{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T08:12:27Z","timestamp":1778659947667,"version":"3.51.4"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T00:00:00Z","timestamp":1705536000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T00:00:00Z","timestamp":1705536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["SA2018-UP-025"],"award-info":[{"award-number":["SA2018-UP-025"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["SA2018-UP-025"],"award-info":[{"award-number":["SA2018-UP-025"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A wide range of critical infrastructures are connected via wide area networks as well as the Internet-of-Thing (IoT). Apart from natural disasters, these infrastructures, providing services such as electricity, water, gas, and Internet, are vulnerable to terrorist attacks. Clearly, damages to these infrastructures can have dire consequences on economics, health services, security and safety, and various business sectors. An infrastructure network can be represented as a directed graph in which nodes and edges denote operation entities and dependencies between entities, respectively. A knowledgeable attacker who plans to harm the system would aim to use the minimum amount of effort, cost, or resources to yield the maximum amount of damage. Their best strategy would be to attack the most critical nodes of the infrastructure. From the defender\u2019s side, the strategy would be to minimize the potential damage by investing resources in bolstering the security of the critical nodes. Thus, in the struggle between the attacker and defender, it becomes important for both the attacker and defender to identify which nodes are most critically significant to the system. Identifying critical nodes is a complex optimization problem. In this paper, we first present the problem model and then propose a solution for computing the optimal cost attack while considering the failure propagation. The proposed model represents one or multiple interconnected infrastructures. While considering the attack cost of each node, the proposed method computes the optimal attack that a rational attacker would make. Our problem model simulates one of two goals: maximizing the damage for a given attack budget or minimizing the cost for a given amount of damage. Our technique obtains solutions to optimize the objective functions by utilizing integer-linear programming while observing the constraints for each of the specified goals. The paper reports an extensive set of experiments using various graphs. The results show the efficacy of our technique in terms of its ability to obtain solutions with fast turnaround times.<\/jats:p>","DOI":"10.1007\/s43926-023-00054-1","type":"journal-article","created":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T13:01:42Z","timestamp":1705582902000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Determining critical nodes in optimal cost attacks on networked infrastructures"],"prefix":"10.1007","volume":"4","author":[{"given":"Ishfaq","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Addison","family":"Clark","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Hansheng","family":"Lei","sequence":"additional","affiliation":[]},{"given":"David","family":"Ferris","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Aved","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,18]]},"reference":[{"issue":"12","key":"54_CR1","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1504\/IJCIS.2008.016092","volume":"4","author":"V Rosato","year":"2008","unstructured":"Rosato V, Issacharoff L, Tiriticco F, Meloni S, Porcellinis S, Setola R. Modelling interdependent infrastructures using interacting dynamical models. Int J Crit Infrastruct. 2008;4(12):63\u201379.","journal-title":"Int J Crit Infrastruct"},{"key":"54_CR2","unstructured":"Romero J. Lack of rain a leading cause of indian grid collapse. IEEE spectrum: technology, engineering, and science news. 2012. https:\/\/spectrum.ieee.org\/energywise\/energy\/the-smarter-grid\/disappointing-monsoon-season-wreaks-havoc-with-indias-grid."},{"key":"54_CR3","doi-asserted-by":"crossref","unstructured":"Naik N, Jenkins P, Grace P, Song J. Comparing attack models for IT systems: lockheed martin\u2019s cyber kill chain, MITRE ATT&CK framework and diamond model, 2022 IEEE International Symposium on Systems Engineering (ISSE), Vienna, Austria, 2022, pp. 1\u20137","DOI":"10.1109\/ISSE54508.2022.10005490"},{"issue":"4","key":"54_CR4","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1111\/risa.12333","volume":"35","author":"DL Alderson","year":"2015","unstructured":"Alderson DL, Brown GG, Carlyle WM. Operational models of infrastructure resilience. Risk Anal. 2015;35(4):562\u201386.","journal-title":"Risk Anal"},{"key":"54_CR5","unstructured":"A dictionary of physics, 6th ed. Oxford [Angleterre]: Oxford University Press, 2009."},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Sturaro S, Silvestri M, Conti Das S. Towards a realistic model for failure propagation in interdependent networks. In: International conference on computing, networking, and Communications (ICNC); 2016. pp. 1\u20137.","DOI":"10.1109\/ICCNC.2016.7440711"},{"issue":"7291","key":"54_CR7","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1038\/nature08932","volume":"464","author":"S Buldyrev","year":"2010","unstructured":"Buldyrev S, Parshani R, Paul G, Stanley H, Havlin S. Catastrophic cascade of failures in interdependent networks. Nature. 2010;464(7291):1025\u20138.","journal-title":"Nature"},{"issue":"1","key":"54_CR8","doi-asserted-by":"publisher","first-page":"016112","DOI":"10.1103\/PhysRevE.83.016112","volume":"83","author":"SV Buldyrev","year":"2011","unstructured":"Buldyrev SV, Shere NW, Cwilich GA. Interdependent networks with identical degrees of mutually dependent nodes. Phys Rev E. 2011;83(1):016112.","journal-title":"Phys Rev E."},{"key":"54_CR9","doi-asserted-by":"crossref","unstructured":"Huang Z, Wang C et al. Balancing system survivability and cost of smart grid via modeling cascading failures. In: IEEE transactions on emerging topics in computing. 2013; 1(1).","DOI":"10.1109\/TETC.2013.2273079"},{"key":"54_CR10","doi-asserted-by":"crossref","unstructured":"Huang Z,Wang C et al. Small cluster in cyber physical systems: network topology, interdependence and cascading failures. In: IEEE transactions on parallel and distributed systems. 2015; 26(8).","DOI":"10.1109\/TPDS.2014.2342740"},{"key":"54_CR11","doi-asserted-by":"publisher","unstructured":"Sturaro A, Silvestri S, Conti M, Das SK. A realistic model for failure propagation in interdependent cyber-physical systems. In IEEE Transactions on Network Science and Engineering, 2020; 7(2): pp. 817\u2013831. Doi: https:\/\/doi.org\/10.1109\/TNSE.2018.2872034.","DOI":"10.1109\/TNSE.2018.2872034"},{"key":"54_CR12","doi-asserted-by":"crossref","unstructured":"Alderson DL, Brown GG, Carlyle WM, Wood RK. Solving defender-attacker-defender models for infrastructure defense. In: Naval postgraduate school, department of operations research, 2011.","DOI":"10.1287\/ics.2011.0047"},{"key":"54_CR13","doi-asserted-by":"publisher","first-page":"16124","DOI":"10.1038\/s41598-020-72771-4","volume":"10","author":"A Smolyak","year":"2020","unstructured":"Smolyak A, Levy O, Vodenska I, et al. Mitigation of cascading failures in complex networks. Sci Rep. 2020;10:16124. https:\/\/doi.org\/10.1038\/s41598-020-72771-4.","journal-title":"Sci Rep"},{"issue":"3","key":"54_CR14","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/TNSE.2019.2904008","volume":"7","author":"U Nakarmi","year":"2020","unstructured":"Nakarmi U, Rahnamay-Naeini M, Khamfroush H. Critical component analysis in cascading failures for power grids using community structures in interaction graphs. IEEE Transact Netw Sci Eng. 2020;7(3):1079\u201393. https:\/\/doi.org\/10.1109\/TNSE.2019.2904008.","journal-title":"IEEE Transact Netw Sci Eng"},{"key":"54_CR15","doi-asserted-by":"publisher","unstructured":"Hazra K et al. A novel network architecture for resource-constrained post-disaster environments. In: International conference on communication systems & networks (COMSNETS), Bengaluru, India; 2019. pp. 328\u2013335. https:\/\/doi.org\/10.1109\/COMSNETS.2019.8711166.","DOI":"10.1109\/COMSNETS.2019.8711166"},{"issue":"5","key":"54_CR16","first-page":"1","volume":"1695","author":"G Csardi","year":"2006","unstructured":"Csardi G, Nepusz T. The igraph software package for complex network research. Int J Complex Syst. 2006;1695(5):1\u20139.","journal-title":"Int J Complex Syst"},{"key":"54_CR17","unstructured":"User's Manual for CPLEX. International business machines corporation, 2009, p. 157."},{"issue":"5439","key":"54_CR18","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si A, Albert R. Emergence of scaling in random networks. Science. 1999;286(5439):509\u201312.","journal-title":"Science"},{"key":"54_CR19","unstructured":"Venkateswaran V, Aved A, Ferris D, Siviy N. Critical node analysis on interconnected networks under cascading failures. 2017."},{"key":"54_CR20","first-page":"38","volume-title":"On the evolution of random graphs, the structure and dynamics of networks","author":"P Erd\u00f6s","year":"2006","unstructured":"Erd\u00f6s P, R\u00e9nyi A. On the evolution of random graphs, the structure and dynamics of networks. Princeton: Princeton University Press; 2006. p. 38\u201382."},{"key":"54_CR21","doi-asserted-by":"publisher","first-page":"2193","DOI":"10.1016\/j.cor.2008.08.016","volume":"36","author":"A Arulselvan","year":"2009","unstructured":"Arulselvan A, Commander CW, Elefteriadou L, Pardalos PM. Detecting critical nodes in sparse graphs. Comput Oper Res. 2009;36:2193\u2013200.","journal-title":"Comput Oper Res"},{"key":"54_CR22","doi-asserted-by":"crossref","unstructured":"Bichi BY, Islam SU, Kademi AM, Ahmad I. An energy-aware application module for the fog-based internet of military things, accepted for publication in discover internet-of-things. 2022.","DOI":"10.1007\/s43926-022-00024-z"},{"key":"54_CR23","unstructured":"British airways IT failure caused by 'Uncontrolled return of power', the guardian, 2017. https:\/\/www.theguardian.com\/business\/2017\/may\/31\/ba-it-shutdown-caused-by-uncontrolled-return-of-power-after-outage."},{"issue":"5","key":"54_CR24","doi-asserted-by":"publisher","first-page":"2352","DOI":"10.1137\/08073562X","volume":"20","author":"D Bienstock","year":"2010","unstructured":"Bienstock D, Verma A. The N-k problem in power grids: new models, formulations, and numerical experiments. SIAM J Optim. 2010;20(5):2352\u201380.","journal-title":"SIAM J Optim"},{"key":"54_CR25","doi-asserted-by":"crossref","unstructured":"Nguyen DT, Shen Y, Thai MT. Detecting critical nodes in interdependent power networks for vulnerability assessment. In: IEEE transactions on smart Grid. 2013;4(1).","DOI":"10.1109\/TSG.2012.2229398"},{"key":"54_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s43926-021-00007-6","author":"I Ahmad","year":"2021","unstructured":"Ahmad I. Discover internet-of-things editorial, inaugural issue. Discov Internet Things 2021. https:\/\/doi.org\/10.1007\/s43926-021-00007-6.","journal-title":"Discov Internet Things"},{"issue":"2","key":"54_CR27","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/TPWRS.2004.825888","volume":"19","author":"J Salmeron","year":"2004","unstructured":"Salmeron J, Wood K, Baldick R. Analysis of electric grid security under terrorist threat. IEEE Trans Power Syst 2004;19(2):905\u201312. https:\/\/doi.org\/10.1109\/TPWRS.2004.825888.","journal-title":"IEEE Trans Power Syst"},{"key":"54_CR28","unstructured":"Golari M. Integer programming formulations for minimum spanning forest problems, presentation, systems and industrial engineering, University of Arizona. 2015. http:\/\/math.arizona.edu\/glickenstein\/math443f14\/golari.pdf."},{"issue":"6794","key":"54_CR29","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, Barabasi A-L. Error and attack tolerance of complex networks. Nature. 2000;406(6794):378\u201382.","journal-title":"Nature"},{"issue":"2","key":"54_CR30","doi-asserted-by":"publisher","first-page":"025103","DOI":"10.1103\/PhysRevE.69.025103","volume":"69","author":"R Albert","year":"2004","unstructured":"Albert R, Albert I, Nakarado GL. Structural vulnerability of the north american power grid. Phys Rev E. 2004;69(2):025103.","journal-title":"Phys Rev E"},{"key":"54_CR31","doi-asserted-by":"publisher","DOI":"10.1117\/12.2223499","volume-title":"Proceedings of SPIE","author":"V Venkateswaran","year":"2016","unstructured":"Venkateswaran V, Bennette W. Critical node analysis (CNA) of electrical infrastructure networks, in machine intelligence and bio-inspired computation: theory and applications X. In: Misty B, Jonathan W, Hall RD, editors. Proceedings of SPIE Vol. 9850, SPIE, Bellingham, WA, 2016. https:\/\/doi.org\/10.1117\/12.2223499.","edition":"9850"},{"issue":"113","key":"54_CR32","doi-asserted-by":"publisher","first-page":"99","DOI":"10.2298\/PIM1613099M","volume":"99","author":"Z Maksimovic","year":"2016","unstructured":"Maksimovic Z. A new mixed integer linear programming formulation for the maximum degree bounded connected subgraph problem. Publications De L\u2019Institut, Mathmatique. Nouv Ser. 2016;99(113):99\u2013108.","journal-title":"Publications De L\u2019Institut, Mathmatique. Nouv Ser."}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-023-00054-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-023-00054-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-023-00054-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,21]],"date-time":"2024-01-21T16:03:44Z","timestamp":1705853024000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-023-00054-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,18]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["54"],"URL":"https:\/\/doi.org\/10.1007\/s43926-023-00054-1","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,18]]},"assertion":[{"value":"27 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"2"}}