interconnected stem networks: security focus a.tikhomirov, inha university, incheon, rk...

15
INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK [email protected] A.Trufanov, Irkutsk State Technical University, Irkutsk, RF [email protected]

Upload: madlyn-little

Post on 21-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

INTERCONNECTED STEM NETWORKS:SECURITY FOCUS

A.Tikhomirov, INHA University, Incheon, RK

[email protected]

A.Trufanov, Irkutsk State Technical University, Irkutsk, RF

[email protected]

Page 2: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

1. Introduction

Development and support of infrastructure and security of critical infrastructure are among vital issues of governance in public and private sectors.Modern infrastructure looks like a set of interconnected structural elements that forms a kind of a complex network.Even for complex networks which had been studied intensively for a decade, their exploration still concentrates on the platform of single non-interacting network.It has been recognized that there is a need in elaboration in reliable and transparent tools for studying interconnected complex networks[1-2].

Page 3: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

Visualization of interconnected Internet AS (autonomous system )-level topologies of South Korea (left) and Japan (right). The size of nodes represents their internal degree, and label of nodes is AS number [http://bgp.potaroo.net/cidr/autnums.html.]. Visualization:Pajek (Batagelj and Mrvar, 2013).See ref. [3]

1. Introduction (continuation)

Page 4: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

2. Modeling Platform

Within the context of a complex network methodology a conception introducing CNL [4] as stem networks with its intrinsic multilayered thematic and dynamic nature has been applied.

Page 5: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

2. Modeling Platform (continuation 1)

The CNL describes a stem network or S-network [5] by the triple (S, T, C), where S is nonempty set of stems ; T is a nonempty set of thematic layers - which are nonoverlapping sets of stems; C = (C1, C2, ..., Ct) is a set of binary relations on the S, where Ci corresponds thematic layer Ti.

In present work the CNL defined as a group of S-networks {S B1, SB2, .. SBm}, describes on beds B = {B1, B2, .. Bm} with thematic layers T = {TB1, TB2, .. TBm} .

SB1SB2

TB11

TB12

TB21

TB21

TB21

TB21

Page 6: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

2. Modeling Platform (continuation 2)

The associations that explain functioning of real objects - multiplets (pairs, triples, ..), including nonrepeatable stems of different beds (Sm, Sk; Sm, Sk, Sl;…) are called bouquets.

Page 7: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

2. Modeling Platform (continuation 3)

Bouquets include Stems which firm nodes of networks of the same nature( for example , airlines, railways, boat lines bus lines…).Simple terminology has been applied with aim to bridge diverse disciplines and clustersaround CNL.

Page 8: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

2. Modeling Platform (continuation 4)

Links - between the stems inside a bouquet represent binary relations (interactions) such as "dependence" ( D-links), which differ from couplings - "connections" (C-links) that govern the interaction between the stems of a bed; couplings of "bindings"- type (B-links ) describe the relationship between the nodes of the same stem

D-link

C-linkB-link

Page 9: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

2. Modeling Platform (continuation 5)

The "connections" (C-links) govern the interaction between the stems of a bed; These might be multithreaded couplings

Bouquet of 2 stems , each in its bed islinked with multithread connections

Page 10: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

Such a detailing of links promotes clarification while modeling attacks on separate elements of a network (nodes, stems, bouquets, beds, layers, links-bindings, links- connections, and links-dependencies ) and their combinations.

In order to study the problems of security and sustainable development of systems it is important to take into account internal properties of stems - capacities.

2. Modeling Platform (continuation 6)

Capacities

Page 11: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

First, capacities are needed to hold loads in a network in terms of centralities ( degree centrality load, bridge centrality load, vicinity centrality load…).Second, those provide safety and security while countering diverse attacks.Time factor t is also included into consideration for reflecting CNL dynamics.

2. Modeling Platform (continuation 7)

Capacities

Page 12: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

Attack schemes of the CNL network structures in context of security problems has been reviewed in frame of a simple analysis of signs of major offensive actions, which are important for study of critical infrastructures described by s-networks. The well-known statement of information security theory has been taken into account , the fact that the attack is a pair of "source of threat - vulnerability of a target" , the pair that implements a threat into action and brings to damage.

2. Modeling Platform (continuation 8)

Source of threat Attack Damage

Vulnerability

Page 13: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

3. Findings

The proposed model allows the following.

Elements of critical infrastructure network are considered as stems that stand-alone or interconnected and interdependent within and across countries, states, regions, and local territories. Most facilities of critical infrastructure are proprietary of the private sector or federal, regional, or local governments, and might be stratified into diverse layers on pertinent beds while connected to other systems of the same or different field.

All these clarify CNL security issues and promote CNL security strategies.

MDG eight goals with 21 targets might be considered accordingly as bouquets and subbouquets . Same concerns a new set of Goals building on the achievements of the MDGs.

Page 14: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

4 Summary

An advanced supercomplex network model with its qualitative description has been proposed as an extension of previously introduced conception of comprehensive network lace.

The model includes multiplets of elements (stems, beds, layers, nodes, links-bindings, links-connections, and links-dependencies) in order to formalize interactions of transportation - technological, socio-organizational and biosocial systems.

Clarification of concomitant security problems has been provided.

Page 15: INTERCONNECTED STEM NETWORKS: SECURITY FOCUS A.Tikhomirov, INHA University, Incheon, RK alexei-tikhomirov@hotmail.com A.Trufanov, Irkutsk State Technical

References

1. J.Gao, S. V. Buldyrev, H.E. Stanley, S. Havlin. Networks formed from interdependent networks. Nature Physics . vol. 8, Pp 40–48 (2012). doi:10.1038/nphys2180,http://www.nature.com/nphys/journal/v8/n1/pdf/nphys2180.pdf2. M. Dickison, S. Havlin, H. E. Stanley. Epidemics on interconnected networks. PHYSICAL REVIEW E 85, 066109 (2012). http://argento.bu.edu/hes/articles/dhs12.pdf3. F. Tan, J. Wu, Y. Xia, C. K. Tse. Traffic congestion in interconnected complex networks. Phys. Rev. E 89, 062813 (2014). http://arxiv.org/pdf/1401.0412v2.pdf4. A.Tikhomirov, A. Trufanov. New network models to improve the processes of state regulations. – 42 p. (2012), http://www.pitt.edu/~super1/lecture/lec43841/index.htm (in Russian)5. A.Tikhomirov, A. Trufanov, L. Nosyreva, E. Nosyreva. Mathematical description of stem networks Proceedings of XVII Baikal All-Russian Conference. vol. 3. Pp.149- 153 . Irkutsk (2012) (in Russian)