Analyzing Disaster-Induced Cascading Effects in Hybrid Critical Infrastructures: A Practical Approach View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2020-07-23

AUTHORS

Sandra König , Antonios Gouglidis , Stefan Rass , Neil Adams , Paul Smith , David Hutchison

ABSTRACT

Critical Infrastructures (CIs) now include complex cyber-physical systems, with communication networks enabling interactions between the cyber and physical systems. Although the digitalization of such critical infrastructures is intended to increase performance and safety, it also subjects them to new forms of attack. Contemporary attacks that combine both cyber and physical elements are often targeting these critical infrastructures. Recent incidents have shown that it is important to have a holistic view of a CI, including the communication networks at its core, in order to understand the potential attacks on it, as well as the consequences. It is therefore imperative to analyze potential cascading effects enabled by dependencies between the various assets in such a Critical Infrastructure. In this chapter, we describe an approach to modelling the dependencies between assets in a CI and analyze the potential for, and the nature of, these cascading effects. More... »

PAGES

769-789

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-030-44685-7_31

DOI

http://dx.doi.org/10.1007/978-3-030-44685-7_31

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1129566675


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Center for Digital Safety & Security, Austrian Institute of Technology GmbH, Vienna, Austria", 
          "id": "http://www.grid.ac/institutes/grid.4332.6", 
          "name": [
            "Center for Digital Safety & Security, Austrian Institute of Technology GmbH, Vienna, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "K\u00f6nig", 
        "givenName": "Sandra", 
        "id": "sg:person.07522234405.16", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07522234405.16"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Computing and Communications, Lancaster University, LA1 4WA, Lancaster, UK", 
          "id": "http://www.grid.ac/institutes/grid.9835.7", 
          "name": [
            "School of Computing and Communications, Lancaster University, LA1 4WA, Lancaster, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gouglidis", 
        "givenName": "Antonios", 
        "id": "sg:person.011353374772.69", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011353374772.69"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Institute of Applied Informatics, Universit\u00e4t Klagenfurt, Klagenfurt, Austria", 
          "id": "http://www.grid.ac/institutes/grid.7520.0", 
          "name": [
            "Institute of Applied Informatics, Universit\u00e4t Klagenfurt, Klagenfurt, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Rass", 
        "givenName": "Stefan", 
        "id": "sg:person.011757105216.80", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011757105216.80"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "InnovaSec Ltd, Malvern, UK", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "InnovaSec Ltd, Malvern, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Adams", 
        "givenName": "Neil", 
        "id": "sg:person.010162267007.82", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010162267007.82"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Center for Digital Safety & Security, Austrian Institute of Technology GmbH, Vienna, Austria", 
          "id": "http://www.grid.ac/institutes/grid.4332.6", 
          "name": [
            "Center for Digital Safety & Security, Austrian Institute of Technology GmbH, Vienna, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Smith", 
        "givenName": "Paul", 
        "id": "sg:person.015112647531.58", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015112647531.58"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Computing and Communications, Lancaster University, LA1 4WA, Lancaster, UK", 
          "id": "http://www.grid.ac/institutes/grid.9835.7", 
          "name": [
            "School of Computing and Communications, Lancaster University, LA1 4WA, Lancaster, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hutchison", 
        "givenName": "David", 
        "id": "sg:person.012636622347.55", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012636622347.55"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2020-07-23", 
    "datePublishedReg": "2020-07-23", 
    "description": "Critical Infrastructures (CIs) now include complex cyber-physical systems, with communication networks enabling interactions between the cyber and physical systems. Although the digitalization of such critical infrastructures is intended to increase performance and safety, it also subjects them to new forms of attack. Contemporary attacks that combine both cyber and physical elements are often targeting these critical infrastructures. Recent incidents have shown that it is important to have a holistic view of a CI, including the communication networks at its core, in order to understand the potential attacks on it, as well as the consequences. It is therefore imperative to analyze potential cascading effects enabled by dependencies between the various assets in such a Critical Infrastructure. In this chapter, we describe an approach to modelling the dependencies between assets in a CI and analyze the potential for, and the nature of, these cascading effects.", 
    "editor": [
      {
        "familyName": "Rak", 
        "givenName": "Jacek", 
        "type": "Person"
      }, 
      {
        "familyName": "Hutchison", 
        "givenName": "David", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-030-44685-7_31", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-030-44684-0", 
        "978-3-030-44685-7"
      ], 
      "name": "Guide to Disaster-Resilient Communication Networks", 
      "type": "Book"
    }, 
    "keywords": [
      "critical infrastructure", 
      "communication networks", 
      "complex cyber-physical systems", 
      "cyber-physical systems", 
      "such critical infrastructures", 
      "potential attacks", 
      "infrastructure", 
      "physical systems", 
      "physical elements", 
      "attacks", 
      "network", 
      "contemporary attacks", 
      "holistic view", 
      "practical approach", 
      "recent incidents", 
      "cyber", 
      "digitalization", 
      "dependency", 
      "system", 
      "cascading effects", 
      "new forms", 
      "assets", 
      "potential cascading effects", 
      "performance", 
      "approach", 
      "order", 
      "view", 
      "core", 
      "incidents", 
      "chapter", 
      "safety", 
      "elements", 
      "form", 
      "nature", 
      "effect", 
      "interaction", 
      "potential", 
      "consequences", 
      "Disaster-Induced Cascading Effects", 
      "Hybrid Critical Infrastructures"
    ], 
    "name": "Analyzing Disaster-Induced Cascading Effects in Hybrid Critical Infrastructures: A Practical Approach", 
    "pagination": "769-789", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1129566675"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-030-44685-7_31"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-030-44685-7_31", 
      "https://app.dimensions.ai/details/publication/pub.1129566675"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:14", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_235.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-030-44685-7_31"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-44685-7_31'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-44685-7_31'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-44685-7_31'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-44685-7_31'


 

This table displays all metadata directly associated to this object as RDF triples.

149 TRIPLES      23 PREDICATES      64 URIs      57 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-030-44685-7_31 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N3a4529fa525e451aa2fa6a49eed607ef
4 schema:datePublished 2020-07-23
5 schema:datePublishedReg 2020-07-23
6 schema:description Critical Infrastructures (CIs) now include complex cyber-physical systems, with communication networks enabling interactions between the cyber and physical systems. Although the digitalization of such critical infrastructures is intended to increase performance and safety, it also subjects them to new forms of attack. Contemporary attacks that combine both cyber and physical elements are often targeting these critical infrastructures. Recent incidents have shown that it is important to have a holistic view of a CI, including the communication networks at its core, in order to understand the potential attacks on it, as well as the consequences. It is therefore imperative to analyze potential cascading effects enabled by dependencies between the various assets in such a Critical Infrastructure. In this chapter, we describe an approach to modelling the dependencies between assets in a CI and analyze the potential for, and the nature of, these cascading effects.
7 schema:editor N7a0cc5a9700144dda5a986210b58abd7
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N97e6afaaea6b4d37bd8ca14a1b02855e
12 schema:keywords Disaster-Induced Cascading Effects
13 Hybrid Critical Infrastructures
14 approach
15 assets
16 attacks
17 cascading effects
18 chapter
19 communication networks
20 complex cyber-physical systems
21 consequences
22 contemporary attacks
23 core
24 critical infrastructure
25 cyber
26 cyber-physical systems
27 dependency
28 digitalization
29 effect
30 elements
31 form
32 holistic view
33 incidents
34 infrastructure
35 interaction
36 nature
37 network
38 new forms
39 order
40 performance
41 physical elements
42 physical systems
43 potential
44 potential attacks
45 potential cascading effects
46 practical approach
47 recent incidents
48 safety
49 such critical infrastructures
50 system
51 view
52 schema:name Analyzing Disaster-Induced Cascading Effects in Hybrid Critical Infrastructures: A Practical Approach
53 schema:pagination 769-789
54 schema:productId N2191edf4db514f1b8c49b2f5458e5195
55 Nf0edda35088d49fc82885729f495eaeb
56 schema:publisher Ne1323cbf891f4dc5be0b8403667bb3bb
57 schema:sameAs https://app.dimensions.ai/details/publication/pub.1129566675
58 https://doi.org/10.1007/978-3-030-44685-7_31
59 schema:sdDatePublished 2022-01-01T19:14
60 schema:sdLicense https://scigraph.springernature.com/explorer/license/
61 schema:sdPublisher N167c652807be42909b1cf3c047325bfc
62 schema:url https://doi.org/10.1007/978-3-030-44685-7_31
63 sgo:license sg:explorer/license/
64 sgo:sdDataset chapters
65 rdf:type schema:Chapter
66 N09b71211ab8041cf8cbb867f442cbf7c rdf:first sg:person.011353374772.69
67 rdf:rest N8d591c2ecd994cd0a4d1ca8213c16a41
68 N167c652807be42909b1cf3c047325bfc schema:name Springer Nature - SN SciGraph project
69 rdf:type schema:Organization
70 N2191edf4db514f1b8c49b2f5458e5195 schema:name dimensions_id
71 schema:value pub.1129566675
72 rdf:type schema:PropertyValue
73 N21af974651be4cf382187df1c995acad rdf:first sg:person.012636622347.55
74 rdf:rest rdf:nil
75 N26a618d716ae4e4990423521bef6369a rdf:first Nd3eb7026a9414afdb84851c5f723830f
76 rdf:rest rdf:nil
77 N3a4529fa525e451aa2fa6a49eed607ef rdf:first sg:person.07522234405.16
78 rdf:rest N09b71211ab8041cf8cbb867f442cbf7c
79 N430cd4eb61cf4e8093834b9bc817c2f4 rdf:first sg:person.010162267007.82
80 rdf:rest N6e15b85e90d04c20beaf976c970aa0b1
81 N454e1198f8984baea1a16ae24d3c0d5a schema:familyName Rak
82 schema:givenName Jacek
83 rdf:type schema:Person
84 N6e15b85e90d04c20beaf976c970aa0b1 rdf:first sg:person.015112647531.58
85 rdf:rest N21af974651be4cf382187df1c995acad
86 N7a0cc5a9700144dda5a986210b58abd7 rdf:first N454e1198f8984baea1a16ae24d3c0d5a
87 rdf:rest N26a618d716ae4e4990423521bef6369a
88 N8d591c2ecd994cd0a4d1ca8213c16a41 rdf:first sg:person.011757105216.80
89 rdf:rest N430cd4eb61cf4e8093834b9bc817c2f4
90 N97e6afaaea6b4d37bd8ca14a1b02855e schema:isbn 978-3-030-44684-0
91 978-3-030-44685-7
92 schema:name Guide to Disaster-Resilient Communication Networks
93 rdf:type schema:Book
94 Nd3eb7026a9414afdb84851c5f723830f schema:familyName Hutchison
95 schema:givenName David
96 rdf:type schema:Person
97 Ne1323cbf891f4dc5be0b8403667bb3bb schema:name Springer Nature
98 rdf:type schema:Organisation
99 Nf0edda35088d49fc82885729f495eaeb schema:name doi
100 schema:value 10.1007/978-3-030-44685-7_31
101 rdf:type schema:PropertyValue
102 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
103 schema:name Information and Computing Sciences
104 rdf:type schema:DefinedTerm
105 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
106 schema:name Information Systems
107 rdf:type schema:DefinedTerm
108 sg:person.010162267007.82 schema:affiliation grid-institutes:None
109 schema:familyName Adams
110 schema:givenName Neil
111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010162267007.82
112 rdf:type schema:Person
113 sg:person.011353374772.69 schema:affiliation grid-institutes:grid.9835.7
114 schema:familyName Gouglidis
115 schema:givenName Antonios
116 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011353374772.69
117 rdf:type schema:Person
118 sg:person.011757105216.80 schema:affiliation grid-institutes:grid.7520.0
119 schema:familyName Rass
120 schema:givenName Stefan
121 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011757105216.80
122 rdf:type schema:Person
123 sg:person.012636622347.55 schema:affiliation grid-institutes:grid.9835.7
124 schema:familyName Hutchison
125 schema:givenName David
126 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012636622347.55
127 rdf:type schema:Person
128 sg:person.015112647531.58 schema:affiliation grid-institutes:grid.4332.6
129 schema:familyName Smith
130 schema:givenName Paul
131 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015112647531.58
132 rdf:type schema:Person
133 sg:person.07522234405.16 schema:affiliation grid-institutes:grid.4332.6
134 schema:familyName König
135 schema:givenName Sandra
136 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07522234405.16
137 rdf:type schema:Person
138 grid-institutes:None schema:alternateName InnovaSec Ltd, Malvern, UK
139 schema:name InnovaSec Ltd, Malvern, UK
140 rdf:type schema:Organization
141 grid-institutes:grid.4332.6 schema:alternateName Center for Digital Safety & Security, Austrian Institute of Technology GmbH, Vienna, Austria
142 schema:name Center for Digital Safety & Security, Austrian Institute of Technology GmbH, Vienna, Austria
143 rdf:type schema:Organization
144 grid-institutes:grid.7520.0 schema:alternateName Institute of Applied Informatics, Universität Klagenfurt, Klagenfurt, Austria
145 schema:name Institute of Applied Informatics, Universität Klagenfurt, Klagenfurt, Austria
146 rdf:type schema:Organization
147 grid-institutes:grid.9835.7 schema:alternateName School of Computing and Communications, Lancaster University, LA1 4WA, Lancaster, UK
148 schema:name School of Computing and Communications, Lancaster University, LA1 4WA, Lancaster, UK
149 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...