+ All Categories
Home > Documents > Vulnerability of Complex Infrastructure Systems

Vulnerability of Complex Infrastructure Systems

Date post: 02-Jan-2016
Category:
Upload: price-noble
View: 20 times
Download: 1 times
Share this document with a friend
Description:
Vulnerability of Complex Infrastructure Systems. Torbjörn Thedéen Safety Research, KTH. HAZARDS. Nature-Acts of God: Earthquakes, Extreme floods, Thunder storms ... Failures of material ... Human lapses Organizational errors Hackers Terrorism War. Info Stairs. Many data - PowerPoint PPT Presentation
Popular Tags:
28
Vulnerability of Complex Infrastructure Systems Torbjörn Thedéen Safety Research, KTH
Transcript
Page 1: Vulnerability  of Complex Infrastructure Systems

Vulnerability of Complex Infrastructure Systems

Torbjörn Thedéen

Safety Research, KTH

Page 2: Vulnerability  of Complex Infrastructure Systems

•HAZARDS

• Nature-Acts of God: Earthquakes, Extreme floods, Thunder storms ...

• Failures of material ...• Human lapses• Organizational errors• Hackers• Terrorism• War

Page 3: Vulnerability  of Complex Infrastructure Systems

D a t a N e t w o r k

P o w e r N e tF i n a n c e N e t

T r a n s p o r t N e t w o r k

I N F R A S T R U C T U R E S

… … .

Page 4: Vulnerability  of Complex Infrastructure Systems

Info Stairs

Many dataClassical statistical analysis

Few dataLogical modelReliability methodsPRASubjective

Probabilities

Bayesian methods

Precursors, Incidents

Page 5: Vulnerability  of Complex Infrastructure Systems

•Research Areas

• Terrorist Groups• Motivation• Religious, political,

social, economic studiesConditional

• Power+possibilities

• Conditional Vulnerability

• Consequences given ´attacks´:

• Dams, transportation, power grids...

Page 6: Vulnerability  of Complex Infrastructure Systems

Vulnerability USA October 07

Vulnerability of Road Transportation Systems

(Erik Jenelius KTH)

Page 7: Vulnerability  of Complex Infrastructure Systems

Conditional Vulnerability

• Road systems modelled as a connected graph

• Conditioned of one link is out, the consequences are estimated:

• The increased total traffic time• The unsatisfied demand• The most ´important´ or one link at random

is taken out

Page 8: Vulnerability  of Complex Infrastructure Systems

Example

• Northern Sweden

• The average traffic is known

• The traffic for a disturbed net can be calculated

Page 9: Vulnerability  of Complex Infrastructure Systems

Unsatisfied veh/total00 - 0.00050.0005 - 0.00170.0017 - 0.00360.0036 - 0.00840.0084 - 0.024

0 200 400 Kilometers

Figur 6

Page 10: Vulnerability  of Complex Infrastructure Systems

Vehicles/day0 - 15931594 - 48114812 - 1053310534 - 1958619587 - 35742

0 200 400 Kilometers

Figur 2

Page 11: Vulnerability  of Complex Infrastructure Systems

Vehicle min/veh0 - 0.020.02 - 0.080.08 - 0.190.19 - 0.450.45 - 1.22

0 200 400 Kilometers

Figur 5

Page 12: Vulnerability  of Complex Infrastructure Systems

Vulnerability of Power Net

Power Generation

Power Transmission

Power Distribution and Consumption

Page 13: Vulnerability  of Complex Infrastructure Systems

Power Generation

Dam Safety and Security

Safety analysis OK, but security antagonistic threats??

Nuclear Power Plants. PRA safety OK,

Defense passive?

Page 14: Vulnerability  of Complex Infrastructure Systems

Power Nets - Vulnerability

• (Statistical Analysis of Collapses) Too few!

• Vulnerability analysis of empirical graph model – partly classisfied!

• Vulnerability analysis of idealized graph model (coupled branching processes)

Page 15: Vulnerability  of Complex Infrastructure Systems

Power law of large consequences, power grid

Page 16: Vulnerability  of Complex Infrastructure Systems

Power Net – Graph Model

Power stations

Transformers

400 kV

110 kV

220 V Consumers

…………

Page 17: Vulnerability  of Complex Infrastructure Systems

Powergeneration

Consumers

Branching Process

Page 18: Vulnerability  of Complex Infrastructure Systems

Limiting result

• One link is removed at random. The proportion of unserved consumers has in the limit a distribution with a right tail of power type exponent – 1.

Page 19: Vulnerability  of Complex Infrastructure Systems
Page 20: Vulnerability  of Complex Infrastructure Systems
Page 21: Vulnerability  of Complex Infrastructure Systems

Vulnerability and Terrorism

Page 22: Vulnerability  of Complex Infrastructure Systems

Terrorism

Motivation Terrorist groups

Basis Common goal

Cause fear, chaos and deaths!

Page 23: Vulnerability  of Complex Infrastructure Systems

TERRORISM AND DEFENSE

Enemy infrastructure

Criticalinfrastructure

?Partly known Known

Page 24: Vulnerability  of Complex Infrastructure Systems

Fighting Terrorism

• Knowledge or qualified guesses about probable terrorist groups, their goals and actions constitutes:

• Basis for our defence of infrastructures ...

• Basis for our actions against terrorist groups

Page 25: Vulnerability  of Complex Infrastructure Systems

Fight Between Two Networks

• Our critical infrastructures: power, transportation, data, finance, water ...

• KNOWN TO THE ENEMY!

• Enemy infrastructure: terrorist groups

• ALMOST UNKNOWN TO US!

Page 26: Vulnerability  of Complex Infrastructure Systems

Terrorist Network

Known links and nodesUnknown links and nodes

Page 27: Vulnerability  of Complex Infrastructure Systems

Sampling Procedures

• Random sampling of nodes/links

• In time or in time periods

• Markov sampling

• Markov sampling with side conditions

Page 28: Vulnerability  of Complex Infrastructure Systems

Estimates – random sampling

• Link distribution

• Shortest path

• Sampling in many time periods – (N, p):

• ML estimates of p and N (Size of the terrorist population)


Recommended