In last decades, thanks to the large diffusion of Information and communications technologies, the cooperation of distributed systems has been facilitated with the aim to provide new services. One of the common aspect of this kind of systems is the presence of a network able to ensure the connectivity among the elements of the network. The connectivity is a fundamental prerequisite also in the context of critical infrastructures (CIs), which are defined as a specific kind of infrastructures able to provide the essential services that underpin the society and serve as the backbone of our nation’s economy, security, and health (i.e. transportation systems, gas and water distribution systems, financial services, etc). Due to their relevance, the identification of vulnerabilities in this kind of systems is a mandatory task in order to design adequate and effective defense strategies. To this end, in this chapter some of the most common methods for networks vulnerabilities identification are illustrated and compared in order to stress common aspects and differences.

Identification of Vulnerabilities in Networked Systems

Faramondi L;Setola R
2019-01-01

Abstract

In last decades, thanks to the large diffusion of Information and communications technologies, the cooperation of distributed systems has been facilitated with the aim to provide new services. One of the common aspect of this kind of systems is the presence of a network able to ensure the connectivity among the elements of the network. The connectivity is a fundamental prerequisite also in the context of critical infrastructures (CIs), which are defined as a specific kind of infrastructures able to provide the essential services that underpin the society and serve as the backbone of our nation’s economy, security, and health (i.e. transportation systems, gas and water distribution systems, financial services, etc). Due to their relevance, the identification of vulnerabilities in this kind of systems is a mandatory task in order to design adequate and effective defense strategies. To this end, in this chapter some of the most common methods for networks vulnerabilities identification are illustrated and compared in order to stress common aspects and differences.
2019
Critical nodes; Network vulnerabilities; Optimization approach
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12610/14980
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 5
  • ???jsp.display-item.citation.isi??? ND
social impact