A Methodological Overview of Network Vulnerability Analysis

被引:107
作者
Murray, Alan T. [1 ]
Matisziw, Timothy C. [2 ,3 ]
Grubesic, Tony H. [4 ]
机构
[1] Arizona State Univ, Sch Geog Sci, Tempe, AZ 85287 USA
[2] Univ Missouri, Dept Geog, Columbia, MO 65211 USA
[3] Univ Missouri, Dept Civil & Environm Engn, Columbia, MO 65211 USA
[4] Indiana Univ, Dept Geog, Bloomington, IN 47405 USA
基金
美国国家科学基金会;
关键词
D O I
10.1111/j.1468-2257.2008.00447.x
中图分类号
F0 [经济学]; F1 [世界各国经济概况、经济史、经济地理]; C [社会科学总论];
学科分类号
0201 ; 020105 ; 03 ; 0303 ;
摘要
Evaluating network infrastructures for potential vulnerabilities is an important component of strategic planning, particularly in the context of managing and mitigating service disruptions. Many methods have been proposed to facilitate such analysis, providing different interpretations of infrastructure vulnerability. The primary approaches that have been employed for network Vulnerability analysis can be broadly classified as scenario-specific, strategy-specific, simulation, and mathematical modeling methodologies. Research on network vulnerability assessment has traditionally focused on one of these methodologies without consideration of the others. This article highlights the important implications of methodology for both infrastructure planning and policy development. To better understand the theoretical and practical trade-offs associated with methodology selection, this article provides a review of these categories of analysis, examining benefits and shortcomings with regard to practical planning issues and policy interpretation.
引用
收藏
页码:573 / 592
页数:20
相关论文
共 54 条
[1]  
AHLERS M, 2004, FEDERAL SECURITY PRO
[2]   Structural vulnerability of the North American power grid [J].
Albert, R ;
Albert, I ;
Nakarado, GL .
PHYSICAL REVIEW E, 2004, 69 (02) :025103-1
[3]   Error and attack tolerance of complex networks [J].
Albert, R ;
Jeong, H ;
Barabási, AL .
NATURE, 2000, 406 (6794) :378-382
[4]  
ANDERSON PL, 2003, NE BLACKOUT LIKELY R
[5]   A game theory approach to measuring the performance reliability of transport networks [J].
Bell, MGH .
TRANSPORTATION RESEARCH PART B-METHODOLOGICAL, 2000, 34 (06) :533-545
[6]   The use of game theory to measure the vulnerability of stochastic networks [J].
Bell, MGH .
IEEE TRANSACTIONS ON RELIABILITY, 2003, 52 (01) :63-68
[7]   GENERAL SYSTEMS-THEORY - THE SKELETON OF SCIENCE [J].
BOULDING, KE .
MANAGEMENT SCIENCE, 1956, 2 (03) :197-208
[8]  
Bryson KM, 2002, EUR J OPER RES, V141, P679, DOI 10.1016/S0377-2217(01)00275-2
[9]  
Church R., 2007, Critical Infrastructure: Reliability and Vulnerability, P221, DOI DOI 10.1007/978-3-540-68056-7_11
[10]   Protecting critical assets:: The r-interdiction median problem with fortification [J].
Church, Richard L. ;
Scaparra, Maria Paola .
GEOGRAPHICAL ANALYSIS, 2007, 39 (02) :129-146