS scheme significantly improves the secure ability of the system compared to that of the random source relay selection scheme, but does not outperform the optimal joint source relay selection (OJSRS) scheme. However, the PSRS scheme drastically reduces the required amount of channel state information (CSI) estimations compared to that required by the OJSRS scheme, specially in dense cooperative networks. PMID:28212286
DOE Office of Scientific and Technical Information (OSTI.GOV)
Christoph, G.G; Jackson, K.A.; Neuman, M.C.
An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in the system audit record, by changes in the vulnerability posture of the system configuration, and in other evidence found through active testing of the system. In 1989 we started developing an automatic misuse detection system for the Integrated Computing Network (ICN) at Los Alamos National Laboratory. Since 1990 this system has been operational, monitoring a variety of network systems and services. We call it the Network Anomaly Detection and Intrusion Reporter, or NADIR. During the last year andmore » a half, we expanded NADIR to include processing of audit and activity records for the Cray UNICOS operating system. This new component is called the UNICOS Real-time NADIR, or UNICORN. UNICORN summarizes user activity and system configuration information in statistical profiles. In near real-time, it can compare current activity to historical profiles and test activity against expert rules that express our security policy and define improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. UNICORN is currently operational on four Crays in Los Alamos` main computing network, the ICN.« less
Great Lakes coastal systems are vulnerable to introduction of a wide variety of non-indigenous species (NIS), and the desire to effectively respond to future invaders is prompting efforts towards establishing a broad early-detection network. Such a network requires statistically...
ERIC Educational Resources Information Center
Knowlton, Amy R.; Latkin, Carl A.
2007-01-01
The study examined multiple dimensions of social support as predictors of depressive symptoms among a highly vulnerable population. Social network analysis was used to assess perceived and enacted dimensions of support (emotional, financial, instrumental), network conflict, closeness, and composition. Participants were 393 current and former…
Network topology and resilience analysis of South Korean power grid
NASA Astrophysics Data System (ADS)
Kim, Dong Hwan; Eisenberg, Daniel A.; Chun, Yeong Han; Park, Jeryang
2017-01-01
In this work, we present topological and resilience analyses of the South Korean power grid (KPG) with a broad voltage level. While topological analysis of KPG only with high-voltage infrastructure shows an exponential degree distribution, providing another empirical evidence of power grid topology, the inclusion of low voltage components generates a distribution with a larger variance and a smaller average degree. This result suggests that the topology of a power grid may converge to a highly skewed degree distribution if more low-voltage data is considered. Moreover, when compared to ER random and BA scale-free networks, the KPG has a lower efficiency and a higher clustering coefficient, implying that highly clustered structure does not necessarily guarantee a functional efficiency of a network. Error and attack tolerance analysis, evaluated with efficiency, indicate that the KPG is more vulnerable to random or degree-based attacks than betweenness-based intentional attack. Cascading failure analysis with recovery mechanism demonstrates that resilience of the network depends on both tolerance capacity and recovery initiation time. Also, when the two factors are fixed, the KPG is most vulnerable among the three networks. Based on our analysis, we propose that the topology of power grids should be designed so the loads are homogeneously distributed, or functional hubs and their neighbors have high tolerance capacity to enhance resilience.
Vulnerability and cosusceptibility determine the size of network cascades
Yang, Yang; Nishikawa, Takashi; Motter, Adilson E.
2017-01-27
In a network, a local disturbance can propagate and eventually cause a substantial part of the system to fail in cascade events that are easy to conceptualize but extraordinarily difficult to predict. Furthermore, we develop a statistical framework that can predict cascade size distributions by incorporating two ingredients only: the vulnerability of individual components and the cosusceptibility of groups of components (i.e., their tendency to fail together). Using cascades in power grids as a representative example, we show that correlations between component failures define structured and often surprisingly large groups of cosusceptible components. Aside from their implications for blackout studies,more » these results provide insights and a new modeling framework for understanding cascades in financial systems, food webs, and complex networks in general.« less
NASA Astrophysics Data System (ADS)
Shao, Huaiyong; Xian, Wei; Yang, Wunian
2009-07-01
The large-scale and super-strength development of mineral resources in mining cities in long term has made great contributions to China's economic construction and development, but it has caused serious damage to the ecological environment even ecological imbalance at the same time because the neglect of the environmental impact even to the expense of the environment to some extent. In this study, according to the characteristics of mining cities, the scientific and practical eco-environmental vulnerability evaluation index system of mining cities had been established. Taking Panzhihua city of Sichuan province as an example, using remote sensing and GIS technology, applying various types of remote sensing image (TM, SPOT5, IKONOS) and Statistical data, the ecological environment evaluation data of mining cities was extracted effectively. For the non-linear relationship between the evaluation indexes and the degree of eco-environmental vulnerability in mining cities, this study innovative took the evaluation of eco-environmental vulnerability of the study area by using artificial neural network whose training used SCE-UA algorithm that well overcome the slow learning and difficult convergence of traditional neural network algorithm. The results of ecoenvironmental vulnerability evaluation of the study area were objective, reasonable and the credibility was high. The results showed that the area distribution of five eco-environmental vulnerability grade types was basically normal, and the overall ecological environment situation of Panzhihua city was in the middle level, the degree of eco-environmental vulnerability in the south was higher than the north, and mining activities were dominant factors to cause ecoenvironmental damage and eco-environmental Vulnerability. In this study, a comprehensive theory and technology system of regional eco-environmental vulnerability evaluation which included the establishment of eco-environmental vulnerability evaluation index system, processing of evaluation data and establishing of evaluation model. New ideas and methods had provided for eco-environmental vulnerability of mining cities.
Vulnerability of networks of interacting Markov chains.
Kocarev, L; Zlatanov, N; Trajanov, D
2010-05-13
The concept of vulnerability is introduced for a model of random, dynamical interactions on networks. In this model, known as the influence model, the nodes are arranged in an arbitrary network, while the evolution of the status at a node is according to an internal Markov chain, but with transition probabilities that depend not only on the current status of that node but also on the statuses of the neighbouring nodes. Vulnerability is treated analytically and numerically for several networks with different topological structures, as well as for two real networks--the network of infrastructures and the EU power grid--identifying the most vulnerable nodes of these networks.
Robustness of Synchrony in Complex Networks and Generalized Kirchhoff Indices
NASA Astrophysics Data System (ADS)
Tyloo, M.; Coletta, T.; Jacquod, Ph.
2018-02-01
In network theory, a question of prime importance is how to assess network vulnerability in a fast and reliable manner. With this issue in mind, we investigate the response to external perturbations of coupled dynamical systems on complex networks. We find that for specific, nonaveraged perturbations, the response of synchronous states depends on the eigenvalues of the stability matrix of the unperturbed dynamics, as well as on its eigenmodes via their overlap with the perturbation vector. Once averaged over properly defined ensembles of perturbations, the response is given by new graph topological indices, which we introduce as generalized Kirchhoff indices. These findings allow for a fast and reliable method for assessing the specific or average vulnerability of a network against changing operational conditions, faults, or external attacks.
Availability: A Metric for Nucleic Acid Strand Displacement Systems
2016-01-01
DNA strand displacement systems have transformative potential in synthetic biology. While powerful examples have been reported in DNA nanotechnology, such systems are plagued by leakage, which limits network stability, sensitivity, and scalability. An approach to mitigate leakage in DNA nanotechnology, which is applicable to synthetic biology, is to introduce mismatches to complementary fuel sequences at key locations. However, this method overlooks nuances in the secondary structure of the fuel and substrate that impact the leakage reaction kinetics in strand displacement systems. In an effort to quantify the impact of secondary structure on leakage, we introduce the concepts of availability and mutual availability and demonstrate their utility for network analysis. Our approach exposes vulnerable locations on the substrate and quantifies the secondary structure of fuel strands. Using these concepts, a 4-fold reduction in leakage has been achieved. The result is a rational design process that efficiently suppresses leakage and provides new insight into dynamic nucleic acid networks. PMID:26875531
Dynamics of subway networks based on vehicles operation timetable
NASA Astrophysics Data System (ADS)
Xiao, Xue-mei; Jia, Li-min; Wang, Yan-hui
2017-05-01
In this paper, a subway network is represented as a dynamic, directed and weighted graph, in which vertices represent subway stations and weights of edges represent the number of vehicles passing through the edges by considering vehicles operation timetable. Meanwhile the definitions of static and dynamic metrics which can represent vertices' and edges' local and global attributes are proposed. Based on the model and metrics, standard deviation is further introduced to study the dynamic properties (heterogeneity and vulnerability) of subway networks. Through a detailed analysis of the Beijing subway network, we conclude that with the existing network structure, the heterogeneity and vulnerability of the Beijing subway network varies over time when the vehicle operation timetable is taken into consideration, and the distribution of edge weights affects the performance of the network. In other words, although the vehicles operation timetable is restrained by the physical structure of the network, it determines the performances and properties of the Beijing subway network.
Loepfe, Lasse; Cabrales, Antonio; Sánchez, Angel
2013-01-01
The 2007-2008 financial crisis solidified the consensus among policymakers that a macro-prudential approach to regulation and supervision should be adopted. The currently preferred policy option is the regulation of capital requirements, with the main focus on combating procyclicality and on identifying the banks that have a high systemic importance, those that are “too big to fail”. Here we argue that the concept of systemic risk should include the analysis of the system as a whole and we explore systematically the most important properties for policy purposes of networks topology on resistance to shocks. In a thorough study going from analytical models to empirical data, we show two sharp transitions from safe to risky regimes: 1) diversification becomes harmful with just a small fraction (~2%) of the shocks sampled from a fat tailed shock distributions and 2) when large shocks are present a critical link density exists where an effective giant cluster forms and most firms become vulnerable. This threshold depends on the network topology, especially on modularity. Firm size heterogeneity has important but diverse effects that are heavily dependent on shock characteristics. Similarly, degree heterogeneity increases vulnerability only when shocks are directed at the most connected firms. Furthermore, by studying the structure of the core of the transnational corporation network from real data, we show that its stability could be clearly increased by removing some of the links with highest centrality betweeness. Our results provide a novel insight and arguments for policy makers to focus surveillance on the connections between firms, in addition to capital requirements directed at the nodes. PMID:24147017
Rautureau, S; Dufour, B; Durand, B
2011-04-01
Besides farming, trade of livestock is a major component of agricultural economy. However, the networks generated by live animal movements are the major support for the propagation of infectious agents between farms, and their structure strongly affects how fast a disease may spread. Structural characteristics may thus be indicators of network vulnerability to the spread of infectious disease. The method proposed here is based upon the analysis of specific subnetworks: the giant strongly connected components (GSCs). Their existence, size and geographic extent are used to assess network vulnerability. Their disappearance when targeted nodes are removed allows studying how network vulnerability may be controlled under emergency conditions. The method was applied to the cattle trade network in France, 2005. Giant strongly connected components were present and widely spread all over the country in yearly, monthly and weekly networks. Among several tested approaches, the most efficient way to make GSCs disappear was based on the ranking of nodes by decreasing betweenness centrality (the proportion of shortest paths between nodes on which a specific node lies). Giant strongly connected components disappearance was obtained after removal of <1% of network nodes. Under emergency conditions, suspending animal trade activities in a small subset of holdings may thus allow to control the spread of an infectious disease through the animal trade network. Nodes representing markets and dealers were widely affected by these simulated control measures. This confirms their importance as 'hubs' for infectious diseases spread. Besides emergency conditions, specific sensitization and preventive measures should be dedicated to this population. © 2010 Blackwell Verlag GmbH.
McGreevy, Conor; Harrop, Wayne
2015-01-01
Global trade and commerce requires products to be securely contained and transferred in a timely way across great distances and between national boundaries. Throughout the process, cargo and containers are stored, handled and checked by a range of authorities and authorised agents. Intermodal transportation involves the use of container ships, planes, railway systems, land bridges, road networks and barges. This paper examines the the nefarious nature of intentional disruption and nefarious risks associated with the movement of cargo and container freight. The paper explores main threats, vulnerabilities and security measures relevant to significant intermodal transit risk issues such as theft, piracy, terrorism, contamination, counterfeiting and product tampering. Three risk and vulnerability models are examined and basic standards and regulations that are relevant to safe and secure transit of container goods across international supply networks are outlined.
Robustness analysis of interdependent networks under multiple-attacking strategies
NASA Astrophysics Data System (ADS)
Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie
2018-04-01
The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.
ERIC Educational Resources Information Center
Silva, Marisa; da Silva, Sofia Marques; Araújo, Helena C
2017-01-01
This article presents an analysis of school principals' perspectives on networking concerning schools and school clusters from areas of social vulnerability (Educational Territories of Priority Intervention (TEIP)) in Northern Portugal. The meanings, purpose, benefits and difficulties of networking in education are examined, based on interviews…
A Framework for Programming and Budgeting for Cybersecurity
2016-01-01
environment in which hackers operate and extends beyond the confines of a single organization. Reducing the incen- tive for hacking and availability of...convey- ing to hackers that going after their organization entails a great deal of frustration (deterrence by denial) or risk (e.g., via hack -backs...components in the network: Systems are hacked because they have vulnerabilities (although a vulnerability-free system may be encounter risks from protocol
Potential System Vulnerabilities of a Network Enabled Force
2004-09-01
of trust in information, loss of context and awareness of others’ needs and reduction of social cohesion . Science - (more specifically systems...and Technology Damaging Social Cohesion NCW champions the concept of dispersed forces as a means to generate effects through approaches other than...Mission Grouping Damaging Social Cohesion This is a slight variation on the vulnerability expressed in 3.9.6 above. If we have agility in mission
2010-03-01
Employ NetFlow on Edge Router ......................................... 45 E. IMPLEMENT AN INTEGRATED VULNERABILITY ASSESSMENT. 48 1. Conduct...45 Figure 18. Netflow Information on Unauthorized Connections ............................ 46 Figure 19. Algorithm for Detecting...indicating that an attack has being initiated from this port. Figure 17. Information on Traffic Generated by Suspicious Host 3. Employ NetFlow
Onyango, Esther Achieng; Sahin, Oz; Awiti, Alex; Chu, Cordia; Mackey, Brendan
2016-11-11
Malaria is one of the key research concerns in climate change-health relationships. Numerous risk assessments and modelling studies provide evidence that the transmission range of malaria will expand with rising temperatures, adversely impacting on vulnerable communities in the East African highlands. While there exist multiple lines of evidence for the influence of climate change on malaria transmission, there is insufficient understanding of the complex and interdependent factors that determine the risk and vulnerability of human populations at the community level. Moreover, existing studies have had limited focus on the nature of the impacts on vulnerable communities or how well they are prepared to cope. In order to address these gaps, a systems approach was used to present an integrated risk and vulnerability assessment framework for studies of community level risk and vulnerability to malaria due to climate change. Drawing upon published literature on existing frameworks, a systems approach was applied to characterize the factors influencing the interactions between climate change and malaria transmission. This involved structural analysis to determine influential, relay, dependent and autonomous variables in order to construct a detailed causal loop conceptual model that illustrates the relationships among key variables. An integrated assessment framework that considers indicators of both biophysical and social vulnerability was proposed based on the conceptual model. A major conclusion was that this integrated assessment framework can be implemented using Bayesian Belief Networks, and applied at a community level using both quantitative and qualitative methods with stakeholder engagement. The approach enables a robust assessment of community level risk and vulnerability to malaria, along with contextually relevant and targeted adaptation strategies for dealing with malaria transmission that incorporate both scientific and community perspectives.
Automated Software Vulnerability Analysis
NASA Astrophysics Data System (ADS)
Sezer, Emre C.; Kil, Chongkyung; Ning, Peng
Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.
Research on the information security system in electrical gis system in mobile application
NASA Astrophysics Data System (ADS)
Zhou, Chao; Feng, Renjun; Jiang, Haitao; Huang, Wei; Zhu, Daohua
2017-05-01
With the rapid development of social informatization process, the demands of government, enterprise, and individuals for spatial information becomes larger. In addition, the combination of wireless network technology and spatial information technology promotes the generation and development of mobile technologies. In today’s rapidly developed information technology field, network technology and mobile communication have become the two pillar industries by leaps and bounds. They almost absorbed and adopted all the latest information, communication, computer, electronics and so on new technologies. Concomitantly, the network coverage is more and more big, the transmission rate is faster and faster, the volume of user’s terminal is smaller and smaller. What’s more, from LAN to WAN, from wired network to wireless network, from wired access to mobile wireless access, people’s demand for communication technology is increasingly higher. As a result, mobile communication technology is facing unprecedented challenges as well as unprecedented opportunities. When combined with the existing mobile communication network, it led to the development of leaps and bounds. However, due to the inherent dependence of the system on the existing computer communication network, information security problems cannot be ignored. Today’s information security has penetrated into all aspects of life. Information system is a complex computer system, and it’s physical, operational and management vulnerabilities constitute the security vulnerability of the system. Firstly, this paper analyzes the composition of mobile enterprise network and information security threat. Secondly, this paper puts forward the security planning and measures, and constructs the information security structure.
Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks.
Gou, Li; Wei, Bo; Sadiq, Rehan; Sadiq, Yong; Deng, Yong
2016-01-01
With an increasing emphasis on network security, much more attentions have been attracted to the vulnerability of complex networks. In this paper, the fractal dimension, which can reflect space-filling capacity of networks, is redefined as the origin moment of the edge betweenness to obtain a more reasonable evaluation of vulnerability. The proposed model combining multiple evaluation indexes not only overcomes the shortage of average edge betweenness's failing to evaluate vulnerability of some special networks, but also characterizes the topological structure and highlights the space-filling capacity of networks. The applications to six US airline networks illustrate the practicality and effectiveness of our proposed method, and the comparisons with three other commonly used methods further validate the superiority of our proposed method.
NASA Astrophysics Data System (ADS)
Wu, Qiang; Zhou, Wanfang; Wang, Jinhua; Xie, Shuhan
2009-05-01
Groundwater inrush is a geohazard that can significantly impact safe operations of the coal mines in China. Its occurrence is controlled by many factors and processes are often not amenable to mathematical expressions. To evaluate the water inrush risk, Professor Wu and his colleagues have proposed the vulnerability index approach by coupling the artificial neural network (ANN) and geographic information system (GIS). The detailed procedures of using this innovative approach are shown in a case study. Firstly, the powerful spatial data analysis functions of GIS was used to establish the thematic layer of each of the main factors that control the water inrush, and then to choose the training sample on the thematic layer with the ANN-BP Arithmetic. Secondly, the ANN evaluation model of the water inrush was established to determine the threshold value for each risk level with a histogram of the water inrush vulnerability index. As a result, the mine area was divided into four regions with different vulnerability levels and they served as the general guidelines for the mine operations.
UGV: security analysis of subsystem control network
NASA Astrophysics Data System (ADS)
Abbott-McCune, Sam; Kobezak, Philip; Tront, Joseph; Marchany, Randy; Wicks, Al
2013-05-01
Unmanned Ground vehicles (UGVs) are becoming prolific in the heterogeneous superset of robotic platforms. The sensors which provide odometry, localization, perception, and vehicle diagnostics are fused to give the robotic platform a sense of the environment it is traversing. The automotive industry CAN bus has dominated the industry due to the fault tolerance and the message structure allowing high priority messages to reach the desired node in a real time environment. UGVs are being researched and produced at an accelerated rate to preform arduous, repetitive, and dangerous missions that are associated with a military action in a protracted conflict. The technology and applications of the research will inevitably be turned into dual-use platforms to aid civil agencies in the performance of their various operations. Our motivation is security of the holistic system; however as subsystems are outsourced in the design, the overall security of the system may be diminished. We will focus on the CAN bus topology and the vulnerabilities introduced in UGVs and recognizable security vulnerabilities that are inherent in the communications architecture. We will show how data can be extracted from an add-on CAN bus that can be customized to monitor subsystems. The information can be altered or spoofed to force the vehicle to exhibit unwanted actions or render the UGV unusable for the designed mission. The military relies heavily on technology to maintain information dominance, and the security of the information introduced onto the network by UGVs must be safeguarded from vulnerabilities that can be exploited.
Global effects of local food-production crises: a virtual water perspective
Tamea, Stefania; Laio, Francesco; Ridolfi, Luca
2016-01-01
By importing food and agricultural goods, countries cope with the heterogeneous global water distribution and often rely on water resources available abroad. The virtual displacement of the water used to produce such goods (known as virtual water) connects together, in a global water system, all countries participating to the international trade network. Local food-production crises, having social, economic or environmental origin, propagate in this network, modifying the virtual water trade and perturbing local and global food availability, quantified in terms of virtual water. We analyze here the possible effects of local crises by developing a new propagation model, parsimonious but grounded on data-based and statistically-verified assumptions, whose effectiveness is proved on the Argentinean crisis in 2008–09. The model serves as the basis to propose indicators of crisis impact and country vulnerability to external food-production crises, which highlight that countries with largest water resources have the highest impact on the international trade, and that not only water-scarce but also wealthy and globalized countries are among the most vulnerable to external crises. The temporal analysis reveals that global average vulnerability has increased over time and that stronger effects of crises are now found in countries with low food (and water) availability. PMID:26804492
Global effects of local food-production crises: a virtual water perspective.
Tamea, Stefania; Laio, Francesco; Ridolfi, Luca
2016-01-25
By importing food and agricultural goods, countries cope with the heterogeneous global water distribution and often rely on water resources available abroad. The virtual displacement of the water used to produce such goods (known as virtual water) connects together, in a global water system, all countries participating to the international trade network. Local food-production crises, having social, economic or environmental origin, propagate in this network, modifying the virtual water trade and perturbing local and global food availability, quantified in terms of virtual water. We analyze here the possible effects of local crises by developing a new propagation model, parsimonious but grounded on data-based and statistically-verified assumptions, whose effectiveness is proved on the Argentinean crisis in 2008-09. The model serves as the basis to propose indicators of crisis impact and country vulnerability to external food-production crises, which highlight that countries with largest water resources have the highest impact on the international trade, and that not only water-scarce but also wealthy and globalized countries are among the most vulnerable to external crises. The temporal analysis reveals that global average vulnerability has increased over time and that stronger effects of crises are now found in countries with low food (and water) availability.
Global effects of local food-production crises: a virtual water perspective
NASA Astrophysics Data System (ADS)
Tamea, Stefania; Laio, Francesco; Ridolfi, Luca
2016-01-01
By importing food and agricultural goods, countries cope with the heterogeneous global water distribution and often rely on water resources available abroad. The virtual displacement of the water used to produce such goods (known as virtual water) connects together, in a global water system, all countries participating to the international trade network. Local food-production crises, having social, economic or environmental origin, propagate in this network, modifying the virtual water trade and perturbing local and global food availability, quantified in terms of virtual water. We analyze here the possible effects of local crises by developing a new propagation model, parsimonious but grounded on data-based and statistically-verified assumptions, whose effectiveness is proved on the Argentinean crisis in 2008-09. The model serves as the basis to propose indicators of crisis impact and country vulnerability to external food-production crises, which highlight that countries with largest water resources have the highest impact on the international trade, and that not only water-scarce but also wealthy and globalized countries are among the most vulnerable to external crises. The temporal analysis reveals that global average vulnerability has increased over time and that stronger effects of crises are now found in countries with low food (and water) availability.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Igure, V. M.; Williams, R. D.
2006-07-01
Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less
Gruber, Joshua S.; Colford, John M.
2014-01-01
Background: Water distribution systems are vulnerable to performance deficiencies that can cause (re)contamination of treated water and plausibly lead to increased risk of gastrointestinal illness (GII) in consumers. Objectives: It is well established that large system disruptions in piped water networks can cause GII outbreaks. We hypothesized that routine network problems can also contribute to background levels of waterborne illness and conducted a systematic review and meta-analysis to assess the impact of distribution system deficiencies on endemic GII. Methods: We reviewed published studies that compared direct tap water consumption to consumption of tap water re-treated at the point of use (POU) and studies of specific system deficiencies such as breach of physical or hydraulic pipe integrity and lack of disinfectant residual. Results: In settings with network malfunction, consumers of tap water versus POU-treated water had increased GII [incidence density ratio (IDR) = 1.34; 95% CI: 1.00, 1.79]. The subset of nonblinded studies showed a significant association between GII and tap water versus POU-treated water consumption (IDR = 1.52; 95% CI: 1.05, 2.20), but there was no association based on studies that blinded participants to their POU water treatment status (IDR = 0.98; 95% CI: 0.90, 1.08). Among studies focusing on specific network deficiencies, GII was associated with temporary water outages (relative risk = 3.26; 95% CI: 1.48, 7.19) as well as chronic outages in intermittently operated distribution systems (odds ratio = 1.61; 95% CI: 1.26, 2.07). Conclusions: Tap water consumption is associated with GII in malfunctioning distribution networks. System deficiencies such as water outages also are associated with increased GII, suggesting a potential health risk for consumers served by piped water networks. Citation: Ercumen A, Gruber JS, Colford JM Jr. 2014. Water distribution system deficiencies and gastrointestinal illness: a systematic review and meta-analysis. Environ Health Perspect 122:651–660; http://dx.doi.org/10.1289/ehp.1306912 PMID:24659576
A Multilayer perspective for the analysis of urban transportation systems
Aleta, Alberto; Meloni, Sandro; Moreno, Yamir
2017-01-01
Public urban mobility systems are composed by several transportation modes connected together. Most studies in urban mobility and planning often ignore the multi-layer nature of transportation systems considering only aggregated versions of this complex scenario. In this work we present a model for the representation of the transportation system of an entire city as a multiplex network. Using two different perspectives, one in which each line is a layer and one in which lines of the same transportation mode are grouped together, we study the interconnected structure of 9 different cities in Europe raging from small towns to mega-cities like London and Berlin highlighting their vulnerabilities and possible improvements. Finally, for the city of Zaragoza in Spain, we also consider data about service schedule and waiting times, which allow us to create a simple yet realistic model for urban mobility able to reproduce real-world facts and to test for network improvements. PMID:28295015
A Multilayer perspective for the analysis of urban transportation systems.
Aleta, Alberto; Meloni, Sandro; Moreno, Yamir
2017-03-15
Public urban mobility systems are composed by several transportation modes connected together. Most studies in urban mobility and planning often ignore the multi-layer nature of transportation systems considering only aggregated versions of this complex scenario. In this work we present a model for the representation of the transportation system of an entire city as a multiplex network. Using two different perspectives, one in which each line is a layer and one in which lines of the same transportation mode are grouped together, we study the interconnected structure of 9 different cities in Europe raging from small towns to mega-cities like London and Berlin highlighting their vulnerabilities and possible improvements. Finally, for the city of Zaragoza in Spain, we also consider data about service schedule and waiting times, which allow us to create a simple yet realistic model for urban mobility able to reproduce real-world facts and to test for network improvements.
Aquatic invasive species early detection in the Great Lakes: Lessons concerning strategy
Great Lakes coastal systems are vulnerable to introduction of a wide variety of non-indigenous species (NIS), and the desire to effectively respond to future invaders is prompting efforts towards establishing a broad early-detection network. Such a network requires statistically...
People at risk - nexus critical infrastructure and society
NASA Astrophysics Data System (ADS)
Heiser, Micha; Thaler, Thomas; Fuchs, Sven
2016-04-01
Strategic infrastructure networks include the highly complex and interconnected systems that are so vital to a city or state that any sudden disruption can result in debilitating impacts on human life, the economy and the society as a whole. Recently, various studies have applied complex network-based models to study the performance and vulnerability of infrastructure systems under various types of attacks and hazards - a major part of them is, particularly after the 9/11 incident, related to terrorism attacks. Here, vulnerability is generally defined as the performance drop of an infrastructure system under a given disruptive event. The performance can be measured by different metrics, which correspond to various levels of resilience. In this paper, we will address vulnerability and exposure of critical infrastructure in the Eastern Alps. The Federal State Tyrol is an international transport route and an essential component of the north-south transport connectivity in Europe. Any interruption of the transport flow leads to incommensurable consequences in terms of indirect losses, since the system does not feature redundant elements at comparable economic efficiency. Natural hazard processes such as floods, debris flows, rock falls and avalanches, endanger this infrastructure line, such as large flood events in 2005 or 2012, rock falls 2014, which had strong impacts to the critical infrastructure, such as disruption of the railway lines (in 2005 and 2012), highways and motorways (in 2014). The aim of this paper is to present how critical infrastructures as well as communities and societies are vulnerable and can be resilient against natural hazard risks and the relative cascading effects to different compartments (industrial, infrastructural, societal, institutional, cultural, etc.), which is the dominant by the type of hazard (avalanches, torrential flooding, debris flow, rock falls). Specific themes will be addressed in various case studies to allow cross-learning and cross-comparison of, for example rural and urban areas, and different scales. Correspondingly, scale-specific resilience indicators and metrics will be developed to tailor methods to specific needs according to the scale of assessment (micro/local and macro/regional) and to the type of infrastructure. The traditional indicators normally used in structural analysis are not sufficient to understand how events happening on the networks can have cascading consequences. Moreover, effects have multidimensional (technical, economic, organizational and human), multiscale (micro and macro) and temporal characteristics (short- to long-term incidence). These considerations will guide to different activities: 1) computation of classic structural analysis indicators on the case studies in order to obtain an identity of the transport infrastructure and; 2) development of a set of new measures of resilience. To mitigate natural hazard risk a large amount of protection measures of different typology have been constructed following inhomogeneous reliability standards. The focus of this case study will be on resilience issues and decision making in the context of a large scale sectorial approach focused on transport infrastructure network.
NASA Astrophysics Data System (ADS)
Kostyuchenko, Yuriy; Movchan, Dmytro; Kopachevsky, Ivan; Yuschenko, Maxim
2016-04-01
Modern world based on relations more than on causalities, so communicative, socio-economic, and socio-cultural issues are important to understand nature of risks and to make correct, ethical decisions. Today major part of risk analysts declared new nature of modern risks. We faced coherent or systemic risks, realization of which leads to domino effect, unexpected growing of losses and fatalities. This type of risks originated by complicated nature of heterogeneous environment, close interconnection of engineering networks, and changing structure of society. Heterogeneous multi-agent environment generates systemic risks, which requires analyze multi-source data with sophisticated tools. Formal basis for analysis of this type of risks is developed during last 5-7 years. But issues of social fairness, ethics, and education require further development. One aspect of analysis of social issues of risk management is studied in this paper. Formal algorithm for quantitative analysis of multi-source data analysis is proposed. As it was demonstrated, using proposed methodological base and the algorithm, it is possible to obtain regularized spatial-temporal distribution of investigated parameters over whole observation period with rectified reliability and controlled uncertainty. The result of disaster data analysis demonstrates that about half of direct disaster damage might be caused by social factors: education, experience and social behaviour. Using data presented also possible to estimate quantitative parameters of the losses distributions: a relation between education, age, experience, and losses; as well as vulnerability (in terms of probable damage) toward financial status in current social density. It is demonstrated that on wide-scale range an education determines risk perception and so vulnerability of societies. But on the local level there are important heterogeneities. Land-use and urbanization structure influencing to vulnerability essentially. The way to calculate a distribution of losses connected with decision making in land-use is demonstrated. Rural community's vulnerability determines by water availability, quality of soils, effectiveness of land use (including climate change adaptation), intensity of pollutions, crop productivity variations during the period of crop rotation, annual national distribution of crops output, and distance to city centres. It should noted here that "distance to city centres" is not comprehensive indicator of market accessibility in general case: quality and availability of transport infrastructure should be described more detailed on the next stages of analysis. Urban population vulnerability determines by distribution of urban fractures and quality urban environment: density, quality and availability of infrastructure, balance between industrial, residential and recreational zones, effectiveness of urban land use and landscape management, and social policy, particularly, employment. Population density is closely connected with social density, with communications and decision making. Social learning, as the function of social communications, is the way to increase sustainability. Also it possible to say that social sustainability is a function of intensity and efficiency of communications between interlinked and interacted networks in the heterogeneous environment. Therefore the results of study demonstrated that risk management study should includes issues of risk and threats perception, which should be described in framework of appropriate tools and approaches connected with ethical dimension of vulnerability. For instance, problems of accessibility and availability of safety resources in view of social fairness and socio-economic dynamics should be included into future studies in field of risk analysis.
Combining demographic and genetic factors to assess population vulnerability in stream species
Erin L, Landguth; Muhlfeld, Clint C.; Jones, Leslie W.; Waples, Robin S.; Whited, Diane; Lowe, Winsor H.; Lucotch, John; Neville, Helen; Luikart, Gordon
2014-01-01
Accelerating climate change and other cumulative stressors create an urgent need to understand the influence of environmental variation and landscape features on the connectivity and vulnerability of freshwater species. Here, we introduce a novel modeling framework for aquatic systems that integrates spatially explicit, individual-based, demographic and genetic (demogenetic) assessments with environmental variables. To show its potential utility, we simulated a hypothetical network of 19 migratory riverine populations (e.g., salmonids) using a riverscape connectivity and demogenetic model (CDFISH). We assessed how stream resistance to movement (a function of water temperature, fluvial distance, and physical barriers) might influence demogenetic connectivity, and hence, population vulnerability. We present demographic metrics (abundance, immigration, and change in abundance) and genetic metrics (diversity, differentiation, and change in differentiation), and combine them into a single vulnerability index for identifying populations at risk of extirpation. We considered four realistic scenarios that illustrate the relative sensitivity of these metrics for early detection of reduced connectivity: (1) maximum resistance due to high water temperatures throughout the network, (2) minimum resistance due to low water temperatures throughout the network, (3) increased resistance at a tributary junction caused by a partial barrier, and (4) complete isolation of a tributary, leaving resident individuals only. We then applied this demogenetic framework using empirical data for a bull trout (Salvelinus confluentus) metapopulation in the upper Flathead River system, Canada and USA, to assess how current and predicted future stream warming may influence population vulnerability. Results suggest that warmer water temperatures and associated barriers to movement (e.g., low flows, dewatering) are predicted to fragment suitable habitat for migratory salmonids, resulting in the loss of genetic diversity and reduced numbers in certain vulnerable populations. This demogenetic simulation framework, which is illustrated in a web-based interactive mapping prototype, should be useful for evaluating population vulnerability in a wide variety of dendritic and fragmented riverscapes, helping to guide conservation and management efforts for freshwater species.
Sequential defense against random and intentional attacks in complex networks.
Chen, Pin-Yu; Cheng, Shin-Ming
2015-02-01
Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.
Moving Target Techniques: Leveraging Uncertainty for Cyber Defense
2015-08-24
vulnerability (a flaw or bug that an attacker can exploit to penetrate or disrupt a system) to successfully compromise systems. Defenders, however...device drivers, numerous software applications, and hardware components. Within the cyberspace, this imbalance between a simple, one- bug attack...parsing code itself could have security-relevant software bugs . Dynamic Network Techniques in the dynamic network domain change the properties
Network theory and its applications in economic systems
NASA Astrophysics Data System (ADS)
Huang, Xuqing
This dissertation covers the two major parts of my Ph.D. research: i) developing theoretical framework of complex networks; and ii) applying complex networks models to quantitatively analyze economics systems. In part I, we focus on developing theories of interdependent networks, which includes two chapters: 1) We develop a mathematical framework to study the percolation of interdependent networks under targeted-attack and find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc = 0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. 2) We analytically demonstrates that clustering, which quantifies the propensity for two neighbors of the same vertex to also be neighbors of each other, significantly increases the vulnerability of the system. In part II, we apply the complex networks models to study economics systems, which also includes two chapters: 1) We study the US corporate governance network, in which nodes representing directors and links between two directors representing their service on common company boards, and propose a quantitative measure of information and influence transformation in the network. Thus we are able to identify the most influential directors in the network. 2) We propose a bipartite networks model to simulate the risk propagation process among commercial banks during financial crisis. With empirical bank's balance sheet data in 2007 as input to the model, we find that our model efficiently identifies a significant portion of the actual failed banks reported by Federal Deposit Insurance Corporation during the financial crisis between 2008 and 2011. The results suggest that complex networks model could be useful for systemic risk stress testing for financial systems. The model also identifies that commercial rather than residential real estate assets are major culprits for the failure of over 350 US commercial banks during 2008 - 2011.
Podder, Avijit; Jatana, Nidhi; Latha, N
2014-09-21
Dopamine receptors (DR) are one of the major neurotransmitter receptors present in human brain. Malfunctioning of these receptors is well established to trigger many neurological and psychiatric disorders. Taking into consideration that proteins function collectively in a network for most of the biological processes, the present study is aimed to depict the interactions between all dopamine receptors following a systems biology approach. To capture comprehensive interactions of candidate proteins associated with human dopamine receptors, we performed a protein-protein interaction network (PPIN) analysis of all five receptors and their protein partners by mapping them into human interactome and constructed a human Dopamine Receptors Interaction Network (DRIN). We explored the topology of dopamine receptors as molecular network, revealing their characteristics and the role of central network elements. More to the point, a sub-network analysis was done to determine major functional clusters in human DRIN that govern key neurological pathways. Besides, interacting proteins in a pathway were characterized and prioritized based on their affinity for utmost drug molecules. The vulnerability of different networks to the dysfunction of diverse combination of components was estimated under random and direct attack scenarios. To the best of our knowledge, the current study is unique to put all five dopamine receptors together in a common interaction network and to understand the functionality of interacting proteins collectively. Our study pinpointed distinctive topological and functional properties of human dopamine receptors that have helped in identifying potential therapeutic drug targets in the dopamine interaction network. Copyright © 2014 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Elias, E.; Reyes, J. J.; Steele, C. M.; Rango, A.
2017-12-01
Assessing vulnerability of agricultural systems to climate variability and change is vital in securing food systems and sustaining rural livelihoods. Farmers, ranchers, and forest landowners rely on science-based, decision-relevant, and localized information to maintain production, ecological viability, and economic returns. This contribution synthesizes a collection of research on the future of agricultural production in the American Southwest (SW). Research was based on a variety of geospatial methodologies and datasets to assess the vulnerability of rangelands and livestock, field crops, specialty crops, and forests in the SW to climate-risk and change. This collection emerged from the development of regional vulnerability assessments for agricultural climate-risk by the U.S. Department of Agriculture (USDA) Climate Hub Network, established to deliver science-based information and technologies to enable climate-informed decision-making. Authors defined vulnerability differently based on their agricultural system of interest, although each primarily focuses on biophysical systems. We found that an inconsistent framework for vulnerability and climate risk was necessary to adequately capture the diversity, variability, and heterogeneity of SW landscapes, peoples, and agriculture. Through the diversity of research questions and methodologies, this collection of articles provides valuable information on various aspects of SW vulnerability. All articles relied on geographic information systems technology, with highly variable levels of complexity. Agricultural articles used National Agricultural Statistics Service data, either as tabular county level summaries or through the CropScape cropland raster datasets. Most relied on modeled historic and future climate information, but with differing assumptions regarding spatial resolution and temporal framework. We assert that it is essential to evaluate climate risk using a variety of complementary methodologies and perspectives. In addition, we found that spatial analysis supports informed adaptation, within and outside the SW United States. The persistence and adaptive capacity of agriculture in the water-limited Southwest serves as an instructive example and may offer solutions to reduce future climate risk.
Brain network alterations and vulnerability to simulated neurodegeneration in breast cancer.
Kesler, Shelli R; Watson, Christa L; Blayney, Douglas W
2015-08-01
Breast cancer and its treatments are associated with mild cognitive impairment and brain changes that could indicate an altered or accelerated brain aging process. We applied diffusion tensor imaging and graph theory to measure white matter organization and connectivity in 34 breast cancer survivors compared with 36 matched healthy female controls. We also investigated how brain networks (connectomes) in each group responded to simulated neurodegeneration based on network attack analysis. Compared with controls, the breast cancer group demonstrated significantly lower fractional anisotropy, altered small-world connectome properties, lower brain network tolerance to systematic region (node), and connection (edge) attacks and significant cognitive impairment. Lower tolerance to network attack was associated with cognitive impairment in the breast cancer group. These findings provide further evidence of diffuse white matter pathology after breast cancer and extend the literature in this area with unique data demonstrating increased vulnerability of the post-breast cancer brain network to future neurodegenerative processes. Copyright © 2015 Elsevier Inc. All rights reserved.
Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing
2017-01-01
Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.
Report: Results of Technical Network Vulnerability Assessment: EPA’s Erlanger Building
Report #10-P-0211, September 7, 2010. Vulnerability testing of EPA’s Erlanger Building network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.
Report: Results of Technical Network Vulnerability Assessment: EPA’s Region 4
Report #10-P-0213, September 7, 2010. Vulnerability testing of EPA’s Region 4 network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.
Resistance Genes in Global Crop Breeding Networks.
Garrett, K A; Andersen, K F; Asche, F; Bowden, R L; Forbes, G A; Kulakow, P A; Zhou, B
2017-10-01
Resistance genes are a major tool for managing crop diseases. The networks of crop breeders who exchange resistance genes and deploy them in varieties help to determine the global landscape of resistance and epidemics, an important system for maintaining food security. These networks function as a complex adaptive system, with associated strengths and vulnerabilities, and implications for policies to support resistance gene deployment strategies. Extensions of epidemic network analysis can be used to evaluate the multilayer agricultural networks that support and influence crop breeding networks. Here, we evaluate the general structure of crop breeding networks for cassava, potato, rice, and wheat. All four are clustered due to phytosanitary and intellectual property regulations, and linked through CGIAR hubs. Cassava networks primarily include public breeding groups, whereas others are more mixed. These systems must adapt to global change in climate and land use, the emergence of new diseases, and disruptive breeding technologies. Research priorities to support policy include how best to maintain both diversity and redundancy in the roles played by individual crop breeding groups (public versus private and global versus local), and how best to manage connectivity to optimize resistance gene deployment while avoiding risks to the useful life of resistance genes. [Formula: see text] Copyright © 2017 The Author(s). This is an open access article distributed under the CC BY 4.0 International license .
Nuclear pulse. II - Ensuring delivery of the doomsday signal
NASA Astrophysics Data System (ADS)
Broad, W. J.
1981-06-01
The ability of the communications systems on which U.S. strategic forces depend to survive the electromagnetic pulse (EMP) effects of a nuclear blast in the upper atmosphere is examined. It is shown that the Bell system telephone network, Autovon, on which much military communication presently depends, is especially vulnerable to EMP; while satellite and microwave communications networks are expected to be more resistant to attack. Satellites are, though, vulnerable to killer-satellite attack. Much promise is seen in the conversion of ground communications links to fiber-optic form, which is inherently highly resistant to EMP. A nuclear bomb detonated 200 miles above Nebraska would affect communications equipment throughout the contiguous U.S. with peak fields of 500,000 volts/meter.
Aircraft vulnerability analysis by modeling and simulation
NASA Astrophysics Data System (ADS)
Willers, Cornelius J.; Willers, Maria S.; de Waal, Alta
2014-10-01
Infrared missiles pose a significant threat to civilian and military aviation. ManPADS missiles are especially dangerous in the hands of rogue and undisciplined forces. Yet, not all the launched missiles hit their targets; the miss being either attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft-missile engagement is a complex series of events, many of which are only partially understood. Aircraft and missile designers focus on the optimal design and performance of their respective systems, often testing only in a limited set of scenarios. Most missiles react to the contrast intensity, but the variability of the background is rarely considered. Finally, the vulnerability of the aircraft depends jointly on the missile's performance and the doctrine governing the missile's launch. These factors are considered in a holistic investigation. The view direction, altitude, time of day, sun position, latitude/longitude and terrain determine the background against which the aircraft is observed. Especially high gradients in sky radiance occur around the sun and on the horizon. This paper considers uncluttered background scenes (uniform terrain and clear sky) and presents examples of background radiance at all view angles across a sphere around the sensor. A detailed geometrical and spatially distributed radiometric model is used to model the aircraft. This model provides the signature at all possible view angles across the sphere around the aircraft. The signature is determined in absolute terms (no background) and in contrast terms (with background). It is shown that the background significantly affects the contrast signature as observed by the missile sensor. A simplified missile model is constructed by defining the thrust and mass profiles, maximum seeker tracking rate, maximum guidance acceleration and seeker sensitivity. For the purpose of this investigation the aircraft is equipped with conventional pyrotechnic decoy flares and the missile has no counter-countermeasure means (security restrictions on open publication). This complete simulation is used to calculate the missile miss distance, when the missile is launched from different locations around the aircraft. The miss distance data is then graphically presented showing miss distance (aircraft vulnerability) as a function of launch direction and range. The aircraft vulnerability graph accounts for aircraft and missile characteristics, but does not account for missile deployment doctrine. A Bayesian network is constructed to fuse the doctrinal rules with the aircraft vulnerability data. The Bayesian network now provides the capability to evaluate the combined risk of missile launch and aircraft vulnerability. It is shown in this paper that it is indeed possible to predict the aircraft vulnerability to missile attack in a comprehensive modelling and a holistic process. By using the appropriate real-world models, this approach is used to evaluate the effectiveness of specific countermeasure techniques against specific missile threats. The use of a Bayesian network provides the means to fuse simulated performance data with more abstract doctrinal rules to provide a realistic assessment of the aircraft vulnerability.
Sanchez, Karla R; Mersha, Mahlet D; Dhillon, Harbinder S; Temburni, Murali K
2018-04-26
Bis-phenols, such as bis-phenol A (BPA) and bis-phenol-S (BPS), are polymerizing agents widely used in the production of plastics and numerous everyday products. They are classified as endocrine disrupting compounds (EDC) with estradiol-like properties. Long-term exposure to EDCs, even at low doses, has been linked with various health defects including cancer, behavioral disorders, and infertility, with greater vulnerability during early developmental periods. To study the effects of BPA on the development of neuronal function, we used an in vitro neuronal network derived from the early chick embryonic brain as a model. We found that exposure to BPA affected the development of network activity, specifically spiking activity and synchronization. A change in network activity is the crucial link between the molecular target of a drug or compound and its effect on behavioral outcome. Multi-electrode arrays are increasingly becoming useful tools to study the effects of drugs on network activity in vitro. There are several systems available in the market and, although there are variations in the number of electrodes, the type and quality of the electrode array and the analysis software, the basic underlying principles, and the data obtained is the same across the different systems. Although currently limited to analysis of two-dimensional in vitro cultures, these MEA systems are being improved to enable in vivo network activity in brain slices. Here, we provide a detailed protocol for embryonic exposure and recording neuronal network activity and synchrony, along with representative results.
Cyber threat model for tactical radio networks
NASA Astrophysics Data System (ADS)
Kurdziel, Michael T.
2014-05-01
The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.
A Framework of Complex Adaptive Systems: Parents As Partners in the Neonatal Intensive Care Unit.
DʼAgata, Amy L; McGrath, Jacqueline M
2016-01-01
Advances in neonatal care are allowing for increased infant survival; however, neurodevelopmental complications continue. Using a complex adaptive system framework, a broad analysis of the network of agents most influential to vulnerable infants in the neonatal intensive care unit (NICU) is presented: parent, nurse, and organization. By exploring these interconnected relationships and the emergent behaviors, a model of care that increases parental caregiving in the NICU is proposed. Supportive parent caregiving early in an infant's NICU stay has the potential for more sensitive caregiving and enhanced opportunities for attachment, perhaps positively impacting neurodevelopment.
T.A. Munoz-Erickson; A.E. Lugo; E. Melendez-Ackerman; L.E. Santiago-Acevedo; J. Seguinot-Barbosa; P. Mendez-Lazaro
2014-01-01
This paper presents initial efforts to establish the San Juan Urban Long-Term Research Area Exploratory (ULTRA-Ex), a long-term program aimed at developing transdisciplinary social-ecological system (SES) research to address vulnerability and sustainability for the municipality of San Juan. Transdisciplinary approaches involve the collaborations between researchers,...
Evaluating Machine Learning Classifiers for Hybrid Network Intrusion Detection Systems
2015-03-26
7 VRT Vulnerability Research Team...and the Talos (formerly the Vulnerability Research Team ( VRT )) [7] 7 ruleset libraries are the two leading rulesets in use. Both libraries offer paid...rule sets to load for the signature-based IDS. Snort is selected as the IDS engine using the “ VRT and ET No/GPL” rule set. The total rule count in the
Integrated assessment of urban vulnerability and resilience. Case study: Targu Ocna town, Romania
NASA Astrophysics Data System (ADS)
Grozavu, Adrian; Bănică, Alexandru
2015-04-01
Vulnerability assessment frequently emphasizes the internal fragility of a system in relation to a given hazard, when compared to similar systems or to a reference standard. This internal fragility, either biophysical or structural, may affect the ability to predict, to prepare for and cope with or to recover from the manifestation of a risk phenomenon. Thus, the vulnerability is highly related to resilience and adaptability. There is no single methodology for vulnerability and resilience analysis, their assessment can only be made by identifying and integrating indicators which are compatible with the analysis level and the geographic, economic and social features of a certain area. An integrated model of evaluating vulnerability and resilience capacity is being proposed in this paper for Targu Ocna, a small mining settlement in the Eastern Carpathians of Romania, that became in the last years a tourist town and acts within the surrounding territory as a dynamic local pole. Methodologically, the following steps and operations were considered: identifying potential hazards, identifying elements at risk, identifying proper indicators and integrating them in order to evaluate the general vulnerability and resilience. The inventory of elements at risk (the number of people potentially affected, residential or other functionalities buildings, roads and other infrastructure elements etc.) was made based on General Urban Plan, topographic maps (scale 1:5000), ortophotos from 2003 and 2008 and field mapping and researches. Further on, several vulnerability indicators were identified and included within the analytical approach: dependency ratio, income, quality of the habitat and technical urban facilities, environment quality showing differentiated sensitivity. Issues such as preparedness and preventive measures (priority areas within the risk prevention plans), coping ability (networks' geometry and connectivity, emergency utilities and services accessibility) and the recovering capacity (the time needed to reestablish functions after a disastrous event) were also taken into account. The selected indicators were mathematically processed (standardized and normalized) in order to maximize their relevance and to unitary express the results in the spread 0-1. Then a grid with a cell size of 100 x 100 m was created in order to spatialize vulnerability indicators, that were calculated as the average vulnerability of the exposed elements in each cell. All identified indicators have been processed within a cluster analysis that permitted the identification of similar areas in terms of vulnerabilities. Finally, a general index was obtained by the integration of all vulnerability factors in an equation based on the geometric mean. The results of the study could provide a reference basis to substantiate local correctly prioritized decisions for reducing vulnerability by mitigation and adaptation measures in order to avoid significant damages when risks materialise.
Hindhede, Anette Lykke; Aagaard-Hansen, Jens
2017-03-01
This article provides an example of the application of social network analysis method to assess community participation thereby strengthening planning and implementation of health promotion programming. Community health promotion often takes the form of services that reach out to or are located within communities. The concept of community reflects the idea that people's behavior and well-being are influenced by interaction with others, and here, health promotion requires participation and local leadership to facilitate transmission and uptake of interventions for the overall community to achieve social change. However, considerable uncertainty exists over exact levels of participation in these interventions. The article draws on a mixed methods research within a community development project in a vulnerable neighborhood of a town in Denmark. It presents a detailed analysis of the way in which social network analysis can be used as a tool to display participation and nonparticipation in community development and health promotion activities, to help identify capacities and assets, mobilize resources, and finally to evaluate the achievements. The article concludes that identification of interpersonal ties among people who know one another well as well as more tenuous relationships in networks can be used by community development workers to foster greater cohesion and cooperation within an area.
Report #09-P-0227, August 31, 2009. Vulnerability testing conducted in April 2009 of EPA’s Research Triangle Park Finance Center network identified Internet Protocol addresses with several highrisk vulnerabilities.
Report #09-P-0053, December 9, 2008. Vulnerability testing of EPA’s Radiation and Indoor Environments National Laboratory (R&IEN) network identified Internet Protocol addresses with medium-risk vulnerabilities.
Report: Results of Technical Network Vulnerability Assessment: EPA’s Ronald Reagan Building
Report #10-P-0212, September 7, 2010. Vulnerability testing of EPA’s Ronald Reagan Building network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.
Del Giudice, G; Padulano, R; Siciliano, D
2016-01-01
The lack of geometrical and hydraulic information about sewer networks often excludes the adoption of in-deep modeling tools to obtain prioritization strategies for funds management. The present paper describes a novel statistical procedure for defining the prioritization scheme for preventive maintenance strategies based on a small sample of failure data collected by the Sewer Office of the Municipality of Naples (IT). Novelty issues involve, among others, considering sewer parameters as continuous statistical variables and accounting for their interdependences. After a statistical analysis of maintenance interventions, the most important available factors affecting the process are selected and their mutual correlations identified. Then, after a Box-Cox transformation of the original variables, a methodology is provided for the evaluation of a vulnerability map of the sewer network by adopting a joint multivariate normal distribution with different parameter sets. The goodness-of-fit is eventually tested for each distribution by means of a multivariate plotting position. The developed methodology is expected to assist municipal engineers in identifying critical sewers, prioritizing sewer inspections in order to fulfill rehabilitation requirements.
Modeling the Propagation of Mobile Phone Virus under Complex Network
Yang, Wei; Wei, Xi-liang; Guo, Hao; An, Gang; Guo, Lei
2014-01-01
Mobile phone virus is a rogue program written to propagate from one phone to another, which can take control of a mobile device by exploiting its vulnerabilities. In this paper the propagation model of mobile phone virus is tackled to understand how particular factors can affect its propagation and design effective containment strategies to suppress mobile phone virus. Two different propagation models of mobile phone viruses under the complex network are proposed in this paper. One is intended to describe the propagation of user-tricking virus, and the other is to describe the propagation of the vulnerability-exploiting virus. Based on the traditional epidemic models, the characteristics of mobile phone viruses and the network topology structure are incorporated into our models. A detailed analysis is conducted to analyze the propagation models. Through analysis, the stable infection-free equilibrium point and the stability condition are derived. Finally, considering the network topology, the numerical and simulation experiments are carried out. Results indicate that both models are correct and suitable for describing the spread of two different mobile phone viruses, respectively. PMID:25133209
KREAGER, PHILIP
2007-01-01
Contemporary trends in population ageing and urbanisation in the developing world imply that the extensive out-migration of young people from rural areas coincides with, and is likely to exacerbate, a rise in the older share of the rural population. This paper examines the impact of migration on vulnerability at older ages by drawing on the results of anthropological and demographic field studies in three Indonesian communities. The methodology for identifying vulnerable older people has a progressively sharper focus, beginning first with important differences between the communities, then examining variations by socio-economic strata, and finally the variability of older people's family networks. Comparative analysis indicates considerable heterogeneity in past and present migration patterns, both within and between villages. The migrants' contributions are a normal and important component of older people's support, often in combination with those of local family members. Higher status families are commonly able to reinforce their position by making better use of migration opportunities than the less advantaged. Although family networks in the poorer strata may effect some redistribution of the children's incomes, their social networks are smaller and insufficient to overcome their marked disadvantages. Vulnerability thus arises where several factors, including migration histories, result in unusually small networks, and when the migrations are within rural areas. PMID:23750063
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-12
...) Not to exceed 3000 positions that require unique cyber security skills and knowledge to perform cyber..., distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture...
Cyber Hygiene for Control System Security
Oliver, David
2015-10-08
There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.
SSL/TLS Vulnerability Detection Using Black Box Approach
NASA Astrophysics Data System (ADS)
Gunawan, D.; Sitorus, E. H.; Rahmat, R. F.; Hizriadi, A.
2018-03-01
Socket Secure Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide data encryption to secure the communication over a network. However, in some cases, there are vulnerability found in the implementation of SSL/TLS because of weak cipher key, certificate validation error or session handling error. One of the most vulnerable SSL/TLS bugs is heartbleed. As the security is essential in data communication, this research aims to build a scanner that detect the SSL/TLS vulnerability by using black box approach. This research will focus on heartbleed case. In addition, this research also gathers information about existing SSL in the server. The black box approach is used to test the output of a system without knowing the process inside the system itself. For testing purpose, this research scanned websites and found that some of the websites still have SSL/TLS vulnerability. Thus, the black box approach can be used to detect the vulnerability without considering the source code and the process inside the application.
Scada Malware, a Proof of Concept
NASA Astrophysics Data System (ADS)
Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto
Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into such complex critical systems. Of particular interest are the set of vulnerabilities related to the class of communication protocols normally known as “SCADA” protocols, under which fall all the communication protocols used to remotely control the RTU devices of an industrial system. In this paper we present a proof of concept of the potential effects of a set of computer malware specifically designed and created in order to impact, by taking advantage of some vulnerabilities of the ModBUS protocol, on a typical Supervisory Control and Data Acquisition system.
The robustness of multiplex networks under layer node-based attack
Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen
2016-01-01
From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology. PMID:27075870
The robustness of multiplex networks under layer node-based attack.
Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen
2016-04-14
From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology.
If it walks like a duck: nanosensor threat assessment
NASA Astrophysics Data System (ADS)
Chachis, George C.
2003-09-01
A convergence of technologies is making deployment of unattended ground nanosensors operationally feasible in terms of energy, communications for both arbitrated and self-organizing distributed, collective behaviors. A number of nano communications technologies are already making network-centric systems possible for MicroElectrical Mechanical (MEM) sensor devices today. Similar technologies may make NanoElectrical Mechanical (NEM) sensor devices operationally feasible a few years from now. Just as organizational behaviors of large numbers of nanodevices can derive strategies from social insects and other group-oriented animals, bio-inspired heuristics for threat assessment provide a conceptual approach for successful integration of nanosensors into unattended smart sensor networks. Biological models such as the organization of social insects or the dynamics of immune systems show promise as biologically-inspired paradigms for protecting nanosensor networks for security scene analysis and battlespace awareness. The paradox of nanosensors is that the smaller the device is the more useful it is but the smaller it is the more vulnerable it is to a variety of threats. In other words simpler means networked nanosensors are more likely to fall prey to a wide-range of attacks including jamming, spoofing, Janisserian recruitment, Pied-Piper distraction, as well as typical attacks computer network security. Thus, unattended sensor technologies call for network architectures that include security and countermeasures to provide reliable scene analysis or battlespace awareness information. Such network centric architectures may well draw upon a variety of bio-inspired approaches to safeguard, validate and make sense of large quantities of information.
Cognitive Radio Networks for Tactical Wireless Communications
2014-12-01
exists. Instead, security is an evolving process, as we have seen in the context of WLANs and 2G / 3G networks. New system vulnerabilities continue to...in the network configuration and radio parameters take place due to mobility of platforms, and variation in other users of the RF environment. CRNs...dynamic spectrum access experimentally, and it represents the largest military Mobile Ad hoc Network (MANET) as of today. The WNaN demonstrator has been
NASA Astrophysics Data System (ADS)
Simicevic, Aleksandra; Bonadonna, Costanza; di Traglia, Federico; Rosi, Mauro
2010-05-01
Volcanic eruptions are accompanied by numerous hazards which pose short- and long-term threats to people and property. Recent experiences have shown that successful responses to hazard events correlate strongly with the degree to which proactive policies of risk reduction are already in place before an eruption occurs. Effective proactive risk-reduction strategies require contributions from numerous disciplines. A volcanic eruption is not a hazard, per se, but rather an event capable of producing a variety of hazards (e.g. earthquakes, pyroclastic density currents, lava flows, tephra fall, lahars, landslides, gas release, and tsunamis) that can affect the built environment in a variety of ways, over different time scales and with different degrees of intensity. Our proposed model for the assessment and mitigation of exposure-based volcanic risk is mainly based on the compilation of three types of maps: hazard maps, hazard-specific vulnerability maps and exposure-based risk maps. Hazard maps identify the spatial distribution of individual volcanic hazard and it includes both event analysis and impact analysis. Hazard-specific vulnerability maps represent the systematic evaluation of physical vulnerability of the built environment to a range of volcanic phenomena, i.e. spatial distribution of buildings vulnerable to a given hazard based on the analysis of selected building elements. Buildings are classified on the basis of their major components that are relevant for different volcanic hazards, their strength, their construction materials and are defined taking into account the potential damage that each group of building elements (e.g. walls, roof, load-bearing structure) will suffer under a volcanic hazard. All those factors are enumerated in a checklist and are used for the building survey. Hazard-specific vulnerability maps are then overlapped with hazard maps in order to compile exposure-based risk maps and so quantify the potential damage. Such quantification is the starting point of the identification of suitable mitigation measures which will be analyzed through a cost-benefit analysis to assess their financial feasibility. Information about public networks is also recorded in order to give an overall idea of the built environment condition of the island. The vulnerability assessment of the technical systems describes the potential damages that could stress systems like electricity supply, water distribution, communication networks or transport systems. These damages can also be described as function disruption of the system. The important aspect is not only the physical capacity of a system to resist, but also its capacity to continue functioning. The model will be tested on the island of Vulcano in southern Italy. Vulcano is characterized by clear signs of volcanic unrest and is the type locality for a deadly style of eruption. The main active system of Vulcano Island (La Fossa cone) is known to produce a variety of eruption styles and intensities, each posing their own hazards and threats. Six different hazard scenarios have been identified based on a detailed stratigraphic work. The urbanization on Vulcano took place in the 1980s with no real planning and its population mostly subsists on tourism. Our preliminary results show that Vulcano is not characterized by a great variability of architectural typologies and construction materials. Three main types of buildings are present (masonry with concrete frame, masonry with manufactured stone units, masonry with hollow clay bricks) and no statistically significant trends were found between physical and morphological characteristics. The recent signs of volcanic unrest combined with a complex vulnerability of the island due to an uncontrolled urban development and a significant seasonal variation of the exposed population in summer months result in a high volcanic risk. As a result, Vulcano represents the ideal environment to test a multi-hazard based risk model and to study the transition between micro (building) and macro (urban environment) scale of analysis, which is still an unexplored field in the study of volcanic risk. Different levels of vulnerability need to be analyzed in order to increase the level of preparedness, plan a potential evacuation, manage a potential volcanic crisis and assess the best mitigation measures to put in place and reduce the volcanic risk.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-10
... design feature associated with the architecture and connectivity capabilities of the airplanes' computer... vulnerabilities to the airplanes' systems. The proposed network architecture includes the following connectivity.... Operator business and administrative support systems, and 3. Passenger entertainment systems, and access by...
NASA Astrophysics Data System (ADS)
Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu
2017-05-01
This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.
Engineering Safety- and Security-Related Requirements for Software-Intensive Systems
2010-04-27
Requirements Negative (shall not) Requirements Hardware Requirements equ remen s System / Documentation Requirements eve oper Requirements Operational ...Validation Actual / Proposed Defensibility C li Operational Vulnerability Analysis VulnerabilityVulnerability Safety Vulnerability performs System ...including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson
Fuzz Testing of Industrial Network Protocols in Programmable Logic Controllers
2017-12-01
PLCs) are vital components in these cyber-physical systems. The industrial network protocols used to communicate between nodes in a control network...AB/RA) MicroLogix 1100 PLC through its implementation of EtherNet/IP, Common Industrial Protocol (CIP), and Programmable Controller Communication ...Commands (PCCC) communication protocols. This research also examines whether cross-generational vulnerabilities exist in the more advanced AB/RA
NASA Astrophysics Data System (ADS)
Sword-Daniels, V. L.; Rossetto, T.; Wilson, T. M.; Sargeant, S.
2015-05-01
The essential services that support urban living are complex and interdependent, and their disruption in disasters directly affects society. Yet there are few empirical studies to inform our understanding of the vulnerabilities and resilience of complex infrastructure systems in disasters. This research takes a systems thinking approach to explore the dynamic behaviour of a network of essential services, in the presence and absence of volcanic ashfall hazards in Montserrat, West Indies. Adopting a case study methodology and qualitative methods to gather empirical data, we centre the study on the healthcare system and its interconnected network of essential services. We identify different types of relationship between sectors and develop a new interdependence classification system for analysis. Relationships are further categorised by hazard conditions, for use in extensive risk contexts. During heightened volcanic activity, relationships between systems transform in both number and type: connections increase across the network by 41%, and adapt to increase cooperation and information sharing. Interconnections add capacities to the network, increasing the resilience of prioritised sectors. This in-depth and context-specific approach provides a new methodology for studying the dynamics of infrastructure interdependence in an extensive risk context, and can be adapted for use in other hazard contexts.
NASA Astrophysics Data System (ADS)
Sword-Daniels, V. L.; Rossetto, T.; Wilson, T. M.; Sargeant, S.
2015-02-01
The essential services that support urban living are complex and interdependent, and their disruption in disasters directly affects society. Yet there are few empirical studies to inform our understanding of the vulnerabilities and resilience of complex infrastructure systems in disasters. This research takes a systems thinking approach to explore the dynamic behaviour of a network of essential services, in the presence and absence of volcanic ashfall hazards in Montserrat, West Indies. Adopting a case study methodology and qualitative methods to gather empirical data we centre the study on the healthcare system and its interconnected network of essential services. We identify different types of relationship between sectors and develop a new interdependence classification system for analysis. Relationships are further categorised by hazard condition, for use in extensive risk contexts. During heightened volcanic activity, relationships between systems transform in both number and type: connections increase across the network by 41%, and adapt to increase cooperation and information sharing. Interconnections add capacities to the network, increasing the resilience of prioritised sectors. This in-depth and context-specific approach provides a new methodology for studying the dynamics of infrastructure interdependence in an extensive risk context, and can be adapted for use in other hazard contexts.
Report #12-P-0900, September 27, 2012. Vulnerability testing of networked resources located in the NVFEL identified Internet Protocol addresses with potentially 9 critical-risk, 70 high-risk, and 297 medium-risk vulnerabilities.
Cyber Incidents Involving Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert J. Turk
2005-10-01
The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Managementmore » Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).« less
NASA Technical Reports Server (NTRS)
Ganzy, Ethan G.
2014-01-01
All devices attached to the NASA KSC network are subject to security vulnerability scanning and/or penetration testing. In today's changing environment, vulnerable and/or unprotected systems can easily be overlooked. Systems that are not properly managed can become a potential threat to the operational integrity of our systems and networks. This includes all NASA (internal and external) information systems within NASA KSC Internet Protocol (IP) address space, and NASA KSC facilities. The Office of the Chief Information Officer (OCIO) recommends that all NASA Centers and information systems be subject to penetration testing on a regular interval in accordance with the guidelines identified by the National Institute of Standards and Technology (NIST). (ITS-HBK-2810.04-02A) Protecting information and equipment at NASA is an area of increasing concern. In addition to the CPU's on the network; Supervisory, Control and Data Acquisition (SCADA) systems are especially vulnerable because these systems have lacked standards, use embedded controllers with little computational power and informal software, are connected to physical processes, have few operators, and are increasingly also being connected to corporate networks. The scope of work is comprised of several individual components which together build upon previous work by Drew Branch, NASA KSC Intern. The Pwn Plug is the selected COTS (Commercial-Off-The-Shelf) device chosen to test simplification of mandatory IT Security tasks. The device will be utilized to provide services to NASA KSC and enable an assessment of infrastructure soundness and regulatory compliance in an efficient, economical, and business responsive manner. The Pwn Plug is designed as a pen testing appliance which provides a hardware platform that can support commercial penetration testing efforts at significantly reduced costs. The expected outcomes are: 1) External Penetration Testing, 2) Social Engineering, 3) Procedural Documentation, 4) Recommended Remediation Action Plan, 5) System Retest & Remediation Attestation and 6) Final Reports, out briefing and Presentation. Due to physical and material constraints beyond intern and mentor control, the project was redefined as a working pen-test scenario. Limitations of lab availability and tools dictated an academic exercise. This report was developed within the scenario guidelines suggested by the project mentor. The guidelines were to be creative in developing a Pen Test program for a client.
A spatial DB model to simulate the road network efficiency in hydrogeological emergency
NASA Astrophysics Data System (ADS)
Michele, Mangiameli; Giuseppe, Mussumeci
2015-12-01
We deal with the theme of the simulation of risk analysis using a technological approach based on the integration of exclusively free and open source tools: PostgreSQL as Database Management System (DBMS) and Quantum GIS-GRASS as Geographic Information System (GIS) platform. The case study is represented by a seismic land in Sicily characterized by steep slopes and frequent instability phenomena. This area includes a city of about 30.000 inhabitants (Enna) that lies on the top of a mountain at about 990 m a.s.l.. The access to the city is assured by few and very winding roads that are also highly vulnerable to seismic and hydrogeological hazards. When exceptional rainfall events occur, the loss of efficiency of these roads should compromise timeliness and effectiveness of rescue operations. The data of the sample area have been structured into the adopted DBMS, and the connection to the GIS functionalities allows simulating the exceptional events. We analyzed the hazard, vulnerability and exposure related to these events and calculated the final risk defining three classes for each scenario: low (L), medium (M) and high (H). This study can be a valuable tool to prioritize risk levels and set priorities for intervention to the main road networks..
A negative genetic interaction map in isogenic cancer cell lines reveals cancer cell vulnerabilities
Vizeacoumar, Franco J; Arnold, Roland; Vizeacoumar, Frederick S; Chandrashekhar, Megha; Buzina, Alla; Young, Jordan T F; Kwan, Julian H M; Sayad, Azin; Mero, Patricia; Lawo, Steffen; Tanaka, Hiromasa; Brown, Kevin R; Baryshnikova, Anastasia; Mak, Anthony B; Fedyshyn, Yaroslav; Wang, Yadong; Brito, Glauber C; Kasimer, Dahlia; Makhnevych, Taras; Ketela, Troy; Datti, Alessandro; Babu, Mohan; Emili, Andrew; Pelletier, Laurence; Wrana, Jeff; Wainberg, Zev; Kim, Philip M; Rottapel, Robert; O'Brien, Catherine A; Andrews, Brenda; Boone, Charles; Moffat, Jason
2013-01-01
Improved efforts are necessary to define the functional product of cancer mutations currently being revealed through large-scale sequencing efforts. Using genome-scale pooled shRNA screening technology, we mapped negative genetic interactions across a set of isogenic cancer cell lines and confirmed hundreds of these interactions in orthogonal co-culture competition assays to generate a high-confidence genetic interaction network of differentially essential or differential essentiality (DiE) genes. The network uncovered examples of conserved genetic interactions, densely connected functional modules derived from comparative genomics with model systems data, functions for uncharacterized genes in the human genome and targetable vulnerabilities. Finally, we demonstrate a general applicability of DiE gene signatures in determining genetic dependencies of other non-isogenic cancer cell lines. For example, the PTEN−/− DiE genes reveal a signature that can preferentially classify PTEN-dependent genotypes across a series of non-isogenic cell lines derived from the breast, pancreas and ovarian cancers. Our reference network suggests that many cancer vulnerabilities remain to be discovered through systematic derivation of a network of differentially essential genes in an isogenic cancer cell model. PMID:24104479
An Extreme-Value Approach to Anomaly Vulnerability Identification
NASA Technical Reports Server (NTRS)
Everett, Chris; Maggio, Gaspare; Groen, Frank
2010-01-01
The objective of this paper is to present a method for importance analysis in parametric probabilistic modeling where the result of interest is the identification of potential engineering vulnerabilities associated with postulated anomalies in system behavior. In the context of Accident Precursor Analysis (APA), under which this method has been developed, these vulnerabilities, designated as anomaly vulnerabilities, are conditions that produce high risk in the presence of anomalous system behavior. The method defines a parameter-specific Parameter Vulnerability Importance measure (PVI), which identifies anomaly risk-model parameter values that indicate the potential presence of anomaly vulnerabilities, and allows them to be prioritized for further investigation. This entails analyzing each uncertain risk-model parameter over its credible range of values to determine where it produces the maximum risk. A parameter that produces high system risk for a particular range of values suggests that the system is vulnerable to the modeled anomalous conditions, if indeed the true parameter value lies in that range. Thus, PVI analysis provides a means of identifying and prioritizing anomaly-related engineering issues that at the very least warrant improved understanding to reduce uncertainty, such that true vulnerabilities may be identified and proper corrective actions taken.
Report #10-P-0210, September 7, 2010. Vulnerability testing of EPA’s Andrew W. Breidenbach Environmental Research Center network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-25
... regular security audits and have been certified for operation. The CPSC observes all industry and Federal government best practices for network security. CPSC staff regularly analyzes its systems for vulnerabilities and malware, and monitor the network for real-time intrusion attempts. B. Estimated Burden The CPSC...
2015-05-01
HNW line-of-sight network is mounted on a 10-meter telescoping mast located just aft of the TCN’s cab. The flat plate Range Throughput Extension Kit... TAC – Tactical Command Post ATH – At-the-Halt PoP – Point of Presence SNE – Soldier Network Extension NOSC – Network Operations & Security...Survivability/Lethality Analysis Directorate (ARL/SLAD) conducted a Cooperative Vulnerability and Penetration Assessment on WIN-T Increment 2. The Army
NASA Astrophysics Data System (ADS)
Ceola, S.; Laio, F.; Montanari, A.
2013-12-01
The study and the analysis of the interactions and feedbacks between hydrology and society constitute the main issue of socio-hydrology. Recent flood events, which occurred across the globe, highlighted once again that mitigation strategies are needed to reduce flood risk. In particular, quick procedures for the identification of vulnerable human settlements and flood prone areas are a necessary tool to identify priorities for flood risk management. To this aim, a 19-year long period of world-wide night light data, as a proxy of human population, and the global river network have been examined. The spatio-temporal evolution of artificial luminosity depending on the distance from the river network has been assessed in order to quantitatively identify the likelihood for a populated pixel to be reached by water. The analysis focuses both on a global and on a local scale. Hotspots, such as highly illuminated areas and developing regions, have been also examined. The analysis shows an increment of yearly-averaged artificial luminosity from 1992 to 2010 (i.e. the time period of satellite data availability), whereas light intensity tends to decrease with increasing distance from the river network. The results thus reveal an increased vulnerability of human settlements to flooding events. A nearly 70-year long period of peace and the economic development after the Second World War could reasonably explain the observed enhancement of human population proximity to water bodies.
Design and implementation of website information disclosure assessment system.
Cho, Ying-Chiang; Pan, Jen-Yi
2015-01-01
Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people's lives. Websites contain vast amounts of personal privacy information. In order to protect this information, network security technologies, such as database protection and data encryption, attract many researchers. The most serious problems concerning web vulnerability are e-mail address and network database leakages. These leakages have many causes. For example, malicious users can steal database contents, taking advantage of mistakes made by programmers and administrators. In order to mitigate this type of abuse, a website information disclosure assessment system is proposed in this study. This system utilizes a series of technologies, such as web crawler algorithms, SQL injection attack detection, and web vulnerability mining, to assess a website's information disclosure. Thirty websites, randomly sampled from the top 50 world colleges, were used to collect leakage information. This testing showed the importance of increasing the security and privacy of website information for academic websites.
Burholt, Vanessa; Dobbs, Christine
2014-08-01
This paper considers the support networks of older people in populations with a preponderance of multigenerational households and examines the most vulnerable network types in terms of loneliness and isolation. Current common typologies of support networks may not be sensitive to differences within and between different cultures. This paper uses cross-sectional data drawn from 590 elders (Gujaratis, Punjabis and Sylhetis) living in the United Kingdom and South Asia. Six variables were used in K-means cluster analysis to establish a new network typology. Two logistic regression models using loneliness and isolation as dependent variables assessed the contribution of the new network type to wellbeing. Four support networks were identified: 'Multigenerational Households: Older Integrated Networks', 'Multigenerational Households: Younger Family Networks', 'Family and Friends Integrated Networks' and 'Non-kin Restricted Networks'. Older South Asians with 'Non-kin Restricted Networks' were more likely to be lonely and isolated compared to others. Using network typologies developed with individualistically oriented cultures, distributions are skewed towards more robust network types and could underestimate the support needs of older people from familistic cultures, who may be isolated and lonely and with limited informal sources of help. The new typology identifies different network types within multigenerational households, identifies a greater proportion of older people with vulnerable networks and could positively contribute to service planning.
Vulnerabilities in GSM technology and feasibility of selected attacks
NASA Astrophysics Data System (ADS)
Voznak, M.; Prokes, M.; Sevcik, L.; Frnda, J.; Toral-Cruz, Homer; Jakovlev, Sergej; Fazio, Peppino; Mehic, M.; Mikulec, M.
2015-05-01
Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem's occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting - Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.
Measurement of traffic network vulnerability for Mississippi coastal region : final research report.
DOT National Transportation Integrated Search
2017-08-15
Natural disasters such as a hurricane can cause great damages to the transportation networks and significantly affect the evacuation trip operations. An accurate understanding and measurement of the network vulnerability can enhance the evacuees p...
Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure
NASA Astrophysics Data System (ADS)
Arndt, Craig M.; Hall, Nathaniel A.
2004-08-01
Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.
2015-02-01
not normally blocked by enterprise firewalls . • Some malware exploited zero-day vulnerabilities as well as attempted to exploit vulnerabilities for...servers, receiving updates, and exfiltrating data. Firewalls are routinely configured to block incoming connections while malware within a target...implemented with layers of technical security controls (e.g., ICS-aware firewalls ) to control network traffic and prevent the spread of malware . Intrusion
A Mathematical Framework for the Analysis of Cyber-Resilient Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Melin, Alexander M; Ferragut, Erik M; Laska, Jason A
2013-01-01
The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security (IT) techniques to control system networks. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective. Little research has focused on the design of closed-loop dynamics that are resilient to cyber-attack. The majority of control system protection measures are concerned with how to prevent unauthorized access and protect data integrity. We believe that the abilitymore » to analyze how an attacker can effect the closed loop dynamics of a control system configuration once they have access is just as important to the overall security of a control system. To begin to analyze this problem, consistent mathematical definitions of concepts within resilient control need to be established so that a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and configuration can be made. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.« less
Vulnerabilities, Influences and Interaction Paths: Failure Data for Integrated System Risk Analysis
NASA Technical Reports Server (NTRS)
Malin, Jane T.; Fleming, Land
2006-01-01
We describe graph-based analysis methods for identifying and analyzing cross-subsystem interaction risks from subsystem connectivity information. By discovering external and remote influences that would be otherwise unexpected, these methods can support better communication among subsystem designers at points of potential conflict and to support design of more dependable and diagnosable systems. These methods identify hazard causes that can impact vulnerable functions or entities if propagated across interaction paths from the hazard source to the vulnerable target. The analysis can also assess combined impacts of And-Or trees of disabling influences. The analysis can use ratings of hazards and vulnerabilities to calculate cumulative measures of the severity and importance. Identification of cross-subsystem hazard-vulnerability pairs and propagation paths across subsystems will increase coverage of hazard and risk analysis and can indicate risk control and protection strategies.
2012-02-06
Event Interface Custom ASCII JSS Client Y (Spectrum) 3.2 8 IT Infrastructure Performance Data/Vulnerability Assessment eHealth , Spectrum NSM...monitoring of infrastructure servers.) The Concord product line. Concord products ( eHealth and Spectrum) can provide both real-time and historical...Network and Systems Management (NSM) • Unicenter Asset Management • Spectrum • eHealth • Centennial Discovery Table 12 summarizes the the role of
Daniel J. Isaak; Charles H. Luce; Bruce E. Rieman; David E. Nagel; Erin E. Peterson; Dona L. Horan; Sharon Parkes; Gwynne L. Chandler
2010-01-01
Mountain streams provide important habitats for many species, but their faunas are especially vulnerable to climate change because of ectothermic physiologies and movements that are constrained to linear networks that are easily fragmented. Effectively conserving biodiversity in these systems requires accurate downscaling of climatic trends to local habitat conditions...
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-01-01
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-09-02
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.
Wiltshire, Serge W
2018-01-01
An agent-based computer model that builds representative regional U.S. hog production networks was developed and employed to assess the potential impact of the ongoing trend towards increased producer specialization upon network-level resilience to catastrophic disease outbreaks. Empirical analyses suggest that the spatial distribution and connectivity patterns of contact networks often predict epidemic spreading dynamics. Our model heuristically generates realistic systems composed of hog producer, feed mill, and slaughter plant agents. Network edges are added during each run as agents exchange livestock and feed. The heuristics governing agents' contact patterns account for factors including their industry roles, physical proximities, and the age of their livestock. In each run, an infection is introduced, and may spread according to probabilities associated with the various modes of contact. For each of three treatments-defined by one-phase, two-phase, and three-phase production systems-a parameter variation experiment examines the impact of the spatial density of producer agents in the system upon the length and size of disease outbreaks. Resulting data show phase transitions whereby, above some density threshold, systemic outbreaks become possible, echoing findings from percolation theory. Data analysis reveals that multi-phase production systems are vulnerable to catastrophic outbreaks at lower spatial densities, have more abrupt percolation transitions, and are characterized by less-predictable outbreak scales and durations. Key differences in network-level metrics shed light on these results, suggesting that the absence of potentially-bridging producer-producer edges may be largely responsible for the superior disease resilience of single-phase "farrow to finish" production systems.
Weighted link graphs: a distributed IDS for secondary intrusion detection and defense
NASA Astrophysics Data System (ADS)
Zhou, Mian; Lang, Sheau-Dong
2005-03-01
While a firewall installed at the perimeter of a local network provides the first line of defense against the hackers, many intrusion incidents are the results of successful penetration of the firewalls. One computer"s compromise often put the entire network at risk. In this paper, we propose an IDS that provides a finer control over the internal network. The system focuses on the variations of connection-based behavior of each single computer, and uses a weighted link graph to visualize the overall traffic abnormalities. The functionality of our system is of a distributed personal IDS system that also provides a centralized traffic analysis by graphical visualization. We use a novel weight assignment schema for the local detection within each end agent. The local abnormalities are quantitatively carried out by the node weight and link weight and further sent to the central analyzer to build the weighted link graph. Thus, we distribute the burden of traffic processing and visualization to each agent and make it more efficient for the overall intrusion detection. As the LANs are more vulnerable to inside attacks, our system is designed as a reinforcement to prevent corruption from the inside.
da Silva, Marcus Vinicius Pereira; de Araújo, Kizi Mendonça; Sampaio, Ricardo Barros; Moraes, Milton Ozório
2017-01-01
Collaborative networks are of great value for science and technology (S&T) institutions as a way of sharing, generating and disseminating new knowledge that could ultimately lead to innovations. Driven by the need to assess the contribution and effectiveness of these networks in informing S&T management, we explored the evolution and dynamics of tuberculosis scientific networks involving the Oswaldo Cruz Foundation (Fiocruz), the major public health S&T Institution in Brazil. Social network analysis (SNA) was used to produce a 10-year (2005–2009, 2010–2014) retrospective longitudinal mapping of Brazilian tuberculosis research networks within the country and internationally, highlighting Fiocruz collaborations. Co-authorship analysis showed a significant expansion of collaboration in Brazil and the role of Fiocruz and other leading national institutions in maintaining connectivity, facilitating knowledge exchange and reducing network vulnerability. It also identified influential researchers that can act as information leaders and support strategic decisions. When we focused on networks inside the institution, the analysis showed a clear discontinuation between the clinical and the public health research areas, which needs specific internal policies to improve collaborations since outcomes in TB are expected to provide better diagnostic tools and more effective treatments. The approach provides evidence to support S&T management by pinpointing: key central institutions maintaining network connectivity; most influential researchers that can act as advisors/experts for investment and induction policies; key Fiocruz researchers that could improve information exchange, systems integration and innovation within the institution; opportunities for synergy between internal research groups working in complementary areas. In summary, we observed that SNA parameters proved to be a valuable tool that, along with other indicators, can strengthen knowledge platforms to support S&T management efforts. PMID:28792514
Climbing the Slope of Enlightenment during NASA's Arctic Boreal Vulnerability Experiment
NASA Astrophysics Data System (ADS)
Griffith, P. C.; Hoy, E.; Duffy, D.; McInerney, M.
2015-12-01
The Arctic Boreal Vulnerability Experiment (ABoVE) is a new field campaign sponsored by NASA's Terrestrial Ecology Program and designed to improve understanding of the vulnerability and resilience of Arctic and boreal social-ecological systems to environmental change (http://above.nasa.gov). ABoVE is integrating field-based studies, modeling, and data from airborne and satellite remote sensing. The NASA Center for Climate Simulation (NCCS) has partnered with the NASA Carbon Cycle and Ecosystems Office (CCEO) to create a high performance science cloud for this field campaign. The ABoVE Science Cloud combines high performance computing with emerging technologies and data management with tools for analyzing and processing geographic information to create an environment specifically designed for large-scale modeling, analysis of remote sensing data, copious disk storage for "big data" with integrated data management, and integration of core variables from in-situ networks. The ABoVE Science Cloud is a collaboration that is accelerating the pace of new Arctic science for researchers participating in the field campaign. Specific examples of the utilization of the ABoVE Science Cloud by several funded projects will be presented.
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps.
Moya, José M; Araujo, Alvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier
2009-01-01
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals.
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps
Moya, José M.; Araujo, Álvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier
2009-01-01
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals. PMID:22291569
A new Geo-Information Architecture for Risk Management in the Alps
NASA Astrophysics Data System (ADS)
Baruffini, Mi.; Thuering, M.
2009-04-01
During the last decades land-use increased significantly in the Swiss (and European) mountain regions. Due to the scarceness of areas suitable for development, anthropic activities were extended into areas prone to natural hazards such as avalanches, debris flows and rockfalls (Smith 2001). Furthermore, the transalpine transport system necessity to develop effective links in an important area collides with the need to ensure the safety of travelers and the health of the population. Consequently, an increase in losses due to hazards can be observed. To mitigate these associated losses, both traditional protective measures and land-use planning policies are to be developed and implemented to optimize future investments. Efficient protection alternatives can be obtained considering the concept of integral risk management. Risk analysis, as the central part of risk management, has become gradually a generally accepted approach for the assessment of current and future scenarios (Loat & Zimmermann 2004). The procedure aims at risk reduction which can be reached by conventional mitigation on one hand and the implementation of land-use planning on the other hand: a combination of active and passive mitigation measures is applied to prevent damage to buildings, people and infrastructures. As part of the Swiss National Science Foundation Project 54 "Evaluation of the optimal resilience for vulnerable infrastructure networks - An interdisciplinary pilot study on the transalpine transportation corridors" we study the vulnerability of infrastructures due to natural hazards. The project aims to study various natural hazards (and later, even man-made) and to obtain an evaluation of the resilience according to an interdisciplinary approach, considering the possible damage by means of risk criteria and pointing out the feasibility of conceivable measures to reduce potential damage. The project consists of a geoscientific part and an application. The fist part consists in studying the dangers (natural) and related risks in terms of infrastructure vulnerability. The application considers different types of danger (logically intersected with the transport infrastructure) and compares them with fixed values to obtain a so-called deficit. As framework we adopt The Swiss system for risk analysis of gravitational natural hazards (BUWAL 1999). In this way the project develops a methodology that makes possible a risk analysis aiming to optimize the infrastructure vulnerability and therefore allows to obtain a model designed to optimize the functionality of the network infrastructure. A simulation environment, RiskBox, is developed within the open-source GIS environment GRASS (Geographic Resources Analysis Support System) and a database (PostgreSQL) in order to manage a infrastructure data catalog. The targeted simulation environment includes the elements that identify the consecutive steps of risk analysis: hazard - vulnerability - risk. The initial results of the experimental case study show how useful a GIS-based system, which identify the risk of any single vulnerable element in the corridor and to assess the risk to the global system on the basis of priorities of the actors involved, can be for effective and efficient disaster response management, as explained in (ARMONIA Project 2007). In our work we wanted to highlight the complexity of the risk analysis methodology, difficulty that is amplified by many peculiarities in the mountain areas. In particular, the illustrative performed process can give an overview of the interests and the need to act to reduce vulnerability and the hazardous nature of the Gotthard corridor. We present the concept and current state of development of our project and our application to the testbed, the Alps-crossing corridor of St. Gotthard. REFERENCES ARMONIA Project 2007: Land use plans in Risky areas fro Unwise to Wise Practices - Materials 2nd conference. Politecnico di Milano. BUWAL 1999: Risikoanalyse bei gravitativen Naturgefahren - Methode, Fallbeispiele und Daten (Risk analyses for gravitational natural hazards). Bundesamt für Umwelt, Wald und Landschaft (BUWAL). Umwelt-Materialen Nr. 107, 1-244. Loat, R. & Zimmermann, M. 2004 : La gestion des risques en Suisse (Risk Management in Switzerland). In: Veyret, Y., Garry, G., Meschinet de Richemont, N. & Armand Colin (eds) 2002: Colloque Arche de la Défense 22-24 octobre 2002, dans Risques naturels et aménagement en Europe, 108-120. Smith, K. 2001: Environmental hazards. Assessing the risk and reducing disaster. Third edition. London
Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua
2013-01-01
Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks.
Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua
2013-01-01
Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147
Passive and Active Analysis in DSR-Based Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Dempsey, Tae; Sahin, Gokhan; Morton, Y. T. (Jade)
Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments. Furthermore, we investigate active analysis, which is the combination of a classifier and intelligent jammer to invoke specific responses from a victim network.
SPAN security policies and guidelines
NASA Technical Reports Server (NTRS)
Sisson, Patricia L.; Green, James L.
1989-01-01
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure. Therefore, each system manager, must strictly adhere to the requirements and must consider implementing the guidelines discussed. There are areas of vulnerability within the operating system that may not be addressed. However, when a requirement or guideline is discussed, implementation techniques are included. Information related to computer and data security is discussed to provide information on implementation options. The information is presented as it relates to a VAX computer environment.
Risk Mitigation for Highway and Railway Bridges
DOT National Transportation Integrated Search
2009-02-01
Performance of the transportation network strongly depends on the performance of bridges. Bridges constitute a vital part of the transportation infrastructure system and they are vulnerable to extreme events such as natural disasters (i.e., hurricane...
Network Security Is Manageable
ERIC Educational Resources Information Center
Roberts, Gary
2006-01-01
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Food Price Volatility and Decadal Climate Variability
NASA Astrophysics Data System (ADS)
Brown, M. E.
2013-12-01
The agriculture system is under pressure to increase production every year as global population expands and more people move from a diet mostly made up of grains, to one with more meat, dairy and processed foods. Weather shocks and large changes in international commodity prices in the last decade have increased pressure on local food prices. This paper will review several studies that link climate variability as measured with satellite remote sensing to food price dynamics in 36 developing countries where local monthly food price data is available. The focus of the research is to understand how weather and climate, as measured by variations in the growing season using satellite remote sensing, has affected agricultural production, food prices and access to food in agricultural societies. Economies are vulnerable to extreme weather at multiple levels. Subsistence small holders who hold livestock and consume much of the food they produce are vulnerable to food production variability. The broader society, however, is also vulnerable to extreme weather because of the secondary effects on market functioning, resource availability, and large-scale impacts on employment in trading, trucking and wage labor that are caused by weather-related shocks. Food price variability captures many of these broad impacts and can be used to diagnose weather-related vulnerability across multiple sectors. The paper will trace these connections using market-level data and analysis. The context of the analysis is the humanitarian aid community, using the guidance of the USAID Famine Early Warning Systems Network and the United Nation's World Food Program in their response to food security crises. These organizations have worked over the past three decades to provide baseline information on food production through satellite remote sensing data and agricultural yield models, as well as assessments of food access through a food price database. Econometric models and spatial analysis are used to describe the connection between shocks and food prices, and to demonstrate the importance of these metrics in overall outcomes in food-insecure communities.
Health complaints and regulatory reform: Implications for vulnerable populations?
Carney, Terry; Beaupert, Fleur; Chiarella, Mary; Bennett, Belinda; Walton, Merrilyn; Kelly, Patrick J; Satchell, Claudette S
2016-03-01
Complaints and disciplinary processes play a significant role in health professional regulation. Many countries are transitioning from models of self-regulation to greater external oversight through systems including meta-regulation, responsive (risk-based) regulation, and "networked governance". Such systems harness, in differing ways, public, private, professional and non-governmental bodies to exert influence over the conduct of health professionals and services. Interesting literature is emerging regarding complainants' motivations and experiences, the impact of complaints processes on health professionals, and identification of features such as complainant and health professional profiles, types of complaints and outcomes. This article concentrates on studies identifying vulnerable groups and their participation in health care regulatory systems.
NASA Astrophysics Data System (ADS)
Wang, Jiang; Yang, Chen; Wang, Ruofan; Yu, Haitao; Cao, Yibin; Liu, Jing
2016-10-01
In this paper, EEG series are applied to construct functional connections with the correlation between different regions in order to investigate the nonlinear characteristic and the cognitive function of the brain with Alzheimer's disease (AD). First, limited penetrable visibility graph (LPVG) and phase space method map single EEG series into networks, and investigate the underlying chaotic system dynamics of AD brain. Topological properties of the networks are extracted, such as average path length and clustering coefficient. It is found that the network topology of AD in several local brain regions are different from that of the control group with no statistically significant difference existing all over the brain. Furthermore, in order to detect the abnormality of AD brain as a whole, functional connections among different brain regions are reconstructed based on similarity of clustering coefficient sequence (CCSS) of EEG series in the four frequency bands (delta, theta, alpha, and beta), which exhibit obvious small-world properties. Graph analysis demonstrates that for both methodologies, the functional connections between regions of AD brain decrease, particularly in the alpha frequency band. AD causes the graph index complexity of the functional network decreased, the small-world properties weakened, and the vulnerability increased. The obtained results show that the brain functional network constructed by LPVG and phase space method might be more effective to distinguish AD from the normal control than the analysis of single series, which is helpful for revealing the underlying pathological mechanism of the disease.
NASA Astrophysics Data System (ADS)
Gidaris, I.; Gori, A.; Panakkal, P.; Padgett, J.; Bedient, P. B.
2017-12-01
The record-breaking rainfall produced over the Houston region by Hurricane Harvey resulted in catastrophic and unprecedented impacts on the region's infrastructure. Notably, Houston's transportation network was crippled, with almost every major highway flooded during the five-day event. Entire neighborhoods and subdivisions were inundated, rendering them completely inaccessible to rescue crews and emergency services. Harvey has tragically highlighted the vulnerability of major thoroughfares, as well as neighborhood roads, to severe inundation during extreme precipitation events. Furthermore, it has emphasized the need for detailed accessibility characterization of road networks under extreme event scenarios in order to determine which areas of the city are most vulnerable. This analysis assesses and tracks the accessibility of Houston's major highways during Harvey's evolution by utilizing road flood/closure data from the Texas DOT. In the absence of flooded/closure data for local roads, a hybrid approach is adopted that utilizes a physics-based hydrologic model to produce high-resolution inundation estimates for selected urban watersheds in the Houston area. In particular, hydrologic output in the form of inundation depths is used to estimate the operability of local roads. Ultimately, integration of hydrologic-based estimation of road conditions with observed data from DOT supports a network accessibility analysis of selected urban neighborhoods. This accessibility analysis can identify operable routes for emergency response (rescue crews, medical services, etc.) during the storm event.
Meyer, Victor; Myres, Charles; Bakshi, Nitin
2010-03-01
The objective of this paper is to analyse the vulnerabilities of current power-grid systems and to propose alternatives to using fossil fuel power generation and infrastructure solutions in the form of microgrids, particularly those from renewable energy sources. One of the key potential benefits of microgrids, apart from their inherent sustainability and ecological advantages, is increased resilience. The analysis is targeted towards the context of business process outsourcing in India. However, much of the research on vulnerabilities has been derived from the USA and as such many of the examples cite vulnerabilities in the USA and other developed economies. Nevertheless, the vulnerabilities noted are to a degree common to all grid systems, and so the analysis may be more broadly applicable.
Research on information security system of waste terminal disposal process
NASA Astrophysics Data System (ADS)
Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei
2017-05-01
Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.
Percolation of a general network of networks.
Gao, Jianxi; Buldyrev, Sergey V; Stanley, H Eugene; Xu, Xiaoming; Havlin, Shlomo
2013-12-01
Percolation theory is an approach to study the vulnerability of a system. We develop an analytical framework and analyze the percolation properties of a network composed of interdependent networks (NetONet). Typically, percolation of a single network shows that the damage in the network due to a failure is a continuous function of the size of the failure, i.e., the fraction of failed nodes. In sharp contrast, in NetONet, due to the cascading failures, the percolation transition may be discontinuous and even a single node failure may lead to an abrupt collapse of the system. We demonstrate our general framework for a NetONet composed of n classic Erdős-Rényi (ER) networks, where each network depends on the same number m of other networks, i.e., for a random regular network (RR) formed of interdependent ER networks. The dependency between nodes of different networks is taken as one-to-one correspondence, i.e., a node in one network can depend only on one node in the other network (no-feedback condition). In contrast to a treelike NetONet in which the size of the largest connected cluster (mutual component) depends on n, the loops in the RR NetONet cause the largest connected cluster to depend only on m and the topology of each network but not on n. We also analyzed the extremely vulnerable feedback condition of coupling, where the coupling between nodes of different networks is not one-to-one correspondence. In the case of NetONet formed of ER networks, percolation only exhibits two phases, a second order phase transition and collapse, and no first order percolation transition regime is found in the case of the no-feedback condition. In the case of NetONet composed of RR networks, there exists a first order phase transition when the coupling strength q (fraction of interdependency links) is large and a second order phase transition when q is small. Our insight on the resilience of coupled networks might help in designing robust interdependent systems.
ERIC Educational Resources Information Center
King, Kenneth M.
1988-01-01
Discussion of the recent computer virus attacks on computers with vulnerable operating systems focuses on the values of educational computer networks. The need for computer security procedures is emphasized, and the ethical use of computer hardware and software is discussed. (LRW)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shekar, Venkateswaran; Fiondella, Lance; Chatterjee, Samrat
Transportation networks are critical to the social and economic function of nations. Given the continuing increase in the populations of cities throughout the world, the criticality of transportation infrastructure is expected to increase. Thus, it is ever more important to mitigate congestion as well as to assess the impact disruptions would have on individuals who depend on transportation for their work and livelihood. Moreover, several government organizations are responsible for ensuring transportation networks are available despite the constant threat of natural disasters and terrorist activities. Most of the previous transportation network vulnerability research has been performed in the context ofmore » static traffic models, many of which are formulated as traditional optimization problems. However, transportation networks are dynamic because their usage varies over time. Thus, more appropriate methods to characterize the vulnerability of transportation networks should consider their dynamic properties. This paper presents a quantitative approach to assess the vulnerability of a transportation network to disruptions with methods from traffic simulation. Our approach can prioritize the critical links over time and is generalizable to the case where both link and node disruptions are of concern. We illustrate the approach through a series of examples. Our results demonstrate that the approach provides quantitative insight into the time varying criticality of links. Such an approach could be used as the objective function of less traditional optimization methods that use simulation and other techniques to evaluate the relative utility of a particular network defense to reduce vulnerability and increase resilience.« less
Complex networks in confined comminution
NASA Astrophysics Data System (ADS)
Walker, David M.; Tordesillas, Antoinette; Einav, Itai; Small, Michael
2011-08-01
The physical process of confined comminution is investigated within the framework of complex networks. We first characterize the topology of the unweighted contact networks as generated by the confined comminution process. We find this process gives rise to an ultimate contact network which exhibits a scale-free degree distribution and small world properties. In particular, if viewed in the context of networks through which information travels along shortest paths, we find that the global average of the node vulnerability decreases as the comminution process continues, with individual node vulnerability correlating with grain size. A possible application to the design of synthetic networks (e.g., sensor networks) is highlighted. Next we turn our attention to the physics of the granular comminution process and examine force transmission with respect to the weighted contact networks, where each link is weighted by the inverse magnitude of the normal force acting at the associated contact. We find that the strong forces (i.e., force chains) are transmitted along pathways in the network which are mainly following shortest-path routing protocols, as typically found, for example, in communication systems. Motivated by our earlier studies of the building blocks for self-organization in dense granular systems, we also explore the properties of the minimal contact cycles. The distribution of the contact strain energy intensity of 4-cycle motifs in the ultimate state of the confined comminution process is shown to be consistent with a scale-free distribution with infinite variance, thereby suggesting that 4-cycle arrangements of grains are capable of storing vast amounts of energy in their contacts without breaking.
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Şen, Sevil; Clark, John A.; Tapiador, Juan E.
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rice, Mark J.; Bonebrake, Christopher A.; Dayley, Greg K.
Inter-Control Center Communications Protocol (ICCP), defined by the IEC 60870-6 TASE.2 standard, was developed to enable data exchange over wide area networks between electric system entities, including utility control centers, Independent System Operators (ISOs), Regional Transmission Operators (RTOs) and Independent Power Producers (IPP) also known as Non-Utility Generators (NUG). ICCP is an unprotected protocol, and as a result is vulnerable to such actions as integrity violation, interception or alteration, spoofing, and eavesdropping. Because of these vulnerabilities with unprotected ICCP communication, security enhancements, referred to as Secure ICCP, have been added and are included in the ICCP products that utilities havemore » received since 2003 when the standard was defined. This has resulted in an ICCP product whose communication can be encrypted and authenticated to address these vulnerabilities.« less
Cinner, Joshua E; Bodin, Orjan
2010-08-11
Diverse livelihood portfolios are frequently viewed as a critical component of household economies in developing countries. Within the context of natural resources governance in particular, the capacity of individual households to engage in multiple occupations has been shown to influence important issues such as whether fishers would exit a declining fishery, how people react to policy, the types of resource management systems that may be applicable, and other decisions about natural resource use. This paper uses network analysis to provide a novel methodological framework for detailed systemic analysis of household livelihood portfolios. Paying particular attention to the role of natural resource-based occupations such as fisheries, we use network analyses to map occupations and their interrelationships- what we refer to as 'livelihood landscapes'. This network approach allows for the visualization of complex information about dependence on natural resources that can be aggregated at different scales. We then examine how the role of natural resource-based occupations changes along spectra of socioeconomic development and population density in 27 communities in 5 western Indian Ocean countries. Network statistics, including in- and out-degree centrality, the density of the network, and the level of network centralization are compared along a multivariate index of community-level socioeconomic development and a gradient of human population density. The combination of network analyses suggests an increase in household-level specialization with development for most occupational sectors, including fishing and farming, but that at the community-level, economies remained diversified. The novel modeling approach introduced here provides for various types of livelihood portfolio analyses at different scales of social aggregation. Our livelihood landscapes approach provides insights into communities' dependencies and usages of natural resources, and shows how patterns of occupational interrelationships relate to socioeconomic development and population density. A key question for future analysis is how the reduction of household occupational diversity, but maintenance of community diversity we see with increasing socioeconomic development influences key aspects of societies' vulnerability to environmental change or disasters.
NASA Astrophysics Data System (ADS)
Ge, Linqiang; Yu, Wei; Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik; Lu, Chao
2014-06-01
Most enterprise networks are built to operate in a static configuration (e.g., static software stacks, network configurations, and application deployments). Nonetheless, static systems make it easy for a cyber adversary to plan and launch successful attacks. To address static vulnerability, moving target defense (MTD) has been proposed to increase the difficulty for the adversary to launch successful attacks. In this paper, we first present a literature review of existing MTD techniques. We then propose a generic defense framework, which can provision an incentive-compatible MTD mechanism through dynamically migrating server locations. We also present a user-server mapping mechanism, which not only improves system resiliency, but also ensures network performance. We demonstrate a MTD with a multi-user network communication and our data shows that the proposed framework can effectively improve the resiliency and agility of the system while achieving good network timeliness and throughput performance.
Urban flood risk mitigation: from vulnerability assessment to resilient city
NASA Astrophysics Data System (ADS)
Serre, D.; Barroca, B.
2009-04-01
Urban flood risk mitigation: from vulnerability assessment to resilient city Bruno Barroca1, Damien Serre2 1Laboratory of Urban Engineering, Environment and Building (L G U E H) - Université de Marne-la-Vallée - Pôle Ville, 5, Bd Descartes - Bâtiment Lavoisier - 77454 Marne la Vallée Cedex 2 - France 2City of Paris Engineering School, Construction - Environment Department, 15 rue Fénelon, 75010 Paris, France In France, as in Europe and more generally throughout the world, river floods have been increasing in frequency and severity over the last ten years, and there are more instances of rivers bursting their banks, aggravating the impact of the flooding of areas supposedly protected by flood defenses. Despite efforts made to well maintain the flood defense assets, we often observe flood defense failures leading to finally increase flood risk in protected area during major flood events. Furthermore, flood forecasting models, although they benefit continuous improvements, remain partly inaccurate due to uncertainties populated all along data calculation processes. These circumstances obliged stakeholders and the scientific communities to manage flood risk by integrating new concepts like stakes management, vulnerability assessments and more recently urban resilience development. Definitively, the goal is to reduce flood risk by managing of course flood defenses and improving flood forecasting models, but also stakes and vulnerability of flooded areas to achieve urban resilience face to flood events. Vulnerability to flood is essentially concentrated in urban areas. Assessing vulnerability of a city is very difficult. Indeed, urban area is a complex system composed by a sum of technical sub-systems as complex as the urban area itself. Assessing city vulnerability consists in talking into account each sub system vulnerability and integrating all direct and indirect impacts generally depending from city shape and city spatial organization. At this time, although some research activities have been undertaken, there are no specific methods and tools to assess flood vulnerability at the scale of the city. Indeed, by studying literature we can list some vulnerability indicators and a few Geographic Information System (GIS) tools. But generally indicators and GIS are not developed specifically at the city scale: often a regional scale is used. Analyzing vulnerability at this scale needs more accurate and formalized indicators and GIS tools. The second limit of existing GIS is temporal: even if vulnerability could be assessed and localized through GIS, such tools cannot assist city managers in their decision to efficiency recover after a severe flood event. Due to scale and temporal limits, methods and tools available to assess urban vulnerability need large improvements. Talking into account all these considerations and limits, our research is focusing on: • vulnerability indicators design; • recovery scenarios design; • GIS for city vulnerability assessment and recovery scenarios. Dealing with vulnerability indicators, the goal is to design a set of indicators of city sub systems. Sub systems are seen like assets of high value and complex and interdependent infrastructure networks (i.e. power supplies, communications, water, transport etc.). The infrastructure networks are critical for the continuity of economic activities as well as for the people's basic living needs. Their availability is also required for fast and effective recovery after flood disasters. The severity of flood damage therefore largely depends on the degree that both high value assets and critical urban infrastructure are affected, either directly or indirectly. To face the challenge of designing indicators, a functional model of the city system (and sub systems) has to be built to analyze the system response to flood solicitation. Then, a coherent and an efficient set of vulnerability of indicators could be built up. With such methods city stakeholders will be informed on how and how much their systems are vulnerable. It is a first level of information that has to be completed to become a real decision making tool. Indeed, we have seen that major floods cause almost always failures in the flood defense system. So potentially the city could face a flood event and managers recovery works. Knowing the vulnerability of the city, direct and indirect impacts, how can managers optimize recovery actions? Our research will focus first on proposing recovery scenarios based on the city system and second on vulnerability indicators to first limit damages during floods and to speed up recovery actions. At last, a GIS will be developed to assist stakeholders to take spatial measures to reduce city system weakness before a flood event and to help them to decide on how to optimize recovery actions after a flood event. Dealing with these two temporal scales will allow obtaining more flood resilient cities.
Towards Optimal Connectivity on Multi-layered Networks.
Chen, Chen; He, Jingrui; Bliss, Nadya; Tong, Hanghang
2017-10-01
Networks are prevalent in many high impact domains. Moreover, cross-domain interactions are frequently observed in many applications, which naturally form the dependencies between different networks. Such kind of highly coupled network systems are referred to as multi-layered networks , and have been used to characterize various complex systems, including critical infrastructure networks, cyber-physical systems, collaboration platforms, biological systems and many more. Different from single-layered networks where the functionality of their nodes is mainly affected by within-layer connections, multi-layered networks are more vulnerable to disturbance as the impact can be amplified through cross-layer dependencies, leading to the cascade failure to the entire system. To manipulate the connectivity in multi-layered networks, some recent methods have been proposed based on two-layered networks with specific types of connectivity measures. In this paper, we address the above challenges in multiple dimensions. First, we propose a family of connectivity measures (SUBLINE) that unifies a wide range of classic network connectivity measures. Third, we reveal that the connectivity measures in SUBLINE family enjoy diminishing returns property , which guarantees a near-optimal solution with linear complexity for the connectivity optimization problem. Finally, we evaluate our proposed algorithm on real data sets to demonstrate its effectiveness and efficiency.
A simple model of global cascades on random networks
NASA Astrophysics Data System (ADS)
Watts, Duncan J.
2002-04-01
The origin of large but rare cascades that are triggered by small initial shocks is a phenomenon that manifests itself as diversely as cultural fads, collective action, the diffusion of norms and innovations, and cascading failures in infrastructure and organizational networks. This paper presents a possible explanation of this phenomenon in terms of a sparse, random network of interacting agents whose decisions are determined by the actions of their neighbors according to a simple threshold rule. Two regimes are identified in which the network is susceptible to very large cascadesherein called global cascadesthat occur very rarely. When cascade propagation is limited by the connectivity of the network, a power law distribution of cascade sizes is observed, analogous to the cluster size distribution in standard percolation theory and avalanches in self-organized criticality. But when the network is highly connected, cascade propagation is limited instead by the local stability of the nodes themselves, and the size distribution of cascades is bimodal, implying a more extreme kind of instability that is correspondingly harder to anticipate. In the first regime, where the distribution of network neighbors is highly skewed, it is found that the most connected nodes are far more likely than average nodes to trigger cascades, but not in the second regime. Finally, it is shown that heterogeneity plays an ambiguous role in determining a system's stability: increasingly heterogeneous thresholds make the system more vulnerable to global cascades; but an increasingly heterogeneous degree distribution makes it less vulnerable.
Design and Implementation of Website Information Disclosure Assessment System
Cho, Ying-Chiang; Pan, Jen-Yi
2015-01-01
Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people’s lives. Websites contain vast amounts of personal privacy information. In order to protect this information, network security technologies, such as database protection and data encryption, attract many researchers. The most serious problems concerning web vulnerability are e-mail address and network database leakages. These leakages have many causes. For example, malicious users can steal database contents, taking advantage of mistakes made by programmers and administrators. In order to mitigate this type of abuse, a website information disclosure assessment system is proposed in this study. This system utilizes a series of technologies, such as web crawler algorithms, SQL injection attack detection, and web vulnerability mining, to assess a website’s information disclosure. Thirty websites, randomly sampled from the top 50 world colleges, were used to collect leakage information. This testing showed the importance of increasing the security and privacy of website information for academic websites. PMID:25768434
Adolescent Maturation of Dopamine D1 and D2 Receptor Function and Interactions in Rodents
Dwyer, Jennifer B.; Leslie, Frances M.
2016-01-01
Adolescence is a developmental period characterized by heightened vulnerability to illicit drug use and the onset of neuropsychiatric disorders. These clinical phenomena likely share common neurobiological substrates, as mesocorticolimbic dopamine systems actively mature during this period. Whereas prior studies have examined age-dependent changes in dopamine receptor binding, there have been fewer functional analyses. The aim of the present study was therefore to determine whether the functional consequences of D1 and D2-like activation are age-dependent. Adolescent and adult rats were given direct D1 and D2 agonists, alone and in combination. Locomotor and stereotypic behaviors were measured, and brains were collected for analysis of mRNA expression for the immediate early genes (IEGs), cfos and arc. Adolescents showed enhanced D2-like receptor control of locomotor and repetitive behaviors, which transitioned to dominant D1-like mechanisms in adulthood. When low doses of agonists were co-administered, adults showed supra-additive behavioral responses to D1/D2 combinations, whereas adolescents did not, which may suggest age differences in D1/D2 synergy. D1/D2-stimulated IEG expression was particularly prominent in the bed nucleus of the stria terminalis (BNST). Given the BNST’s function as an integrator of corticostriatal, hippocampal, and stress-related circuitry, and the importance of neural network dynamics in producing behavior, an exploratory functional network analysis of regional IEG expression was performed. This data-driven analysis demonstrated similar developmental trajectories as those described in humans and suggested that dopaminergic drugs alter forebrain coordinated gene expression age dependently. D1/D2 recruitment of stress nuclei into functional networks was associated with low behavioral output in adolescents. Network analysis presents a novel tool to assess pharmacological action, and highlights critical developmental changes in functional neural circuitry. Immature D1/D2 interactions in adolescents may underlie their unique responses to drugs of abuse and vulnerability to psychopathology. These data highlight the need for age-specific pharmacotherapy design and clinical application in adolescence. PMID:26784516
Cascade-based attacks on complex networks
NASA Astrophysics Data System (ADS)
Motter, Adilson E.; Lai, Ying-Cheng
2002-12-01
We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.
On some recent definitions and analysis frameworks for risk, vulnerability, and resilience.
Aven, Terje
2011-04-01
Recently, considerable attention has been paid to a systems-based approach to risk, vulnerability, and resilience analysis. It is argued that risk, vulnerability, and resilience are inherently and fundamentally functions of the states of the system and its environment. Vulnerability is defined as the manifestation of the inherent states of the system that can be subjected to a natural hazard or be exploited to adversely affect that system, whereas resilience is defined as the ability of the system to withstand a major disruption within acceptable degradation parameters and to recover within an acceptable time, and composite costs, and risks. Risk, on the other hand, is probability based, defined by the probability and severity of adverse effects (i.e., the consequences). In this article, we look more closely into this approach. It is observed that the key concepts are inconsistent in the sense that the uncertainty (probability) dimension is included for the risk definition but not for vulnerability and resilience. In the article, we question the rationale for this inconsistency. The suggested approach is compared with an alternative framework that provides a logically defined structure for risk, vulnerability, and resilience, where all three concepts are incorporating the uncertainty (probability) dimension. © 2010 Society for Risk Analysis.
NASA Astrophysics Data System (ADS)
Kunz-Plapp, T.; Khazai, B.; Daniell, J. E.
2012-04-01
This paper presents a new method for modeling health impacts caused by earthquake damage which allows for integrating key social impacts on individual health and health-care systems and for implementing these impacts in quantitative systemic seismic vulnerability analysis. In current earthquake casualty estimation models, demand on health-care systems is estimated by quantifying the number of fatalities and severity of injuries based on empirical data correlating building damage with casualties. The expected number of injured people (sorted by priorities of emergency treatment) is combined together with post-earthquake reduction of functionality of health-care facilities such as hospitals to estimate the impact on healthcare systems. The aim here is to extend these models by developing a combined engineering and social science approach. Although social vulnerability is recognized as a key component for the consequences of disasters, social vulnerability as such, is seldom linked to common formal and quantitative seismic loss estimates of injured people which provide direct impact on emergency health care services. Yet, there is a consensus that factors which affect vulnerability and post-earthquake health of at-risk populations include demographic characteristics such as age, education, occupation and employment and that these factors can aggravate health impacts further. Similarly, there are different social influences on the performance of health care systems after an earthquake both on an individual as well as on an institutional level. To link social impacts of health and health-care services to a systemic seismic vulnerability analysis, a conceptual model of social impacts of earthquakes on health and the health care systems has been developed. We identified and tested appropriate social indicators for individual health impacts and for health care impacts based on literature research, using available European statistical data. The results will be used to develop a socio-physical model of systemic seismic vulnerability that enhances the further understanding of societal seismic risk by taking into account social vulnerability impacts for health and health-care system, shelter, and transportation.
Romano Foti; Jorge A. Ramirez; Thomas C. Brown
2014-01-01
We introduce a probabilistic framework for vulnerability analysis and use it to quantify current and future vulnerability of the US water supply system. We also determine the contributions of hydro-climatic and socio-economic drivers to the changes in projected vulnerability. For all scenarios and global climatemodels examined, the US Southwest including California and...
The vulnerability of the global container shipping network to targeted link disruption
NASA Astrophysics Data System (ADS)
Viljoen, Nadia M.; Joubert, Johan W.
2016-11-01
Using complex network theory to describe the relational geography of maritime networks has provided great insights regarding their hierarchy and evolution over the past two decades. Unlike applications in other transport fields, notably air transport, complex network theory has had limited application in studying the vulnerability of maritime networks. This study uses targeted link disruption to investigate the strategy specific vulnerability of the network. Although nodal infrastructure such as ports can render a network vulnerable as a result of labour strikes, trade embargoes or natural disasters, it is the shipping lines connecting the ports that are more probably disrupted, either from within the industry, or outside. In this paper, we apply and evaluate two link-based disruption strategies on the global container shipping network, one based on link betweenness, and the other on link salience, to emulate the impact of large-scale service reconfiguration affecting priority links. The results show that the network is by and large robust to such reconfiguration. Meanwhile the flexibility of the network is reduced by both strategies, but to a greater degree by betweenness, resulting in a reduction of transshipment and dynamic rerouting potential amongst the busiest port regions. The results further show that the salience strategy is highly effective in reducing the commonality of shortest path sets, thereby diminishing opportunities for freight consolidation and scale economies.
Heckle, Rosa R; Lutters, Wayne G
2011-08-01
Healthcare providers and their IT staff, working in an effort to balance appropriate accessibility with stricter security mandates, are considering the use of a single network sign-on approach for authentication and password management. Single sign-on (SSO) promises to improve usability of authentication for multiple-system users, increase compliance, and help curb system maintenance costs. However, complexities are introduced when SSO is placed within a collaborative environment. These complexities include unanticipated workflow implications that introduce greater security vulnerability for the individual user. OBJECTIVES AND METHODOLOGY: In this work, we examine the challenges of implementing a single sign-on authentication technology in a hospital environment. The aim of the study was to document the factors that affected SSO adoption within the context of use. The ultimate goal is to better inform the design of usable authentication systems within collaborative healthcare work sites. The primary data collection techniques used are ethnographically informed - observation, contextual interviews, and document review. The study included a cross-section of individuals from various departments and varying rolls. These participants were a mix of both clinical and administrative staff, as well as the Information Technology group. The field work revealed fundamental mis-matches between the technology and routine work practices that will significantly impact its effective adoption. While single sign-on was effective in the administrative offices, SSO was not a good fit for collaborative areas. The collaborative needs of the clinical staff unearthed tensions in its implementation. An analysis of the findings revealed that the workflow, activities, and physical environment of the clinical areas create increased security vulnerabilities for the individual user. The clinical users were cognizant of these vulnerabilities and this created resistance to the implementation due to a concern for privacy. From a preliminary analysis of our on-going field study at a community hospital, there appears to be a number of mismatches between the SSO vision and the realities of routine work. While we cannot conclusively say if a SSO adoption will be effective in meeting its goals in a hospital environment, we do know that it will affect the work practice and that will make the management of the SSO system problematic. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Lamkin, Joanna; Clifton, Allan; Campbell, W Keith; Miller, Joshua D
2014-04-01
Two dimensions of narcissism exist, grandiose and vulnerable, which are thought to be associated with distinctly different patterns of interpersonal behavior. Social network analysis is a way of quantifying and analyzing interpersonal interactions that may prove useful for characterizing the networks associated with these narcissism dimensions. In the current study, participants (N = 148) completed scales assessing both narcissism dimensions and a measure of the five-factor model of personality. Egocentric network information about participants' 30 closest friends and family members (i.e., "alters") was also obtained. Both narcissism dimensions were characterized by negative perceptions of the individuals who comprise one's social networks, and many of these relations were mediated by individuals' higher levels of antagonism. Grandiose narcissism also interacted with alter centrality (i.e., importance to the network) such that individuals low on grandiose narcissism were less likely to perceive central alters in a negative light and were more attuned to central alters than were individuals high on grandiose narcissism. Overall, both narcissism dimensions were associated with perceiving one's overall social environment negatively because of the high levels of antagonism that characterize both narcissism dimensions. Individuals high on grandiose narcissism, however, appear to be more insensitive to the relative importance of individuals in their social networks. PsycINFO Database Record (c) 2014 APA, all rights reserved
NASA Astrophysics Data System (ADS)
Hung, Hung-Chih; Wu, Ju-Yu; Hung, Chih-Hsuan
2017-04-01
1. Background Asia-Pacific region is one of the most vulnerable areas of the world to climate-related hazards and extremes due to rapid urbanization and over-development in hazard-prone areas. It is thus increasingly recognized that the management of land use and reduction of hazard risk are inextricably linked. This is especially critical from the perspective of integrated river basin management. A range of studies has targeted existing vulnerability assessments. However, limited attention has been paid to the cumulative effects of multiple vulnerable factors and their dynamics faced by local communities. This study proposes a novel methodology to access the changing cumulative vulnerability to climate-related hazards, and to examine the relationship between the attraction factors relevant to the general process of urbanization and vulnerability variability with a focus on a river basin management unit. 2. Methods and data The methods applied in this study include three steps. First, using Intergovernmental Panel on Climate Change's (IPCC) approach, a Cumulative Vulnerability Assessment Framework (CVAF) is built with a goal to characterize and compare the vulnerability to climate-related hazards within river basin regions based on a composition of multiple indicators. We organize these indicator metrics into three categories: (1) hazard exposure; (2) socioeconomic sensitivity, and (3) adaptive capacity. Second, the CVAF is applied by combining a geographical information system (GIS)-based spatial statistics technique with a multicriteria decision analysis (MCDA) to assess and map the changing cumulative vulnerability, comparing conditions in 1996 and 2006 in Danshui River Basin, Taiwan. Third, to examine the affecting factors of vulnerability changing, we develop a Vulnerability Changing Model (VCM) using four attraction factors to reflect how the process of urban developments leads to vulnerability changing. The factors are transport networks, land uses, production values of industries, and infrastructures. We then conduct a regression analysis to test the VCM. To illustrate the proposed methodology, the data are collected from the National Science and Technology Center for Disaster Reduction, Taiwan as well as the National Land Use Investigation and official census statistics. 3. Results and policy implications Results of CVAF analysis demonstrate heterogeneous patterns of vulnerability in the region, and highlight trends of long-term changes. The vulnerable areas unfold as clustered patterns and spatial analogues across regions, rather than randomly distributed. Highest cumulative vulnerability is concentrated in densely populated and downstream reaches (such as Taipei City) of the Danshui River in both time periods. When examining the VCM, it indicates that upper stream and more remote areas generally show low vulnerability, increases are observed in some areas between 1996 and 2006 due to land use intensification, industrial and infrastructure expansion. These findings suggest that land use planning should consider the socioeconomic progression and infrastructure investment factors that contribute to urban sprawl and address current as well as future urban developments vulnerable to hazard risk transmission. The cumulative vulnerability assessment, mapping methods and modelling presented here can be applied to other climate change and hazard risks to highlight priority areas for further investigation and contribute towards improving river basin management.
Business cycles' correlation and systemic risk of the Japanese supplier-customer network.
Krichene, Hazem; Chakraborty, Abhijit; Inoue, Hiroyasu; Fujiwara, Yoshi
2017-01-01
This work aims to study and explain the business cycle correlations of the Japanese production network. We consider the supplier-customer network, which is a directed network representing the trading links between Japanese firms (links from suppliers to customers). The community structure of this network is determined by applying the Infomap algorithm. Each community is defined by its GDP and its associated business cycle. Business cycle correlations between communities are estimated based on copula theory. Then, based on firms' attributes and network topology, these correlations are explained through linear econometric models. The results show strong evidence of business cycle correlations in the Japanese production network. A significant systemic risk is found for high negative or positive shocks. These correlations are explained mainly by the sector and by geographic similarities. Moreover, our results highlight the higher vulnerability of small communities and small firms, which is explained by the disassortative mixing of the production network.
Business cycles’ correlation and systemic risk of the Japanese supplier-customer network
Chakraborty, Abhijit; Inoue, Hiroyasu; Fujiwara, Yoshi
2017-01-01
This work aims to study and explain the business cycle correlations of the Japanese production network. We consider the supplier-customer network, which is a directed network representing the trading links between Japanese firms (links from suppliers to customers). The community structure of this network is determined by applying the Infomap algorithm. Each community is defined by its GDP and its associated business cycle. Business cycle correlations between communities are estimated based on copula theory. Then, based on firms’ attributes and network topology, these correlations are explained through linear econometric models. The results show strong evidence of business cycle correlations in the Japanese production network. A significant systemic risk is found for high negative or positive shocks. These correlations are explained mainly by the sector and by geographic similarities. Moreover, our results highlight the higher vulnerability of small communities and small firms, which is explained by the disassortative mixing of the production network. PMID:29059233
The growth of partnerships to support patient safety practice adoption.
Mendel, Peter; Damberg, Cheryl L; Sorbero, Melony E S; Varda, Danielle M; Farley, Donna O
2009-04-01
To document the numbers and types of interorganizational partnerships within the national patient safety domain, changes over time in these networks, and their potential for disseminating patient safety knowledge and practices. Self-reported information gathered from representatives of national-level organizations active in promoting patient safety. Social network analysis was used to examine the structure and composition of partnership networks and changes between 2004 and 2006. Two rounds of structured telephone interviews (n=35 organizations in 2004 and 55 in 2006). Patient safety partnerships expanded between 2004 and 2006. The average number of partnerships per interviewed organization increased 40 percent and activities per reported partnership increased over 50 percent. Partnerships increased in all activity domains, particularly dissemination and tools development. Fragmentation of the overall partnership network decreased and potential for information flow increased. Yet network centralization increased, suggesting vulnerability to partnership failure if key participants disengage. Growth in partnerships signifies growing strength in the capacity to disseminate and implement patient safety advancements in the U.S. health care system. The centrality of AHRQ in these networks of partnerships bodes well for its leadership role in disseminating information, tools, and practices generated by patient safety research projects.
Vulnerability of dynamic genetic conservation units of forest trees in Europe to climate change.
Schueler, Silvio; Falk, Wolfgang; Koskela, Jarkko; Lefèvre, François; Bozzano, Michele; Hubert, Jason; Kraigher, Hojka; Longauer, Roman; Olrik, Ditte C
2014-05-01
A transnational network of genetic conservation units for forest trees was recently documented in Europe aiming at the conservation of evolutionary processes and the adaptive potential of natural or man-made tree populations. In this study, we quantified the vulnerability of individual conservation units and the whole network to climate change using climate favourability models and the estimated velocity of climate change. Compared to the overall climate niche of the analysed target species populations at the warm and dry end of the species niche are underrepresented in the network. However, by 2100, target species in 33-65 % of conservation units, mostly located in southern Europe, will be at the limit or outside the species' current climatic niche as demonstrated by favourabilities below required model sensitivities of 95%. The highest average decrease in favourabilities throughout the network can be expected for coniferous trees although they are mainly occurring within units in mountainous landscapes for which we estimated lower velocities of change. Generally, the species-specific estimates of favourabilities showed only low correlations to the velocity of climate change in individual units, indicating that both vulnerability measures should be considered for climate risk analysis. The variation in favourabilities among target species within the same conservation units is expected to increase with climate change and will likely require a prioritization among co-occurring species. The present results suggest that there is a strong need to intensify monitoring efforts and to develop additional conservation measures for populations in the most vulnerable units. Also, our results call for continued transnational actions for genetic conservation of European forest trees, including the establishment of dynamic conservation populations outside the current species distribution ranges within European assisted migration schemes. © 2013 John Wiley & Sons Ltd.
Development of a decision support tool for assessing vulnerability of transportation networks.
DOT National Transportation Integrated Search
2010-08-01
This research develops a decision support tool for assessing vulnerability of transportation networks. This report consists of 1) describing the trends of freight movements in Utah, 2) identifying the current and potential freight chokepoints/bottlen...
Diao, K; Farmani, R; Fu, G; Astaraie-Imani, M; Ward, S; Butler, D
2014-01-01
Large water distribution systems (WDSs) are networks with both topological and behavioural complexity. Thereby, it is usually difficult to identify the key features of the properties of the system, and subsequently all the critical components within the system for a given purpose of design or control. One way is, however, to more explicitly visualize the network structure and interactions between components by dividing a WDS into a number of clusters (subsystems). Accordingly, this paper introduces a clustering strategy that decomposes WDSs into clusters with stronger internal connections than external connections. The detected cluster layout is very similar to the community structure of the served urban area. As WDSs may expand along with urban development in a community-by-community manner, the correspondingly formed distribution clusters may reveal some crucial configurations of WDSs. For verification, the method is applied to identify all the critical links during firefighting for the vulnerability analysis of a real-world WDS. Moreover, both the most critical pipes and clusters are addressed, given the consequences of pipe failure. Compared with the enumeration method, the method used in this study identifies the same group of the most critical components, and provides similar criticality prioritizations of them in a more computationally efficient time.
McTeague, Lisa M; Huemer, Julia; Carreon, David M; Jiang, Ying; Eickhoff, Simon B; Etkin, Amit
2017-07-01
Cognitive deficits are a common feature of psychiatric disorders. The authors investigated the nature of disruptions in neural circuitry underlying cognitive control capacities across psychiatric disorders through a transdiagnostic neuroimaging meta-analysis. A PubMed search was conducted for whole-brain functional neuroimaging articles published through June 2015 that compared activation in patients with axis I disorders and matched healthy control participants during cognitive control tasks. Tasks that probed performance or conflict monitoring, response inhibition or selection, set shifting, verbal fluency, and recognition or working memory were included. Activation likelihood estimation meta-analyses were conducted on peak voxel coordinates. The 283 experiments submitted to meta-analysis included 5,728 control participants and 5,493 patients with various disorders (schizophrenia, bipolar or unipolar depression, anxiety disorders, and substance use disorders). Transdiagnostically abnormal activation was evident in the left prefrontal cortex as well as the anterior insula, the right ventrolateral prefrontal cortex, the right intraparietal sulcus, and the midcingulate/presupplementary motor area. Disruption was also observed in a more anterior cluster in the dorsal cingulate cortex, which overlapped with a network of structural perturbation that the authors previously reported in a transdiagnostic meta-analysis of gray matter volume. These findings demonstrate a common pattern of disruption across major psychiatric disorders that parallels the "multiple-demand network" observed in intact cognition. This network interfaces with the anterior-cingulo-insular or "salience network" demonstrated to be transdiagnostically vulnerable to gray matter reduction. Thus, networks intrinsic to adaptive, flexible cognition are vulnerable to broad-spectrum psychopathology. Dysfunction in these networks may reflect an intermediate transdiagnostic phenotype, which could be leveraged to advance therapeutics.
Propato, Marco; Uber, James G
2004-07-01
Can the spread of infectious disease through water distribution systems be halted by a disinfectant residual? This question is overdue for an answer. Regulatory agencies and water utilities have long been concerned about accidental intrusions of pathogens into distribution system pipelines (i.e., cross-connections) and are increasingly concerned about deliberate pathogen contamination. Here, a simulation framework is developed and used to assess the vulnerability of a water system to microbiological contamination. The risk of delivering contaminated water to consumers is quantified by a network water quality model that includes disinfectant decay and disinfection kinetics. The framework is applied to two example networks under a worst-case deliberate intrusion scenario. Results show that the risk of consumer exposure is affected by the residual maintenance strategy employed. The common regulation that demands a "detectable" disinfectant residual may not provide effective consumer protection against microbial contamination. A chloramine residual, instead of free chlorine, may significantly weaken this final barrier against pathogen intrusions. Moreover, the addition of a booster station at storage tanks may improve consumer protection without requiring excessive disinfectant.
Illustrating the coupled human-environment system for vulnerability analysis: three case studies.
Turner, B L; Matson, Pamela A; McCarthy, James J; Corell, Robert W; Christensen, Lindsey; Eckley, Noelle; Hovelsrud-Broda, Grete K; Kasperson, Jeanne X; Kasperson, Roger E; Luers, Amy; Martello, Marybeth L; Mathiesen, Svein; Naylor, Rosamond; Polsky, Colin; Pulsipher, Alexander; Schiller, Andrew; Selin, Henrik; Tyler, Nicholas
2003-07-08
The vulnerability framework of the Research and Assessment Systems for Sustainability Program explicitly recognizes the coupled human-environment system and accounts for interactions in the coupling affecting the system's responses to hazards and its vulnerability. This paper illustrates the usefulness of the vulnerability framework through three case studies: the tropical southern Yucatán, the arid Yaqui Valley of northwest Mexico, and the pan-Arctic. Together, these examples illustrate the role of external forces in reshaping the systems in question and their vulnerability to environmental hazards, as well as the different capacities of stakeholders, based on their access to social and biophysical capital, to respond to the changes and hazards. The framework proves useful in directing attention to the interacting parts of the coupled system and helps identify gaps in information and understanding relevant to reducing vulnerability in the systems as a whole.
Ceschin, Rafael; Lee, Vince K; Schmithorst, Vince; Panigrahy, Ashok
2015-01-01
Preterm born children with spastic diplegia type of cerebral palsy and white matter injury or periventricular leukomalacia (PVL), are known to have motor, visual and cognitive impairments. Most diffusion tensor imaging (DTI) studies performed in this group have demonstrated widespread abnormalities using averaged deterministic tractography and voxel-based DTI measurements. Little is known about structural network correlates of white matter topography and reorganization in preterm cerebral palsy, despite the availability of new therapies and the need for brain imaging biomarkers. Here, we combined novel post-processing methodology of probabilistic tractography data in this preterm cohort to improve spatial and regional delineation of longitudinal cortical association tract abnormalities using an along-tract approach, and compared these data to structural DTI cortical network topology analysis. DTI images were acquired on 16 preterm children with cerebral palsy (mean age 5.6 ± 4) and 75 healthy controls (mean age 5.7 ± 3.4). Despite mean tract analysis, Tract-Based Spatial Statistics (TBSS) and voxel-based morphometry (VBM) demonstrating diffusely reduced fractional anisotropy (FA) reduction in all white matter tracts, the along-tract analysis improved the detection of regional tract vulnerability. The along-tract map-structural network topology correlates revealed two associations: (1) reduced regional posterior-anterior gradient in FA of the longitudinal visual cortical association tracts (inferior fronto-occipital fasciculus, inferior longitudinal fasciculus, optic radiation, posterior thalamic radiation) correlated with reduced posterior-anterior gradient of intra-regional (nodal efficiency) metrics with relative sparing of frontal and temporal regions; and (2) reduced regional FA within frontal-thalamic-striatal white matter pathways (anterior limb/anterior thalamic radiation, superior longitudinal fasciculus and cortical spinal tract) correlated with alteration in eigenvector centrality, clustering coefficient (inter-regional) and participation co-efficient (inter-modular) alterations of frontal-striatal and fronto-limbic nodes suggesting re-organization of these pathways. Both along tract and structural topology network measurements correlated strongly with motor and visual clinical outcome scores. This study shows the value of combining along-tract analysis and structural network topology in depicting not only selective parietal occipital regional vulnerability but also reorganization of frontal-striatal and frontal-limbic pathways in preterm children with cerebral palsy. These finding also support the concept that widespread, but selective posterior-anterior neural network connectivity alterations in preterm children with cerebral palsy likely contribute to the pathogenesis of neurosensory and cognitive impairment in this group.
2018-01-01
An agent-based computer model that builds representative regional U.S. hog production networks was developed and employed to assess the potential impact of the ongoing trend towards increased producer specialization upon network-level resilience to catastrophic disease outbreaks. Empirical analyses suggest that the spatial distribution and connectivity patterns of contact networks often predict epidemic spreading dynamics. Our model heuristically generates realistic systems composed of hog producer, feed mill, and slaughter plant agents. Network edges are added during each run as agents exchange livestock and feed. The heuristics governing agents’ contact patterns account for factors including their industry roles, physical proximities, and the age of their livestock. In each run, an infection is introduced, and may spread according to probabilities associated with the various modes of contact. For each of three treatments—defined by one-phase, two-phase, and three-phase production systems—a parameter variation experiment examines the impact of the spatial density of producer agents in the system upon the length and size of disease outbreaks. Resulting data show phase transitions whereby, above some density threshold, systemic outbreaks become possible, echoing findings from percolation theory. Data analysis reveals that multi-phase production systems are vulnerable to catastrophic outbreaks at lower spatial densities, have more abrupt percolation transitions, and are characterized by less-predictable outbreak scales and durations. Key differences in network-level metrics shed light on these results, suggesting that the absence of potentially-bridging producer–producer edges may be largely responsible for the superior disease resilience of single-phase “farrow to finish” production systems. PMID:29522574
Contagion on complex networks with persuasion
NASA Astrophysics Data System (ADS)
Huang, Wei-Min; Zhang, Li-Jie; Xu, Xin-Jian; Fu, Xinchu
2016-03-01
The threshold model has been widely adopted as a classic model for studying contagion processes on social networks. We consider asymmetric individual interactions in social networks and introduce a persuasion mechanism into the threshold model. Specifically, we study a combination of adoption and persuasion in cascading processes on complex networks. It is found that with the introduction of the persuasion mechanism, the system may become more vulnerable to global cascades, and the effects of persuasion tend to be more significant in heterogeneous networks than those in homogeneous networks: a comparison between heterogeneous and homogeneous networks shows that under weak persuasion, heterogeneous networks tend to be more robust against random shocks than homogeneous networks; whereas under strong persuasion, homogeneous networks are more stable. Finally, we study the effects of adoption and persuasion threshold heterogeneity on systemic stability. Though both heterogeneities give rise to global cascades, the adoption heterogeneity has an overwhelmingly stronger impact than the persuasion heterogeneity when the network connectivity is sufficiently dense.
Contagion on complex networks with persuasion
Huang, Wei-Min; Zhang, Li-Jie; Xu, Xin-Jian; Fu, Xinchu
2016-01-01
The threshold model has been widely adopted as a classic model for studying contagion processes on social networks. We consider asymmetric individual interactions in social networks and introduce a persuasion mechanism into the threshold model. Specifically, we study a combination of adoption and persuasion in cascading processes on complex networks. It is found that with the introduction of the persuasion mechanism, the system may become more vulnerable to global cascades, and the effects of persuasion tend to be more significant in heterogeneous networks than those in homogeneous networks: a comparison between heterogeneous and homogeneous networks shows that under weak persuasion, heterogeneous networks tend to be more robust against random shocks than homogeneous networks; whereas under strong persuasion, homogeneous networks are more stable. Finally, we study the effects of adoption and persuasion threshold heterogeneity on systemic stability. Though both heterogeneities give rise to global cascades, the adoption heterogeneity has an overwhelmingly stronger impact than the persuasion heterogeneity when the network connectivity is sufficiently dense. PMID:27029498
Contagion on complex networks with persuasion.
Huang, Wei-Min; Zhang, Li-Jie; Xu, Xin-Jian; Fu, Xinchu
2016-03-31
The threshold model has been widely adopted as a classic model for studying contagion processes on social networks. We consider asymmetric individual interactions in social networks and introduce a persuasion mechanism into the threshold model. Specifically, we study a combination of adoption and persuasion in cascading processes on complex networks. It is found that with the introduction of the persuasion mechanism, the system may become more vulnerable to global cascades, and the effects of persuasion tend to be more significant in heterogeneous networks than those in homogeneous networks: a comparison between heterogeneous and homogeneous networks shows that under weak persuasion, heterogeneous networks tend to be more robust against random shocks than homogeneous networks; whereas under strong persuasion, homogeneous networks are more stable. Finally, we study the effects of adoption and persuasion threshold heterogeneity on systemic stability. Though both heterogeneities give rise to global cascades, the adoption heterogeneity has an overwhelmingly stronger impact than the persuasion heterogeneity when the network connectivity is sufficiently dense.
SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gordon Rueff; Lyle Roybal; Denis Vollmer
2013-01-01
There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on howmore » to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.« less
Using software security analysis to verify the secure socket layer (SSL) protocol
NASA Technical Reports Server (NTRS)
Powell, John D.
2004-01-01
nal Aeronautics and Space Administration (NASA) have tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information the3, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach '' offers, among its capabilities, formal verification of software security properties, through the use of model based verification (MBV) to address software security risks. [1,2,3,4,5,6] MBV is a formal approach to software assurance that combines analysis of software, via abstract models, with technology, such as model checkers, that provide automation of the mechanical portions of the analysis process. This paper will discuss: The need for formal analysis to assure software systems with respect to software and why testing alone cannot provide it. The means by which MBV with a Flexible Modeling Framework (FMF) accomplishes the necessary analysis task. An example of FMF style MBV in the verification of properties over the Secure Socket Layer (SSL) communication protocol as a demonstration.
Vulnerability of a killer whale social network to disease outbreaks
NASA Astrophysics Data System (ADS)
Guimarães, Paulo R., Jr.; de Menezes, Márcio Argollo; Baird, Robin W.; Lusseau, David; Guimarães, Paulo; Dos Reis, Sérgio F.
2007-10-01
Emerging infectious diseases are among the main threats to conservation of biological diversity. A crucial task facing epidemiologists is to predict the vulnerability of populations of endangered animals to disease outbreaks. In this context, the network structure of social interactions within animal populations may affect disease spreading. However, endangered animal populations are often small and to investigate the dynamics of small networks is a difficult task. Using network theory, we show that the social structure of an endangered population of mammal-eating killer whales is vulnerable to disease outbreaks. This feature was found to be a consequence of the combined effects of the topology and strength of social links among individuals. Our results uncover a serious challenge for conservation of the species and its ecosystem. In addition, this study shows that the network approach can be useful to study dynamical processes in very small networks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weerakkody, Sean; Liu, Xiaofei; Sinopoli, Bruno
We consider the design and analysis of robust distributed control systems (DCSs) to ensure the detection of integrity attacks. DCSs are often managed by independent agents and are implemented using a diverse set of sensors and controllers. However, the heterogeneous nature of DCSs along with their scale leave such systems vulnerable to adversarial behavior. To mitigate this reality, we provide tools that allow operators to prevent zero dynamics attacks when as many as p agents and sensors are corrupted. Such a design ensures attack detectability in deterministic systems while removing the threat of a class of stealthy attacks in stochasticmore » systems. To achieve this goal, we use graph theory to obtain necessary and sufficient conditions for the presence of zero dynamics attacks in terms of the structural interactions between agents and sensors. We then formulate and solve optimization problems which minimize communication networks while also ensuring a resource limited adversary cannot perform a zero dynamics attacks. Polynomial time algorithms for design and analysis are provided.« less
Multiobjective analysis of a public wellfield using artificial neural networks
Coppola, E.A.; Szidarovszky, F.; Davis, D.; Spayd, S.; Poulton, M.M.; Roman, E.
2007-01-01
As competition for increasingly scarce ground water resources grows, many decision makers may come to rely upon rigorous multiobjective techniques to help identify appropriate and defensible policies, particularly when disparate stakeholder groups are involved. In this study, decision analysis was conducted on a public water supply wellfield to balance water supply needs with well vulnerability to contamination from a nearby ground water contaminant plume. With few alternative water sources, decision makers must balance the conflicting objectives of maximizing water supply volume from noncontaminated wells while minimizing their vulnerability to contamination from the plume. Artificial neural networks (ANNs) were developed with simulation data from a numerical ground water flow model developed for the study area. The ANN-derived state transition equations were embedded into a multiobjective optimization model, from which the Pareto frontier or trade-off curve between water supply and wellfield vulnerability was identified. Relative preference values and power factors were assigned to the three stakeholders, namely the company whose waste contaminated the aquifer, the community supplied by the wells, and the water utility company that owns and operates the wells. A compromise pumping policy that effectively balances the two conflicting objectives in accordance with the preferences of the three stakeholder groups was then identified using various distance-based methods. ?? 2006 National Ground Water Association.
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-11
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.
Network Security Risk Assessment System Based on Attack Graph and Markov Chain
NASA Astrophysics Data System (ADS)
Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian
2017-10-01
Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.
Zhang, Yang; Shen, Jing; Li, Yu
2018-01-01
Assessing and quantifying atmospheric vulnerability is a key issue in urban environmental protection and management. This paper integrated the Analytical hierarchy process (AHP), fuzzy synthesis evaluation and Geographic Information System (GIS) spatial analysis into an Exposure-Sensitivity-Adaptive capacity (ESA) framework to quantitatively assess atmospheric environment vulnerability in the Beijing-Tianjin-Hebei (BTH) region with spatial and temporal comparisons. The elaboration of the relationships between atmospheric environment vulnerability and indices of exposure, sensitivity, and adaptive capacity supports enable analysis of the atmospheric environment vulnerability. Our findings indicate that the atmospheric environment vulnerability of 13 cities in the BTH region exhibits obvious spatial heterogeneity, which is caused by regional diversity in exposure, sensitivity, and adaptive capacity indices. The results of atmospheric environment vulnerability assessment and the cause analysis can provide guidance to pick out key control regions and recognize vulnerable indicators for study sites. The framework developed in this paper can also be replicated at different spatial and temporal scales using context-specific datasets to support environmental management. PMID:29342852
Zhang, Yang; Shen, Jing; Li, Yu
2018-01-13
Assessing and quantifying atmospheric vulnerability is a key issue in urban environmental protection and management. This paper integrated the Analytical hierarchy process (AHP), fuzzy synthesis evaluation and Geographic Information System (GIS) spatial analysis into an Exposure-Sensitivity-Adaptive capacity (ESA) framework to quantitatively assess atmospheric environment vulnerability in the Beijing-Tianjin-Hebei (BTH) region with spatial and temporal comparisons. The elaboration of the relationships between atmospheric environment vulnerability and indices of exposure, sensitivity, and adaptive capacity supports enable analysis of the atmospheric environment vulnerability. Our findings indicate that the atmospheric environment vulnerability of 13 cities in the BTH region exhibits obvious spatial heterogeneity, which is caused by regional diversity in exposure, sensitivity, and adaptive capacity indices. The results of atmospheric environment vulnerability assessment and the cause analysis can provide guidance to pick out key control regions and recognize vulnerable indicators for study sites. The framework developed in this paper can also be replicated at different spatial and temporal scales using context-specific datasets to support environmental management.
Identifying typical patterns of vulnerability: A 5-step approach based on cluster analysis
NASA Astrophysics Data System (ADS)
Sietz, Diana; Lüdeke, Matthias; Kok, Marcel; Lucas, Paul; Carsten, Walther; Janssen, Peter
2013-04-01
Specific processes that shape the vulnerability of socio-ecological systems to climate, market and other stresses derive from diverse background conditions. Within the multitude of vulnerability-creating mechanisms, distinct processes recur in various regions inspiring research on typical patterns of vulnerability. The vulnerability patterns display typical combinations of the natural and socio-economic properties that shape a systems' vulnerability to particular stresses. Based on the identification of a limited number of vulnerability patterns, pattern analysis provides an efficient approach to improving our understanding of vulnerability and decision-making for vulnerability reduction. However, current pattern analyses often miss explicit descriptions of their methods and pay insufficient attention to the validity of their groupings. Therefore, the question arises as to how do we identify typical vulnerability patterns in order to enhance our understanding of a systems' vulnerability to stresses? A cluster-based pattern recognition applied at global and local levels is scrutinised with a focus on an applicable methodology and practicable insights. Taking the example of drylands, this presentation demonstrates the conditions necessary to identify typical vulnerability patterns. They are summarised in five methodological steps comprising the elicitation of relevant cause-effect hypotheses and the quantitative indication of mechanisms as well as an evaluation of robustness, a validation and a ranking of the identified patterns. Reflecting scale-dependent opportunities, a global study is able to support decision-making with insights into the up-scaling of interventions when available funds are limited. In contrast, local investigations encourage an outcome-based validation. This constitutes a crucial step in establishing the credibility of the patterns and hence their suitability for informing extension services and individual decisions. In this respect, working at the local level provides a clear advantage since, to a large extent, limitations in globally available observational data constrain such a validation on the global scale. Overall, the five steps are outlined in detail in order to facilitate and motivate the application of pattern recognition in other research studies concerned with vulnerability analysis, including future applications to different vulnerability frameworks. Such applications could promote the refinement of mechanisms in specific contexts and advance methodological adjustments. This would further increase the value of identifying typical patterns in the properties of socio-ecological systems for an improved understanding and management of the relation between these systems and particular stresses.
NASA Technical Reports Server (NTRS)
Branch, Drew Alexander
2014-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to communication among the military branches legionnaires. With advanced persistent threats (APTs) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated, patched and secured state in a launch control system environment. Attacks on critical systems are becoming more and more relevant and frequent. Nation states are hacking into critical networks that might control electrical power grids or water dams as well as carrying out advanced persistent threat (APTs) attacks on government entities. NASA, as an organization, must protect its self from attacks from all different types of attackers with different motives. Although the International Space Station was created, there is still competition between the different space programs. With that in mind, NASA might get attacked and breached for various reasons such as espionage or sabotage. My project will provide a way for NASA to complete an in house penetration test which includes: asset discovery, vulnerability scans, exploit vulnerabilities and also provide forensic information to harden systems. Completing penetration testing is a part of the compliance requirements of the Federal Information Security Act (FISMA) and NASA NPR 2810.1 and related NASA Handbooks. This project is to demonstrate how in house penetration testing can be conducted that will satisfy all of the compliance requirements of the National Institute of Standards and Technology (NIST), as outlined in FISMA. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.
Assessing node risk and vulnerability in epidemics on networks
NASA Astrophysics Data System (ADS)
Rogers, T.
2015-01-01
Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.
Reshadat, S; Saedi, S; Zangeneh, A; Ghasemi, S R; Gilan, N R; Karbasi, A; Bavandpoor, E
2015-09-08
Geographic information systems (GIS) analysis has not been widely used in underdeveloped countries to ensure that vulnerable populations have accessibility to primary health-care services. This study applied GIS methods to analyse the spatial accessibility to urban primary-care centres of the population in Kermanshah city, Islamic Republic of Iran, by age and sex groups. In a descriptive-analytical study over 3 time periods, network analysis, mean centre and standard distance methods were applied using ArcGIS 9.3. The analysis was based on a standard radius of 750 m distance from health centres, walking speed of 1 m/s and desired access time to health centres of 12.5 mins. The proportion of the population with inadequate geographical access to health centres rose from 47.3% in 1997 to 58.4% in 2012. The mean centre and standard distance mapping showed that the spatial distribution of health centres in Kermanshah needed to be adjusted to changes in population distribution.
Damage and Loss Estimation for Natural Gas Networks: The Case of Istanbul
NASA Astrophysics Data System (ADS)
Çaktı, Eser; Hancılar, Ufuk; Şeşetyan, Karin; Bıyıkoǧlu, Hikmet; Şafak, Erdal
2017-04-01
Natural gas networks are one of the major lifeline systems to support human, urban and industrial activities. The continuity of gas supply is critical for almost all functions of modern life. Under natural phenomena such as earthquakes and landslides the damages to the system elements may lead to explosions and fires compromising human life and damaging physical environment. Furthermore, the disruption in the gas supply puts human activities at risk and also results in economical losses. This study is concerned with the performance of one of the largest natural gas distribution systems in the world. Physical damages to Istanbul's natural gas network are estimated under the most recent probabilistic earthquake hazard models available, as well as under simulated ground motions from physics based models. Several vulnerability functions are used in modelling damages to system elements. A first-order assessment of monetary losses to Istanbul's natural gas distribution network is also attempted.
Intelligent systems for strategic power infrastructure defense
NASA Astrophysics Data System (ADS)
Jung, Ju-Hwan
A fault or disturbance in a power system can be severe due to the sources of vulnerability such as human errors, protection and control system failures, a failure of communication networks to deliver critical control signals, and market and load uncertainties. There have been several catastrophic failures resulting from disturbances involving the sources of vulnerability while power systems are designed to withstand disturbances or faults. To avoid catastrophic failures or minimize the impact of a disturbance(s), the state of the power system has to be analyzed correctly and preventive or corrective self-healing control actions have to be deployed. This dissertation addresses two aspects of power systems: Defense system and diagnosis, both concerned with the power system analysis and operation during events involving faults or disturbances. This study is intended to develop a defense system that is able to assess power system vulnerability and to perform self-healing control actions based on the system-wide analysis. In order to meet the requirements of the system-wide analysis, the defense system is designed with multi-agent system technologies. Since power systems are dynamic and uncertain the self-healing control actions need to be adaptive. This study applies the reinforcement learning technique to provide a theoretical basis for adaptation. One of the important issues in adaptation is the convergence of the learning algorithm. An appropriate convergence criterion is derived and an application with a load-shedding scheme is demonstrated in this study. This dissertation also demonstrates the feasibility of the defense system and self-healing control actions through multi-agent system technologies. The other subject of this research is to investigate the methodology for on-line fault diagnosis using the information from Sequence-of-Events Recorders (SER). The proposed multiple-hypothesis analysis generates one or more hypothetical fault scenarios to interpret the SER information. In order to avoid ambiguity of the hypotheses, this study proposes a new method to determine the credibility of each hypothesis. Even if there is not enough SER information, the proposed method is able to perform an accurate fault and malfunction analysis. To avoid exhaustive testing, a minimal set of test scenarios is derived, which is able to handle missing information and SERs. During extreme contingencies or cascading events, fault diagnosis is the first step in the operation of the power system. On-line fault diagnosis provides necessary and correct information for the defense system to make correct and efficient decisions on self-healing control actions. It has been shown in previous studies that incorrect fault diagnosis can lead to catastrophic failures in power systems. Fault diagnosis is an important issue for strategic power infrastructure defense.
Linking Research to Practice: FEWS NET and Its Use of Satellite Remote Sensing Data
NASA Technical Reports Server (NTRS)
Brown, Molly E.; Brickley, Elizabeth B.
2011-01-01
The purpose of the Famine Early Warning Systems Network (FEWS NET) is to collaborate with international, regional and national partners to provide timely and rigorous early warning and vulnerability information on emerging and evolving food security issues
Bayou Corne sinkhole : control measurements of State Highway 70 in Assumption Parish, Louisiana.
DOT National Transportation Integrated Search
2014-01-01
This project measured and assessed the surface stability of the portion of LA Highway 70 that is : potentially vulnerable to the Assumption Parish sinkhole. Using Global Positioning Systems (GPS) : enhanced by a real-time network (RTN) of continuousl...
Cybersecurity and Optimization in Smart “Autonomous” Buildings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mylrea, Michael E.; Gourisetti, Sri Nikhil Gup
Significant resources have been invested in making buildings “smart” by digitizing, networking and automating key systems and operations. Smart autonomous buildings create new energy efficiency, economic and environmental opportunities. But as buildings become increasingly networked to the Internet, they can also become more vulnerable to various cyber threats. Automated and Internet-connected buildings systems, equipment, controls, and sensors can significantly increase cyber and physical vulnerabilities that threaten the confidentiality, integrity, and availability of critical systems in organizations. Securing smart autonomous buildings presents a national security and economic challenge to the nation. Ignoring this challenge threatens business continuity and the availability ofmore » critical infrastructures that are enabled by smart buildings. In this chapter, the authors address challenges and explore new opportunities in securing smart buildings that are enhanced by machine learning, cognitive sensing, artificial intelligence (AI) and smart-energy technologies. The chapter begins by identifying cyber-threats and challenges to smart autonomous buildings. Then it provides recommendations on how AI enabled solutions can help smart buildings and facilities better protect, detect and respond to cyber-physical threats and vulnerabilities. Next, the chapter will provide case studies that examine how combining AI with innovative smart-energy technologies can increase both cybersecurity and energy efficiency savings in buildings. The chapter will conclude by proposing recommendations for future cybersecurity and energy optimization research for examining AI enabled smart-energy technology.« less
NASA Astrophysics Data System (ADS)
Li, C.-H.; Li, N.; Wu, L.-C.; Hu, A.-J.
2013-07-01
The vulnerability to flood disaster is addressed by a number of studies. It is of great importance to analyze the vulnerability of different regions and various periods to enable the government to make policies for distributing relief funds and help the regions to improve their capabilities against disasters, yet a recognized paradigm for such studies seems missing. Vulnerability is defined and evaluated through either physical or economic-ecological perspectives depending on the field of the researcher concerned. The vulnerability, however, is the core of both systems as it entails systematic descriptions of flood severities or disaster management units. The research mentioned often has a development perspective, and in this article we decompose the overall flood system into several factors: disaster driver, disaster environment, disaster bearer, and disaster intensity, and take the interaction mechanism among all factors as an indispensable function. The conditions of flood disaster components are demonstrated with disaster driver risk level, disaster environment stability level and disaster bearer sensitivity, respectively. The flood system vulnerability is expressed as vulnerability = f(risk, stability, sensitivity). Based on the theory, data envelopment analysis method (DEA) is used to detail the relative vulnerability's spatiotemporal variation of a flood disaster system and its components in the Dongting Lake region. The study finds that although a flood disaster system's relative vulnerability is closely associated with its components' conditions, the flood system and its components have a different vulnerability level. The overall vulnerability is not the aggregation of its components' vulnerability. On a spatial scale, zones central and adjacent to Dongting Lake and/or river zones are characterized with very high vulnerability. Zones with low and very low vulnerability are mainly distributed in the periphery of the Dongting Lake region. On a temporal scale, the occurrence of a vibrating flood vulnerability trend is observed. A different picture is displayed with the disaster driver risk level, disaster environment stability level and disaster bearer sensitivity level. The flood relative vulnerability estimation method based on DEA is characteristic of good comparability, which takes the relative efficiency of disaster system input-output into account, and portrays a very diverse but consistent picture with varying time steps. Therefore, among different spatial and time domains, we could compare the disaster situations with what was reflected by the same disaster. Additionally, the method overcomes the subjectivity of a comprehensive flood index caused by using an a priori weighting system, which exists in disaster vulnerability estimation of current disasters.
Perturbation of the mutated EGFR interactome identifies vulnerabilities and resistance mechanisms.
Li, Jiannong; Bennett, Keiryn; Stukalov, Alexey; Fang, Bin; Zhang, Guolin; Yoshida, Takeshi; Okamoto, Isamu; Kim, Jae-Young; Song, Lanxi; Bai, Yun; Qian, Xiaoning; Rawal, Bhupendra; Schell, Michael; Grebien, Florian; Winter, Georg; Rix, Uwe; Eschrich, Steven; Colinge, Jacques; Koomen, John; Superti-Furga, Giulio; Haura, Eric B
2013-11-05
We hypothesized that elucidating the interactome of epidermal growth factor receptor (EGFR) forms that are mutated in lung cancer, via global analysis of protein-protein interactions, phosphorylation, and systematically perturbing the ensuing network nodes, should offer a new, more systems-level perspective of the molecular etiology. Here, we describe an EGFR interactome of 263 proteins and offer a 14-protein core network critical to the viability of multiple EGFR-mutated lung cancer cells. Cells with acquired resistance to EGFR tyrosine kinase inhibitors (TKIs) had differential dependence of the core network proteins based on the underlying molecular mechanisms of resistance. Of the 14 proteins, 9 are shown to be specifically associated with survival of EGFR-mutated lung cancer cell lines. This included EGFR, GRB2, MK12, SHC1, ARAF, CD11B, ARHG5, GLU2B, and CD11A. With the use of a drug network associated with the core network proteins, we identified two compounds, midostaurin and lestaurtinib, that could overcome drug resistance through direct EGFR inhibition when combined with erlotinib. Our results, enabled by interactome mapping, suggest new targets and combination therapies that could circumvent EGFR TKI resistance.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.
An effective method for detecting computer misuse is the automatic monitoring and analysis of on-line user activity. This activity is reflected in the system audit record, in the system vulnerability posture, and in other evidence found through active testing of the system. During the last several years we have implemented an automatic misuse detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter (NADIR). We are currently expanding NADIR to include processing of the Cray UNICOS operating system. This new component is called the UNICOS Realtime NADIR, or UNICORN. UNICORN summarizes user activity and system configurationmore » in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. The first phase of UNICORN development is nearing completion, and will be operational in late 1994.« less
Vulnerability of network of networks
NASA Astrophysics Data System (ADS)
Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.
2014-10-01
Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.
NASA Astrophysics Data System (ADS)
Masure, P.
2003-04-01
The GEMITIS method has been implemented since 1995 into a global and integrated Risk Reduction Strategy for improving the seismic risk-assessment effectiveness in urban areas, including the generation of crisis scenarios and mid- to long term- seismic impact assessment. GEMITIS required us to provide more precise definitions of notions in common use by natural-hazard specialists, such as elements at risk and vulnerability. Until then, only the physical and human elements had been considered, and analysis of their vulnerability referred to their fragility in the face of aggression by nature. We have completed this approach by also characterizing the social and cultural vulnerability of a city and its inhabitants, and, with a wider scope, the functional vulnerability of the "urban system". This functional vulnerability depends upon the relations between the system elements (weak links in chains, functional relays, and defense systems) and upon the city's relations with the outside world (interdependence). Though well developed in methods for evaluating industrial risk (fault-tree analysis, event-tree analysis, multiple defense barriers, etc.), this aspect had until now been ignored by the "hard-science" specialists working on natural hazards. Based on the implementation of an Urban System Exposure methodology, we were able to identify specific human, institutional, or functional vulnerability factors for each urban system, which until had been very little discussed by risk-analysis and civil-protection specialists. In addition, we have defined the new concept of "main stakes" of the urban system, ranked by order of social value (or collective utility). Obviously, vital or strategic issues must be better resistant or protected against natural hazards than issues of secondary importance. The ranking of exposed elements of a city in terms of "main stakes" provides a very useful guide for adapting vulnerability studies and for orienting preventive actions. For this, GEMITIS is based on a systemic approach of the city and on value analysis of exposed elements. It facilitates a collective expertise for the definition of a preventive action plan based on the participation of the main urban actors (crisis preparedness, construction, land-use, etc.).
Making Supply Chains Resilient to Floods Using a Bayesian Network
NASA Astrophysics Data System (ADS)
Haraguchi, M.
2015-12-01
Natural hazards distress the global economy by disrupting the interconnected supply chain networks. Manufacturing companies have created cost-efficient supply chains by reducing inventories, streamlining logistics and limiting the number of suppliers. As a result, today's supply chains are profoundly susceptible to systemic risks. In Thailand, for example, the GDP growth rate declined by 76 % in 2011 due to prolonged flooding. Thailand incurred economic damage including the loss of USD 46.5 billion, approximately 70% of which was caused by major supply chain disruptions in the manufacturing sector. Similar problems occurred after the Great East Japan Earthquake and Tsunami in 2011, the Mississippi River floods and droughts during 2011 - 2013, and Hurricane Sandy in 2012. This study proposes a methodology for modeling supply chain disruptions using a Bayesian network analysis (BNA) to estimate expected values of countermeasures of floods, such as inventory management, supplier management and hard infrastructure management. We first performed a spatio-temporal correlation analysis between floods and extreme precipitation data for the last 100 years at a global scale. Then we used a BNA to create synthetic networks that include variables associated with the magnitude and duration of floods, major components of supply chains and market demands. We also included decision variables of countermeasures that would mitigate potential losses caused by supply chain disruptions. Finally, we conducted a cost-benefit analysis by estimating the expected values of these potential countermeasures while conducting a sensitivity analysis. The methodology was applied to supply chain disruptions caused by the 2011 Thailand floods. Our study demonstrates desirable typical data requirements for the analysis, such as anonymized supplier network data (i.e. critical dependencies, vulnerability information of suppliers) and sourcing data(i.e. locations of suppliers, and production rates and volume), and data from previous experiences (i.e. companies' risk mitigation strategy decisions).
THE IMPACT OF KINSHIP NETWORKS ON OLD-AGE VULNERABILITY IN INDONESIA
Schröder-Butterfill, Elisabeth
2007-01-01
SUMMARY This article examines the problem of care provision for elderly people in Java, a contemporary developing society characterised by lack of formal welfare services, nuclear family organisation and high levels of childlessness. A similar socio-demographic, cultural and economic regime existed in historical Northwest Europe, where it has been seen as having contributed to the early emergence of community based old-age care and low involvement of wider kin networks. Here the role of kin in providing old-age care in a nuclear family system is re-examined by drawing on longitudinal data of elderly people's life histories and support networks in a village in East Java. The central argument is that the identification of elders most vulnerable to a lack of care and support in old age requires understanding the nature and functioning of kin networks over time. The paper discusses three key aspects of networks—network membership, exchanges within networks and network dynamics—and arrives at a characterisation of different kin networks on the basis of size, composition, location and social status. By focusing on the effects of a specific crisis, namely the loss of a wife, on care outcomes in old age, it is possible to determine what kinds of kin networks are best able to adjust to a sudden change in older people's circumstances and protect them from declines in welfare. This reveals the importance, especially for childless elderly people, of extended, heterogeneous and well-connected kin networks. PMID:23750056
Hoorelbeke, Kristof; Marchetti, Igor; De Schryver, Maarten; Koster, Ernst H W
2016-05-01
Individuals in remission from depression are at increased risk for developing future depressive episodes. Several cognitive risk- and resilience factors have been suggested to account for this vulnerability. In the current study we explored how risk- and protective factors such as cognitive control, adaptive and maladaptive emotion regulation, residual symptomatology, and resilience relate to one another in a remitted depressed (RMD) sample. We examined the relationships between these constructs in a cross-sectional dataset of 69 RMD patients using network analyses in order to obtain a comprehensive, data-driven view on the interplay between these constructs. We subsequently present an association network, a concentration network, and a relative importance network. In all three networks resilience formed the central hub, connecting perceived cognitive control (i.e., working memory complaints), emotion regulation, and residual symptomatology. The contribution of the behavioral measure for cognitive control in the network was negligible. Moreover, the directed relative importance network indicates bidirectional influences between these constructs, with all indicators of centrality suggesting a key role of resilience in remission from depression. The presented findings are cross-sectional and networks are limited to a fixed set of key constructs in the literature pertaining cognitive vulnerability for depression. These findings indicate the importance of resilience to successfully cope with stressors following remission from depression. Further in-depth studies will be essential to identify the specific underlying resilience mechanisms that may be key to successful remission from depression. Copyright © 2016 Elsevier B.V. All rights reserved.
A Statistical Graphical Model of the California Reservoir System
NASA Astrophysics Data System (ADS)
Taeb, A.; Reager, J. T.; Turmon, M.; Chandrasekaran, V.
2017-11-01
The recent California drought has highlighted the potential vulnerability of the state's water management infrastructure to multiyear dry intervals. Due to the high complexity of the network, dynamic storage changes in California reservoirs on a state-wide scale have previously been difficult to model using either traditional statistical or physical approaches. Indeed, although there is a significant line of research on exploring models for single (or a small number of) reservoirs, these approaches are not amenable to a system-wide modeling of the California reservoir network due to the spatial and hydrological heterogeneities of the system. In this work, we develop a state-wide statistical graphical model to characterize the dependencies among a collection of 55 major California reservoirs across the state; this model is defined with respect to a graph in which the nodes index reservoirs and the edges specify the relationships or dependencies between reservoirs. We obtain and validate this model in a data-driven manner based on reservoir volumes over the period 2003-2016. A key feature of our framework is a quantification of the effects of external phenomena that influence the entire reservoir network. We further characterize the degree to which physical factors (e.g., state-wide Palmer Drought Severity Index (PDSI), average temperature, snow pack) and economic factors (e.g., consumer price index, number of agricultural workers) explain these external influences. As a consequence of this analysis, we obtain a system-wide health diagnosis of the reservoir network as a function of PDSI.
Melchert, O; Katzgraber, Helmut G; Novotny, M A
2016-04-01
We estimate the critical thresholds of bond and site percolation on nonplanar, effectively two-dimensional graphs with chimeralike topology. The building blocks of these graphs are complete and symmetric bipartite subgraphs of size 2n, referred to as K_{n,n} graphs. For the numerical simulations we use an efficient union-find-based algorithm and employ a finite-size scaling analysis to obtain the critical properties for both bond and site percolation. We report the respective percolation thresholds for different sizes of the bipartite subgraph and verify that the associated universality class is that of standard two-dimensional percolation. For the canonical chimera graph used in the D-Wave Systems Inc. quantum annealer (n=4), we discuss device failure in terms of network vulnerability, i.e., we determine the critical fraction of qubits and couplers that can be absent due to random failures prior to losing large-scale connectivity throughout the device.
Dynamic model of time-dependent complex networks.
Hill, Scott A; Braha, Dan
2010-10-01
The characterization of the "most connected" nodes in static or slowly evolving complex networks has helped in understanding and predicting the behavior of social, biological, and technological networked systems, including their robustness against failures, vulnerability to deliberate attacks, and diffusion properties. However, recent empirical research of large dynamic networks (characterized by irregular connections that evolve rapidly) has demonstrated that there is little continuity in degree centrality of nodes over time, even when their degree distributions follow a power law. This unexpected dynamic centrality suggests that the connections in these systems are not driven by preferential attachment or other known mechanisms. We present an approach to explain real-world dynamic networks and qualitatively reproduce these dynamic centrality phenomena. This approach is based on a dynamic preferential attachment mechanism, which exhibits a sharp transition from a base pure random walk scheme.
NASA Astrophysics Data System (ADS)
Panthi, J., Sr.
2014-12-01
Climate change vulnerability depends upon various factors and differs between places, sectors and communities. People in developing countries whose subsistence livelihood depends upon agriculture and livestock are identified as particularly vulnerable. Nepal, where the majority of people are in a mixed agro-livestock system, is identified as the world's fourth most vulnerable country to climate change. However, there are few studies on how vulnerable mixed agro-livestock smallholders are and how their vulnerability differs across different ecological regions. This study aims to test two vulnerability assessment indices, livelihood vulnerability index (LVI) and IPCC vulnerability index (VI-IPCC), around the Gandaki river basin of Nepal. A total of 543 households practicing mixed agro-livestock were surveyed from three districts (Dhading, Syangja and Kapilvastu) representing the mountain, mid-hill and lowland altitudinal belts respectively. Data on socio-demographics, livelihoods, social networks, health, food and water security, natural disasters and climate variability were collected. Both indices differed across the three districts, with mixed agro-livestock smallholders of Dhading district found to be the most vulnerable and that of Syangja least vulnerable. This vulnerability index approach may be used to monitor rural vulnerability and/or evaluate potential program/policy effectiveness in poor countries like Nepal. The present findings are intended to help in designing intervention strategies to reduce vulnerability of mixed agro-livestock smallholders and other rural people in developing countries to climate change.
Harro, Jaanus; Kanarik, Margus; Kaart, Tanel; Matrov, Denis; Kõiv, Kadri; Mällo, Tanel; Del Río, Joaquin; Tordera, Rosa M; Ramirez, Maria J
2014-07-01
The large variety of available animal models has revealed much on the neurobiology of depression, but each model appears as specific to a significant extent, and distinction between stress response, pathogenesis of depression and underlying vulnerability is difficult to make. Evidence from epidemiological studies suggests that depression occurs in biologically predisposed subjects under impact of adverse life events. We applied the diathesis-stress concept to reveal brain regions and functional networks that mediate vulnerability to depression and response to chronic stress by collapsing data on cerebral long term neuronal activity as measured by cytochrome c oxidase histochemistry in distinct animal models. Rats were rendered vulnerable to depression either by partial serotonergic lesion or by maternal deprivation, or selected for a vulnerable phenotype (low positive affect, low novelty-related activity or high hedonic response). Environmental adversity was brought about by applying chronic variable stress or chronic social defeat. Several brain regions, most significantly median raphe, habenula, retrosplenial cortex and reticular thalamus, were universally implicated in long-term metabolic stress response, vulnerability to depression, or both. Vulnerability was associated with higher oxidative metabolism levels as compared to resilience to chronic stress. Chronic stress, in contrast, had three distinct patterns of effect on oxidative metabolism in vulnerable vs. resilient animals. In general, associations between regional activities in several brain circuits were strongest in vulnerable animals, and chronic stress disrupted this interrelatedness. These findings highlight networks that underlie resilience to stress, and the distinct response to stress that occurs in vulnerable subjects. Copyright © 2014 Elsevier B.V. All rights reserved.
A Transmission Availability Forecast Service for Internet Protocol Networks
1998-12-01
long term changes in the network situation. The probe measurement takes a finite period and so can aggregate and characterise short term variations in...network situation. Nevertheless, the process remains vulnerable to medium term variations, ie changes that occur after the probe and before the download...vulnerable to the medium term changes that might occur between the completion of the examination and the commencement of the download. 3.2 TAF
Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics
2012-05-22
cyber at- tack. Recently, high -prole successful attacks have been detected against the International Mon- etary Fund, Citibank, Lockheed Martin, Google...RSA Security, Sony, and Oak Ridge National Laboratory[13]. These and other attacks have heightened securing networks as a high priority for many...of high -severity vulnerabilities found by network vulnerability scanners (e.g., [40]) and the numbers or percentages of hosts that are are not
Characterization of attacks on public telephone networks
NASA Astrophysics Data System (ADS)
Lorenz, Gary V.; Manes, Gavin W.; Hale, John C.; Marks, Donald; Davis, Kenneth; Shenoi, Sujeet
2001-02-01
The U.S. Public Telephone Network (PTN) is a massively connected distributed information systems, much like the Internet. PTN signaling, transmission and operations functions must be protected from physical and cyber attacks to ensure the reliable delivery of telecommunications services. The increasing convergence of PTNs with wireless communications systems, computer networks and the Internet itself poses serious threats to our nation's telecommunications infrastructure. Legacy technologies and advanced services encumber well-known and as of yet undiscovered vulnerabilities that render them susceptible to cyber attacks. This paper presents a taxonomy of cyber attacks on PTNs in converged environments that synthesizes exploits in computer and communications network domains. The taxonomy provides an opportunity for the systematic exploration of mitigative and preventive strategies, as well as for the identification and classification of emerging threats.
Networking—a statistical physics perspective
NASA Astrophysics Data System (ADS)
Yeung, Chi Ho; Saad, David
2013-03-01
Networking encompasses a variety of tasks related to the communication of information on networks; it has a substantial economic and societal impact on a broad range of areas including transportation systems, wired and wireless communications and a range of Internet applications. As transportation and communication networks become increasingly more complex, the ever increasing demand for congestion control, higher traffic capacity, quality of service, robustness and reduced energy consumption requires new tools and methods to meet these conflicting requirements. The new methodology should serve for gaining better understanding of the properties of networking systems at the macroscopic level, as well as for the development of new principled optimization and management algorithms at the microscopic level. Methods of statistical physics seem best placed to provide new approaches as they have been developed specifically to deal with nonlinear large-scale systems. This review aims at presenting an overview of tools and methods that have been developed within the statistical physics community and that can be readily applied to address the emerging problems in networking. These include diffusion processes, methods from disordered systems and polymer physics, probabilistic inference, which have direct relevance to network routing, file and frequency distribution, the exploration of network structures and vulnerability, and various other practical networking applications.
Urban MEMS based seismic network for post-earthquakes rapid disaster assessment
NASA Astrophysics Data System (ADS)
D'Alessandro, A.; Luzio, D.; D'Anna, G.
2014-09-01
In this paper, we introduce a project for the realization of the first European real-time urban seismic network based on Micro Electro-Mechanical Systems (MEMS) technology. MEMS accelerometers are a highly enabling technology, and nowadays, the sensitivity and the dynamic range of these sensors are such as to allow the recording of earthquakes of moderate magnitude even at a distance of several tens of kilometers. Moreover, thanks to their low cost and smaller size, MEMS accelerometers can be easily installed in urban areas in order to achieve an urban seismic network constituted by high density of observation points. The network is being implemented in the Acireale Municipality (Sicily, Italy), an area among those with the highest hazard, vulnerability and exposure to the earthquake of the Italian territory. The main objective of the implemented urban network will be to achieve an effective system for post-earthquake rapid disaster assessment. The earthquake recorded, also that with moderate magnitude will be used for the effective seismic microzonation of the area covered by the network. The implemented system will be also used to realize a site-specific earthquakes early warning system.
Lapek, John D; Greninger, Patricia; Morris, Robert; Amzallag, Arnaud; Pruteanu-Malinici, Iulian; Benes, Cyril H; Haas, Wilhelm
2017-10-01
The formation of protein complexes and the co-regulation of the cellular concentrations of proteins are essential mechanisms for cellular signaling and for maintaining homeostasis. Here we use isobaric-labeling multiplexed proteomics to analyze protein co-regulation and show that this allows the identification of protein-protein associations with high accuracy. We apply this 'interactome mapping by high-throughput quantitative proteome analysis' (IMAHP) method to a panel of 41 breast cancer cell lines and show that deviations of the observed protein co-regulations in specific cell lines from the consensus network affects cellular fitness. Furthermore, these aberrant interactions serve as biomarkers that predict the drug sensitivity of cell lines in screens across 195 drugs. We expect that IMAHP can be broadly used to gain insight into how changing landscapes of protein-protein associations affect the phenotype of biological systems.
Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem
Williams, Patricia AH; Woodward, Andrew J
2015-01-01
The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat. PMID:26229513
Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem.
Williams, Patricia Ah; Woodward, Andrew J
2015-01-01
The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat.
Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan
2017-12-15
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients' personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.
Neural Network Based Intrusion Detection System for Critical Infrastructures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Todd Vollmer; Ondrej Linda; Milos Manic
2009-07-01
Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less
Robustness of network of networks under targeted attack.
Dong, Gaogao; Gao, Jianxi; Du, Ruijin; Tian, Lixin; Stanley, H Eugene; Havlin, Shlomo
2013-05-01
The robustness of a network of networks (NON) under random attack has been studied recently [Gao et al., Phys. Rev. Lett. 107, 195701 (2011)]. Understanding how robust a NON is to targeted attacks is a major challenge when designing resilient infrastructures. We address here the question how the robustness of a NON is affected by targeted attack on high- or low-degree nodes. We introduce a targeted attack probability function that is dependent upon node degree and study the robustness of two types of NON under targeted attack: (i) a tree of n fully interdependent Erdős-Rényi or scale-free networks and (ii) a starlike network of n partially interdependent Erdős-Rényi networks. For any tree of n fully interdependent Erdős-Rényi networks and scale-free networks under targeted attack, we find that the network becomes significantly more vulnerable when nodes of higher degree have higher probability to fail. When the probability that a node will fail is proportional to its degree, for a NON composed of Erdős-Rényi networks we find analytical solutions for the mutual giant component P(∞) as a function of p, where 1-p is the initial fraction of failed nodes in each network. We also find analytical solutions for the critical fraction p(c), which causes the fragmentation of the n interdependent networks, and for the minimum average degree k[over ¯](min) below which the NON will collapse even if only a single node fails. For a starlike NON of n partially interdependent Erdős-Rényi networks under targeted attack, we find the critical coupling strength q(c) for different n. When q>q(c), the attacked system undergoes an abrupt first order type transition. When q≤q(c), the system displays a smooth second order percolation transition. We also evaluate how the central network becomes more vulnerable as the number of networks with the same coupling strength q increases. The limit of q=0 represents no dependency, and the results are consistent with the classical percolation theory of a single network under targeted attack.
Examining social, physical, and environmental dimensions of tornado vulnerability in Texas.
Siebeneck, Laura
2016-01-01
To develop a vulnerability model that captures the social, physical, and environmental dimensions of tornado vulnerability of Texas counties. Guided by previous research and methodologies proposed in the hazards and emergency management literature, a principle components analysis is used to create a tornado vulnerability index. Data were gathered from open source information available through the US Census Bureau, American Community Surveys, and the Texas Natural Resources Information System. Texas counties. The results of the model yielded three indices that highlight geographic variability of social vulnerability, built environment vulnerability, and tornado hazard throughout Texas. Further analyses suggest that counties with the highest tornado vulnerability include those with high population densities and high tornado risk. This article demonstrates one method for assessing statewide tornado vulnerability and presents how the results of this type of analysis can be applied by emergency managers towards the reduction of tornado vulnerability in their communities.
Cinner, Joshua E.; Bodin, Örjan
2010-01-01
Background Diverse livelihood portfolios are frequently viewed as a critical component of household economies in developing countries. Within the context of natural resources governance in particular, the capacity of individual households to engage in multiple occupations has been shown to influence important issues such as whether fishers would exit a declining fishery, how people react to policy, the types of resource management systems that may be applicable, and other decisions about natural resource use. Methodology/Principal Findings This paper uses network analysis to provide a novel methodological framework for detailed systemic analysis of household livelihood portfolios. Paying particular attention to the role of natural resource-based occupations such as fisheries, we use network analyses to map occupations and their interrelationships- what we refer to as ‘livelihood landscapes’. This network approach allows for the visualization of complex information about dependence on natural resources that can be aggregated at different scales. We then examine how the role of natural resource-based occupations changes along spectra of socioeconomic development and population density in 27 communities in 5 western Indian Ocean countries. Network statistics, including in- and out-degree centrality, the density of the network, and the level of network centralization are compared along a multivariate index of community-level socioeconomic development and a gradient of human population density. The combination of network analyses suggests an increase in household-level specialization with development for most occupational sectors, including fishing and farming, but that at the community-level, economies remained diversified. Conclusions/Significance The novel modeling approach introduced here provides for various types of livelihood portfolio analyses at different scales of social aggregation. Our livelihood landscapes approach provides insights into communities' dependencies and usages of natural resources, and shows how patterns of occupational interrelationships relate to socioeconomic development and population density. A key question for future analysis is how the reduction of household occupational diversity, but maintenance of community diversity we see with increasing socioeconomic development influences key aspects of societies' vulnerability to environmental change or disasters. PMID:20711442
Responses to a self-presented suicide attempt in social media: a social network analysis.
Fu, King-Wa; Cheng, Qijin; Wong, Paul W C; Yip, Paul S F
2013-01-01
The self-presentation of suicidal acts in social media has become a public health concern. This article centers on a Chinese microblogger who posted a wrist-cutting picture that was widely circulated in Chinese social media in 2011. This exploratory study examines written reactions of a group of Chinese microbloggers exposed to the post containing a self-harming message and photo. In addition, we investigate the pattern of information diffusion via a social network. We systematically collected and analyzed 5,971 generated microblogs and the network of information diffusion. We found that a significant portion of written responses (36.6%) could help vulnerable netizens by providing peer-support and calls for help. These responses were reposted and diffused via an online social network with markedly more clusters of users--and at a faster pace-- than a set of randomly generated networks. We conclude that social media can be a double-edged sword: While it may contagiously affect others by spreading suicidal thoughts and acts, it may also play a positive role by assisting people at risk for suicide, providing rescue or support. More research is needed to learn how suicidally vulnerable people interact with online suicide information, and how we can effectively intervene.
Practical Computer Security through Cryptography
NASA Technical Reports Server (NTRS)
McNab, David; Twetev, David (Technical Monitor)
1998-01-01
The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.
NASA Astrophysics Data System (ADS)
Wang, Kai; Zhang, Bu-han; Zhang, Zhe; Yin, Xiang-gen; Wang, Bo
2011-11-01
Most existing research on the vulnerability of power grids based on complex networks ignores the electrical characteristics and the capacity of generators and load. In this paper, the electrical betweenness is defined by considering the maximal demand of load and the capacity of generators in power grids. The loss of load, which reflects the ability of power grids to provide sufficient power to customers, is introduced to measure the vulnerability together with the size of the largest cluster. The simulation results of the IEEE-118 bus system and the Central China Power Grid show that the cumulative distributions of node electrical betweenness follow a power-law and that the nodes with high electrical betweenness play critical roles in both topological structure and power transmission of power grids. The results prove that the model proposed in this paper is effective for analyzing the vulnerability of power grids.
Ouyang, Min; Tian, Hui; Wang, Zhenghua; Hong, Liu; Mao, Zijun
2017-01-17
This article studies a general type of initiating events in critical infrastructures, called spatially localized failures (SLFs), which are defined as the failure of a set of infrastructure components distributed in a spatially localized area due to damage sustained, while other components outside the area do not directly fail. These failures can be regarded as a special type of intentional attack, such as bomb or explosive assault, or a generalized modeling of the impact of localized natural hazards on large-scale systems. This article introduces three SLFs models: node centered SLFs, district-based SLFs, and circle-shaped SLFs, and proposes a SLFs-induced vulnerability analysis method from three aspects: identification of critical locations, comparisons of infrastructure vulnerability to random failures, topologically localized failures and SLFs, and quantification of infrastructure information value. The proposed SLFs-induced vulnerability analysis method is finally applied to the Chinese railway system and can be also easily adapted to analyze other critical infrastructures for valuable protection suggestions. © 2017 Society for Risk Analysis.
Neurophysiological maturation in adolescence - vulnerability and counteracting addiction to alcohol.
Chwedorowicz, Roman; Skarżyński, Henryk; Pucek, Weronika; Studziński, Tadeusz
2017-03-22
The results of contemporary studies confirm the formation of two neural networks in the brain during the period of adolescence. The first is defined as emotional, located in the limbic system, develops earlier, quicker, and more intensively than the second one in the prefrontal cortex, called the judgement network, which fulfils the role of control and inhibition of emotional reactions. The domination of the emotional network in adolescence is manifested by hyperactivity of the limbic system, accompanied by intensified undertaking of courageous, reckless, risky, or even sometimes dangerous actions, so very characteristic in the maturation. The aim of the article is to present the state of the art in the field of latest achievements in experimental neurophysiology related to the maturation of the structural end functional processes in adolescents, and to alcohol vulnerability. Alcohol effect initiation starts in early adolescence, and therefore is connected with alcohol abuse and addiction in adulthood, which confirms the necessity for provision of an early prophylactic protection for juveniles, even before entering the phase of early adolescence. Some electrophysiological characteristics, such as low P3 amplitude of the Event-Related Potential (ERP) and Event-Related Oscillations (EROs), are manifested by their high risk offspring, and are considered to be biological markers (endophenotypes) of a predisposition to develop alcohol use disorders. Electroencephalographic oscillations induced within the range of the theta and delta waves (Event-Related Oscillation- ERO), considered as endophenotypes and markers of increased vulnerability for addiction, present three groups of genes and three types of neurotransmitters, with gamma aminobutyric acid, acetylcholine and glutamate as neurotransmitters in the central nervous system. A new research approach consisting in the application of electroencephalographic methods and techniques in developmental and genetic studies of the conditioning of varied vulnerability, and especially increased preferences for alcohol tasting and abuse in adolescence, provide unique possibilities for comprehensive and deepened studies which may contribute to the prevention of alcohol addiction, the genesis of which, to a great extent, is related with the effect of causative environmental and genetic factors during adolescent development.
Exacerbated vulnerability of coupled socio-economic risk in complex networks
NASA Astrophysics Data System (ADS)
Zhang, Xin; Feng, Ling; Berman, Yonatan; Hu, Ning; Stanley, H. Eugene
2016-10-01
The study of risk contagion in economic networks has most often focused on the financial liquidities of institutions and assets. In practice the agents in a network affect each other through social contagion, i.e., through herd behavior and the tendency to follow leaders. We study the coupled risk between social and economic contagion and find it significantly more severe than when economic risk is considered alone. Using the empirical network from the China venture capital market we find that the system exhibits an extreme risk of abrupt phase transition and large-scale damage, which is in clear contrast to the smooth phase transition traditionally observed in economic contagion alone. We also find that network structure impacts market resilience and that the randomization of the social network of the market participants can reduce system fragility when there is herd behavior. Our work indicates that under coupled contagion mechanisms network resilience can exhibit a fundamentally different behavior, i.e., an abrupt transition. It also reveals the extreme risk when a system has coupled socio-economic risks, and this could be of interest to both policy makers and market practitioners.
Economic networks: Heterogeneity-induced vulnerability and loss of synchronization
NASA Astrophysics Data System (ADS)
Colon, Célian; Ghil, Michael
2017-12-01
Interconnected systems are prone to propagation of disturbances, which can undermine their resilience to external perturbations. Propagation dynamics can clearly be affected by potential time delays in the underlying processes. We investigate how such delays influence the resilience of production networks facing disruption of supply. Interdependencies between economic agents are modeled using systems of Boolean delay equations (BDEs); doing so allows us to introduce heterogeneity in production delays and in inventories. Complex network topologies are considered that reproduce realistic economic features, including a network of networks. Perturbations that would otherwise vanish can, because of delay heterogeneity, amplify and lead to permanent disruptions. This phenomenon is enabled by the interactions between short cyclic structures. Difference in delays between two interacting, and otherwise resilient, structures can in turn lead to loss of synchronization in damage propagation and thus prevent recovery. Finally, this study also shows that BDEs on complex networks can lead to metastable relaxation oscillations, which are damped out in one part of a network while moving on to another part.
Multi-level significance of vulnerability indicators. Case study: Eastern Romania
NASA Astrophysics Data System (ADS)
Stanga, I. C.; Grozavu, A.
2012-04-01
Vulnerability assessment aims, most frequently, to emphasize internal fragility of a system comparing to a reference standard, to similar systems or in relation to a given hazard. Internal fragility, either biophysical or structural, may affect the capacity to predict, to prepare for, to cope with or to recover from a disaster. Thus, vulnerability is linked to resilience and adaptive capacity. From local level to global one, vulnerability factors and corresponding indicators are different and their significance must be tested and validated in a well-structured conceptual and methodological framework. In this paper, the authors aim to show the real vulnerability of rural settlements in Eastern Romania in a multi-level approach. The research area, Tutova Hills, counts about 3421 sq.km and more than 200.000 inhabitants in 421 villages characterized by deficient accessibility, lack of endowments, subsistential agriculture, high pressure on natural environment (especially on forest and soil resources), poverty and aging process of population. Factors that could influence the vulnerability of these rural settlements have been inventoried and assigned into groups through a cluster analysis: habitat and technical urban facilities, infrastructure, economical, social and demographical indicators, environment quality, management of emergency situations etc. Firstly, the main difficulty was to convert qualitative variable in quantitative indicators and to standardize all values to make possible mathematical and statistical processing of data. Secondly, the great variability of vulnerability factors, their different measuring units and their high amplitude of variation require different method of standardization in order to obtain values between zero (minimum vulnerability) and one (maximum vulnerability). Final vulnerability indicators were selected and integrated in a general scheme, according to their significance resulted from an appropriate factor analysis: linear and logistic regression, varimax rotation, multiple-criteria decision analysis, weight of evidence, multi-criteria evaluation method etc. The approach started from the local level which allows a functional and structural analysis and was progressively translated to an upper level and to a spatial analysis. The model shows that changing the level of analysis diminishes the functional significance of some indicators and increases the capacity of discretization in the case of others, highlighting the spatial and functional complexity of vulnerability.
ReTrust: attack-resistant and lightweight trust management for medical sensor networks.
He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V
2012-07-01
Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.
MERINOVA: Meteorological risks as drivers of environmental innovation in agro-ecosystem management
NASA Astrophysics Data System (ADS)
Gobin, Anne; Oger, Robert; Marlier, Catherine; Van De Vijver, Hans; Vandermeulen, Valerie; Van Huylenbroeck, Guido; Zamani, Sepideh; Curnel, Yannick; Mettepenningen, Evi
2013-04-01
The BELSPO funded project 'MERINOVA' deals with risks associated with extreme weather phenomena and with risks of biological origin such as pests and diseases. The major objectives of the proposed project are to characterise extreme meteorological events, assess the impact on Belgian agro-ecosystems, characterise their vulnerability and resilience to these events, and explore innovative adaptation options to agricultural risk management. The project comprises of five major parts that reflect the chain of risks: (i) Hazard: Assessing the likely frequency and magnitude of extreme meteorological events by means of probability density functions; (ii) Impact: Analysing the potential bio-physical and socio-economic impact of extreme weather events on agro-ecosystems in Belgium using process-based modelling techniques commensurate with the regional scale; (iii) Vulnerability: Identifying the most vulnerable agro-ecosystems using fuzzy multi-criteria and spatial analysis; (iv) Risk Management: Uncovering innovative risk management and adaptation options using actor-network theory and fuzzy cognitive mapping techniques; and, (v) Communication: Communicating to research, policy and practitioner communities using web-based techniques. The different tasks of the MERINOVA project require expertise in several scientific disciplines: meteorology, statistics, spatial database management, agronomy, bio-physical impact modelling, socio-economic modelling, actor-network theory, fuzzy cognitive mapping techniques. These expertises are shared by the four scientific partners who each lead one work package. The MERINOVA project will concentrate on promoting a robust and flexible framework by demonstrating its performance across Belgian agro-ecosystems, and by ensuring its relevance to policy makers and practitioners. Impacts developed from physically based models will not only provide information on the state of the damage at any given time, but also assist in understanding the links between different factors causing damage and determining bio-physical vulnerability. Socio-economic impacts will enlarge the basis for vulnerability mapping, risk management and adaptation options. A strong expert and end-user network will be established to help disseminating and exploiting project results to meet user needs.
Rogoza, Radosław; Żemojtel-Piotrowska, Magdalena; Kwiatkowska, Maria M; Kwiatkowska, Katarzyna
2018-01-01
Grandiose and vulnerable narcissism seem to be uncorrelated in empirical studies, yet they share at least some theoretical similarities. In the current study, we examine the relation between grandiose (conceptualized as admiration and rivalry) and vulnerable narcissism in the context of the Big Five personality traits and metatraits, self-esteem, and their nomological network. To this end, participants ( N = 314) filled in a set of self-report measures via an online survey. Rivalry was positively linked with both admiration and vulnerable narcissism. We replicated the relations of admiration and rivalry with personality traits and metatraits-as well as extended existing knowledge by providing support for the theory that vulnerable narcissism is simultaneously negatively related to the Stability and Plasticity. Higher scores on vulnerable narcissism and rivalry predicted having fragile self-esteem, whereas high scores on admiration predicted having optimal self-esteem. The assumed relations with the nomological network were confirmed, i.e., vulnerable narcissism and admiration demonstrated a contradictory pattern of relation to shyness and loneliness, whilst rivalry predicted low empathy. Our results suggest that the rivalry is between vulnerable narcissism and admiration, which supports its localization in the self-importance dimension of the narcissism spectrum model. It was concluded that whereas admiration and rivalry represent the bright and dark face of narcissism, vulnerable narcissism represents its blue face.
Rogoza, Radosław; Żemojtel-Piotrowska, Magdalena; Kwiatkowska, Maria M.; Kwiatkowska, Katarzyna
2018-01-01
Grandiose and vulnerable narcissism seem to be uncorrelated in empirical studies, yet they share at least some theoretical similarities. In the current study, we examine the relation between grandiose (conceptualized as admiration and rivalry) and vulnerable narcissism in the context of the Big Five personality traits and metatraits, self-esteem, and their nomological network. To this end, participants (N = 314) filled in a set of self-report measures via an online survey. Rivalry was positively linked with both admiration and vulnerable narcissism. We replicated the relations of admiration and rivalry with personality traits and metatraits—as well as extended existing knowledge by providing support for the theory that vulnerable narcissism is simultaneously negatively related to the Stability and Plasticity. Higher scores on vulnerable narcissism and rivalry predicted having fragile self-esteem, whereas high scores on admiration predicted having optimal self-esteem. The assumed relations with the nomological network were confirmed, i.e., vulnerable narcissism and admiration demonstrated a contradictory pattern of relation to shyness and loneliness, whilst rivalry predicted low empathy. Our results suggest that the rivalry is between vulnerable narcissism and admiration, which supports its localization in the self-importance dimension of the narcissism spectrum model. It was concluded that whereas admiration and rivalry represent the bright and dark face of narcissism, vulnerable narcissism represents its blue face. PMID:29593627
Chang, Kyle
2006-01-01
As you can see, there are a number of different ways to protect your network with different protocols, all of which can be very confusing to people whose core business process is not technology. This article is only a brief synopsis of the dangers that lurk in the corners of the technology world. Therefore, the best course of action is to do as much research as possible rather than falling into a situation of risk and vulnerability by implementing a system or network that does not work with your business. Remember, the technology is there to support your business; the business should not have to work around the technology.
Tau, amyloid, and cascading network failure across the Alzheimer's disease spectrum.
Jones, David T; Graff-Radford, Jonathan; Lowe, Val J; Wiste, Heather J; Gunter, Jeffrey L; Senjem, Matthew L; Botha, Hugo; Kantarci, Kejal; Boeve, Bradley F; Knopman, David S; Petersen, Ronald C; Jack, Clifford R
2017-12-01
Functionally related brain regions are selectively vulnerable to Alzheimer's disease pathophysiology. However, molecular markers of this pathophysiology (i.e., beta-amyloid and tau aggregates) have discrepant spatial and temporal patterns of progression within these selectively vulnerable brain regions. Existing reductionist pathophysiologic models cannot account for these large-scale spatiotemporal inconsistencies. Within the framework of the recently proposed cascading network failure model of Alzheimer's disease, however, these large-scale patterns are to be expected. This model postulates the following: 1) a tau-associated, circumscribed network disruption occurs in brain regions specific to a given phenotype in clinically normal individuals; 2) this disruption can trigger phenotype independent, stereotypic, and amyloid-associated compensatory brain network changes indexed by changes in the default mode network; 3) amyloid deposition marks a saturation of functional compensation and portends an acceleration of the inciting phenotype specific, and tau-associated, network failure. With the advent of in vivo molecular imaging of tau pathology, combined with amyloid and functional network imaging, it is now possible to investigate the relationship between functional brain networks, tau, and amyloid across the disease spectrum within these selectively vulnerable brain regions. In a large cohort (n = 218) spanning the Alzheimer's disease spectrum from young, amyloid negative, cognitively normal subjects to Alzheimer's disease dementia, we found several distinct spatial patterns of tau deposition, including 'Braak-like' and 'non-Braak-like', across functionally related brain regions. Rather than arising focally and spreading sequentially, elevated tau signal seems to occur system-wide based on inferences made from multiple cross-sectional analyses we conducted looking at regional patterns of tau signal. Younger age-of-disease-onset was associated with 'non-Braak-like' patterns of tau, suggesting an association with atypical clinical phenotypes. As predicted by the cascading network failure model of Alzheimer's disease, we found that amyloid is a partial mediator of the relationship between functional network failure and tau deposition in functionally connected brain regions. This study implicates large-scale brain networks in the pathophysiology of tau deposition and offers support to models incorporating large-scale network physiology into disease models linking tau and amyloid, such as the cascading network failure model of Alzheimer's disease. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.
Impact analysis of two kinds of failure strategies in Beijing road transportation network
NASA Astrophysics Data System (ADS)
Zhang, Zundong; Xu, Xiaoyang; Zhang, Zhaoran; Zhou, Huijuan
The Beijing road transportation network (BRTN), as a large-scale technological network, exhibits very complex and complicate features during daily periods. And it has been widely highlighted that how statistical characteristics (i.e. average path length and global network efficiency) change while the network evolves. In this paper, by using different modeling concepts, three kinds of network models of BRTN namely the abstract network model, the static network model with road mileage as weights and the dynamic network model with travel time as weights — are constructed, respectively, according to the topological data and the real detected flow data. The degree distribution of the three kinds of network models are analyzed, which proves that the urban road infrastructure network and the dynamic network behavior like scale-free networks. By analyzing and comparing the important statistical characteristics of three models under random attacks and intentional attacks, it shows that the urban road infrastructure network and the dynamic network of BRTN are both robust and vulnerable.
The system of technical diagnostics of the industrial safety information network
NASA Astrophysics Data System (ADS)
Repp, P. V.
2017-01-01
This research is devoted to problems of safety of the industrial information network. Basic sub-networks, ensuring reliable operation of the elements of the industrial Automatic Process Control System, were identified. The core tasks of technical diagnostics of industrial information safety were presented. The structure of the technical diagnostics system of the information safety was proposed. It includes two parts: a generator of cyber-attacks and the virtual model of the enterprise information network. The virtual model was obtained by scanning a real enterprise network. A new classification of cyber-attacks was proposed. This classification enables one to design an efficient generator of cyber-attacks sets for testing the virtual modes of the industrial information network. The numerical method of the Monte Carlo (with LPτ - sequences of Sobol), and Markov chain was considered as the design method for the cyber-attacks generation algorithm. The proposed system also includes a diagnostic analyzer, performing expert functions. As an integrative quantitative indicator of the network reliability the stability factor (Kstab) was selected. This factor is determined by the weight of sets of cyber-attacks, identifying the vulnerability of the network. The weight depends on the frequency and complexity of cyber-attacks, the degree of damage, complexity of remediation. The proposed Kstab is an effective integral quantitative measure of the information network reliability.
NASA Astrophysics Data System (ADS)
Xue, Fei; Bompard, Ettore; Huang, Tao; Jiang, Lin; Lu, Shaofeng; Zhu, Huaiying
2017-09-01
As the modern power system is expected to develop to a more intelligent and efficient version, i.e. the smart grid, or to be the central backbone of energy internet for free energy interactions, security concerns related to cascading failures have been raised with consideration of catastrophic results. The researches of topological analysis based on complex networks have made great contributions in revealing structural vulnerabilities of power grids including cascading failure analysis. However, existing literature with inappropriate assumptions in modeling still cannot distinguish the effects between the structure and operational state to give meaningful guidance for system operation. This paper is to reveal the interrelation between network structure and operational states in cascading failure and give quantitative evaluation by integrating both perspectives. For structure analysis, cascading paths will be identified by extended betweenness and quantitatively described by cascading drop and cascading gradient. Furthermore, the operational state for cascading paths will be described by loading level. Then, the risk of cascading failure along a specific cascading path can be quantitatively evaluated considering these two factors. The maximum cascading gradient of all possible cascading paths can be used as an overall metric to evaluate the entire power grid for its features related to cascading failure. The proposed method is tested and verified on IEEE30-bus system and IEEE118-bus system, simulation evidences presented in this paper suggests that the proposed model can identify the structural causes for cascading failure and is promising to give meaningful guidance for the protection of system operation in the future.
NASA Astrophysics Data System (ADS)
Seaquist, J. W.; Li Johansson, Emma; Nicholas, Kimberly A.
2014-11-01
Global land acquisitions, often dubbed ‘land grabbing’ are increasingly becoming drivers of land change. We use the tools of network science to describe the connectivity of the global acquisition system. We find that 126 countries participate in this form of global land trade. Importers are concentrated in the Global North, the emerging economies of Asia, and the Middle East, while exporters are confined to the Global South and Eastern Europe. A small handful of countries account for the majority of land acquisitions (particularly China, the UK, and the US), the cumulative distribution of which is best described by a power law. We also find that countries with many land trading partners play a disproportionately central role in providing connectivity across the network with the shortest trading path between any two countries traversing either China, the US, or the UK over a third of the time. The land acquisition network is characterized by very few trading cliques and therefore characterized by a low degree of preferential trading or regionalization. We also show that countries with many export partners trade land with countries with few import partners, and vice versa, meaning that less developed countries have a large array of export partnerships with developed countries, but very few import partnerships (dissassortative relationship). Finally, we find that the structure of the network is potentially prone to propagating crises (e.g., if importing countries become dependent on crops exported from their land trading partners). This network analysis approach can be used to quantitatively analyze and understand telecoupled systems as well as to anticipate and diagnose the potential effects of telecoupling.
A Novel Centrality Measure for Network-wide Cyber Vulnerability Assessment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sathanur, Arun V.; Haglin, David J.
In this work we propose a novel formulation that models the attack and compromise on a cyber network as a combination of two parts - direct compromise of a host and the compromise occurring through the spread of the attack on the network from a compromised host. The model parameters for the nodes are a concise representation of the host profiles that can include the risky behaviors of the associated human users while the model parameters for the edges are based on the existence of vulnerabilities between each pair of connected hosts. The edge models relate to the summary representationsmore » of the corresponding attack-graphs. This results in a formulation based on Random Walk with Restart (RWR) and the resulting centrality metric can be solved for in an efficient manner through the use of sparse linear solvers. Thus the formulation goes beyond mere topological considerations in centrality computations by summarizing the host profiles and the attack graphs into the model parameters. The computational efficiency of the method also allows us to also quantify the uncertainty in the centrality measure through Monte Carlo analysis.« less
Attack Vulnerability of Network Controllability
2016-01-01
Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941
Attack Vulnerability of Network Controllability.
Lu, Zhe-Ming; Li, Xin-Feng
2016-01-01
Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.
Transport Traffic Analysis for Abusive Infrastructure Characterization
2012-12-14
Introduction Abusive traffic abounds on the Internet, in the form of email, malware, vulnerability scanners, worms, denial-of-service, drive-by-downloads, scam ...insight is two-fold. First, attackers have a basic requirement to source large amounts of data, be it denial-of-service, scam -hosting, spam, or other...the network core. This paper explores the power of transport-layer traffic analysis to detect and characterize scam hosting infrastructure, including
Injured Brains and Adaptive Networks: The Benefits and Costs of Hyperconnectivity.
Hillary, Frank G; Grafman, Jordan H
2017-05-01
A common finding in human functional brain-imaging studies is that damage to neural systems paradoxically results in enhanced functional connectivity between network regions, a phenomenon commonly referred to as 'hyperconnectivity'. Here, we describe the various ways that hyperconnectivity operates to benefit a neural network following injury while simultaneously negotiating the trade-off between metabolic cost and communication efficiency. Hyperconnectivity may be optimally expressed by increasing connections through the most central and metabolically efficient regions (i.e., hubs). While adaptive in the short term, we propose that chronic hyperconnectivity may leave network hubs vulnerable to secondary pathological processes over the life span due to chronically elevated metabolic stress. We conclude by offering novel, testable hypotheses for advancing our understanding of the role of hyperconnectivity in systems-level brain plasticity in neurological disorders. Copyright © 2017 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dobson, Ian; Hiskens, Ian; Linderoth, Jeffrey
Building on models of electrical power systems, and on powerful mathematical techniques including optimization, model predictive control, and simluation, this project investigated important issues related to the stable operation of power grids. A topic of particular focus was cascading failures of the power grid: simulation, quantification, mitigation, and control. We also analyzed the vulnerability of networks to component failures, and the design of networks that are responsive to and robust to such failures. Numerous other related topics were investigated, including energy hubs and cascading stall of induction machines
Large-scale transportation network congestion evolution prediction using deep learning theory.
Ma, Xiaolei; Yu, Haiyang; Wang, Yunpeng; Wang, Yinhai
2015-01-01
Understanding how congestion at one location can cause ripples throughout large-scale transportation network is vital for transportation researchers and practitioners to pinpoint traffic bottlenecks for congestion mitigation. Traditional studies rely on either mathematical equations or simulation techniques to model traffic congestion dynamics. However, most of the approaches have limitations, largely due to unrealistic assumptions and cumbersome parameter calibration process. With the development of Intelligent Transportation Systems (ITS) and Internet of Things (IoT), transportation data become more and more ubiquitous. This triggers a series of data-driven research to investigate transportation phenomena. Among them, deep learning theory is considered one of the most promising techniques to tackle tremendous high-dimensional data. This study attempts to extend deep learning theory into large-scale transportation network analysis. A deep Restricted Boltzmann Machine and Recurrent Neural Network architecture is utilized to model and predict traffic congestion evolution based on Global Positioning System (GPS) data from taxi. A numerical study in Ningbo, China is conducted to validate the effectiveness and efficiency of the proposed method. Results show that the prediction accuracy can achieve as high as 88% within less than 6 minutes when the model is implemented in a Graphic Processing Unit (GPU)-based parallel computing environment. The predicted congestion evolution patterns can be visualized temporally and spatially through a map-based platform to identify the vulnerable links for proactive congestion mitigation.
Large-Scale Transportation Network Congestion Evolution Prediction Using Deep Learning Theory
Ma, Xiaolei; Yu, Haiyang; Wang, Yunpeng; Wang, Yinhai
2015-01-01
Understanding how congestion at one location can cause ripples throughout large-scale transportation network is vital for transportation researchers and practitioners to pinpoint traffic bottlenecks for congestion mitigation. Traditional studies rely on either mathematical equations or simulation techniques to model traffic congestion dynamics. However, most of the approaches have limitations, largely due to unrealistic assumptions and cumbersome parameter calibration process. With the development of Intelligent Transportation Systems (ITS) and Internet of Things (IoT), transportation data become more and more ubiquitous. This triggers a series of data-driven research to investigate transportation phenomena. Among them, deep learning theory is considered one of the most promising techniques to tackle tremendous high-dimensional data. This study attempts to extend deep learning theory into large-scale transportation network analysis. A deep Restricted Boltzmann Machine and Recurrent Neural Network architecture is utilized to model and predict traffic congestion evolution based on Global Positioning System (GPS) data from taxi. A numerical study in Ningbo, China is conducted to validate the effectiveness and efficiency of the proposed method. Results show that the prediction accuracy can achieve as high as 88% within less than 6 minutes when the model is implemented in a Graphic Processing Unit (GPU)-based parallel computing environment. The predicted congestion evolution patterns can be visualized temporally and spatially through a map-based platform to identify the vulnerable links for proactive congestion mitigation. PMID:25780910
Day-Ahead Anticipation of Complex Network Vulnerability
NASA Astrophysics Data System (ADS)
Stefanov, S. Z.; Wang, Paul P.
2017-11-01
In this paper, a day-ahead anticipation of complex network vulnerability for an intentional threat of an attack or a shock is carried out. An ecological observer is introduced for that reason, which is a watch in the intentional multiverse, tiled by cells; dynamics of the intentional threat for a day-ahead is characterized by a space-time cell; spreading of the intentional threat is derived from its energy; duration of the intentional threat is found by the self-assembling of a space-time cell; the lower bound of probability is assessed to anticipate for a day-ahead the intentional threat; it is indicated that this vulnerability anticipation for a day-ahead is right when the intentional threat leads to dimension doubling of the complex network.
Climate change and vulnerability of bull trout (Salvelinus confluentus) in a fire-prone landscape.
Falke, Jeffrey A.; Flitcroft, Rebecca L; Dunham, Jason B.; McNyset, Kristina M.; Hessburg, Paul F.; Reeves, Gordon H.
2015-01-01
Linked atmospheric and wildfire changes will complicate future management of native coldwater fishes in fire-prone landscapes, and new approaches to management that incorporate uncertainty are needed to address this challenge. We used a Bayesian network (BN) approach to evaluate population vulnerability of bull trout (Salvelinus confluentus) in the Wenatchee River basin, Washington, USA, under current and future climate and fire scenarios. The BN was based on modeled estimates of wildfire, water temperature, and physical habitat prior to, and following, simulated fires throughout the basin. We found that bull trout population vulnerability depended on the extent to which climate effects can be at least partially offset by managing factors such as habitat connectivity and fire size. Moreover, our analysis showed that local management can significantly reduce the vulnerability of bull trout to climate change given appropriate management actions. Tools such as our BN that explicitly integrate the linked nature of climate and wildfire, and incorporate uncertainty in both input data and vulnerability estimates, will be vital in effective future management to conserve native coldwater fishes.
Gómez, José M; Verdú, Miguel
2017-03-06
Epidemics can spread across large regions becoming pandemics by flowing along transportation and social networks. Two network attributes, transitivity (when a node is connected to two other nodes that are also directly connected between them) and centrality (the number and intensity of connections with the other nodes in the network), are widely associated with the dynamics of transmission of pathogens. Here we investigate how network centrality and transitivity influence vulnerability to diseases of human populations by examining one of the most devastating pandemic in human history, the fourteenth century plague pandemic called Black Death. We found that, after controlling for the city spatial location and the disease arrival time, cities with higher values of both centrality and transitivity were more severely affected by the plague. A simulation study indicates that this association was due to central cities with high transitivity undergo more exogenous re-infections. Our study provides an easy method to identify hotspots in epidemic networks. Focusing our effort in those vulnerable nodes may save time and resources by improving our ability of controlling deadly epidemics.
Control Systems Cyber Security:Defense in Depth Strategies
DOE Office of Scientific and Technical Information (OSTI.GOV)
David Kuipers; Mark Fabro
2006-05-01
Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecturemore » that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.« less
Control Systems Cyber Security: Defense-in-Depth Strategies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mark Fabro
2007-10-01
Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecturemore » that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.« less
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-01
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719
Wang, Chenyu; Xu, Guoai; Sun, Jing
2017-12-19
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.
Xu, Guoai; Sun, Jing
2017-01-01
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme. PMID:29257066
A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Purvine, Emilie AH; Johnson, John R.; Lo, Chaomei
Most cyber network attacks begin with an adversary gain- ing a foothold within the network and proceed with lateral movement until a desired goal is achieved. The mechanism by which lateral movement occurs varies but the basic signa- ture of hopping between hosts by exploiting vulnerabilities is the same. Because of the nature of the vulnerabilities typ- ically exploited, lateral movement is very difficult to detect and defend against. In this paper we define a dynamic reach- ability graph model of the network to discover possible paths that an adversary could take using different vulnerabilities, and how those paths evolvemore » over time. We use this reacha- bility graph to develop dynamic machine-level and network- level impact scores. Lateral movement mitigation strategies which make use of our impact scores are also discussed, and we detail an example using a freely available data set.« less
Assessment of flood hazard in a combined sewer system in Reykjavik city centre.
Hlodversdottir, Asta Osk; Bjornsson, Brynjolfur; Andradottir, Hrund Olof; Eliasson, Jonas; Crochet, Philippe
2015-01-01
Short-duration precipitation bursts can cause substantial property damage and pose operational risks for wastewater managers. The objective of this study was to assess the present and possible future flood hazard in the combined sewer system in Reykjavik city centre. The catchment is characterised by two hills separated by a plain. A large portion of the pipes in the aging network are smaller than the current minimum diameter of 250 mm. Runoff and sewer flows were modelled using the MIKE URBAN software package incorporating both historical precipitation and synthetic storms derived from annual maximum rainfall data. Results suggest that 3% of public network manholes were vulnerable to flooding during an 11-year long rainfall sequence. A Chicago Design Storm (CDS) incorporating a 10-minute rainfall burst with a 5-year return period predicted twice as many flooded manholes at similar locations. A 20% increase in CDS intensity increased the number of flooded manholes and surface flood volume by 70% and 80%, respectively. The flood volume tripled if rainfall increase were combined with urban re-development, leading to a 20% increase in the runoff coefficient. Results highlight the need for reducing network vulnerabilities, which include decreased pipe diameters and low or drastically varying pipe grades.
Resilience of networks to environmental stress: From regular to random networks
NASA Astrophysics Data System (ADS)
Eom, Young-Ho
2018-04-01
Despite the huge interest in network resilience to stress, most of the studies have concentrated on internal stress damaging network structure (e.g., node removals). Here we study how networks respond to environmental stress deteriorating their external conditions. We show that, when regular networks gradually disintegrate as environmental stress increases, disordered networks can suddenly collapse at critical stress with hysteresis and vulnerability to perturbations. We demonstrate that this difference results from a trade-off between node resilience and network resilience to environmental stress. The nodes in the disordered networks can suppress their collapses due to the small-world topology of the networks but eventually collapse all together in return. Our findings indicate that some real networks can be highly resilient against environmental stress to a threshold yet extremely vulnerable to the stress above the threshold because of their small-world topology.
NASA Astrophysics Data System (ADS)
Queiroz, G.; Goulart, C.; Gaspar, J. L.; Gomes, A.; Resendes, J. P.; Marques, R.; Gonçalves, P.; Silveira, D.; Valadão, P.
2003-04-01
The Geographic Information Systems (GIS) are becoming a major tool in the domain of geological hazard assessment and risk mitigation. When available, hazard and vulnerability data can easily be represented in a GIS and a great diversity of risk maps can be produced following the implementation of specific predicting models. A major difficulty for those that deal with GIS is to obtain high quality, well geo-referenced and validated data. This situation is particularly evident in the scope of risk analysis due to the diversity of data that need to be considered. In order to develop a coherent database for the geological risk analysis of the Azores archipelago it was decided to use the digital maps edited in 2001 by the Instituto Geográfico do Exército de Portugal (scale 1:25000), comprising altimetry, urban areas, roads and streams network. For the particular case of S. Miguel Island the information contained in these layers was revised and rectifications were made whenever needed. Moreover basic additional layers were added to the system, including counties and parishes administrative limits, agriculture and forested areas. For detailed studies all the edifices (e.g. houses, public buildings, monuments) are being individualized and characterized taking in account several parameters that can become crucial to assess their direct vulnerability to geological hazards (e.g. type of construction, number of floors, roof stability). Geological data obtained (1) through the interpretation of historical documents, (2) during recent fieldwork campaigns (e.g. mapping of volcanic centres and associated deposits, faults, dikes, soil degassing anomalies, landslides) and (3) by the existent monitoring networks (e.g. seismic, geodetic, fluid geochemistry) are also being digitised. The acquisition, storage and maintenance of all this information following the same criteria of quality are critical to guarantee the accuracy and consistency of the GIS database through time. In this work we notice the GIS-based methodologies aimed to assure the development of a GIS database directed to the geological risk analysis in S. Miguel Island. In a long-term programme the same strategy is being extended to the other Azorean islands.
Rowel, Randy; Sheikhattari, Payam; Barber, Tanyka M; Evans-Holland, Myrtle
2012-01-01
Low-income populations, especially those belonging to minority groups, are among the most vulnerable groups before, during, and after a natural disaster. One of the factors that can be attributed to their vulnerability is the ineffectiveness of traditional risk communication systems in reaching this population. Many low-income populations are distrustful of government agencies and those who typically communicate risk messages. Consequently, traditional systems are not as effective in reaching these communities. Furthermore, traditional systems have been based on the social media that the general population uses and not based on social networks of disadvantaged populations which are more important than formal channels in these communities for dissemination of information. To bridge the gap, an approach is needed that relies on trusted agencies and leaders to educate and warn low-income communities about possible public health threats. A grassroots approach can enhance the capacity of the risk communication systems to more effectively reach vulnerable populations by engaging grassroots organizations in risk communication activities. The Guide to Enhance Grassroots Risk Communication Among Low-Income Populations provides strategies and guidance that can assist agencies in upgrading their systems for risk communication by building partnerships with local community stakeholders.
On effectiveness of network sensor-based defense framework
NASA Astrophysics Data System (ADS)
Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh
2012-06-01
Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.
Tokunaga river networks: New empirical evidence and applications to transport problems
NASA Astrophysics Data System (ADS)
Tejedor, A.; Zaliapin, I. V.
2013-12-01
The Tokunaga self-similarity has proven to be an important constraint for the observed river networks. Notably, various Horton laws are naturally satisfied by the Tokunaga networks, which makes this model of considerable interest for theoretical analysis and modeling of environmental transport. Recall that Horton self-similarity is a weaker property of a tree graph that addresses its principal branching; it is a counterpart of the power-law size distribution for system's elements. The stronger Tokunaga self-similarity addresses so-called side branching; it ensures that different levels of a hierarchy have the same probabilistic structure (in a sense that can be rigorously defined). We describe an improved statistical framework for testing self-similarity in a finite tree and estimating the related parameters. The developed inference is applied to the major river basins in continental United States and Iberian Peninsula. The results demonstrate the validity of the Tokunaga model for the majority of the examined networks with very narrow (universal) range of parameter values. Next, we explore possible relationships between the Tokunaga parameter anomalies (deviations from the universal values) and climatic and geomorphologic characteristics of a region. Finally, we apply the Tokunaga model to explore vulnerability of river networks, defined via reaction of the river discharge to a storm.
Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management.
Ganin, Alexander A; Quach, Phuoc; Panwar, Mahesh; Collier, Zachary A; Keisler, Jeffrey M; Marchese, Dayton; Linkov, Igor
2017-09-05
Risk assessors and managers face many difficult challenges related to novel cyber systems. Among these challenges are the constantly changing nature of cyber systems caused by technical advances, their distribution across the physical, information, and sociocognitive domains, and the complex network structures often including thousands of nodes. Here, we review probabilistic and risk-based decision-making techniques applied to cyber systems and conclude that existing approaches typically do not address all components of the risk assessment triplet (threat, vulnerability, consequence) and lack the ability to integrate across multiple domains of cyber systems to provide guidance for enhancing cybersecurity. We present a decision-analysis-based approach that quantifies threat, vulnerability, and consequences through a set of criteria designed to assess the overall utility of cybersecurity management alternatives. The proposed framework bridges the gap between risk assessment and risk management, allowing an analyst to ensure a structured and transparent process of selecting risk management alternatives. The use of this technique is illustrated for a hypothetical, but realistic, case study exemplifying the process of evaluating and ranking five cybersecurity enhancement strategies. The approach presented does not necessarily eliminate biases and subjectivity necessary for selecting countermeasures, but provides justifiable methods for selecting risk management actions consistent with stakeholder and decisionmaker values and technical data. Published 2017. This article is a U.S. Government work and is in the public domain in the U.S.A.
NASA Technical Reports Server (NTRS)
Denning, Peter J.
1989-01-01
In November 1988 a worm program invaded several thousand UNIX-operated Sun workstations and VAX computers attached to the Research Internet, seriously disrupting service for several days but damaging no files. An analysis of the work's decompiled code revealed a battery of attacks by a knowledgeable insider, and demonstrated a number of security weaknesses. The attack occurred in an open network, and little can be inferred about the vulnerabilities of closed networks used for critical operations. The attack showed that passwork protection procedures need review and strengthening. It showed that sets of mutually trusting computers need to be carefully controlled. Sharp public reaction crystalized into a demand for user awareness and accountability in a networked world.
Hazard interactions and interaction networks (cascades) within multi-hazard methodologies
NASA Astrophysics Data System (ADS)
Gill, Joel C.; Malamud, Bruce D.
2016-08-01
This paper combines research and commentary to reinforce the importance of integrating hazard interactions and interaction networks (cascades) into multi-hazard methodologies. We present a synthesis of the differences between multi-layer single-hazard approaches and multi-hazard approaches that integrate such interactions. This synthesis suggests that ignoring interactions between important environmental and anthropogenic processes could distort management priorities, increase vulnerability to other spatially relevant hazards or underestimate disaster risk. In this paper we proceed to present an enhanced multi-hazard framework through the following steps: (i) description and definition of three groups (natural hazards, anthropogenic processes and technological hazards/disasters) as relevant components of a multi-hazard environment, (ii) outlining of three types of interaction relationship (triggering, increased probability, and catalysis/impedance), and (iii) assessment of the importance of networks of interactions (cascades) through case study examples (based on the literature, field observations and semi-structured interviews). We further propose two visualisation frameworks to represent these networks of interactions: hazard interaction matrices and hazard/process flow diagrams. Our approach reinforces the importance of integrating interactions between different aspects of the Earth system, together with human activity, into enhanced multi-hazard methodologies. Multi-hazard approaches support the holistic assessment of hazard potential and consequently disaster risk. We conclude by describing three ways by which understanding networks of interactions contributes to the theoretical and practical understanding of hazards, disaster risk reduction and Earth system management. Understanding interactions and interaction networks helps us to better (i) model the observed reality of disaster events, (ii) constrain potential changes in physical and social vulnerability between successive hazards, and (iii) prioritise resource allocation for mitigation and disaster risk reduction.
FuzzyFusion: an application architecture for multisource information fusion
NASA Astrophysics Data System (ADS)
Fox, Kevin L.; Henning, Ronda R.
2009-04-01
The correlation of information from disparate sources has long been an issue in data fusion research. Traditional data fusion addresses the correlation of information from sources as diverse as single-purpose sensors to all-source multi-media information. Information system vulnerability information is similar in its diversity of sources and content, and in the desire to draw a meaningful conclusion, namely, the security posture of the system under inspection. FuzzyFusionTM, A data fusion model that is being applied to the computer network operations domain is presented. This model has been successfully prototyped in an applied research environment and represents a next generation assurance tool for system and network security.
NASA Astrophysics Data System (ADS)
Tahri, Meryem; Maanan, Mohamed; Hakdaoui, Mustapha
2016-04-01
This paper shows a method to assess the vulnerability of coastal risks such as coastal erosion or submarine applying Fuzzy Analytic Hierarchy Process (FAHP) and spatial analysis techniques with Geographic Information System (GIS). The coast of the Mohammedia located in Morocco was chosen as the study site to implement and validate the proposed framework by applying a GIS-FAHP based methodology. The coastal risk vulnerability mapping follows multi-parametric causative factors as sea level rise, significant wave height, tidal range, coastal erosion, elevation, geomorphology and distance to an urban area. The Fuzzy Analytic Hierarchy Process methodology enables the calculation of corresponding criteria weights. The result shows that the coastline of the Mohammedia is characterized by a moderate, high and very high level of vulnerability to coastal risk. The high vulnerability areas are situated in the east at Monika and Sablette beaches. This technical approach is based on the efficiency of the Geographic Information System tool based on Fuzzy Analytical Hierarchy Process to help decision maker to find optimal strategies to minimize coastal risks.
Data Hemorrhages in the Health-Care Sector
NASA Astrophysics Data System (ADS)
Johnson, M. Eric
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including privacy violations, medical fraud, financial identity theft, and medical identity theft. We also examine the types and sources of data hemorrhages, focusing on inadvertent disclosures. Through an analysis of leaked files, we examine data hemorrhages stemming from inadvertent disclosures on internet-based file sharing networks. We characterize the security risk for a group of health-care organizations using a direct analysis of leaked files. These files contained highly sensitive medical and personal information that could be maliciously exploited by criminals seeking to commit medical and financial identity theft. We also present evidence of the threat by examining user-issued searches. Our analysis demonstrates both the substantial threat and vulnerability for the health-care sector and the unique complexity exhibited by the US health-care system.
An R package for the design, analysis and operation of reservoir systems
NASA Astrophysics Data System (ADS)
Turner, Sean; Ng, Jia Yi; Galelli, Stefano
2016-04-01
We present a new R package - named "reservoir" - which has been designed for rapid and easy routing of runoff through storage. The package comprises well-established tools for capacity design (e.g., the sequent peak algorithm), performance analysis (storage-yield-reliability and reliability-resilience-vulnerability analysis) and release policy optimization (Stochastic Dynamic Programming). Operating rules can be optimized for water supply, flood control and amenity objectives, as well as for maximum hydropower production. Storage-depth-area relationships are in-built, allowing users to incorporate evaporation from the reservoir surface. We demonstrate the capabilities of the software for global studies using thousands of reservoirs from the Global Reservoir and Dam (GRanD) database fed by historical monthly inflow time series from a 0.5 degree gridded global runoff dataset. The package is freely available through the Comprehensive R Archive Network (CRAN).
Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan
2017-01-01
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients’ personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack. PMID:29244776
NASA Astrophysics Data System (ADS)
Papakosta, Panagiota; Botzler, Sebastian; Krug, Kai; Straub, Daniel
2013-04-01
Mediterranean climate type areas have always been experiencing fire events. However, population growth and expansion of urban centers into wildland areas during the 20th century (expansion of wildland-urban interface) has increased the threat to humans and their activities. Life and property losses, damage on infrastructure and crops, and forest degradation are some of the damages caused by wildfires. Although fires repeatedly occur along the Mediterranean basin, not all areas have experienced severe consequences. The extent of damage by wildfires is influenced by several factors, such as population density, vegetation type, topography, weather conditions and social preparedness [1]. Wildfire consequence estimation by means of vulnerability and exposure indicators is an essential part of wildfire risk analysis. Vulnerability indicators express the conditions that increase the susceptibility of a site to the impact of wildfires and exposure indicators describe the elements at risk [2],[3]. Appropriate indicators to measure wildfire vulnerability and exposure can vary with scale and site. The consequences can be classified into economic, social, environmental and safety, and they can be tangible (human life losses, buildings damaged) or intangible (damage of cultural heritage site). As a consequence, a variety of approaches exist and there is a lack of generalized unified easy-to-implement methodologies. In this study we present a methodology for measuring consequences of wildfires in a Mediterranean area in the mesoscale (1 km² spatial resolution). Vulnerability and exposure indicators covering all consequence levels are identified and their interrelations are stressed. Variables such as building materials, roofing type, and average building values are included in the economic vulnerability level. Safety exposure is expressed by population density, demographic structure, street density and distance to closest fire station. Environmental vulnerability of protected areas and rare species is also included. Presence of cultural heritage sites, power stations and power line network influence social exposure. The conceptual framework is demonstrated with a Bayesian Network (BN). The BN model incorporates empirical observation, physical models and expert knowledge; it can also explicitly account for uncertainty in the indicators. The proposed model is applied to the island of Cyprus. Maps support the demonstration of results. [1] Keeley, J.E.; Bond, W.J.; Bradstock, R.A.; Pausas, J.G.; Rundel, P.W. (2012): Fire in Mediterranean ecosystems: ecology, evolution and management. Cambridge University Press, New York, USA. [2] UN/ISDR (International Strategy for Disaster Reduction (2004): Living with Risk: A Global Review of Disaster Reduction Initiatives, Geneva, UN Publications. [3] Birkmann, J. (2006): Measuring vulnerability to natural hazards: towards disaster resilient societies. United Nations University Press, Tokyo, Japan.
Genie: An Inference Engine with Applications to Vulnerability Analysis.
1986-06-01
Stanford Artifcial intelligence Laboratory, 1976. 15 D. A. Waterman and F. Hayes-Roth, eds. Pattern-Directed Inference Systems. Academic Press, Inc...Continue an reverse aide It nlecessary mid Identify by block rnmbor) ; f Expert Systems Artificial Intelligence % Vulnerability Analysis Knowledge...deduction it is used wherever possible in data -driven mode (forward chaining). Production rules - JIM 0 g79OOFMV55@S I INCLASSTpnF SECURITY CLASSIFICATION OF
Baghapour, Mohammad Ali; Fadaei Nobandegani, Amir; Talebbeydokhti, Nasser; Bagherzadeh, Somayeh; Nadiri, Ata Allah; Gharekhani, Maryam; Chitsazan, Nima
2016-01-01
Extensive human activities and unplanned land uses have put groundwater resources of Shiraz plain at a high risk of nitrate pollution, causing several environmental and human health issues. To address these issues, water resources managers utilize groundwater vulnerability assessment and determination of protection. This study aimed to prepare the vulnerability maps of Shiraz aquifer by using Composite DRASTIC index, Nitrate Vulnerability index, and artificial neural network and also to compare their efficiency. The parameters of the indexes that were employed in this study are: depth to water table, net recharge, aquifer media, soil media, topography, impact of the vadose zone, hydraulic conductivity, and land use. These parameters were rated, weighted, and integrated using GIS, and then, used to develop the risk maps of Shiraz aquifer. The results indicated that the southeastern part of the aquifer was at the highest potential risk. Given the distribution of groundwater nitrate concentrations from the wells in the underlying aquifer, the artificial neural network model offered greater accuracy compared to the other two indexes. The study concluded that the artificial neural network model is an effective model to improve the DRASTIC index and provides a confident estimate of the pollution risk. As intensive agricultural activities are the dominant land use and water table is shallow in the vulnerable zones, optimized irrigation techniques and a lower rate of fertilizers are suggested. The findings of our study could be used as a scientific basis in future for sustainable groundwater management in Shiraz plain.
Modelling social vulnerability in sub-Saharan West Africa using a geographical information system
Arokoyu, Samuel B.
2015-01-01
In recent times, disasters and risk management have gained significant attention, especially with increasing awareness of the risks and increasing impact of natural and other hazards especially in the developing world. Vulnerability, the potential for loss of life or property from disaster, has biophysical or social dimensions. Social vulnerability relates to societal attributes which has negative impacts on disaster outcomes. This study sought to develop a spatially explicit index of social vulnerability, thus addressing the dearth of research in this area in sub-Saharan Africa. Nineteen variables were identified covering various aspects. Descriptive analysis of these variables revealed high heterogeneity across the South West region of Nigeria for both the state and the local government areas (LGAs). Feature identification using correlation analysis identified six important variables. Factor analysis identified two dimensions, namely accessibility and socioeconomic conditions, from this subset. A social vulnerability index (SoVI) showed that Ondo and Ekiti have more vulnerable LGAs than other states in the region. About 50% of the LGAs in Osun and Ogun have a relatively low social vulnerability. Distribution of the SoVI shows that there are great differences within states as well as across regions. Scores of population density, disability and poverty have a high margin of error in relation to mean state scores. The study showed that with a geographical information system there are opportunities to model social vulnerability and monitor its evolution and dynamics across the continent.
How Unstable Are Complex Financial Systems? Analyzing an Inter-bank Network of Credit Relations
NASA Astrophysics Data System (ADS)
Sinha, Sitabhra; Thess, Maximilian; Markose, Sheri
The recent worldwide economic crisis of 2007-09 has focused attention on the need to analyze systemic risk in complex financial networks. We investigate the problem of robustness of such systems in the context of the general theory of dynamical stability in complex networks and, in particular, how the topology of connections influence the risk of the failure of a single institution triggering a cascade of successive collapses propagating through the network. We use data on bilateral liabilities (or exposure) in the derivatives market between 202 financial intermediaries based in USA and Europe in the last quarter of 2009 to empirically investigate the network structure of the over-the-counter (OTC) derivatives market. We observe that the network exhibits both heterogeneity in node properties and the existence of communities. It also has a prominent core-periphery organization and can resist large-scale collapse when subjected to individual bank defaults (however, failure of any bank in the core may result in localized collapse of the innermost core with substantial loss of capital) but is vulnerable to system-wide breakdown as a result of an accompanying liquidity crisis.
NASA Astrophysics Data System (ADS)
Navaratne, Uditha Sudheera
The smart grid is the future of the power grid. Smart meters and the associated network play a major role in the distributed system of the smart grid. Advance Metering Infrastructure (AMI) can enhance the reliability of the grid, generate efficient energy management opportunities and many innovations around the future smart grid. These innovations involve intense research not only on the AMI network itself but as also on the influence an AMI network can have upon the rest of the power grid. This research describes a smart meter testbed with hardware in loop that can facilitate future research in an AMI network. The smart meters in the testbed were developed such that their functionality can be customized to simulate any given scenario such as integrating new hardware components into a smart meter or developing new encryption algorithms in firmware. These smart meters were integrated into the power system simulator to simulate the power flow variation in the power grid on different AMI activities. Each smart meter in the network also provides a communication interface to the home area network. This research delivers a testbed for emulating the AMI activities and monitoring their effect on the smart grid.
Cyber War Game in Temporal Networks
Cho, Jin-Hee; Gao, Jianxi
2016-01-01
In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with minimum effort. Given the system goal states of attackers and defenders, we study what strategies attackers or defenders can take to reach their respective system goal state (i.e., winning system state) with minimum resource consumption. However, due to the dynamics of a network caused by a node’s mobility, failure or its resource depletion over time or action(s), this optimization problem becomes NP-complete. We propose two heuristic strategies in a greedy manner based on a node’s two characteristics: resource level and influence based on k-hop reachability. We analyze complexity and optimality of each algorithm compared to optimal solutions for a small-scale static network. Further, we conduct a comprehensive experimental study for a large-scale temporal network to investigate best strategies, given a different environmental setting of network temporality and density. We demonstrate the performance of each strategy under various scenarios of attacker/defender strategies in terms of win probability, resource consumption, and system vulnerability. PMID:26859840
Matos, Vanina; Barcellos, Christovam; Camargo, Luiz Octávio de Lima
2013-01-01
This article examines how a group of tourists perceives health issues related to safety, prevention and health care during their travels. Interviews were conducted with Brazilian tourists visiting the city of Rio de Janeiro, as well as local residents leaving the city on trips. The interviews were analyzed in accordance with the dimensions of vulnerability, information, prevention and health care, from which vulnerability emerged as a category of analysis. The reports of the trajectory of the tourists made it possible to identify problems and opportunities that could be used by the health sector for actions of prevention and promotion. The means of transport determines the trajectory of tourists and their security alternatives. Traveling in groups and visiting tourist attractions are seen as protective factors, which reinforces the role of information and social support networks as resources used by tourists in the absence of specific policies geared to this highly mobile and vulnerable population group.
IT Security Support for the Spaceport Command Control System Development
NASA Technical Reports Server (NTRS)
Varise, Brian
2014-01-01
My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.
Trust-Based Security Level Evaluation Using Bayesian Belief Networks
NASA Astrophysics Data System (ADS)
Houmb, Siv Hilde; Ray, Indrakshi; Ray, Indrajit; Chakraborty, Sudip
Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed to support core business processes. Also, modern systems are subject to a highly competitive market, often demanding rapid development cycles, short life-time, short time-to-market, and small budgets. Security evaluation standards, such as ISO 14508 Common Criteria and ISO/IEC 27002, are not adequate for evaluating the security of many modern systems for resource limitations, time-to-market, and other constraints. Towards this end, we propose an alternative time and cost effective approach for evaluating the security level of a security solution, system or part thereof. Our approach relies on collecting information from different sources, who are trusted to varying degrees, and on using a trust measure to aggregate available information when deriving security level. Our approach is quantitative and implemented as a Bayesian Belief Network (BBN) topology, allowing us to reason over uncertain information and seemingly aggregating disparate information. We illustrate our approach by deriving the security level of two alternative Denial of Service (DoS) solutions. Our approach can also be used in the context of security solution trade-off analysis.
Sensor Anomaly Detection in Wireless Sensor Networks for Healthcare
Haque, Shah Ahsanul; Rahman, Mustafizur; Aziz, Syed Mahfuzul
2015-01-01
Wireless Sensor Networks (WSN) are vulnerable to various sensor faults and faulty measurements. This vulnerability hinders efficient and timely response in various WSN applications, such as healthcare. For example, faulty measurements can create false alarms which may require unnecessary intervention from healthcare personnel. Therefore, an approach to differentiate between real medical conditions and false alarms will improve remote patient monitoring systems and quality of healthcare service afforded by WSN. In this paper, a novel approach is proposed to detect sensor anomaly by analyzing collected physiological data from medical sensors. The objective of this method is to effectively distinguish false alarms from true alarms. It predicts a sensor value from historic values and compares it with the actual sensed value for a particular instance. The difference is compared against a threshold value, which is dynamically adjusted, to ascertain whether the sensor value is anomalous. The proposed approach has been applied to real healthcare datasets and compared with existing approaches. Experimental results demonstrate the effectiveness of the proposed system, providing high Detection Rate (DR) and low False Positive Rate (FPR). PMID:25884786
NASA Astrophysics Data System (ADS)
Arosio, Marcello; Martina, Mario L. V.
2017-04-01
In the last years, the relations and interactions between multi-hazards, vulnerability, exposure and resilience spheres are assuming more and more attention and the scientific community recognized that they are very dynamic, complex and interconnected. The traditional approaches define risk as the potential economic, social and environmental consequences due to a hazardous phenomenon in a specific period. Although there have been major improvements in recent years, there are still some limitation in term of a holistic approach that is able to include the emergent value hidden in the relation and interaction between the different spheres. Furthermore, the emergent behaviour of a society makes the collective risk greater than the sum of the parts and this requires a holistic, systematic and integrated approach. For this reason, it is important to consider the connections between elements to assess properly the vulnerability of systems. In a system (e.g. road, hospital and ecological network, etc.), or in a System of System (e.g. socio-technical urban service), there are critical elements that, beyond the intrinsic vulnerability, can be characterize by greater or lower vulnerability because of their physical, geographical, cyber or logical connections. To understand the system response to a perturbation, and therefore its resilience, is necessary not only to represent but also to quantify the relative importance of the elements and their interconnections. To this aim, we propose an innovative approach in the field of natural risk assessment based on the properties of graph G=(N,L). A graph consists of two sets N (nodes) and L (links): the nodes represent the single exposed elements (physical, social, environmental, etc.) to a hazard, while the links (or connections) represent the interaction between the elements. This approach encourages the risk assessment to a new prospective: from reductionist to holistic. The final goal is to provide insight in understanding how to quantify integrated collective vulnerability, resilience and risk.
Ibrahim, George M; Cassel, Daniel; Morgan, Benjamin R; Smith, Mary Lou; Otsubo, Hiroshi; Ochi, Ayako; Taylor, Margot; Rutka, James T; Snead, O Carter; Doesburg, Sam
2014-10-01
The effects of interictal epileptiform discharges on neurocognitive development in children with medically-intractable epilepsy are poorly understood. Such discharges may have a deleterious effect on the brain's intrinsic connectivity networks, which reflect the organization of functional networks at rest, and in turn on neurocognitive development. Using a combined functional magnetic resonance imaging-magnetoencephalography approach, we examine the effects of interictal epileptiform discharges on intrinsic connectivity networks and neurocognitive outcome. Functional magnetic resonance imaging was used to determine the location of regions comprising various intrinsic connectivity networks in 26 children (7-17 years), and magnetoencephalography data were reconstructed from these locations. Inter-regional phase synchronization was then calculated across interictal epileptiform discharges and graph theoretical analysis was applied to measure event-related changes in network topology in the peri-discharge period. The magnitude of change in network topology (network resilience/vulnerability) to interictal epileptiform discharges was associated with neurocognitive outcomes and functional magnetic resonance imaging networks using dual regression. Three main findings are reported: (i) large-scale network changes precede and follow interictal epileptiform discharges; (ii) the resilience of network topologies to interictal discharges is associated with stronger resting-state network connectivity; and (iii) vulnerability to interictal discharges is associated with worse neurocognitive outcomes. By combining the spatial resolution of functional magnetic resonance imaging with the temporal resolution of magnetoencephalography, we describe the effects of interictal epileptiform discharges on neurophysiological synchrony in intrinsic connectivity networks and establish the impact of interictal disruption of functional networks on cognitive outcome in children with epilepsy. The association between interictal discharges, network changes and neurocognitive outcomes suggests that it is of clinical importance to suppress discharges to foster more typical brain network development in children with focal epilepsy. © The Author (2014). Published by Oxford University Press on behalf of the Guarantors of Brain. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
A Two-Factor Model of Relapse/Recurrence Vulnerability in Unipolar Depression
Farb, Norman A. S.; Irving, Julie A.; Anderson, Adam K.; Segal, Zindel V.
2015-01-01
The substantial health burden associated with Major Depressive Disorder is a product of both its high prevalence and the significant risk of relapse, recurrence and chronicity. Establishing recurrence vulnerability factors (VFs) could improve the long-term management of MDD by identifying the need for further intervention in seemingly recovered patients. We present a model of sensitization in depression vulnerability, with an emphasis on the integration of behavioral and neural systems accounts. Evidence suggests that VFs fall into two categories: dysphoric attention and dysphoric elaboration. Dysphoric attention is driven by fixation on negative life events, and is characterized behaviorally by reduced executive control, and neurally by elevated activity in the brain’s salience network. Dysphoric elaboration is driven by rumination that promotes over-general self and contextual appraisals, and is characterized behaviorally by dysfunctional attitudes, and neurally by elevated connectivity within normally-distinct prefrontal brain networks. While, at present, few prospective VF studies exist from which to catalogue a definitive neurobehavioral account, extant data support the value of the proposed two-factor model. Measuring the continued presence of these two VFs during recovery may more accurately identify remitted patients who would benefit from targeted prophylactic intervention. PMID:25688431
Exploring pathways for building trust in vaccination and strengthening health system resilience.
Ozawa, Sachiko; Paina, Ligia; Qiu, Mary
2016-11-15
Trust is critical to generate and maintain demand for vaccines in low and middle income countries. However, there is little documentation on how health system insufficiencies affect trust in vaccination and the process of re-building trust once it has been compromised. We reflect on how disruptions to immunizations systems can affect trust in vaccination and can compromise vaccine utilization. We then explore key pathways for overcoming system vulnerabilities in order to restore trust, to strengthen the resilience of health systems and communities, and to promote vaccine utilization. Utilizing secondary data and a review of the literature, we developed a causal loop diagram (CLD) to map the determinants of building trust in immunizations. Using the CLD, we devised three scenarios to illustrate common vulnerabilities that compromise trust and pathways to strengthen trust and utilization of vaccines, specifically looking at weak health systems, harmful communication channels, and role of social capital. Spill-over effects, interactions and other dynamics in the CLD were then examined to assess leverage points to counter these vulnerabilities. Trust in vaccination arises from the interactions among experiences with the health system, the various forms of communication and social capital - both external and internal to communities. When experiencing system-wide shocks such as the case in Ebola-affected countries, distrust is reinforced by feedback between the health and immunization systems where distrust often lingers even after systems are restored and spills over beyond vaccination in the broader health system. Vaccine myths or anti-vaccine movements reinforce distrust. Social capital - the collective value of social networks of community members - plays a central role in increasing levels of trust. Trust is important, yet underexplored, in the context of vaccine utilization. Using a CLD to illustrate various scenarios helped to explore how common health and vaccine vulnerabilities can reinforce and spill over distrust through vicious, reinforcing feedback. Restoring trust requires a careful balance between eliminating vulnerabilities and strengthening social capital and interactions among communication channels.
2010-09-23
Chris, ―An Analysis of Breaches Affecting 500 or More Individuals in Healthcare‖, HITRUST, August 2010. 2. ―2009 Annual Study: Cost of a Data Breach ,‖ Ponemon...penalties for willful neglect • Loss of human life? — While many concerns focus on a data breach , some vulnerabilities can be more severe
Structural and functional properties of spatially embedded scale-free networks.
Emmerich, Thorsten; Bunde, Armin; Havlin, Shlomo
2014-06-01
Scale-free networks have been studied mostly as non-spatially embedded systems. However, in many realistic cases, they are spatially embedded and these constraints should be considered. Here, we study the structural and functional properties of a model of scale-free (SF) spatially embedded networks. In our model, both the degree and the length of links follow power law distributions as found in many real networks. We show that not all SF networks can be embedded in space and that the largest degree of a node in the network is usually smaller than in nonembedded SF networks. Moreover, the spatial constraints (each node has only few neighboring nodes) introduce degree-degree anticorrelations (disassortativity) since two high degree nodes cannot stay close in space. We also find significant effects of space embedding on the hopping distances (chemical distance) and the vulnerability of the networks.
Thermal analysis of combinatorial solid geometry models using SINDA
NASA Technical Reports Server (NTRS)
Gerencser, Diane; Radke, George; Introne, Rob; Klosterman, John; Miklosovic, Dave
1993-01-01
Algorithms have been developed using Monte Carlo techniques to determine the thermal network parameters necessary to perform a finite difference analysis on Combinatorial Solid Geometry (CSG) models. Orbital and laser fluxes as well as internal heat generation are modeled to facilitate satellite modeling. The results of the thermal calculations are used to model the infrared (IR) images of targets and assess target vulnerability. Sample analyses and validation are presented which demonstrate code products.
Insolvency and contagion in the Brazilian interbank market
NASA Astrophysics Data System (ADS)
Souza, Sergio R. S.; Tabak, Benjamin M.; Silva, Thiago C.; Guerra, Solange M.
2015-08-01
This paper proposes a new way to model and analyze contagion in interbank networks. We use a unique dataset from the Brazilian financial system and include all active financial intermediaries. We show that the contagion chain has a short propagation path. We find that first-round contagion is generated only by banks and that medium-sized banks can generate contagion, which implies that size is not the sole determinant of importance within networks. Most vulnerable financial institutions are not banks. Finally, we compute a lower bound for the financial system expected losses in a 1-year horizon. The results contribute to the development of a financial stability-monitoring toolkit.
Interfacing with in-Situ Data Networks during the Arctic Boreal Vulnerability Experiment (ABoVE)
NASA Astrophysics Data System (ADS)
McInerney, M.; Griffith, P. C.; Duffy, D.; Hoy, E.; Schnase, J. L.; Sinno, S.; Thompson, J. H.
2014-12-01
The Arctic Boreal Vulnerability Experiment (ABoVE) is designed to improve understanding of the causes and impacts of ecological changes in Arctic/boreal regions, and will integrate field-based studies, modeling, and data from airborne and satellite remote sensing. ABoVE will result in a fuller understanding of ecosystem vulnerability and resilience to environmental change in the Arctic and boreal regions of western North America, and provide scientific information required to develop options for societal responses to the impacts of these changes. The studies sponsored by NASA during ABoVE will be coordinated with research and in-situ monitoring activities being sponsored by a number of national and international partners. The NASA Center for Climate Simulation at the Goddard Space Flight Center has partnered with the NASA Carbon Cycle & Ecosystems Office to create a science cloud designed for this field campaign - the ABoVE Science Cloud (ASC). The ASC combines high performance computing with emerging technologies to create an environment specifically designed for large-scale modeling, analysis of remote sensing data, copious disk storage with integrated data management, and integration of core variables from in-situ networks identified by the ABoVE Science Definition Team. In this talk, we will present the scientific requirements driving the development of the ABoVE Science Cloud, discuss the necessary interfaces, both computational and human, with in-situ monitoring networks, and show examples of how the ASC is being used to meet the needs of the ABoVE campaign.
NASA Astrophysics Data System (ADS)
Lee, Sang-Hyun; Mohtar, Rabi H.; Choi, Jin-Yong; Yoo, Seung-Hwan
2016-10-01
This study aims to analyze the characteristics of global virtual water trade (GVWT), such as the connectivity of each trader, vulnerable importers, and influential countries, using degree and eigenvector centrality during the period 2006-2010. The degree centrality was used to measure the connectivity, and eigenvector centrality was used to measure the influence on the entire GVWT network. Mexico, Egypt, China, the Republic of Korea, and Japan were classified as vulnerable importers, because they imported large quantities of virtual water with low connectivity. In particular, Egypt had a 15.3 Gm3 year-1 blue water saving effect through GVWT: the vulnerable structure could cause a water shortage problem for the importer. The entire GVWT network could be changed by a few countries, termed "influential traders". We used eigenvector centrality to identify those influential traders. In GVWT for food crops, the USA, Russian Federation, Thailand, and Canada had high eigenvector centrality with large volumes of green water trade. In the case of blue water trade, western Asia, Pakistan, and India had high eigenvector centrality. For feed crops, the green water trade in the USA, Brazil, and Argentina was the most influential. However, Argentina and Pakistan used high proportions of internal water resources for virtual water export (32.9 and 25.1 %); thus other traders should carefully consider water resource management in these exporters.
Hames, Elizabeth; Stoler, Justin; Emrich, Christopher T; Tewary, Sweta; Pandya, Naushira
2017-11-10
We define, map, and analyze geodemographic patterns of socially and medically vulnerable older adults within the tri-county region of South Florida. We apply principal components analysis (PCA) to a set of previously identified indicators of social and medical vulnerability at the census tract level. We create and map age-stratified vulnerability scores using a geographic information system (GIS), and use spatial analysis techniques to identify patterns and interactions between social and medical vulnerability. Key factors contributing to social vulnerability in areas with higher numbers of older adults include age, large household size, and Hispanic ethnicity. Medical vulnerability in these same areas is driven by disease burden, access to emergency cardiac services, availability of nursing home and hospice beds, access to home health care, and available mental health services. Age-dependent areas of social vulnerability emerge in Broward County, whereas age-dependent areas of medical vulnerability emerge in Palm Beach County. Older-adult social and medical vulnerability interact differently throughout the study area. Spatial analysis of older adult social and medical vulnerability using PCA and GIS can help identify age-dependent pockets of vulnerability that are not easily identifiable in a populationwide analysis; improve our understanding of the dynamic spatial organization of health care, health care needs, access to care, and outcomes; and ultimately serve as a tool for health care planning. © The Author 2016. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
2006-09-01
Telecommunications and Information Administration Telecom Telecommunications Telco Telecommunications Company VBIED Vehicle Borne Improvised Explosive... effect the damage to one system or sector would have on another. These concentrations of the sector’s key assets are becoming attractive targets even...critical U.S. infrastructures, such as the nation’s telephone system . Companies make it easier to control their networks from remote locations to save
CH-47C Vulnerability Reduction Modification Program - Fly-by-Wire Backup Demonstration
1976-08-01
Actuator Position for Combined Axis Input ............................. 91 4 Systems Assessment Summary................... 95 C-1 Instrumentation Parameters ...SERVO CARD jEETO FROM MIXERS SUfEV __________ HYLIC AMPL AMPLVLE SHUT-O- DOWN DC PWR LOGIC REA MIONITOR SUMMER *O:EO SWITCH- BUFFER OVER 1 NETWORK...and ranels (Figures 12 and 13). The existing DELS preflight test set, which provides access to the system parameters , was installed along with the
Protecting clinical data in PACS, teleradiology systems, and research environments
NASA Astrophysics Data System (ADS)
Meissner, Marion C.; Collmann, Jeff R.; Tohme, Walid G.; Mun, Seong K.
1997-05-01
As clinical data is more widely stored in electronic patient record management systems and transmitted over the Internet and telephone lines, it becomes more accessible and therefore more useful, but also more vulnerable. Computer systems such as PACS, telemedicine applications, and medical research networks must protect against accidental or deliberate modification, disclosure, and violation of patient confidentiality in order to be viable. Conventional wisdom in the medical field and among lawmakers legislating the use of electronic medical records suggests that, although it may improve access to information, an electronic medical record cannot be as secure as a traditional paper record. This is not the case. Information security is a well-developed field in the computer and communications industry. If medical information systems, such as PACS, telemedicine applications, and research networks, properly apply information security techniques, they can ensure the accuracy and confidentiality of their patient information and even improve the security of their data over a traditional paper record. This paper will elaborate on some of these techniques and discuss how they can be applied to medical information systems. The following systems will be used as examples for the analysis: a research laboratory at Georgetown University Medical Center, the Deployable Radiology system installed to support the US Army's peace- keeping operation in Bosnia, a kidney dialysis telemedicine system in Washington, D.C., and various experiences with implementing and integrating PACS.
A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Stelios, Yannis; Papayanoulas, Nikos; Trakadas, Panagiotis; Maniatis, Sotiris; Leligou, Helen C.; Zahariadis, Theodore
Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.
Towards a Standard for Highly Secure SCADA Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carlson, R.
1998-09-25
The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied tomore » automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the requirements analysis for a highly secure SCADA system. The fi-arnework for the discussion consists of the identification of SCADA security investment areas coupled with the tradeoffs that will force compromises in the solution. For example, computational and bandwidth requirements of a security standard could force the replacement of entire SCADA systems. The requirements for a real-time response in a cascading electric power failure could pose limitations on authentication and encryption mechanisms. The shortest path to the development of a high securi~ SC.ADA standard will be achieved by leveraging existing standards efforts and ensuring that security is being properly addressed in those standards. The Utility Communications Architecture 2.o (UC@, for real-time utili~ decision control, represents one such standard. The development of a SCADA secwiy specification is a complex task that will benefit from a systems engineering approach.« less
Jordan Water Project: an interdisciplinary evaluation of freshwater vulnerability and security
NASA Astrophysics Data System (ADS)
Gorelick, S.; Yoon, J.; Rajsekhar, D.; Muller, M. F.; Zhang, H.; Gawel, E.; Klauer, B.; Klassert, C. J. A.; Sigel, K.; Thilmant, A.; Avisse, N.; Lachaut, T.; Harou, J. J.; Knox, S.; Selby, P. D.; Mustafa, D.; Talozi, S.; Haddad, Y.; Shamekh, M.
2016-12-01
The Jordan Water Project, part of the Belmont Forum projects, is an interdisciplinary, international research effort focused on evaluation of freshwater security in Jordan, one of the most water-vulnerable countries in the world. The team covers hydrology, water resources systems analysis, economics, policy evaluation, geography, risk and remote sensing analyses, and model platform development. The entire project team communally engaged in construction of an integrated hydroeconomic model for water supply policy evaluation. To represent water demand and allocation behavior at multiple levels of decision making,the model integrates biophysical modules that simulate natural and engineered hydrologic phenomena with human behavioral modules. Hydrologic modules include spatially-distributed groundwater and surface-water models for the major aquifers and watersheds throughout Jordan. For the human modules, we adopt a multi-agent modeling approach to represent decision-making processes. The integrated model was developed in Pynsim, a new open-source, object-oriented platform in Python for network-based water resource systems. We continue to explore the impacts of future scenarios and interventions.This project had tremendous encouragement and data support from Jordan's Ministry of Water and Irrigation. Modeling technology is being transferred through a companion NSF/USAID PEER project awarded toJordan University of Science and Technology. Individual teams have also conducted a range of studies aimed at evaluating Jordanian and transboundary surface water and groundwater systems. Surveys, interviews, and econometric analyses enabled us to better understandthe behavior of urban households, farmers, private water resellers, water use pattern of the commercial sector and irrigation water user associations. We analyzed nationwide spatial and temporal statistical trends in rainfall, developed urban and national comparative metrics to quantify water supply vulnerability, improved remote sensing methods to estimate crop-water use, and evaluated the impacts of climate change on future drought severity.
Where to go? Strategic modelling of access to emergency shelters in Mozambique.
Gall, Melanie
2004-03-01
This paper, through spatial-analysis techniques, examines the accessibility of emergency shelters for vulnerable populations, and outlines the benefits of an extended and permanently established shelter network in central Mozambique. The raster-based modelling approach considers data on land cover, locations of accommodation centres in 2000, settlements and infrastructure. The shelter analysis is a two-step process determining access for vulnerable communities first, followed by a suitability analysis for additional emergency shelter sites. The results indicate the need for both retrofitting existing infrastructure (schools, health posts) to function as shelters during an emergency, and constructing new facilities - at best multi-purpose facilities that can serve as social infrastructure and shelter. Besides assessing the current situation in terms of availability and accessibility of emergency shelters, this paper provides an example of evaluating the effectiveness of humanitarian assistance without conventional mechanisms like food tonnage and number of beneficiaries.
Ramanadhan, Shoba; Nagler, Rebekah H; McCloud, Rachel; Kohler, Racquel; Viswanath, Kasisomayajula
2017-02-01
Graphic health warnings (GHWs) on cigarette packages present an important tobacco control opportunity, particularly for vulnerable populations suffering a disproportionate tobacco burden. One mechanism by which GHWs may influence smoking outcomes is by prompting interpersonal discussions within health discussion networks (the set of personal contacts with whom an individual discusses health issues). The study examined the association between GHW-prompted conversations within health discussion networks and key tobacco-related outcomes, with attention to valence and content of the discussions. Between August 2013 and April 2014, we recruited 1200 individuals from three communities in Massachusetts, emphasizing recruitment of individuals of low socioeconomic position (SEP) and members of other selected vulnerable groups. Respondents were exposed to the nine GHWs proposed by the FDA in 2011, asked a series of questions, and assessed at follow-up a few weeks later. A total of 806 individuals were included in this analysis. About 51% of respondents reported having a health discussion network, with significantly lower reports among African-Americans and Hispanics compared to Whites. Around 70% of respondents (smokers and nonsmokers) with health discussion networks reported having one or more conversations about the GHWs with network members, the bulk of which were negative and focused on warning others about smoking. For smokers, we found a small but positive association between the percentage of network conversations that were negative and reports of quit attempts. The results point to a potential mechanism by which GHWs may impact tobacco-related outcomes, prompting further inquiry into the role of health discussion networks (and discussion networks, more broadly) in tobacco control among low SEP individuals. Copyright © 2017 Elsevier Ltd. All rights reserved.
Ramanadhan, Shoba; Nagler, Rebekah H.; McCloud, Rachel; Kohler, Racquel; Viswanath, Kasisomayajula
2017-01-01
Rationale Graphic health warnings (GHWs) on cigarette packages present an important tobacco control opportunity, particularly for vulnerable populations suffering a disproportionate tobacco burden. One mechanism by which GHWs may influence smoking outcomes is by prompting interpersonal discussions within health discussion networks (the set of personal contacts with whom an individual discusses health issues). Objective The study examined the association between GHW-prompted conversations within health discussion networks and key tobacco-related outcomes, with attention to valence and content of the discussions. Method Between August 2013 and April 2014, we recruited 1200 individuals from three communities in Massachusetts, emphasizing recruitment of individuals of low socioeconomic position (SEP) and members of other selected vulnerable groups. Respondents were exposed to the nine GHWs proposed by the FDA in 2011, asked a series of questions, and assessed at follow-up a few weeks later. Results A total of 806 individuals were included in this analysis. About 51% of respondents reported having a health discussion network, with significantly lower reports among African-Americans and Hispanics compared to Whites. Around 70% of respondents (smokers and nonsmokers) with health discussion networks reported having one or more conversations about the GHWs with network members, the bulk of which were negative and focused on warning others about smoking. For smokers, we found a small but positive association between the percentage of network conversations that were negative and reports of quit attempts. Conclusion The results point to a potential mechanism by which GHWs may impact tobacco-related outcomes, prompting further inquiry into the role of health discussion networks (and discussion networks, more broadly) in tobacco control among low SEP individuals. PMID:28108053
Mining Bug Databases for Unidentified Software Vulnerabilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dumidu Wijayasekara; Milos Manic; Jason Wright
2012-06-01
Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, amore » significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.« less
Costal vulnerability systems-network using Fuzzy and Bayesian approaches
NASA Astrophysics Data System (ADS)
Taramelli, A.; Valentini, E.; Filipponi, F.; Nguyen Xuan, A.; Arosio, M.
2016-12-01
Marine drivers such as surge in the context of SLR, are threatening low-lying coastal plains. In order to deal with disturbances a deeper understanding of benefits deriving from ecosystem services assesment, management and planning (e.g. the role of dune ridges in surge mitigation and climate adaptation) can enhance the resilience of coastal systems. In this frame assessing the vulnerability is a key concern of many SOS (social, ecological, institutional) that deals with several challenges like the definition of Essential Variables (EVs) able to synthesize the required information, the assignment of different weight to be attributed to each considered variable, the selection of method for combining the relevant variables, etc.. To this end it is unclear how SLR, subsidence and erosion might affect coastal subsistence resources because of highly complex interactions and because of the subjective system of weighting many variables and their interaction within the systems. In this contribution, making the best use of many EO products, in situ data and modelling, we propose a multidimensional surge vulnerability assessment that aims at combining together geophysical and socioeconomic variable on the base of different approaches: 1) Fuzzy Logic; 2) Bayesian approach. The final goal is providing insight in understanding how to quantify regulating ecosystem services.
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-08-16
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.
PeerShield: determining control and resilience criticality of collaborative cyber assets in networks
NASA Astrophysics Data System (ADS)
Cam, Hasan
2012-06-01
As attackers get more coordinated and advanced in cyber attacks, cyber assets are required to have much more resilience, control effectiveness, and collaboration in networks. Such a requirement makes it essential to take a comprehensive and objective approach for measuring the individual and relative performances of cyber security assets in network nodes. To this end, this paper presents four techniques as to how the relative importance of cyber assets can be measured more comprehensively and objectively by considering together the main variables of risk assessment (e.g., threats, vulnerabilities), multiple attributes (e.g., resilience, control, and influence), network connectivity and controllability among collaborative cyber assets in networks. In the first technique, a Bayesian network is used to include the random variables for control, recovery, and resilience attributes of nodes, in addition to the random variables of threats, vulnerabilities, and risk. The second technique shows how graph matching and coloring can be utilized to form collaborative pairs of nodes to shield together against threats and vulnerabilities. The third technique ranks the security assets of nodes by incorporating multiple weights and thresholds of attributes into a decision-making algorithm. In the fourth technique, the hierarchically well-separated tree is enhanced to first identify critical nodes of a network with respect to their attributes and network connectivity, and then selecting some nodes as driver nodes for network controllability.
Software Vulnerability Taxonomy Consolidation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Polepeddi, Sriram S.
2004-12-07
In today's environment, computers and networks are increasing exposed to a number of software vulnerabilities. Information about these vulnerabilities is collected and disseminated via various large publicly available databases such as BugTraq, OSVDB and ICAT. Each of these databases, individually, do not cover all aspects of a vulnerability and lack a standard format among them, making it difficult for end-users to easily compare various vulnerabilities. A central database of vulnerabilities has not been available until today for a number of reasons, such as the non-uniform methods by which current vulnerability database providers receive information, disagreement over which features of amore » particular vulnerability are important and how best to present them, and the non-utility of the information presented in many databases. The goal of this software vulnerability taxonomy consolidation project is to address the need for a universally accepted vulnerability taxonomy that classifies vulnerabilities in an unambiguous manner. A consolidated vulnerability database (CVDB) was implemented that coalesces and organizes vulnerability data from disparate data sources. Based on the work done in this paper, there is strong evidence that a consolidated taxonomy encompassing and organizing all relevant data can be achieved. However, three primary obstacles remain: lack of referencing a common ''primary key'', un-structured and free-form descriptions of necessary vulnerability data, and lack of data on all aspects of a vulnerability. This work has only considered data that can be unambiguously extracted from various data sources by straightforward parsers. It is felt that even with the use of more advanced, information mining tools, which can wade through the sea of unstructured vulnerability data, this current integration methodology would still provide repeatable, unambiguous, and exhaustive results. Though the goal of coalescing all available data, which would be of use to system administrators, software developers and vulnerability researchers is not yet achieved, this work has resulted in the most exhaustive collection of vulnerability data to date.« less
Empirical Estimates of 0Day Vulnerabilities in Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miles A. McQueen; Wayne F. Boyer; Sean M. McBride
2009-01-01
We define a 0Day vulnerability to be any vulnerability, in deployed software, which has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to well managed control systems which have already effectively mitigated the publicly known vulnerabilities. In these well managed systems the risk contribution from 0Days will have proportionally increased. To aid understanding of how great a risk 0Days may pose to control systems, an estimate of how many are in existence is needed. Consequently, using the 0Day definition given above,more » we developed and applied a method for estimating how many 0Day vulnerabilities are in existence on any given day. The estimate is made by: empirically characterizing the distribution of the lifespans, measured in days, of 0Day vulnerabilities; determining the number of vulnerabilities publicly announced each day; and applying a novel method for estimating the number of 0Day vulnerabilities in existence on any given day using the number of vulnerabilities publicly announced each day and the previously derived distribution of 0Day lifespans. The method was first applied to a general set of software applications by analyzing the 0Day lifespans of 491 software vulnerabilities and using the daily rate of vulnerability announcements in the National Vulnerability Database. This led to a conservative estimate that in the worst year there were, on average, 2500 0Day software related vulnerabilities in existence on any given day. Using a smaller but intriguing set of 15 0Day software vulnerability lifespans representing the actual time from discovery to public disclosure, we then made a more aggressive estimate. In this case, we estimated that in the worst year there were, on average, 4500 0Day software vulnerabilities in existence on any given day. We then proceeded to identify the subset of software applications likely to be used in some control systems, analyzed the associated subset of vulnerabilities, and characterized their lifespans. Using the previously developed method of analysis, we very conservatively estimated 250 control system related 0Day vulnerabilities in existence on any given day. While reasonable, this first order estimate for control systems is probably far more conservative than those made for general software systems since the estimate did not include vulnerabilities unique to control system specific components. These control system specific vulnerabilities were unable to be included in the estimate for a variety of reasons with the most problematic being that the public announcement of unique control system vulnerabilities is very sparse. Consequently, with the intent to improve the above 0Day estimate for control systems, we first identified the additional, unique to control systems, vulnerability estimation constraints and then investigated new mechanisms which may be useful for estimating the number of unique 0Day software vulnerabilities found in control system components. We proceeded to identify a number of new mechanisms and approaches for estimating and incorporating control system specific vulnerabilities into an improved 0Day estimation method. These new mechanisms and approaches appear promising and will be more rigorously evaluated during the course of the next year.« less
Thompson, Kirrilly; Every, Danielle; Rainbird, Sophia; Cornell, Victoria; Smith, Bradley; Trigg, Joshua
2014-05-07
Increased vulnerability to natural disasters has been associated with particular groups in the community. This includes those who are considered de facto vulnerable (children, older people, those with disabilities etc.) and those who own pets (not to mention pets themselves). The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to vulnerable members of the community who own pets or other animals? This article addresses this important question by synthesizing information about what makes particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. Despite different vulnerabilities, animals were found to be important to the disaster resilience of seven vulnerable groups in Australia. Animal attachment and animal-related activities and networks are identified as underexplored devices for disseminating or 'piggybacking' disaster-related information and engaging vulnerable people in resilience building behaviors (in addition to including animals in disaster planning initiatives in general). Animals may provide the kind of innovative approach required to overcome the challenges in accessing and engaging vulnerable groups. As the survival of humans and animals are so often intertwined, the benefits of increasing the resilience of vulnerable communities through animal attachment is twofold: human and animal lives can be saved together.
Data security issues arising from integration of wireless access into healthcare networks.
Frenzel, John C
2003-04-01
The versatility of having Ethernet speed connectivity without wires is rapidly driving adoption of wireless data networking by end users across all types of industry. Designed to be easy to configure and work among diverse platforms, wireless brings online data to mobile users. This functionality is particularly useful in modern clinical medicine. Wireless presents operators of networks containing or transmitting sensitive and confidential data with several new types of security vulnerabilities, and potentially opens previously protected core network resources to outside attack. Herein, we review the types of vulnerabilities, the tools necessary to exploit them, and strategies to thwart a successful attack.
A Typology to Explain Changing Social Networks Post Stroke.
Northcott, Sarah; Hirani, Shashivadan P; Hilari, Katerina
2018-05-08
Social network typologies have been used to classify the general population but have not previously been applied to the stroke population. This study investigated whether social network types remain stable following a stroke, and if not, why some people shift network type. We used a mixed methods design. Participants were recruited from two acute stroke units. They completed the Stroke Social Network Scale (SSNS) two weeks and six months post stroke and in-depth interviews 8-15 months following the stroke. Qualitative data was analysed using Framework Analysis; k-means cluster analysis was applied to the six-month data set. Eighty-seven participants were recruited, 71 were followed up at six months, and 29 completed in-depth interviews. It was possible to classify all 29 participants into one of the following network types both prestroke and post stroke: diverse; friends-based; family-based; restricted-supported; restricted-unsupported. The main shift that took place post stroke was participants moving out of a diverse network into a family-based one. The friends-based network type was relatively stable. Two network types became more populated post stroke: restricted-unsupported and family-based. Triangulatory evidence was provided by k-means cluster analysis, which produced a cluster solution (for n = 71) with comparable characteristics to the network types derived from qualitative analysis. Following a stroke, a person's social network is vulnerable to change. Explanatory factors for shifting network type included the physical and also psychological impact of having a stroke, as well as the tendency to lose contact with friends rather than family.
Critical field-exponents for secure message-passing in modular networks
NASA Astrophysics Data System (ADS)
Shekhtman, Louis M.; Danziger, Michael M.; Bonamassa, Ivan; Buldyrev, Sergey V.; Caldarelli, Guido; Zlatić, Vinko; Havlin, Shlomo
2018-05-01
We study secure message-passing in the presence of multiple adversaries in modular networks. We assume a dominant fraction of nodes in each module have the same vulnerability, i.e., the same entity spying on them. We find both analytically and via simulations that the links between the modules (interlinks) have effects analogous to a magnetic field in a spin-system in that for any amount of interlinks the system no longer undergoes a phase transition. We then define the exponents δ, which relates the order parameter (the size of the giant secure component) at the critical point to the field strength (average number of interlinks per node), and γ, which describes the susceptibility near criticality. These are found to be δ = 2 and γ = 1 (with the scaling of the order parameter near the critical point given by β = 1). When two or more vulnerabilities are equally present in a module we find δ = 1 and γ = 0 (with β ≥ 2). Apart from defining a previously unidentified universality class, these exponents show that increasing connections between modules is more beneficial for security than increasing connections within modules. We also measure the correlation critical exponent ν, and the upper critical dimension d c , finding that ν {d}c=3 as for ordinary percolation, suggesting that for secure message-passing d c = 6. These results provide an interesting analogy between secure message-passing in modular networks and the physics of magnetic spin-systems.
Integrating network ecology with applied conservation: a synthesis and guide to implementation.
Kaiser-Bunbury, Christopher N; Blüthgen, Nico
2015-07-10
Ecological networks are a useful tool to study the complexity of biotic interactions at a community level. Advances in the understanding of network patterns encourage the application of a network approach in other disciplines than theoretical ecology, such as biodiversity conservation. So far, however, practical applications have been meagre. Here we present a framework for network analysis to be harnessed to advance conservation management by using plant-pollinator networks and islands as model systems. Conservation practitioners require indicators to monitor and assess management effectiveness and validate overall conservation goals. By distinguishing between two network attributes, the 'diversity' and 'distribution' of interactions, on three hierarchical levels (species, guild/group and network) we identify seven quantitative metrics to describe changes in network patterns that have implications for conservation. Diversity metrics are partner diversity, vulnerability/generality, interaction diversity and interaction evenness, and distribution metrics are the specialization indices d' and [Formula: see text] and modularity. Distribution metrics account for sampling bias and may therefore be suitable indicators to detect human-induced changes to plant-pollinator communities, thus indirectly assessing the structural and functional robustness and integrity of ecosystems. We propose an implementation pathway that outlines the stages that are required to successfully embed a network approach in biodiversity conservation. Most importantly, only if conservation action and study design are aligned by practitioners and ecologists through joint experiments, are the findings of a conservation network approach equally beneficial for advancing adaptive management and ecological network theory. We list potential obstacles to the framework, highlight the shortfall in empirical, mostly experimental, network data and discuss possible solutions. Published by Oxford University Press on behalf of the Annals of Botany Company.
Exploring mobile health in a private online social network.
Memon, Qurban A; Mustafa, Asma Fayes
2015-01-01
Health information is very vulnerable. Certain individuals or corporate organisations will continue to steal it similar to bank account data once data is on wireless channels. Once health information is part of a social network, corresponding privacy issues also surface. Insufficiently trained employees at hospitals that pay less attention to creating a privacy-aware culture will suffer loss when mobile devices containing health information are lost, stolen or sniffed. In this work, a social network system is explored as a m-health system from a privacy perspective. A model is developed within a framework of data-driven privacy and implemented on Android operating system. In order to check feasibility of the proposed model, a prototype application is developed on Facebook for different services, including: i) sharing user location; ii) showing nearby friends; iii) calculating and sharing distance moved, and calories burned; iv) calculating, tracking and sharing user heart rate; etc.
Tan, Zuowen
2014-03-01
The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.
Iguacel, Isabel; Michels, Nathalie; Fernández-Alvira, Juan M; Bammann, Karin; De Henauw, Stefaan; Felső, Regina; Gwozdz, Wencke; Hunsberger, Monica; Reisch, Lucia; Russo, Paola; Tornaritis, Michael; Thumann, Barbara Franziska; Veidebaum, Toomas; Börnhorst, Claudia; Moreno, Luis A
2017-09-01
The effect of socioeconomic inequalities on children's mental health remains unclear. This study aims to explore the cross-sectional and longitudinal associations between social vulnerabilities and psychosocial problems, and the association between accumulation of vulnerabilities and psychosocial problems. 5987 children aged 2-9 years from eight European countries were assessed at baseline and 2-year follow-up. Two different instruments were employed to assess children's psychosocial problems: the KINDL (Questionnaire for Measuring Health-Related Quality of Life in Children and Adolescents) was used to evaluate children's well-being and the Strengths and Difficulties Questionnaire (SDQ) was used to evaluate children's internalising problems. Vulnerable groups were defined as follows: children whose parents had minimal social networks, children from non-traditional families, children of migrant origin or children with unemployed parents. Logistic mixed-effects models were used to assess the associations between social vulnerabilities and psychosocial problems. After adjusting for classical socioeconomic and lifestyle indicators, children whose parents had minimal social networks were at greater risk of presenting internalising problems at baseline and follow-up (OR 1.53, 99% CI 1.11-2.11). The highest risk for psychosocial problems was found in children whose status changed from traditional families at T0 to non-traditional families at T1 (OR 1.60, 99% CI 1.07-2.39) and whose parents had minimal social networks at both time points (OR 1.97, 99% CI 1.26-3.08). Children with one or more vulnerabilities accumulated were at a higher risk of developing psychosocial problems at baseline and follow-up. Therefore, policy makers should implement measures to strengthen the social support for parents with a minimal social network.
A Meta-Analysis of Urban Climate Change Adaptation ...
The concentration of people, infrastructure, and ecosystem services in urban areas make them prime sites for climate change adaptation. While advances have been made in developing frameworks for adaptation planning and identifying both real and potential barriers to action, empirical work evaluating urban adaptation planning processes has been relatively piecemeal. Existing assessments of current experience with urban adaptation provide necessarily broad generalizations based on the available peer-reviewed literature. This paper uses a meta-analysis of U.S. cities’ current experience with urban adaptation planning drawing from 54 sources that include peer-reviewed literature, government reports, white papers, and reports published by non-governmental organizations. The analysis specifically evaluates the institutional support structures being developed for urban climate change adaptation. The results demonstrate that adaptation planning is driven by a desire to reduce vulnerability and often catalyzes new collaborations and coordination mechanisms in urban governance. As a result, building capacity for urban climate change adaptation planning requires a focus not only on city governments themselves but also on the complex horizontal and vertical networks that have arisen around such efforts. Existing adaptation planning often lacks attention to equity issues, social vulnerability, and the influence of non-climatic factors on vulnerability. Engaging city govern
Social Networks, Sexual Networks and HIV Risk in Men Who Have Sex with Men
Amirkhanian, Yuri A.
2014-01-01
Worldwide, men who have sex with men (MSM) remain one of the most HIV-vulnerable community populations. A global public health priority is developing new methods of reaching MSM, understanding HIV transmission patterns, and intervening to reduce their risk. Increased attention is being given to the role that MSM networks play in HIV epidemiology. This review of MSM network research studies demonstrates that: (1) Members of the same social network often share similar norms, attitudes, and HIV risk behavior levels; (2) Network interventions are feasible and powerful for reducing unprotected sex and potentially for increasing HIV testing uptake; (3) HIV vulnerability among African American MSM increases when an individual enters a high-risk sexual network characterized by high density and racial homogeneity; and (4) Networks are primary sources of social support for MSM, particularly for those living with HIV, with greater support predicting higher care uptake and adherence. PMID:24384832
NASA Astrophysics Data System (ADS)
Rosato, Vittorio; Hounjet, Micheline; Burzel, Andreas; Di Pietro, Antonio; Tofani, Alberto; Pollino, Maurizio; Giovinazzi, Sonia
2016-04-01
Natural hazard events can induce severe impacts on the built environment; they can hit wide and densely populated areas, where there is a large number of (inter)dependent technological systems whose damages could cause the failure or malfunctioning of further different services, spreading the impacts on wider geographical areas. The EU project CIPRNet (Critical Infrastructures Preparedness and Resilience Research Network) is realizing an unprecedented Decision Support System (DSS) which enables to operationally perform risk prediction on Critical Infrastructures (CI) by predicting the occurrence of natural events (from long term weather to short nowcast predictions, correlating intrinsic vulnerabilities of CI elements with the different events' manifestation strengths, and analysing the resulting Damage Scenario. The Damage Scenario is then transformed into an Impact Scenario, where punctual CI element damages are transformed into micro (local area) or meso (regional) scale Services Outages. At the smaller scale, the DSS simulates detailed city models (where CI dependencies are explicitly accounted for) that are of important input for crisis management organizations whereas, at the regional scale by using approximate System-of-Systems model describing systemic interactions, the focus is on raising awareness. The DSS has allowed to develop a novel simulation framework for predicting earthquakes shake maps originating from a given seismic event, considering the shock wave propagation in inhomogeneous media and the subsequent produced damages by estimating building vulnerabilities on the basis of a phenomenological model [1, 2]. Moreover, in presence of areas containing river basins, when abundant precipitations are expected, the DSS solves the hydrodynamic 1D/2D models of the river basins for predicting the flux runoff and the corresponding flood dynamics. This calculation allows the estimation of the Damage Scenario and triggers the evaluation of the Impact Scenario. The regional output of cascading effects can be used as an input model for more detailed analyses within urban areas for instance. The DSS weights the overall expected Crisis Scenario by also considering, through an appropriate Consequences Analysis, the number of citizens affected by the Service(s) outages, the expected economic losses of the major industrial activities hit by the unavailability of relevant Services (electricity, water, telecommunications etc.) and the influence of outages of the availability of Public Services (hospitals, schools, public offices etc.) [1] S.Giovinazzi, S. Lagomarsino: A macroseismic method for the vulnerability assessment of buildings. 13th World Conference on Earthquake Engineering, Vancouver, BC, Canada (2004) [2] S. Lagomarsino, S.Giovinazzi: Macroseismic and mechanical models for the vulnerability and damage assessment of current buildings. Bull Earthquake Eng., 4:415-443 (2006)
Hazard Interactions and Interaction Networks (Cascades) within Multi-Hazard Methodologies
NASA Astrophysics Data System (ADS)
Gill, Joel; Malamud, Bruce D.
2016-04-01
Here we combine research and commentary to reinforce the importance of integrating hazard interactions and interaction networks (cascades) into multi-hazard methodologies. We present a synthesis of the differences between 'multi-layer single hazard' approaches and 'multi-hazard' approaches that integrate such interactions. This synthesis suggests that ignoring interactions could distort management priorities, increase vulnerability to other spatially relevant hazards or underestimate disaster risk. We proceed to present an enhanced multi-hazard framework, through the following steps: (i) describe and define three groups (natural hazards, anthropogenic processes and technological hazards/disasters) as relevant components of a multi-hazard environment; (ii) outline three types of interaction relationship (triggering, increased probability, and catalysis/impedance); and (iii) assess the importance of networks of interactions (cascades) through case-study examples (based on literature, field observations and semi-structured interviews). We further propose visualisation frameworks to represent these networks of interactions. Our approach reinforces the importance of integrating interactions between natural hazards, anthropogenic processes and technological hazards/disasters into enhanced multi-hazard methodologies. Multi-hazard approaches support the holistic assessment of hazard potential, and consequently disaster risk. We conclude by describing three ways by which understanding networks of interactions contributes to the theoretical and practical understanding of hazards, disaster risk reduction and Earth system management. Understanding interactions and interaction networks helps us to better (i) model the observed reality of disaster events, (ii) constrain potential changes in physical and social vulnerability between successive hazards, and (iii) prioritise resource allocation for mitigation and disaster risk reduction.
Funk, Christopher C.; Verdin, James; Adams Chavula,; Gregory J. Husak,; Harikishan Jayanthi,; Tamuka Magadzire,
2013-01-01
During 1990s, disaster risk reduction emerged as a novel, proactive approach to managing risks from natural hazards. The World Bank, USAID, and other international donor agencies began making efforts to mainstream disaster risk reduction in countries whose population and economies were heavily dependent on rain-fed agriculture. This approach has more significance in light of the increasing climatic hazard patterns and the climate scenarios projected for different hazard prone countries in the world. The Famine Early Warning System Network (FEWS NET) has been monitoring the food security issues in the sub-Saharan Africa, Asia and in Haiti. FEWS NET monitors the rainfall and moisture availability conditions with the help of NOAA RFE2 data for deriving food security status in Africa. This paper highlights the efforts in using satellite estimated rainfall inputs to develop drought vulnerability models in the drought prone areas in Malawi. The satellite RFE2 based SPI corresponding to the critical tasseling and silking phases (in the months of January, February, and March) were statistically regressed with drought-induced yield losses at the district level. The analysis has shown that the drought conditions in February and early March lead to most damage to maize yields in this region. The district-wise vulnerabilities to drought were upscaled to obtain a regional maize vulnerability model for southern Malawi. The results would help in establishing an early monitoring mechanism for drought impact assessment, give the decision makers additional time to assess seasonal outcomes, and identify potential food-related hazards in Malawi.
How To: Protect against a Zero-Hour Attack
ERIC Educational Resources Information Center
McCarthy, Rob
2005-01-01
In the last year, a series of viruses and worms that caused damage across the Internet in record time has made very clear how vulnerable computer systems are. The MS Blaster, Slammer, Sasser, and Korgo.W worms have shown that signature-based antivirus software and traditional firewalls are not enough to protect networks. Everyone is worried about…
ERIC Educational Resources Information Center
Caudle, Daryl L.
2010-01-01
The nation's critical infrastructure, information systems, and telecommunication networks are vulnerable and threatened by an ever-growing number of attacks in cyberspace. An essential element of the nation's comprehensive approach to cybersecurity is the ability for the Department of Defense to protect and defend its information enterprise.…
Spam Stoppers: Stave off the Spam Onslaught with Technology and Training
ERIC Educational Resources Information Center
Fryer, Wesley A.
2005-01-01
For schools, spam is not only an annoyance and a time waster; it clogs district mail servers, consumes valuable network bandwidth, and can deliver and propagate a variety of malware programs that can wreak havoc on their system. A district strategy to "can the spam," therefore, must be multifaceted and address security vulnerabilities at different…
Verkhivker, Gennady M
2016-01-01
The human protein kinome presents one of the largest protein families that orchestrate functional processes in complex cellular networks, and when perturbed, can cause various cancers. The abundance and diversity of genetic, structural, and biochemical data underlies the complexity of mechanisms by which targeted and personalized drugs can combat mutational profiles in protein kinases. Coupled with the evolution of system biology approaches, genomic and proteomic technologies are rapidly identifying and charactering novel resistance mechanisms with the goal to inform rationale design of personalized kinase drugs. Integration of experimental and computational approaches can help to bring these data into a unified conceptual framework and develop robust models for predicting the clinical drug resistance. In the current study, we employ a battery of synergistic computational approaches that integrate genetic, evolutionary, biochemical, and structural data to characterize the effect of cancer mutations in protein kinases. We provide a detailed structural classification and analysis of genetic signatures associated with oncogenic mutations. By integrating genetic and structural data, we employ network modeling to dissect mechanisms of kinase drug sensitivities to oncogenic EGFR mutations. Using biophysical simulations and analysis of protein structure networks, we show that conformational-specific drug binding of Lapatinib may elicit resistant mutations in the EGFR kinase that are linked with the ligand-mediated changes in the residue interaction networks and global network properties of key residues that are responsible for structural stability of specific functional states. A strong network dependency on high centrality residues in the conformation-specific Lapatinib-EGFR complex may explain vulnerability of drug binding to a broad spectrum of mutations and the emergence of drug resistance. Our study offers a systems-based perspective on drug design by unravelling complex relationships between robustness of targeted kinase genes and binding specificity of targeted kinase drugs. We discuss how these approaches can exploit advances in chemical biology and network science to develop novel strategies for rationally tailored and robust personalized drug therapies.
Cybersim: geographic, temporal, and organizational dynamics of malware propagation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Santhi, Nandakishore; Yan, Guanhua; Eidenbenz, Stephan
2010-01-01
Cyber-infractions into a nation's strategic security envelope pose a constant and daunting challenge. We present the modular CyberSim tool which has been developed in response to the need to realistically simulate at a national level, software vulnerabilities and resulting mal ware propagation in online social networks. CyberSim suite (a) can generate realistic scale-free networks from a database of geocoordinated computers to closely model social networks arising from personal and business email contacts and online communities; (b) maintains for each,bost a list of installed software, along with the latest published vulnerabilities; (d) allows designated initial nodes where malware gets introduced; (e)more » simulates, using distributed discrete event-driven technology, the spread of malware exploiting a specific vulnerability, with packet delay and user online behavior models; (f) provides a graphical visualization of spread of infection, its severity, businesses affected etc to the analyst. We present sample simulations on a national level network with millions of computers.« less
Barrington, Clare; Wejnert, Cyprian; Guardado, Maria Elena; Nieto, Ana Isabel; Bailey, Gabriela Paz
2012-01-01
The purpose of this study is to improve understanding of HIV vulnerability and opportunities for HIV prevention within the social networks of male-to-female transgender persons in San Salvador, El Salvador. We compare HIV prevalence and behavioral data from a sample of gay-identified men who have sex with men (MSM) (n = 279), heterosexual or bisexual identified MSM (n = 229) and transgender persons (n = 67) recruited using Respondent Driven Sampling. Transgender persons consistently reported higher rates of HIV risk behavior than the rest of the study population and were significantly more likely to be involved in sex work. While transgender persons reported the highest rates of exposure to HIV educational activities they had the lowest levels of HIV-related knowledge. Transgender respondents' social networks were homophilous and efficient at recruiting other transgender persons. Findings suggest that transgender social networks could provide an effective and culturally relevant opportunity for HIV prevention efforts in this vulnerable population.
Barrington, Clare; Wejnert, Cyprian; Guardado, Maria Elena; Nieto, Ana Isabel; Bailey, Gabriela Paz
2013-01-01
The purpose of this study is to improve understanding of HIV vulnerability and opportunities for HIV prevention within the social networks of male-to-female transgender persons in San Salvador, El Salvador. We compare HIV prevalence and behavioral data from a sample of gay-identified men who have sex with men (MSM) (n = 279), heterosexual or bisexual identified MSM (n = 229) and transgender persons (n = 67) recruited using Respondent Driven Sampling. Transgender persons consistently reported higher rates of HIV risk behavior than the rest of the study population and were significantly more likely to be involved in sex work. While transgender persons reported the highest rates of exposure to HIV educational activities they had the lowest levels of HIV-related knowledge. Transgender respondents’ social networks were homophilous and efficient at recruiting other transgender persons. Findings suggest that transgender social networks could provide an effective and culturally relevant opportunity for HIV prevention efforts in this vulnerable population. PMID:21538082
Learning and robustness to catch-and-release fishing in a shark social network
Brown, Culum; Planes, Serge
2017-01-01
Individuals can play different roles in maintaining connectivity and social cohesion in animal populations and thereby influence population robustness to perturbations. We performed a social network analysis in a reef shark population to assess the vulnerability of the global network to node removal under different scenarios. We found that the network was generally robust to the removal of nodes with high centrality. The network appeared also highly robust to experimental fishing. Individual shark catchability decreased as a function of experience, as revealed by comparing capture frequency and site presence. Altogether, these features suggest that individuals learnt to avoid capture, which ultimately increased network robustness to experimental catch-and-release. Our results also suggest that some caution must be taken when using capture–recapture models often used to assess population size as assumptions (such as equal probabilities of capture and recapture) may be violated by individual learning to escape recapture. PMID:28298593
Complex social contagion makes networks more vulnerable to disease outbreaks.
Campbell, Ellsworth; Salathé, Marcel
2013-01-01
Social network analysis is now widely used to investigate the dynamics of infectious disease spread. Vaccination dramatically disrupts disease transmission on a contact network, and indeed, high vaccination rates can potentially halt disease transmission altogether. Here, we build on mounting evidence that health behaviors - such as vaccination, and refusal thereof - can spread across social networks through a process of complex contagion that requires social reinforcement. Using network simulations that model health behavior and infectious disease spread, we find that under otherwise identical conditions, the process by which the health behavior spreads has a very strong effect on disease outbreak dynamics. This dynamic variability results from differences in the topology within susceptible communities that arise during the health behavior spreading process, which in turn depends on the topology of the overall social network. Our findings point to the importance of health behavior spread in predicting and controlling disease outbreaks.
Tung, Elizabeth L; Gunter, Kathryn E; Bergeron, Nyahne Q; Lindau, Stacy Tessler; Chin, Marshall H; Peek, Monica E
2018-01-22
To characterize the motivations of stakeholders from diverse sectors who engaged in cross-sector collaboration with an academic medical center. Primary qualitative data (2014-2015) were collected from 22 organizations involved in a cross-sector diabetes intervention on the South Side of Chicago. In-depth, semistructured interviews; participants included leaders from all stakeholder organization types (e.g., businesses, community development, faith-based) involved in the intervention. Data were transcribed verbatim from audio and video recordings. Analysis was conducted using the constant comparison method, derived from grounded theory. All stakeholders described collaboration as an opportunity to promote community health in vulnerable populations. Among diverse motivations across organization types, stakeholders described collaboration as an opportunity for: financial support, brand enhancement, access to specialized skills or knowledge, professional networking, and health care system involvement in community-based efforts. Based on our findings, we propose a framework for implementing a working knowledge of stakeholder motivations to facilitate effective cross-sector collaboration. We identified several factors that motivated collaboration across diverse sectors with health care systems to promote health in a high-poverty, urban setting. Understanding these motivations will be foundational to optimizing meaningful cross-sector collaboration and improving diabetes outcomes in the nation's most vulnerable communities. © Health Research and Educational Trust.
NASA Astrophysics Data System (ADS)
Lachaut, T.; Yoon, J.; Klassert, C. J. A.; Talozi, S.; Mustafa, D.; Knox, S.; Selby, P. D.; Haddad, Y.; Gorelick, S.; Tilmant, A.
2016-12-01
Probabilistic approaches to uncertainty in water systems management can face challenges of several types: non stationary climate, sudden shocks such as conflict-driven migrations, or the internal complexity and dynamics of large systems. There has been a rising trend in the development of bottom-up methods that place focus on the decision side instead of probability distributions and climate scenarios. These approaches are based on defining acceptability thresholds for the decision makers and considering the entire range of possibilities over which such thresholds are crossed. We aim at improving the knowledge on the applicability and relevance of this approach by enlarging its scope beyond climate uncertainty and single decision makers; thus including demographic shifts, internal system dynamics, and multiple stakeholders at different scales. This vulnerability analysis is part of the Jordan Water Project and makes use of an ambitious multi-agent model developed by its teams with the extensive cooperation of the Ministry of Water and Irrigation of Jordan. The case of Jordan is a relevant example for migration spikes, rapid social changes, resource depletion and climate change impacts. The multi-agent modeling framework used provides a consistent structure to assess the vulnerability of complex water resources systems with distributed acceptability thresholds and stakeholder interaction. A proof of concept and preliminary results are presented for a non-probabilistic vulnerability analysis that involves different types of stakeholders, uncertainties other than climatic and the integration of threshold-based indicators. For each stakeholder (agent) a vulnerability matrix is constructed over a multi-dimensional domain, which includes various hydrologic and/or demographic variables.
Toward Understanding How Early-Life Stress Reprograms Cognitive and Emotional Brain Networks.
Chen, Yuncai; Baram, Tallie Z
2016-01-01
Vulnerability to emotional disorders including depression derives from interactions between genes and environment, especially during sensitive developmental periods. Adverse early-life experiences provoke the release and modify the expression of several stress mediators and neurotransmitters within specific brain regions. The interaction of these mediators with developing neurons and neuronal networks may lead to long-lasting structural and functional alterations associated with cognitive and emotional consequences. Although a vast body of work has linked quantitative and qualitative aspects of stress to adolescent and adult outcomes, a number of questions are unclear. What distinguishes 'normal' from pathologic or toxic stress? How are the effects of stress transformed into structural and functional changes in individual neurons and neuronal networks? Which ones are affected? We review these questions in the context of established and emerging studies. We introduce a novel concept regarding the origin of toxic early-life stress, stating that it may derive from specific patterns of environmental signals, especially those derived from the mother or caretaker. Fragmented and unpredictable patterns of maternal care behaviors induce a profound chronic stress. The aberrant patterns and rhythms of early-life sensory input might also directly and adversely influence the maturation of cognitive and emotional brain circuits, in analogy to visual and auditory brain systems. Thus, unpredictable, stress-provoking early-life experiences may influence adolescent cognitive and emotional outcomes by disrupting the maturation of the underlying brain networks. Comprehensive approaches and multiple levels of analysis are required to probe the protean consequences of early-life adversity on the developing brain. These involve integrated human and animal-model studies, and approaches ranging from in vivo imaging to novel neuroanatomical, molecular, epigenomic, and computational methodologies. Because early-life adversity is a powerful determinant of subsequent vulnerabilities to emotional and cognitive pathologies, understanding the underlying processes will have profound implications for the world's current and future children.
A global picture of biological invasion threat on islands.
Bellard, Céline; Rysman, Jean-François; Leroy, Boris; Claud, Chantal; Mace, Georgina M
2017-12-01
Biological invasions are among the main drivers of biodiversity losses. As threats from biological invasions increase, one of the most urgent tasks is to identify areas of high vulnerability. However, the lack of comprehensive information on the impacts of invasive alien species (IAS) is a problem especially on islands, where most of the recorded extinctions associated with IAS have occurred. Here we provide a global, network-oriented analysis of IAS on islands. Using network analysis, we structured 27,081 islands and 437 threatened vertebrates into 21 clusters, based on their profiles in term of invasiveness and shared vulnerabilities. These islands are mainly located in the Southern Hemisphere and many are in biodiversity hotspots. Some of the islands share similar characteristics regarding their connectivity that could be useful for understanding their response to invasive species. The major invaders found in these clusters of islands are feral cats, feral dogs, pigs and rats. Our analyses reveal those IAS that systematically act alone or in combination, and the pattern of shared IAS among threatened species, providing new information to implement effective eradication strategies. Combined with further local, contextual information this can contribute to global strategies to deal with IAS.
Pleistocene megafaunal interaction networks became more vulnerable after human arrival.
Pires, Mathias M; Koch, Paul L; Fariña, Richard A; de Aguiar, Marcus A M; dos Reis, Sérgio F; Guimarães, Paulo R
2015-09-07
The end of the Pleistocene was marked by the extinction of almost all large land mammals worldwide except in Africa. Although the debate on Pleistocene extinctions has focused on the roles of climate change and humans, the impact of perturbations depends on properties of ecological communities, such as species composition and the organization of ecological interactions. Here, we combined palaeoecological and ecological data, food-web models and community stability analysis to investigate if differences between Pleistocene and modern mammalian assemblages help us understand why the megafauna died out in the Americas while persisting in Africa. We show Pleistocene and modern assemblages share similar network topology, but differences in richness and body size distributions made Pleistocene communities significantly more vulnerable to the effects of human arrival. The structural changes promoted by humans in Pleistocene networks would have increased the likelihood of unstable dynamics, which may favour extinction cascades in communities facing extrinsic perturbations. Our findings suggest that the basic aspects of the organization of ecological communities may have played an important role in major extinction events in the past. Knowledge of community-level properties and their consequences to dynamics may be critical to understand past and future extinctions. © 2015 The Author(s).
Pleistocene megafaunal interaction networks became more vulnerable after human arrival
Pires, Mathias M.; Koch, Paul L.; Fariña, Richard A.; de Aguiar, Marcus A. M.; dos Reis, Sérgio F.; Guimarães, Paulo R.
2015-01-01
The end of the Pleistocene was marked by the extinction of almost all large land mammals worldwide except in Africa. Although the debate on Pleistocene extinctions has focused on the roles of climate change and humans, the impact of perturbations depends on properties of ecological communities, such as species composition and the organization of ecological interactions. Here, we combined palaeoecological and ecological data, food-web models and community stability analysis to investigate if differences between Pleistocene and modern mammalian assemblages help us understand why the megafauna died out in the Americas while persisting in Africa. We show Pleistocene and modern assemblages share similar network topology, but differences in richness and body size distributions made Pleistocene communities significantly more vulnerable to the effects of human arrival. The structural changes promoted by humans in Pleistocene networks would have increased the likelihood of unstable dynamics, which may favour extinction cascades in communities facing extrinsic perturbations. Our findings suggest that the basic aspects of the organization of ecological communities may have played an important role in major extinction events in the past. Knowledge of community-level properties and their consequences to dynamics may be critical to understand past and future extinctions. PMID:26336175
An ethernet/IP security review with intrusion detection applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Laughter, S. A.; Williams, R. D.
2006-07-01
Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IPmore » networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)« less
Gillani, Nabeel; Yasseri, Taha; Eynon, Rebecca; Hjorth, Isis
2014-09-23
Massive Open Online Courses (MOOCs) bring together a global crowd of thousands of learners for several weeks or months. In theory, the openness and scale of MOOCs can promote iterative dialogue that facilitates group cognition and knowledge construction. Using data from two successive instances of a popular business strategy MOOC, we filter observed communication patterns to arrive at the "significant" interaction networks between learners and use complex network analysis to explore the vulnerability and information diffusion potential of the discussion forums. We find that different discussion topics and pedagogical practices promote varying levels of 1) "significant" peer-to-peer engagement, 2) participant inclusiveness in dialogue, and ultimately, 3) modularity, which impacts information diffusion to prevent a truly "global" exchange of knowledge and learning. These results indicate the structural limitations of large-scale crowd-based learning and highlight the different ways that learners in MOOCs leverage, and learn within, social contexts. We conclude by exploring how these insights may inspire new developments in online education.
Gillani, Nabeel; Yasseri, Taha; Eynon, Rebecca; Hjorth, Isis
2014-01-01
Massive Open Online Courses (MOOCs) bring together a global crowd of thousands of learners for several weeks or months. In theory, the openness and scale of MOOCs can promote iterative dialogue that facilitates group cognition and knowledge construction. Using data from two successive instances of a popular business strategy MOOC, we filter observed communication patterns to arrive at the “significant” interaction networks between learners and use complex network analysis to explore the vulnerability and information diffusion potential of the discussion forums. We find that different discussion topics and pedagogical practices promote varying levels of 1) “significant” peer-to-peer engagement, 2) participant inclusiveness in dialogue, and ultimately, 3) modularity, which impacts information diffusion to prevent a truly “global” exchange of knowledge and learning. These results indicate the structural limitations of large-scale crowd-based learning and highlight the different ways that learners in MOOCs leverage, and learn within, social contexts. We conclude by exploring how these insights may inspire new developments in online education. PMID:25244925
NASA Astrophysics Data System (ADS)
Gillani, Nabeel; Yasseri, Taha; Eynon, Rebecca; Hjorth, Isis
2014-09-01
Massive Open Online Courses (MOOCs) bring together a global crowd of thousands of learners for several weeks or months. In theory, the openness and scale of MOOCs can promote iterative dialogue that facilitates group cognition and knowledge construction. Using data from two successive instances of a popular business strategy MOOC, we filter observed communication patterns to arrive at the ``significant'' interaction networks between learners and use complex network analysis to explore the vulnerability and information diffusion potential of the discussion forums. We find that different discussion topics and pedagogical practices promote varying levels of 1) ``significant'' peer-to-peer engagement, 2) participant inclusiveness in dialogue, and ultimately, 3) modularity, which impacts information diffusion to prevent a truly ``global'' exchange of knowledge and learning. These results indicate the structural limitations of large-scale crowd-based learning and highlight the different ways that learners in MOOCs leverage, and learn within, social contexts. We conclude by exploring how these insights may inspire new developments in online education.
Adolescent alcohol-related risk cognitions: the roles of social norms and social networking sites.
Litt, Dana M; Stock, Michelle L
2011-12-01
The present study examined the impact of socially based descriptive norms on willingness to drink alcohol, drinker prototype favorability, affective alcohol attitudes, and perceived vulnerability for alcohol-related consequences within the Prototype Willingness model. Descriptive norms were manipulated by having 189 young adolescents view experimenter-created profile pages from the social networking site Facebook, which either showed older peers drinking or not. The results provided evidence that descriptive norms for alcohol use, as portrayed by Facebook profiles, significantly impact willingness to use, prototypes, attitudes toward use, and perceived vulnerability. A multiple mediation analysis indicated that prototypes, attitudes, and perceptions of use mediated the relationship between the content of the Facebook profile and willingness. These results indicate that adolescents who perceive that alcohol use is normative, as evidenced by Facebook profiles, are at higher risk for cognitions shown to predict alcohol use than adolescents who do not see alcohol use portrayed as frequently on Facebook.
NASA Astrophysics Data System (ADS)
Guerra, Solange Maria; Silva, Thiago Christiano; Tabak, Benjamin Miranda; de Souza Penaloza, Rodrigo Andrés; de Castro Miranda, Rodrigo César
2016-01-01
In this paper we present systemic risk measures based on contingent claims approach and banking sector multivariate density. We also apply network measures to analyze bank common risk exposure. The proposed measures aim to capture credit risk stress and its potential to become systemic. These indicators capture not only individual bank vulnerability, but also the stress dependency structure between them. Furthermore, these measures can be quite useful for identifying systemically important banks. The empirical results show that these indicators capture with considerable fidelity the moments of increasing systemic risk in the Brazilian banking sector in recent years.
Model based verification of the Secure Socket Layer (SSL) Protocol for NASA systems
NASA Technical Reports Server (NTRS)
Powell, John D.; Gilliam, David
2004-01-01
The National Aeronautics and Space Administration (NASA) has tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information theft, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach' offers formal verification of information technology (IT), through the creation of a Software Security Assessment Instrument (SSAI), to address software security risks.
Personal networks of women in residential and outpatient substance abuse treatment
Kim, HyunSoo; Tracy, Elizabeth; Brown, Suzanne; Jun, MinKyoung; Park, Hyunyong; Min, Meeyoung; McCarty, Chris
2015-01-01
This study compared compositional, social support, and structural characteristics of personal networks among women in residential (RT) and intensive outpatient (IOP) substance abuse treatment. The study sample included 377 women from inner-city substance use disorder treatment facilities. Respondents were asked about 25 personal network members known within the past 6 months, characteristics of each (relationship, substance use, types of support), and relationships between each network member. Differences between RT women and IOP women in personal network characteristics were identified using Chi-square and t-tests. Compared to IOP women, RT women had more substance users in their networks, more network members with whom they had used substances and fewer network members who provided social support. These findings suggest that women in residential treatment have specific network characteristics, not experienced by women in IOP, which may make them more vulnerable to relapse; they may therefore require interventions that target these specific network characteristics in order to reduce their vulnerability to relapse. PMID:27011762
Personal networks of women in residential and outpatient substance abuse treatment.
Kim, HyunSoo; Tracy, Elizabeth; Brown, Suzanne; Jun, MinKyoung; Park, Hyunyong; Min, Meeyoung; McCarty, Chris
This study compared compositional, social support, and structural characteristics of personal networks among women in residential (RT) and intensive outpatient (IOP) substance abuse treatment. The study sample included 377 women from inner-city substance use disorder treatment facilities. Respondents were asked about 25 personal network members known within the past 6 months, characteristics of each (relationship, substance use, types of support), and relationships between each network member. Differences between RT women and IOP women in personal network characteristics were identified using Chi-square and t -tests. Compared to IOP women, RT women had more substance users in their networks, more network members with whom they had used substances and fewer network members who provided social support. These findings suggest that women in residential treatment have specific network characteristics, not experienced by women in IOP, which may make them more vulnerable to relapse; they may therefore require interventions that target these specific network characteristics in order to reduce their vulnerability to relapse.
Change Detection Algorithms for Information Assurance of Computer Networks
2002-01-01
original document contains color images. 14. ABSTRACT see report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...number of computer attacks increases steadily per year. At the time of this writing the Internet Security Systems’ baseline assessment is that a new...across a network by exploiting security flaws in widely-used services offered by vulnerable computers. In order to locate the vulnerable computers, the
NASA Astrophysics Data System (ADS)
Meyer, Nele Kristin; Schwanghart, Wolfgang; Korup, Oliver
2014-05-01
Norwegian's road network is frequently affected by debris flows. Both damage repair and traffic interruption generate high economic losses and necessitate a rigorous assessment of where losses are expected to be high and where preventive measures should be focused on. In recent studies, we have developed susceptibility and trigger probability maps that serve as input into a hazard calculation at the scale of first-order watersheds. Here we combine these results with graph theory to assess the impact of debris flows on the road network of southern Norway. Susceptibility and trigger probability are aggregated for individual road sections to form a reliability index that relates to the failure probability of a link that connects two network vertices, e.g., road junctions. We define link vulnerability as a function of traffic volume and additional link failure distance. Additional link failure distance is the extra length of the alternative path connecting the two associated link vertices in case the network link fails and is calculated by a shortest-path algorithm. The product of network reliability and vulnerability indices represent the risk index. High risk indices identify critical links for the Norwegian road network and are investigated in more detail. Scenarios demonstrating the impact of single or multiple debris flow events are run for the most important routes between seven large cities in southern Norway. First results show that the reliability of the road network is lowest in the central and north-western part of the study area. Road network vulnerability is highest in the mountainous regions in central southern Norway where the road density is low and in the vicinity of cities where the traffic volume is large. The scenarios indicate that city connections that have their shortest path via routes crossing the central part of the study area have the highest risk of route failure.
Individual Day-to-Day Process of Social Anxiety in Vulnerable College Students
ERIC Educational Resources Information Center
Campbell, Cynthia G.; Bierman, Karen L.; Molenaar, Peter C. M.
2016-01-01
Transitions requiring the creation of new social networks may be challenging for individuals vulnerable to social anxiety, which may hinder successful adjustment. Using person-specific methodology, this study examined social anxiety in vulnerable university freshman away from home during their first semester of college to understand how day-to-day…
DARKDROID: Exposing the Dark Side of Android Marketplaces
2016-06-01
Moreover, our approaches can detect apps containing both intentional and unintentional vulnerabilities, such as unsafe code loading mechanisms and...Security, Static Analysis, Dynamic Analysis, Malware Detection , Vulnerability Scanning 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18...applications in a DoD context. ................... 1 1.2.2 Develop sophisticated whole-system static analyses to detect malicious Android applications
NASA Technical Reports Server (NTRS)
Goseva-Popstojanova, Katerina; Tyo, Jacob
2017-01-01
While some prior research work exists on characteristics of software faults (i.e., bugs) and failures, very little work has been published on analysis of software applications vulnerabilities. This paper aims to contribute towards filling that gap by presenting an empirical investigation of application vulnerabilities. The results are based on data extracted from issue tracking systems of two NASA missions. These data were organized in three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified security related software bugs and classified them in specific vulnerability classes. Then, we created the security vulnerability profiles, i.e., determined where and when the security vulnerabilities were introduced and what were the dominating vulnerabilities classes. Our main findings include: (1) In IVV issues datasets the majority of vulnerabilities were code related and were introduced in the Implementation phase. (2) For all datasets, around 90 of the vulnerabilities were located in two to four subsystems. (3) Out of 21 primary classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, they contributed from 80 to 90 of vulnerabilities in each dataset.
Interdisciplinary approach for disaster risk reduction in Valtellina Valley, northern Italy
NASA Astrophysics Data System (ADS)
Garcia, Carolina; Blahut, Jan; Luna, Byron Quan; Poretti, Ilaria; Camera, Corrado; de Amicis, Mattia; Sterlacchini, Simone
2010-05-01
Inside the framework of the European research network Mountain Risks, an interdisciplinary research group has been working in the Consortium of Mountain Municipalities of Valtellina di Tirano (northern Italy). This area has been continuously affected by several mountain hazards such as landslides, debris flows and floods that directly affect the population, and in some cases caused several deaths and million euros of losses. An aim of the interdisciplinary work in this study area, is to integrate different scientific products of the research group, in the areas of risk assessment, management and governance, in order to generate, among others, risk reduction tools addressed to general public and stakeholders. Two types of phenomena have been particularly investigated: debris flows and floods. The scientific products range from modeling to mapping of hazard and risk, emergency planning based on real time decision support systems, surveying for the evaluation of risk perception and preparedness, among others. Outputs from medium scale hazard and risk modeling could be used for decision makers and spatial planners as well as civil protection authorities to have a general overview of the area and indentify hot spots for further detailed analysis. Subsequently, local scale analysis is necessary to define possible events and risk scenarios for emergency planning. As for the modeling of past events and new scenarios of debris flows, physical outputs were used as inputs into physical vulnerability assessment and quantitative risk analysis within dynamic runout models. On a pilot zone, the physical damage was quantified for each affected structure within the context of physical vulnerability and different empirical vulnerability curves were obtained. Prospective economic direct losses were estimated. For floods hazard assessment, different approaches and models are being tested, in order to produce flood maps for various return periods, and related to registered rainfalls. About Civil Protection topics, the main aim is to set up and manage contingency plans in advance; that is, to identify and prepare people in charge to take action to define the activities to be performed, to be aware of available resources and to optimize the communication system among the people involved, in order to efficiently face a prospective crisis phase. For this purpose, a real time emergency plan has been develop based GIS (Geographical Information Systems), DSS (Decision Support Systems), and ICT (Information & Communication Technology).
Nemesis Autonomous Test System
NASA Technical Reports Server (NTRS)
Barltrop, Kevin J.; Lee, Cin-Young; Horvath, Gregory A,; Clement, Bradley J.
2012-01-01
A generalized framework has been developed for systems validation that can be applied to both traditional and autonomous systems. The framework consists of an automated test case generation and execution system called Nemesis that rapidly and thoroughly identifies flaws or vulnerabilities within a system. By applying genetic optimization and goal-seeking algorithms on the test equipment side, a "war game" is conducted between a system and its complementary nemesis. The end result of the war games is a collection of scenarios that reveals any undesirable behaviors of the system under test. The software provides a reusable framework to evolve test scenarios using genetic algorithms using an operation model of the system under test. It can automatically generate and execute test cases that reveal flaws in behaviorally complex systems. Genetic algorithms focus the exploration of tests on the set of test cases that most effectively reveals the flaws and vulnerabilities of the system under test. It leverages advances in state- and model-based engineering, which are essential in defining the behavior of autonomous systems. It also uses goal networks to describe test scenarios.
An Integrated Approach for Urban Earthquake Vulnerability Analyses
NASA Astrophysics Data System (ADS)
Düzgün, H. S.; Yücemen, M. S.; Kalaycioglu, H. S.
2009-04-01
The earthquake risk for an urban area has increased over the years due to the increasing complexities in urban environments. The main reasons are the location of major cities in hazard prone areas, growth in urbanization and population and rising wealth measures. In recent years physical examples of these factors are observed through the growing costs of major disasters in urban areas which have stimulated a demand for in-depth evaluation of possible strategies to manage the large scale damaging effects of earthquakes. Understanding and formulation of urban earthquake risk requires consideration of a wide range of risk aspects, which can be handled by developing an integrated approach. In such an integrated approach, an interdisciplinary view should be incorporated into the risk assessment. Risk assessment for an urban area requires prediction of vulnerabilities related to elements at risk in the urban area and integration of individual vulnerability assessments. However, due to complex nature of an urban environment, estimating vulnerabilities and integrating them necessities development of integrated approaches in which vulnerabilities of social, economical, structural (building stock and infrastructure), cultural and historical heritage are estimated for a given urban area over a given time period. In this study an integrated urban earthquake vulnerability assessment framework, which considers vulnerability of urban environment in a holistic manner and performs the vulnerability assessment for the smallest administrative unit, namely at neighborhood scale, is proposed. The main motivation behind this approach is the inability to implement existing vulnerability assessment methodologies for countries like Turkey, where the required data are usually missing or inadequate and decision makers seek for prioritization of their limited resources in risk reduction in the administrative districts from which they are responsible. The methodology integrates socio-economical, structural, coastal, ground condition, organizational vulnerabilities, as well as accessibility to critical services within the framework. The proposed framework has the following eight components: Seismic hazard analysis, soil response analysis, tsunami inundation analysis, structural vulnerability analysis, socio-economic vulnerability analysis, accessibility to critical services, GIS-based integrated vulnerability assessment, and visualization of vulnerabilities in 3D virtual city model The integrated model for various vulnerabilities obtained for the urban area is developed in GIS environment by using individual vulnerability assessments for considered elements at risk and serve for establishing the backbone of the spatial decision support system. The stages followed in the model are: Determination of a common mapping unit for each aspect of urban earthquake vulnerability, formation of a geo-database for the vulnerabilities, evaluation of urban vulnerability based on multi attribute utility theory with various weighting algorithms, mapping of the evaluated integrated earthquake risk in geographic information systems (GIS) in the neighborhood scale. The framework is also applicable to larger geographical mapping scales, for example, the building scale. When illustrating the results in building scale, 3-D visualizations with remote sensing data is used so that decision-makers can easily interpret the outputs. The proposed vulnerability assessment framework is flexible and can easily be applied to urban environments at various geographical scales with different mapping units. The obtained total vulnerability maps for the urban area provide a baseline for the development of risk reduction strategies for the decision makers. Moreover, as several aspects of elements at risk for an urban area is considered through vulnerability analyses, effect on changes in vulnerability conditions on the total can easily be determined. The developed approach also enables decision makers to monitor temporal and spatial changes in the urban environment due to implementation of risk reduction strategies.
NASA Astrophysics Data System (ADS)
Miara, A.; Macknick, J.; Vorosmarty, C. J.; Corsi, F.; Fekete, B. M.; Newmark, R. L.; Tidwell, V. C.; Cohen, S. M.
2016-12-01
Thermoelectric plants supply 85% of electricity generation in the United States. Under a warming climate, the performance of these power plants may be reduced, as thermoelectric generation is dependent upon cool ambient temperatures and sufficient water supplies at adequate temperatures. In this study, we assess the vulnerability and reliability of 1,100 operational power plants (2015) across the contiguous United States under a comprehensive set of climate scenarios (five Global Circulation Models each with four Representative Concentration Pathways). We model individual power plant capacities using the Thermoelectric Power and Thermal Pollution model (TP2M) coupled with the Water Balance Model (WBM) at a daily temporal resolution and 5x5 km spatial resolution. Together, these models calculate power plant capacity losses that account for geophysical constraints and river network dynamics. Potential losses at the single-plant level are put into a regional energy security context by assessing the collective system-level reliability at the North-American Electricity Reliability Corporation (NERC) regions. Results show that the thermoelectric sector at the national level has low vulnerability under the contemporary climate and that system-level reliability in terms of available thermoelectric resources relative to thermoelectric demand is sufficient. Under future climates scenarios, changes in water availability and warm ambient temperatures lead to constraints on operational capacity and increased vulnerability at individual power plant sites across all regions in the United States. However, there is a strong disparity in regional vulnerability trends and magnitudes that arise from each region's climate, hydrology and technology mix. Despite increases in vulnerabilities at the individual power plant level, regional energy systems may still be reliable (with no system failures) due to sufficient back-up reserve capacities.
Using Geographic Information Systems (GIS), the vulnerability of ground water supplies to contamination from underground storage tanks (USTs) was assessed. The analysis was conducted for the 48 contiguous states, and then again for groups of states corresponding to the EPA Regio...
Quan, Zhan-Jun; Li, Yuan; Li, Jun-Sheng; Han, Yu; Xiao, Neng-Wen; Fu, Meng-Di
2013-06-01
In this paper, an ecological vulnerability evaluation index system for the Shengli Coalfield in Xilinguole of Inner Mongolia was established, which included 16 factors in ecological sensitivity, natural and social pressure, and ecological recovery capacity, respectively. Based on the expert scoring method and analytic hierarchy process (AHP), an ecological vulnerability model was built for the calculation of the regional ecological vulnerability by means of RS and GIS spatial analysis. An analysis of the relationships between land use and ecological vulnerability was also made, and the results were tested by spatial auto-correlation analysis. Overall, the ecological vulnerability of the study area was at medium-high level. The exploitation of four opencast areas in the Coalfield caused a significant increase of ecological vulnerability. Moreover, due to the effects of mine drained water and human activities, the 300 -2000 m around the opencast areas was turning into higher ecologically fragile area. With further exploitation, the whole Coalfield was evolved into moderate and heavy ecological vulnerability area, and the coal resources mining was a key factor in this process. The cluster analysis showed that the spatial distribution of the ecological vulnerability in the study area had reasonable clustering characteristics. To decrease the population density, control the grazing capacity of grassland, and regulate the ratios of construction land and cultivated land could be the optimal ways for resolving the natural and social pressure, and to increase the investment and improve the vegetation recovery coefficient could be the fundamental measures for decreasing the ecological vulnerability of the study area.
Nirmal Raja, K; Maraline Beno, M
2017-07-01
In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.
Gender, Age, Social differences and Climate Change
NASA Astrophysics Data System (ADS)
Petrucci, Alessandra; Salvini, Silvana
2017-04-01
Climate and society evolve together in a manner that could place already vulnerable areas and their population at a greater risk to extreme weather events. While efforts have been devoted to better planning preparedness and responses to weather extremes, the interactions among various stakeholders who deal with hazard mitigation and response, and the community members, also related with gender and age differences, are not completely understood. In contrast to physical vulnerability, which arises from the potential for environmental extremes to create adverse physiological changes, social vulnerability arises from the potential for these extreme events to cause changes in people's behavior. People can vary in their potential for injury to themselves and their families. They also vary in the potential for destruction of their homes and workplaces, as well as the destruction of the transportation systems and locations for shopping and recreation they use in their daily activities. It is important to recognize that social vulnerability is not randomly distributed either demographically or geographically. In particular, the social vulnerability arising from a lack of psychological resilience, social network integration, economic assets, and political power vary across demographic groups. Some of these components of social vulnerability can be predicted by demographic characteristics such as gender, age, education, income, and ethnicity. This review explores the gender and social difference dimensions of vulnerability and adaptive capacity in relation to climate change.
Evolving bipartite authentication graph partitions
Pope, Aaron Scott; Tauritz, Daniel Remy; Kent, Alexander D.
2017-01-16
As large scale enterprise computer networks become more ubiquitous, finding the appropriate balance between user convenience and user access control is an increasingly challenging proposition. Suboptimal partitioning of users’ access and available services contributes to the vulnerability of enterprise networks. Previous edge-cut partitioning methods unduly restrict users’ access to network resources. This paper introduces a novel method of network partitioning superior to the current state-of-the-art which minimizes user impact by providing alternate avenues for access that reduce vulnerability. Networks are modeled as bipartite authentication access graphs and a multi-objective evolutionary algorithm is used to simultaneously minimize the size of largemore » connected components while minimizing overall restrictions on network users. Lastly, results are presented on a real world data set that demonstrate the effectiveness of the introduced method compared to previous naive methods.« less
Evolving bipartite authentication graph partitions
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pope, Aaron Scott; Tauritz, Daniel Remy; Kent, Alexander D.
As large scale enterprise computer networks become more ubiquitous, finding the appropriate balance between user convenience and user access control is an increasingly challenging proposition. Suboptimal partitioning of users’ access and available services contributes to the vulnerability of enterprise networks. Previous edge-cut partitioning methods unduly restrict users’ access to network resources. This paper introduces a novel method of network partitioning superior to the current state-of-the-art which minimizes user impact by providing alternate avenues for access that reduce vulnerability. Networks are modeled as bipartite authentication access graphs and a multi-objective evolutionary algorithm is used to simultaneously minimize the size of largemore » connected components while minimizing overall restrictions on network users. Lastly, results are presented on a real world data set that demonstrate the effectiveness of the introduced method compared to previous naive methods.« less
Namoğlu, Nihan; Ulgen, Yekta
2013-01-01
Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects.
Critical tipping point distinguishing two types of transitions in modular network structures
NASA Astrophysics Data System (ADS)
Shai, Saray; Kenett, Dror Y.; Kenett, Yoed N.; Faust, Miriam; Dobson, Simon; Havlin, Shlomo
2015-12-01
Modularity is a key organizing principle in real-world large-scale complex networks. The relatively sparse interactions between modules are critical to the functionality of the system and are often the first to fail. We model such failures as site percolation targeting interconnected nodes, those connecting between modules. We find, using percolation theory and simulations, that they lead to a "tipping point" between two distinct regimes. In one regime, removal of interconnected nodes fragments the modules internally and causes the system to collapse. In contrast, in the other regime, while only attacking a small fraction of nodes, the modules remain but become disconnected, breaking the entire system. We show that networks with broader degree distribution might be highly vulnerable to such attacks since only few nodes are needed to interconnect the modules, consequently putting the entire system at high risk. Our model has the potential to shed light on many real-world phenomena, and we briefly consider its implications on recent advances in the understanding of several neurocognitive processes and diseases.
Epidemics in Complex Networks: The Diversity of Hubs
NASA Astrophysics Data System (ADS)
Kitsak, Maksim; Gallos, Lazaros K.; Havlin, Shlomo; Stanley, H. Eugene; Makse, Hernan A.
2009-03-01
Many complex systems are believed to be vulnerable to spread of viruses and information owing to their high level of interconnectivity. Even viruses of low contagiousness easily proliferate the Internet. Rumors, fads, and innovation ideas are prone to efficient spreading in various social systems. Another commonly accepted standpoint is the importance of the most connected elements (hubs) in the spreading processes. We address following questions. Do all hubs conduct epidemics in the same manner? How does the epidemics spread depend on the structure of the network? What is the most efficient way to spread information over the system? We analyze several large-scale systems in the framework of of the susceptible/infective/removed (SIR) disease spread model which can also be mapped to the problem of rumor or fad spreading. We show that hubs are often ineffective in the transmission of virus or information owing to the highly heterogeneous topology of most networks. We also propose a new tool to evaluate the efficiency of nodes in spreading virus or information.
A common brain network links development, aging, and vulnerability to disease.
Douaud, Gwenaëlle; Groves, Adrian R; Tamnes, Christian K; Westlye, Lars Tjelta; Duff, Eugene P; Engvig, Andreas; Walhovd, Kristine B; James, Anthony; Gass, Achim; Monsch, Andreas U; Matthews, Paul M; Fjell, Anders M; Smith, Stephen M; Johansen-Berg, Heidi
2014-12-09
Several theories link processes of development and aging in humans. In neuroscience, one model posits for instance that healthy age-related brain degeneration mirrors development, with the areas of the brain thought to develop later also degenerating earlier. However, intrinsic evidence for such a link between healthy aging and development in brain structure remains elusive. Here, we show that a data-driven analysis of brain structural variation across 484 healthy participants (8-85 y) reveals a largely--but not only--transmodal network whose lifespan pattern of age-related change intrinsically supports this model of mirroring development and aging. We further demonstrate that this network of brain regions, which develops relatively late during adolescence and shows accelerated degeneration in old age compared with the rest of the brain, characterizes areas of heightened vulnerability to unhealthy developmental and aging processes, as exemplified by schizophrenia and Alzheimer's disease, respectively. Specifically, this network, while derived solely from healthy subjects, spatially recapitulates the pattern of brain abnormalities observed in both schizophrenia and Alzheimer's disease. This network is further associated in our large-scale healthy population with intellectual ability and episodic memory, whose impairment contributes to key symptoms of schizophrenia and Alzheimer's disease. Taken together, our results suggest that the common spatial pattern of abnormalities observed in these two disorders, which emerge at opposite ends of the life spectrum, might be influenced by the timing of their separate and distinct pathological processes in disrupting healthy cerebral development and aging, respectively.
Nemoto, Miyuki; Yabushita, Noriko; Kim, Mi-Ji; Matsuo, Tomoaki; Seino, Satoshi; Tanaka, Kiyoji
2012-01-01
This study aimed to evaluate the physical frailty status of vulnerable older adults as classified in the Japanese LTCI system and to compare this with Fried's definition. A total of 444 older adults were classified based on the LTCI system as independent, vulnerable, or dependent, and 400 of these participants also fit Fried's criteria for not frail, pre-frail or frail. We evaluated their physical function with a 12 item physical function test. We derived a physical function score (PFS) from these 12 items and a principal component analysis was used to make comparisons. The receiver operating characteristic (ROC) curve analysis was performed to identify the sensitivity and specificity of the PFS cut-off points to distinguish the dependent category from the other categories. We found significant differences and a hierarchical order for the PFSs among the three groups of the LTCI system (the independent, 0.41 ± 0.54; the vulnerable, -0.40 ± 0.76; and the dependent, -1.49 ± 0.73) and of Fried's definition (not frail, 0.50 ± 0.51; pre frail, -0.11 ± 0.63; and frail, -1.25 ± 0.98). The optimal cut-off value (OCV) was -0.593. This study showed that the range of physical function of people considered frail category (pre-frail, vulnerable, and frail) is wide and overlapping. That is, the physical function of vulnerable older adults is worse than the pre-frail, but better than the frail. To better recognize older adults in need of greater support, the vulnerable should also receive assessment of their frailty status according to Fried's definition. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
User Vulnerability and its Reduction on a Social Networking Site
2014-01-01
social networking sites bring about new...and explore other users’ profiles and friend networks. Social networking sites have reshaped business models [Vayner- chuk 2009], provided platform... social networking sites is to enable users to be more social, user privacy and security issues cannot be ignored. On one hand, most social networking sites
Impact of the topology of global macroeconomic network on the spreading of economic crises.
Lee, Kyu-Min; Yang, Jae-Suk; Kim, Gunn; Lee, Jaesung; Goh, Kwang-Il; Kim, In-mook
2011-03-31
Throughout economic history, the global economy has experienced recurring crises. The persistent recurrence of such economic crises calls for an understanding of their generic features rather than treating them as singular events. The global economic system is a highly complex system and can best be viewed in terms of a network of interacting macroeconomic agents. In this regard, from the perspective of collective network dynamics, here we explore how the topology of the global macroeconomic network affects the patterns of spreading of economic crises. Using a simple toy model of crisis spreading, we demonstrate that an individual country's role in crisis spreading is not only dependent on its gross macroeconomic capacities, but also on its local and global connectivity profile in the context of the world economic network. We find that on one hand clustering of weak links at the regional scale can significantly aggravate the spread of crises, but on the other hand the current network structure at the global scale harbors higher tolerance of extreme crises compared to more "globalized" random networks. These results suggest that there can be a potential hidden cost in the ongoing globalization movement towards establishing less-constrained, trans-regional economic links between countries, by increasing vulnerability of the global economic system to extreme crises.
Impact of the Topology of Global Macroeconomic Network on the Spreading of Economic Crises
Lee, Kyu-Min; Yang, Jae-Suk; Kim, Gunn; Lee, Jaesung; Goh, Kwang-Il; Kim, In-mook
2011-01-01
Throughout economic history, the global economy has experienced recurring crises. The persistent recurrence of such economic crises calls for an understanding of their generic features rather than treating them as singular events. The global economic system is a highly complex system and can best be viewed in terms of a network of interacting macroeconomic agents. In this regard, from the perspective of collective network dynamics, here we explore how the topology of the global macroeconomic network affects the patterns of spreading of economic crises. Using a simple toy model of crisis spreading, we demonstrate that an individual country's role in crisis spreading is not only dependent on its gross macroeconomic capacities, but also on its local and global connectivity profile in the context of the world economic network. We find that on one hand clustering of weak links at the regional scale can significantly aggravate the spread of crises, but on the other hand the current network structure at the global scale harbors higher tolerance of extreme crises compared to more “globalized” random networks. These results suggest that there can be a potential hidden cost in the ongoing globalization movement towards establishing less-constrained, trans-regional economic links between countries, by increasing vulnerability of the global economic system to extreme crises. PMID:21483794
DOE Office of Scientific and Technical Information (OSTI.GOV)
Klise, Katherine A.; Murray, Regan; Bynum, Michael
Water utilities are vulnerable to a wide variety of human-caused and natural disasters. These disruptive events can result in loss of water service, contaminated water, pipe breaks, and failed equipment. Furthermore, long term changes in water supply and customer demand can have a large impact on the operating conditions of the network. The ability to maintain drinking water service during and following these types of events is critical. Simulation and analysis tools can help water utilities explore how their network will respond to disruptive events and plan effective mitigation strategies. The U.S. Environmental Protection Agency and Sandia National Laboratories aremore » developing new software tools to meet this need. The Water Network Tool for Resilience (WNTR, pronounced winter) is a Python package designed to help water utilities investigate resilience of water distribution systems over a wide range of hazardous scenarios and to evaluate resilience-enhancing actions. The following documentation includes installation instructions and examples, description of software features, and software license. It is assumed that the reader is familiar with the Python Programming Language. References are included for additional background on software components. Online documentation, hosted at http://wntr.readthedocsio/, will be updated as new features are added. The online version includes API documentation and information for developers.« less
FAMILY STRUCTURE, DYNAMICS AND PSYCHIATRIC DISORDER IN INDIA1
Chopra, H.D.
1984-01-01
SUMMARY This paper briefly reviews the literature on family structure, dynamics and relationships between family-jointness and different psychiatric disorders in India. Many recent studies indicate that the nuclear families are more vulnerable and plea is made for maintaining the traditional joint family system, even in some modified forms, because of its “built-in-immunity” and supportive networks. PMID:21966010
NASA Astrophysics Data System (ADS)
Kim, Jungja; Ceong, Heetaek; Won, Yonggwan
In market-basket analysis, weighted association rule (WAR) discovery can mine the rules that include more beneficial information by reflecting item importance for special products. In the point-of-sale database, each transaction is composed of items with similar properties, and item weights are pre-defined and fixed by a factor such as the profit. However, when items are divided into more than one group and the item importance must be measured independently for each group, traditional weighted association rule discovery cannot be used. To solve this problem, we propose a new weighted association rule mining methodology. The items should be first divided into subgroups according to their properties, and the item importance, i.e. item weight, is defined or calculated only with the items included in the subgroup. Then, transaction weight is measured by appropriately summing the item weights from each subgroup, and the weighted support is computed as the fraction of the transaction weights that contains the candidate items relative to the weight of all transactions. As an example, our proposed methodology is applied to assess the vulnerability to threats of computer systems that provide networked services. Our algorithm provides both quantitative risk-level values and qualitative risk rules for the security assessment of networked computer systems using WAR discovery. Also, it can be widely used for new applications with many data sets in which the data items are distinctly separated.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mar, M.H.
1995-07-01
Based on the vulnerability Lethality (V/L) taxonomy developed by the Ballistic Vulnerability Lethality Division (BVLD) of the Survivability Lethality Analysis Directorate (SLAD), a nuclear electromagnetic pulse (EMP) coupling V/L analysis taxonomy has been developed. A nuclear EMP threat to a military system can be divided into two levels: (1) coupling to a system level through a cable, antenna, or aperture; and (2) the component level. This report will focus on the initial condition, which includes threat definition and target description, as well as the mapping process from the initial condition to damaged components state. EMP coupling analysis at a systemmore » level is used to accomplish this. This report introduces the nature of EMP threat, interaction between the threat and target, and how the output of EMP coupling analysis at a system level becomes the input to the component level analysis. Many different tools (EMP coupling codes) will be discussed for the mapping process, which correponds to the physics of phenomenology. This EMP coupling V/L taxonomy and the models identified in this report will provide the tools necessary to conduct basic V/L analysis of EMP coupling.« less
A Recommender System in the Cyber Defense Domain
2014-03-27
monitoring software is a java based program sending updates to the database on the sensor machine. The host monitoring program gathers information about...3.2.2 Database. A MySQL database located on the sensor machine acts as the storage for the sensors on the network. Snort, Nmap, vulnerability scores, and...machine with the IDS and the recommender is labeled “sensor”. The recommender system code is written in java and compiled using java version 1.6.024
The Role of Efficient XML Interchange (EXI) in Navy Wide-Area Network (WAN) Optimization
2015-03-01
compress, and re-encrypt data to continue providing optimization through compression; however, that capability requires careful consideration of...optimization 23 of encrypted data requires a careful analysis and comparison of performance improvements and IA vulnerabilities. It is important...Contained EXI capitalizes on multiple techniques to improve compression, and they vary depending on a set of EXI options passed to the codec
David Saah; Trista Patterson; Thomas Buchholz; David Ganz; David Albert; Keith Rush
2014-01-01
Integrated ecological and economic solutions are increasingly sought after by communities to provide basic energy needs such as home heating, transport, and electricity, while reducing drivers of and vulnerability to climate change. Small rural communities may require a coordinated approach to overcome the limitations of economies of scale. Low-carbon development...
NASA Astrophysics Data System (ADS)
Knouz, Najat; Boudhar, Abdelghani; Bachaoui, El Mostafa
2016-04-01
Fresh water is the condition of all life on Earth for its vital role in the survival of living beings and in the social, economic and technological development. The Groundwater, as the surface water, is increasingly threatened by agricultural and industrial pollution. In this respect, the groundwater vulnerability assessment to pollution is a very valuable tool for resource protection, management of its quality and uses it in a sustainable way. The main objective of this study is the evaluation of groundwater vulnerability to pollution of the study area, Beni Amir, located in the first irrigated perimeter of Morocco, Tadla, using the DRASTIC method (depth to water, net recharge, aquifer media, soil media, Topography, impact of Vadose zone and hydraulic conductivity), and assessing the impact of each parameter on the DRASTIC vulnerability index by a sensitivity analysis. This study also highlights the role of geographic information systems (GIS) in assessing vulnerability. The Vulnerability index is calculated as the sum of product of ratings and weights assigned to each of the parameter DRASTIC. The results revealed four vulnerability classes, 7% of the study area has a high vulnerability, 31% are moderately vulnerable, 57% have a low vulnerability and 5% are of very low vulnerability.
Dossou, Jean-Paul; Assarag, Bouchra; Delamou, Alexandre; Van der Veken, Karen; Belaid, Loubna; Ouédraogo, Moctar; Khalfallah, Sonia; Aouras, Hayet; Diadhiou, Mohamed; Fassassi, Raïmi; Delvaux, Thérèse
2016-08-08
Health research capacities have been improved in Africa but still remain weak as compared to other regions of the World. To strengthen these research capacities, international collaboration and networking for knowledge and capacity transfer are needed. In this commentary, we present the Network for Scientific Support in the field of Sexual and Reproductive Health in West and North Africa, its priority research topics and discuss its implementation process. Established in January 2014, the Network aims at generating human rights and gender-based research fully carried out and driven by South based institutions. It is composed of 12 institutions including the Institute of Tropical Medicine of Antwerp (Belgium) and 11 institutions from eight Francophone West and North African countries. The key areas of interest of this network are health policies analysis and health system research in family planning, HIV prevention among vulnerable groups, quality of care and breast cancers. Since it started, seventeen research proposals based on locally relevant research questions have been developed. Among the seventeen proposals, eleven have been implemented. Several research institutions enhanced linkages with local representations of international partners such as UNFPA. The network is committed to strengthening methodological research capacities and soft skills such as fundraising, advocacy and leadership. Such competencies are strongly needed for developing an effective South-based leadership in Sexual and Reproductive Health research, and for achieving the Sustainable Development Goals.
An analysis of the accessibility of video lottery terminals: the case of Montréal.
Robitaille, Eric; Herjean, Patrick
2008-01-18
Researchers and public health officials in Canada, the United States and Australia have for some time noted broader geographic accessibility to gambling establishments, above all in socioeconomically underprivileged communities. This increase in availability could lead to more and more gambling problems. This article focuses, in an ecological perspective, in particular on a spatial analysis of the geographic accessibility of sites possessing a VLT permit in the Montréal area, i.e. Montréal Island, the South Shore and Laval, from the standpoint of the development of an indicator of the vulnerability (socioeconomic components and demographic components) to gambling of populations at the level of certain neighbourhood units (dissemination areas). With the recent development of geographic information systems (GIS), it is now possible to ascertain accessibility to services much more accurately, for example by taking into account the configuration of the road network. The findings of our analysis reveal widespread geographic accessibility to sites possessing a VLT permit in the downtown area and in pericentral districts. In some neighbourhood units, a site possessing a VLT permit may be within a three-minute walk. In the region studied overall, average walking time to a VLT site is nine minutes. Access to this type of service on foot is usually limited in the outskirts. However, a number of groups of sites possessing VLT permits are found along certain axial highways. According to local spatial self-correlation analyses, the findings suggest a significant link between walking accessibility to sites possessing VLT permits and the vulnerability of the communities. In a number of neighbourhood units with ready access to VLT's the populations display high vulnerability. These findings reveal that accessibility to sites possessing a VLT permit is often linked to the vulnerability (socioeconomic and demographic components) of communities. Reliance in our analyses on neighbourhood units with fairly small areas enabled us to emphasize the rectilinear dimension of the spatial distribution of sites possessing VLT permits. This is a significant link that public health officials must consider when elaborating programs to combat pathological gambling.
Cyber situational awareness and differential hardening
NASA Astrophysics Data System (ADS)
Dwivedi, Anurag; Tebben, Dan
2012-06-01
The advent of cyber threats has created a need for a new network planning, design, architecture, operations, control, situational awareness, management, and maintenance paradigms. Primary considerations include the ability to assess cyber attack resiliency of the network, and rapidly detect, isolate, and operate during deliberate simultaneous attacks against the network nodes and links. Legacy network planning relied on automatic protection of a network in the event of a single fault or a very few simultaneous faults in mesh networks, but in the future it must be augmented to include improved network resiliency and vulnerability awareness to cyber attacks. Ability to design a resilient network requires the development of methods to define, and quantify the network resiliency to attacks, and to be able to develop new optimization strategies for maintaining operations in the midst of these newly emerging cyber threats. Ways to quantify resiliency, and its use in visualizing cyber vulnerability awareness and in identifying node or link criticality, are presented in the current work, as well as a methodology of differential network hardening based on the criticality profile of cyber network components.
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-01-01
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890
Wu, Fan; Xu, Lili
2013-08-01
Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project
NASA Astrophysics Data System (ADS)
D'Antonio, Salvatore; Romano, Luigi; Khelil, Abdelmajid; Suri, Neeraj
The INSPIRE project aims at enhancing the European potential in the field of security by ensuring the protection of critical information infrastructures through (a) the identification of their vulnerabilities and (b) the development of innovative techniques for securing networked process control systems. To increase the resilience of such systems INSPIRE will develop traffic engineering algorithms, diagnostic processes and self-reconfigurable architectures along with recovery techniques. Hence, the core idea of the INSPIRE project is to protect critical information infrastructures by appropriately configuring, managing, and securing the communication network which interconnects the distributed control systems. A working prototype will be implemented as a final demonstrator of selected scenarios. Controls/Communication Experts will support project partners in the validation and demonstration activities. INSPIRE will also contribute to standardization process in order to foster multi-operator interoperability and coordinated strategies for securing lifeline systems.
Space Weather Effects on Current and Future Electric Power Systems
NASA Astrophysics Data System (ADS)
Munoz, D.; Dutta, O.; Tandoi, C.; Brandauer, W.; Mohamed, A.; Damas, M. C.
2016-12-01
This work addresses the effects of Geomagnetic Disturbances (GMDs) on the present bulk power system as well as the future smart grid, and discusses the mitigation of these geomagnetic impacts, so as to reduce the vulnerabilities of the electric power network to large space weather events. Solar storm characterized by electromagnetic radiation generates geo-electric fields that result in the flow of Geomagnetically Induced Currents (GICs) through the transmission lines, followed by transformers and the ground. As the ground conductivity and the power network topology significantly vary with the region, it becomes imperative to estimate of the magnitude of GICs for different places. In this paper, the magnitude of GIC has been calculated for New York State (NYS) with the help of extensive modelling of the whole NYS electricity transmission network using real data. Although GIC affects only high voltage levels, e.g. above 300 kV, the presence of coastline in NYS makes the low voltage transmission lines also susceptible to GIC. Besides this, the encroachment of technologies pertaining to smart grid implementation, such as Phasor Measurement Units (PMUs), Microgrids, Flexible AC Transmission System (FACTS), and Information and Communication Technology (ICT) have been analyzed for GMD impacts. Inaccurate PMU results due to scintillation of GPS signals that are affected by electromagnetic interference of solar storm, presence of renewable energy resources in coastal areas that are more vulnerable to GMD, the ability of FACTS devices to either block or pave new path for GICs and so on, shed some light on impacts of GMD on smart grid technologies.
Wireless Channel Characterization in the Airport Surface Environment
NASA Technical Reports Server (NTRS)
Neville, Joshua T.
2004-01-01
Given the anticipated increase in air traffic in the coming years, modernization of the National Airspace System (NAS) is a necessity. Part of this modernization effort will include updating current communication, navigation, and surveillance (CNS) systems to deal with the increased traffic as well as developing advanced CNS technologies for the systems. An example of such technology is the integrated CNS (ICNS) network being developed by the Advanced CNS Architecture and Systems Technology (ACAST) group for use in the airport surface environment. The ICNS network would be used to convey voice/data between users in a secure and reliable manner. The current surface system only supports voice and does so through an obsolete physical infrastructure. The old system is vulnerable to outages and costly to maintain. The proposed ICNS network will include a wireless radio link. To ensure optimal performance, a thorough and accurate characterization of the channel across which the link would operate is necessary. The channel is the path the signal takes from the transmitter to the receiver and is prone to various forms of interference. Channel characterization involves a combination of analysis, simulation, and measurement. My work this summer was divided into four tasks. The first task required compiling and reviewing reference material that dealt with the characterization and modeling of aeronautical channels. The second task involved developing a systematic approach that could be used to group airports into classes, e.g. small airfields, medium airports, large open airports, large cluttered airports, etc. The third task consisted of implementing computer simulations of existing channel models. The fourth task entailed measuring possible interference sources in the airport surface environment via a spectrum analyzer.
Neural networks underlying trait aggression depend on MAOA gene alleles.
Klasen, Martin; Wolf, Dhana; Eisner, Patrick D; Habel, Ute; Repple, Jonathan; Vernaleken, Ingo; Schlüter, Thorben; Eggermann, Thomas; Zerres, Klaus; Zepf, Florian D; Mathiak, Klaus
2018-03-01
Low expressing alleles of the MAOA gene (MAOA-L) have been associated with an increased risk for developing an aggressive personality. This suggests an MAOA-L-specific neurobiological vulnerability associated with trait aggression. The neural networks underlying this vulnerability are unknown. The present study investigated genotype-specific associations between resting state brain networks and trait aggression (Buss-Perry Aggression Questionnaire) in 82 healthy Caucasian males. Genotype influences on aggression-related networks were studied for intrinsic and seed-based brain connectivity. Intrinsic connectivity was higher in the ventromedial prefrontal cortex (VMPFC) of MAOA-L compared to high expressing allele (MAOA-H) carriers. Seed-based connectivity analyses revealed genotype differences in the functional involvement of this region. MAOA genotype modulated the relationship between trait aggression and VMPFC connectivity with supramarginal gyrus (SMG) and areas of the default mode network (DMN). Separate analyses for the two groups were performed to better understand how the genotype modulated the relationship between aggression and brain networks. They revealed a positive correlation between VMPFC connectivity and aggression in right angular gyrus (AG) and a negative correlation in right SMG in the MAOA-L group. No such effect emerged in the MAOA-H carriers. The results indicate a particular relevance of VMPFC for aggression in MAOA-L carriers; in specific, a detachment from the DMN along with a strengthened coupling to the AG seems to go along with lower trait aggression. MAOA-L carriers may thus depend on a synchronization of emotion regulation systems (VMPFC) with core areas of empathy (SMG) to prevent aggression.
Configuration development for ROMENET
NASA Astrophysics Data System (ADS)
Rhue, Lawrence
1989-10-01
A plan prepared by RJO Enterprises and BBN Communications Corporation (BBNCC) for the design of ROMENET, a DDN-like testbed for the Rome Air Development Center (RADC) Wide Area Networks (WAN) laboratory is presented. The ROMENET is intended to provide RADC with the ability to test and evaluate the performance and vulnerability of the Defense Data Network (DDN) technologies in support of specific Major Command programs and activities at RADC. It will also support experimentation with packet switched network technologies and includes facilities to analytically evaluate the performance of the network and its associated equipment and media. In addition, ROMENET will provide a simulation vehicle for controlled interference or jamming into the media for vulnerability assessment. Through interfaces with the RADC Battle Management Laboratory (BML), ROMENET will allow the Air Force to assess the restorative and performance characteristics of the network under stressed conditions. The closed environment of ROMENET makes it ideal for creating and testing routing algorithms and network control protocols.
NASA Astrophysics Data System (ADS)
Wang, Xiao Juan; Guo, Shi Ze; Jin, Lei; Chen, Mo
We study the structural robustness of the scale free network against the cascading failure induced by overload. In this paper, a failure mechanism based on betweenness-degree ratio distribution is proposed. In the cascading failure model we built the initial load of an edge which is proportional to the node betweenness of its ends. During the edge random deletion, we find a phase transition. Then based on the phase transition, we divide the process of the cascading failure into two parts: the robust area and the vulnerable area, and define the corresponding indicator to measure the performance of the networks in both areas. From derivation, we find that the vulnerability of the network is determined by the distribution of betweenness-degree ratio. After that we use the connection between the node ability coefficient and distribution of betweenness-degree ratio to explain the cascading failure mechanism. In simulations, we verify the correctness of our derivations. By changing connecting preferences, we find scale free networks with a slight assortativity, which performs better both in robust area and vulnerable area.
ERIC Educational Resources Information Center
Bele, Irene Velsvik; Kvalsund, Rune
2016-01-01
This longitudinal study, spanning from 1995 through 2012, followed vulnerable youth from upper secondary school (T1) as they made the transition to their early twenties (T2), late twenties (T3) and mid-thirties (T4). We investigated their social network relationships in different phases of adult life, focusing mainly on factors that explain…
De Pietri, Diana; Dietrich, Patricia; Mayo, Patricia; Carcagno, Alejandro; de Titto, Ernesto
2013-12-01
Characterize geographical indicators in relation to their usefulness in measuring regional inequities, identify and describe areas according to their degree of geographical accessibility to primary health care centers (PHCCs), and detect populations at risk from the perspective of access to primary care. Analysis of spatial accessibility using geographic information systems (GIS) involved three aspects: population without medical coverage, distribution of PHCCs, and the public transportation network connecting them. The development of indicators of demand (real, potential, and differential) and analysis of territorial factors affecting population mobility enabled the characterization of PHCCs with regard to their environment, thereby contributing to local and regional analysis and to the detection of different zones according to regional connectivity levels. Indicators developed in a GIS environment were very useful in analyzing accessibility to PHCCs by vulnerable populations. Zoning the region helped identify inequities by differentiating areas of unmet demand and fragmentation of spatial connectivity between PHCCs and public transportation.
Network Vulnerability Assessment of the U.S. Crude Pipeline Infrastructure
2012-09-01
56 Clanton, “Oklahoma Oil Hub Helps Keep Oil Prices from Going Higher.” 57 Donald Furgeson, John Mahoney , and Brett Warfield...Vulnerability Assessment Matrix of the COTH.58 58 Furgeson, Mahoney , and Warfield, Security...Steinhäusler et al., “Security Risks to the Oil and Gas Industry: Terrorist Capabilities.” 71 Furgeson, Mahoney , and Warfield, Security Vulnerability
Crea, Thomas M.; Lombe, Margaret; Robertson, Laura A.; Dumba, Lovemore; Mushati, Phyllis; Makoni, J.C.; Mavise, Gideon; Eaton, Jeffrey W.; Munatsi, Brighton; Nyamukapa, Constance A.; Gregson, Simon
2012-01-01
The high prevalence of human immunodeficiency virus/acquired immune deficiency syndrome in sub-Saharan Africa has resulted in a dramatic increase in orphans and vulnerable children (OVC) over the past decade. These children typically rely on extended family networks for support, but the magnitude of the crisis has resulted in traditional familial networks becoming overwhelmed and more economically and socially vulnerable. Previous research consistently demonstrates the positive influence of household asset ownership on children's well-being. Using data from impoverished households caring for OVC in rural Manicaland Province, Zimbabwe, this study explores the influence of household asset ownership on OVC health vulnerability (HV) and social vulnerability (SV). Findings indicate that asset ownership is associated with significantly lower SV, in terms of school attendance and birth registration. Yet, assets do not emerge as a direct influence of OVC HV as measured by disease and chronic illness, although having a chronically ill adult in the household increases HV. These findings suggest that asset ownership, specifically a combination of fixed and movable assets, may offset the influence of other risk factors for children's SV. PMID:22624868