INTERCONNECTED STEM NETWORKS:SECURITY FOCUS

INTERCONNECTED STEM NETWORKS:
SECURITY FOCUS
A.Tikhomirov,
INHA University, Incheon, RK
[email protected]
A.Trufanov,
Irkutsk State Technical University, Irkutsk, RF
[email protected]
1. Introduction
Development and support of infrastructure and security of critical
infrastructure are among vital issues of governance in public and
private sectors.
Modern infrastructure looks like a set of interconnected structural
elements that forms a kind of a complex network.
Even for complex networks which had been studied intensively for
a decade, their exploration still concentrates on the platform of
single non-interacting network.
It has been recognized that there is a need in elaboration in
reliable and transparent tools for studying interconnected
complex networks[1-2].
1. Introduction
(continuation)
Visualization of interconnected
Internet AS (autonomous system )level topologies of South Korea
(left) and Japan (right). The size of
nodes represents their internal
degree, and label of nodes is AS
number
[http://bgp.potaroo.net/cidr/autnu
ms.html.]. Visualization:
Pajek (Batagelj and Mrvar, 2013).
See ref. [3]
2. Modeling Platform
Within the context of a complex network methodology a
conception introducing CNL [4] as stem networks with its intrinsic
multilayered thematic and dynamic nature has been applied.
2. Modeling Platform
(continuation 1)
The CNL describes a stem network or
S-network [5] by the triple (S, T, C),
where S is nonempty set of stems ;
SB1
T is a nonempty set of thematic layers
- which are nonoverlapping sets of
stems;
TB12
C = (C1, C2, ..., Ct) is a set of binary
relations on the S, where Ci
corresponds thematic layer Ti.
TB21
In present work the CNL defined as a
group of S-networks {S B1, SB2, ..
SBm}, describes on beds B = {B1, B2,
.. Bm} with thematic layers T = {TB1,
TB2, .. TBm} .
TB11
SB2
TB21
TB21
TB21
2. Modeling Platform
(continuation 2)
The associations that explain functioning of real objects
- multiplets (pairs, triples, ..), including nonrepeatable
stems of different beds (Sm, Sk; Sm, Sk, Sl;…) are called
bouquets.
2. Modeling Platform
(continuation 3)
Bouquets include Stems which
firm nodes of networks of the
same nature( for example ,
airlines, railways, boat lines bus
lines…).
Simple terminology has been
applied with aim to bridge
diverse disciplines and clusters
around CNL.
2. Modeling Platform
(continuation 4)
Links - between the stems inside a
bouquet represent binary relations
(interactions) such as
"dependence" ( D-links), which
differ from couplings "connections" (C-links) that govern
the interaction between the stems
of a bed; couplings of "bindings"type (B-links ) describe the
relationship between the nodes of
the same stem
D-link
B-link
C-link
2. Modeling Platform
(continuation 5)
The "connections" (C-links)
govern the interaction
between the stems of a bed;
These might be
multithreaded couplings
Bouquet of 2 stems , each in its bed is
linked with multithread connections
2. Modeling Platform
(continuation 6)
Capacities
Such a detailing of links promotes
clarification while modeling attacks on
separate elements of a network (nodes,
stems, bouquets, beds, layers, linksbindings, links- connections, and linksdependencies ) and their combinations.
In order to study the problems of security
and sustainable development of systems it
is important to take into account internal
properties of stems - capacities.
2. Modeling Platform
(continuation 7)
Capacities
First, capacities are needed to hold loads
in a network in terms of centralities (
degree centrality load, bridge centrality
load, vicinity centrality load…).
Second, those provide safety and security
while countering diverse attacks.
Time factor t is also included into
consideration for reflecting CNL dynamics.
2. Modeling Platform
(continuation 8)
Attack schemes of the CNL network structures in context of
security problems has been reviewed in frame of a simple analysis
of signs of major offensive actions, which are important for study
of critical infrastructures described by s-networks. The wellknown statement of information security theory has been taken
into account , the fact that the attack is a pair of "source of threat vulnerability of a target" , the pair that implements a threat into
action and brings to damage.
Vulnerability
Source of threat
Attack
Damage
3. Findings
The proposed model allows the following.
Elements of critical infrastructure network are considered as
stems that stand-alone or interconnected and interdependent
within and across countries, states, regions, and local territories.
Most facilities of critical infrastructure are proprietary of the
private sector or federal, regional, or local governments, and
might be stratified into diverse layers on pertinent beds while
connected to other systems of the same or different field.
All these clarify CNL security issues and promote CNL security
strategies.
MDG eight goals with 21 targets might be considered
accordingly as bouquets and subbouquets . Same concerns a
new set of Goals building on the achievements of the MDGs.
4 Summary
An advanced supercomplex network model with its qualitative
description has been proposed as an extension of previously
introduced conception of comprehensive network lace.
The model includes multiplets of elements (stems, beds, layers,
nodes, links-bindings, links-connections, and links-dependencies)
in order to formalize interactions of transportation - technological,
socio-organizational and biosocial systems.
Clarification of concomitant security problems has been provided.
References
1. J.Gao, S. V. Buldyrev, H.E. Stanley, S. Havlin. Networks formed from
interdependent networks. Nature Physics . vol. 8, Pp 40–48 (2012).
doi:10.1038/nphys2180,http://www.nature.com/nphys/journal/v8/n1/pdf/np
hys2180.pdf
2. M. Dickison, S. Havlin, H. E. Stanley. Epidemics on interconnected
networks. PHYSICAL REVIEW E 85, 066109 (2012).
http://argento.bu.edu/hes/articles/dhs12.pdf
3. F. Tan, J. Wu, Y. Xia, C. K. Tse. Traffic congestion in interconnected
complex networks. Phys. Rev. E 89, 062813 (2014).
http://arxiv.org/pdf/1401.0412v2.pdf
4. A.Tikhomirov, A. Trufanov. New network models to improve the
processes of state regulations. – 42 p. (2012),
http://www.pitt.edu/~super1/lecture/lec43841/index.htm (in Russian)
5. A.Tikhomirov, A. Trufanov, L. Nosyreva, E. Nosyreva. Mathematical
description of stem networks Proceedings of XVII Baikal All-Russian
Conference. vol. 3. Pp.149- 153 . Irkutsk (2012) (in Russian)