-
The Convergence of AI and Synthetic Biology: The Looming Deluge
Authors:
Cindy Vindman,
Benjamin Trump,
Christopher Cummings,
Madison Smith,
Alexander J. Titus,
Ken Oye,
Valentina Prado,
Eyup Turmus,
Igor Linkov
Abstract:
The convergence of artificial intelligence (AI) and synthetic biology is rapidly accelerating the pace of biological discovery and engineering. AI techniques, such as large language models and biological design tools, are enabling the automated design, build, test, and learning cycles for engineered biological systems. This convergence promises to democratize synthetic biology and unlock novel app…
▽ More
The convergence of artificial intelligence (AI) and synthetic biology is rapidly accelerating the pace of biological discovery and engineering. AI techniques, such as large language models and biological design tools, are enabling the automated design, build, test, and learning cycles for engineered biological systems. This convergence promises to democratize synthetic biology and unlock novel applications across domains from medicine to environmental sustainability. However, it also poses significant risks around reliability, dual use, and governance. The opacity of AI models, the deskilling of workforces, and the outdated nature of current regulatory frameworks present challenges in ensuring responsible development. Urgent attention is needed to update governance structures, integrate human oversight into increasingly automated workflows, and foster a culture of responsibility among the growing community of bioengineers. Only by proactively addressing these issues can we realize the transformative potential of AI-driven synthetic biology while mitigating its risks.
△ Less
Submitted 29 April, 2024;
originally announced April 2024.
-
Access to Emergency Services: A New York City Case Study
Authors:
Sukhwan Chung,
Madison Smith,
Andrew **,
Luke Hogewood,
Maksim Kitsak,
Jeffrey Cegan,
Igor Linkov
Abstract:
Emergency services play a crucial role in safeguarding human life and property within society. In this paper, we propose a network-based methodology for calculating transportation access between emergency services and the broader community. Using New York City as a case study, this study identifies 'emergency service deserts' based on the National Fire Protection Association (NFPA) guidelines, whe…
▽ More
Emergency services play a crucial role in safeguarding human life and property within society. In this paper, we propose a network-based methodology for calculating transportation access between emergency services and the broader community. Using New York City as a case study, this study identifies 'emergency service deserts' based on the National Fire Protection Association (NFPA) guidelines, where accessibility to Fire, Emergency Medical Services, Police, and Hospitals are compromised. The results show that while 95% of NYC residents are well-served by emergency services, the residents of Staten Island are disproportionately underserved. By quantifying the relationship between first responder travel time, Emergency Services Sector (ESS) site density, and population density, we discovered a negative power law relationship between travel time and ESS site density. This relationship can be used directly by policymakers to determine which parts of a community would benefit the most from providing new ESS locations. Furthermore, this methodology can be used to quantify the resilience of emergency service infrastructure by observing changes in accessibility in communities facing threats.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
Finding shortest and nearly shortest path nodes in large substantially incomplete networks
Authors:
Maksim Kitsak,
Alexander Ganin,
Ahmed Elmokashfi,
Hongzhu Cui,
Daniel A. Eisenberg,
David L. Alderson,
Dmitry Korkin,
Igor Linkov
Abstract:
Dynamic processes on networks, be it information transfer in the Internet, contagious spreading in a social network, or neural signaling, take place along shortest or nearly shortest paths. Unfortunately, our maps of most large networks are substantially incomplete due to either the highly dynamic nature of networks, or high cost of network measurements, or both, rendering traditional path finding…
▽ More
Dynamic processes on networks, be it information transfer in the Internet, contagious spreading in a social network, or neural signaling, take place along shortest or nearly shortest paths. Unfortunately, our maps of most large networks are substantially incomplete due to either the highly dynamic nature of networks, or high cost of network measurements, or both, rendering traditional path finding methods inefficient. We find that shortest paths in large real networks, such as the network of protein-protein interactions (PPI) and the Internet at the autonomous system (AS) level, are not random but are organized according to latent-geometric rules. If nodes of these networks are mapped to points in latent hyperbolic spaces, shortest paths in them align along geodesic curves connecting endpoint nodes. We find that this alignment is sufficiently strong to allow for the identification of shortest path nodes even in the case of substantially incomplete networks. We demonstrate the utility of latent-geometric path-finding in problems of cellular pathway reconstruction and communication security.
△ Less
Submitted 8 April, 2022;
originally announced April 2022.
-
Cyber Resilience: by Design or by Intervention?
Authors:
Alexander Kott,
Maureen S. Golan,
Benjamin D. Trump,
Igor Linkov
Abstract:
The term "cyber resilience by design" is growing in popularity. Here, by cyber resilience we refer to the ability of the system to resist, minimize and mitigate a degradation caused by a successful cyber-attack on a system or network of computing and communicating devices. Some use the term "by design" when arguing that systems must be designed and implemented in a provable mission assurance fashi…
▽ More
The term "cyber resilience by design" is growing in popularity. Here, by cyber resilience we refer to the ability of the system to resist, minimize and mitigate a degradation caused by a successful cyber-attack on a system or network of computing and communicating devices. Some use the term "by design" when arguing that systems must be designed and implemented in a provable mission assurance fashion, with the system's intrinsic properties ensuring that a cyber-adversary is unable to cause a meaningful degradation. Others recommend that a system should include a built-in autonomous intelligent agent responsible for thinking and acting towards continuous observation, detection, minimization and remediation of a cyber degradation. In all cases, the qualifier "by design" indicates that the source of resilience is somehow inherent in the structure and operation of the system. But what, then, is the other resilience, not by design? Clearly, there has to be another type of resilience, otherwise what's the purpose of the qualifier "by design"? Indeed, while mentioned less frequently, there exists an alternative form of resilience called "resilience by intervention." In this article we explore differences and mutual reliance of resilience by design and resilience by intervention.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
Autonomous Cyber Defense Introduces Risk: Can We Manage the Risk?
Authors:
Alexandre K. Ligo,
Alexander Kott,
Igor Linkov
Abstract:
From denial-of-service attacks to spreading of ransomware or other malware across an organization's network, it is possible that manually operated defenses are not able to respond in real time at the scale required, and when a breach is detected and remediated the damage is already made. Autonomous cyber defenses therefore become essential to mitigate the risk of successful attacks and their damag…
▽ More
From denial-of-service attacks to spreading of ransomware or other malware across an organization's network, it is possible that manually operated defenses are not able to respond in real time at the scale required, and when a breach is detected and remediated the damage is already made. Autonomous cyber defenses therefore become essential to mitigate the risk of successful attacks and their damage, especially when the response time, effort and accuracy required in those defenses is impractical or impossible through defenses operated exclusively by humans. Autonomous agents have the potential to use ML with large amounts of data about known cyberattacks as input, in order to learn patterns and predict characteristics of future attacks. Moreover, learning from past and present attacks enable defenses to adapt to new threats that share characteristics with previous attacks. On the other hand, autonomous cyber defenses introduce risks of unintended harm. Actions arising from autonomous defense agents may have harmful consequences of functional, safety, security, ethical, or moral nature. Here we focus on machine learning training, algorithmic feedback, and algorithmic constraints, with the aim of motivating a discussion on achieving trust in autonomous cyber defenses.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
Cybertrust: From Explainable to Actionable and Interpretable AI (AI2)
Authors:
Stephanie Galaitsi,
Benjamin D. Trump,
Jeffrey M. Keisler,
Igor Linkov,
Alexander Kott
Abstract:
To benefit from AI advances, users and operators of AI systems must have reason to trust it. Trust arises from multiple interactions, where predictable and desirable behavior is reinforced over time. Providing the system's users with some understanding of AI operations can support predictability, but forcing AI to explain itself risks constraining AI capabilities to only those reconcilable with hu…
▽ More
To benefit from AI advances, users and operators of AI systems must have reason to trust it. Trust arises from multiple interactions, where predictable and desirable behavior is reinforced over time. Providing the system's users with some understanding of AI operations can support predictability, but forcing AI to explain itself risks constraining AI capabilities to only those reconcilable with human cognition. We argue that AI systems should be designed with features that build trust by bringing decision-analytic perspectives and formal tools into AI. Instead of trying to achieve explainable AI, we should develop interpretable and actionable AI. Actionable and Interpretable AI (AI2) will incorporate explicit quantifications and visualizations of user confidence in AI recommendations. In doing so, it will allow examining and testing of AI system predictions to establish a basis for trust in the systems' decision making and ensure broad benefits from deploying and advancing its computational capabilities.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
Cyber Resilience in IoT network: Methodology and example of assessment through epidemic spreading
Authors:
Emanuele Bellini,
Franco Bagnoli,
Alexander A. Ganin,
Igor Linkov
Abstract:
Cyber Resilience is an important property of complex systems and is important consideration in develo** specific IoT applications. This work aims at introducing a novel approach to assess IoT resilience adopting the risk perception in network based epidemic spreading approach. In particular IoT has been considered a network of devices where the probability of infection and interactions (communic…
▽ More
Cyber Resilience is an important property of complex systems and is important consideration in develo** specific IoT applications. This work aims at introducing a novel approach to assess IoT resilience adopting the risk perception in network based epidemic spreading approach. In particular IoT has been considered a network of devices where the probability of infection and interactions (communication), needs to be balanced in order to reduce the malware outbreack while maintaining the network functionalities at an acceptable level. The mathematical model and the simulation results reveal the benefit of a shift from a risk-based to a resilience based approach to threat management in IoT.
△ Less
Submitted 23 September, 2021;
originally announced September 2021.
-
Relationship among state reopening policies, health outcomes and economic recovery through first wave of the COVID-19 pandemic in the U.S
Authors:
Alexandre K. Ligo,
Emerson Mahoney,
Jeffrey Cegan,
Benjamin D. Trump,
Andrew S. **,
Maksim Kitsak,
Jesse Keenan,
Igor Linkov
Abstract:
State governments in the U.S. have been facing difficult decisions involving tradeoffs between economic and health-related outcomes during the COVID-19 pandemic. Despite evidence of the effectiveness of government-mandated restrictions mitigating the spread of contagion, these orders are stigmatized due to undesirable economic consequences. This tradeoff resulted in state governments employing man…
▽ More
State governments in the U.S. have been facing difficult decisions involving tradeoffs between economic and health-related outcomes during the COVID-19 pandemic. Despite evidence of the effectiveness of government-mandated restrictions mitigating the spread of contagion, these orders are stigmatized due to undesirable economic consequences. This tradeoff resulted in state governments employing mandates in widely different ways. We compare the different policies states implemented during periods of restriction (lockdown) and reopening with indicators of COVID-19 spread and consumer card spending at each state during the first wave of the pandemic in the U.S. between March and August 2020. We find that while some states enacted reopening decisions when the incidence rate of COVID-19 was minimal or sustained in its relative decline, other states relaxed socioeconomic restrictions near their highest incidence and prevalence rates experienced so far. Nevertheless, all states experienced similar trends in consumer card spending recovery, which was strongly correlated with reopening policies following the lockdowns and relatively independent from COVID-19 incidence rates at the time. Our findings suggest that consumer card spending patterns can be attributed to government mandates rather than COVID-19 incidence in the states. We estimate the recovery in states that reopened in late April was more than the recovery in states that did not reopen in the same period - 15% for consumer card spending and 18% for spending by high income households. This result highlights the important role of state policies in minimizing health impacts while promoting economic recovery and helps planning effective interventions in subsequent waves and immunization efforts.
△ Less
Submitted 19 October, 2021; v1 submitted 3 May, 2021;
originally announced May 2021.
-
To Improve Cyber Resilience, Measure It
Authors:
Alexander Kott,
Igor Linkov
Abstract:
We are not very good at measuring -- rigorously and quantitatively -- the cyber security of systems. Our ability to measure cyber resilience is even worse. And without measuring cyber resilience, we can neither improve it nor trust its efficacy. It is difficult to know if we are improving or degrading cyber resilience when we add another control, or a mix of controls, to harden the system. The onl…
▽ More
We are not very good at measuring -- rigorously and quantitatively -- the cyber security of systems. Our ability to measure cyber resilience is even worse. And without measuring cyber resilience, we can neither improve it nor trust its efficacy. It is difficult to know if we are improving or degrading cyber resilience when we add another control, or a mix of controls, to harden the system. The only way to know is to specifically measure cyber resilience with and without a particular set of controls. What needs to be measured are temporal patterns of recovery and adaptation, and not time-independent failure probabilities. In this paper, we offer a set of criteria that would ensure decision-maker confidence in the reliability of the methodology used in obtaining a meaningful measurement.
△ Less
Submitted 18 February, 2021;
originally announced February 2021.
-
How to Measure Cyber Resilience of an Autonomous Agent: Approaches and Challenges
Authors:
Alexandre Ligo,
Alexander Kott,
Igor Linkov
Abstract:
Several approaches have been used to assess the performance of cyberphysical systems and their exposure to various types of risks. Such assessments have become increasingly important as autonomous attackers ramp up the frequency, duration and intensity of threats while autonomous agents have the potential to respond to cyber-attacks with unprecedented speed and scale. However, most assessment appr…
▽ More
Several approaches have been used to assess the performance of cyberphysical systems and their exposure to various types of risks. Such assessments have become increasingly important as autonomous attackers ramp up the frequency, duration and intensity of threats while autonomous agents have the potential to respond to cyber-attacks with unprecedented speed and scale. However, most assessment approaches have limitations with respect to measuring cyber resilience, or the ability of systems to absorb, recover from, and adapt to cyberattacks. In this paper, we provide an overview of several common approaches, discuss practical challenges and propose research directions for the development of effective cyber resilience measures.
△ Less
Submitted 31 January, 2021;
originally announced February 2021.
-
Value-based optimization of healthcare resource allocation for COVID-19 hot spots
Authors:
Zachary A. Collier,
Jeffrey M. Keisler,
Benjamin D. Trump,
Jeffrey C. Cegan,
Sarah Wolberg,
Igor Linkov
Abstract:
With the emerging COVID-19 crisis, a critical task for public health officials and policy makers is to decide how to prioritize, locate, and allocate scarce resources. To answer these questions, decision makers need to be able to determine the location of the required resources over time based on emerging hot spot locations. Hot spots are defined as concentrated areas with sharp increases in COVID…
▽ More
With the emerging COVID-19 crisis, a critical task for public health officials and policy makers is to decide how to prioritize, locate, and allocate scarce resources. To answer these questions, decision makers need to be able to determine the location of the required resources over time based on emerging hot spot locations. Hot spots are defined as concentrated areas with sharp increases in COVID19 cases. Hot spots place stress on existing healthcare resources, resulting in demand for resources potentially exceeding current capacity. This research will describe a value based resource allocation approach that seeks to coordinate demand, as defined by uncertain epidemiological forecasts, with the value of adding additional resources such as hospital beds. Value is framed as a function of the expected usage of a marginal resource (bed, ventilator, etc). Subject to certain constraints, allocation decisions are operationalized using a nonlinear programming model, allocating new hospital beds over time and across a number of geographical locations. The results of the research show a need for a value based approach to assist decision makers at all levels in making the best possible decisions in the current highly uncertain and dynamic COVID environment.
△ Less
Submitted 28 November, 2020;
originally announced November 2020.
-
The Vaccine Supply Chain: A Call for Resilience Analytics to Support COVID-19 Vaccine Production and Distribution
Authors:
Maureen S. Golan,
Benjamin D. Trump,
Jeffrey C. Cegan,
Igor Linkov
Abstract:
The COVID19 pandemic has highlighted the lack of resilience in supply chains, as global networks fail from disruptions at single nodes and connections. Through an overview of the existing vaccine and pharmaceutical supply chain publications focusing on resilience, as well as recent papers reporting modeling of resilience in supply chains across multiple fields, we find that models for supply chain…
▽ More
The COVID19 pandemic has highlighted the lack of resilience in supply chains, as global networks fail from disruptions at single nodes and connections. Through an overview of the existing vaccine and pharmaceutical supply chain publications focusing on resilience, as well as recent papers reporting modeling of resilience in supply chains across multiple fields, we find that models for supply chain resilience are few and most of them are focused on individual dimensions of resilience rather than on comprehensive strategy necessary for scaling up vaccine production and distribution in emergency settings. We find that COVID19 resulted in a wave of interest to supply chain resilience, but publications from 2020 are narrow in focus and largely qualitative in nature; evidence-based models and measures are rare. Further, publications often focus exclusively on specific portions of the specific supply chain of interest, excluding associated supporting networks, such as transportation, social and command and control (C2) necessary for vaccine production and equitable distribution. This lack of network analysis is a major gap in the literature that needs to be bridged in order to create methods of real-time analysis and decision tools for the COVID19 vaccine supply chain. We conclude that a comprehensive, quantitative approach to network resilience that encompasses the supply chain in the context of other social and physical networks is needed in order to address the emerging challenges of a large-scale COVID-19 vaccination program. We further find that the COVID-19 pandemic underscores the necessity of positioning supply chain resilience within a multi-network context and formally incorporating temporal dimensions into analysis through the NAS definition of resilience, plan, absorb, recover, adapt, to ensure essential needs are met across all dimensions of society.
△ Less
Submitted 28 November, 2020;
originally announced November 2020.
-
The Need to Reconcile Concepts that Characterize Systems Withstanding Threats
Authors:
Stephanie Galaitsi,
Benjamin D. Trump,
Jeffrey M. Keisler,
Igor Linkov
Abstract:
Desirable system performance in the face of threats and disruptions has been characterized by various management concepts. Through semi-structured interviews with editors of journals in the fields of emergency response and systems management, a literature review, and professional judgment, we identified nine related and often interchangeably-used system performance concepts: adaptability, agility,…
▽ More
Desirable system performance in the face of threats and disruptions has been characterized by various management concepts. Through semi-structured interviews with editors of journals in the fields of emergency response and systems management, a literature review, and professional judgment, we identified nine related and often interchangeably-used system performance concepts: adaptability, agility, reliability, resilience, resistance, robustness, safety, security, and sustainability. We analysed expert responses and reviewed the linguistic definitions and mathematical framing of these concepts to understand their applications. We found a lack of consensus on their usage between interview subjects, but using a mathematical framing enriched the linguistic definitions and enabled formulating comparative visualizations and system-specific definitions for the concepts. We propose a conceptual framing to relate the concepts for management purposes. A better understanding of these concepts will allow system planners to pursue management strategies best suited to their unique system dynamics and specific objectives of 'goodness' that all these concepts bring.
△ Less
Submitted 24 August, 2020; v1 submitted 22 December, 2019;
originally announced December 2019.
-
Lack of Resilience in Transportation Networks: Economic Implications
Authors:
Margaret Kurth,
William Kozlowski,
Alexander Ganin,
Avi Mersky,
Billy Leung,
Maksim Kitsak,
Igor Linkov
Abstract:
Disruptions to transportation networks are inevitable. Currently, most mandated development-related transportation planning is intended to prepare for frequently occurring and observable disruptions while low probability events that have not yet materialized attract less attention. When road networks are not resilient, these unpredictable events can cause significant delays that may not be proport…
▽ More
Disruptions to transportation networks are inevitable. Currently, most mandated development-related transportation planning is intended to prepare for frequently occurring and observable disruptions while low probability events that have not yet materialized attract less attention. When road networks are not resilient, these unpredictable events can cause significant delays that may not be proportional to the extent of the disruption. Enhancing resilience can help in mitigating consequences of disruptions but requires financial investment that is difficult to justify given that low probability event may not have materialized. This paper highlights economic implications of unmitigated random disruptions in urban road systems and makes the case for investment in transportation network resilience. We utilized a model of urban transportation network performance that quantifies resilience and demonstrated its integration with microeconomic transportation planning model REMI TranSight. The model was applied to 10 cities in the USA to calculate several economic indicators under baseline scenario where economic impact was assumed to be proportional to the magnitude of disruptive events and under a test scenario where the magnitude of disruption was used to calculate additional delays in transportation networks and these additional delays were explicitly integrated in REMI model. Results show that GDP losses suffered as a result of disruption may be far more significant in the case scenario and economic output is not necessarily back to normal in the year the following disruptive event. We thus conclude that support for investment decisions on network efficiency and resilience management should be based on a framework that utilizes resilience, quantified in terms that are compatible with standard practice, and scenarios to test the implications of topological attributes.
△ Less
Submitted 9 December, 2019;
originally announced December 2019.
-
Fundamental Concepts of Cyber Resilience: Introduction and Overview
Authors:
Igor Linkov,
Alexander Kott
Abstract:
Given the rapid evolution of threats to cyber systems, new management approaches are needed that address risk across all interdependent domains (i.e., physical, information, cognitive, and social) of cyber systems. Further, the traditional approach of hardening of cyber systems against identified threats has proven to be impossible. Therefore, in the same way that biological systems develop immuni…
▽ More
Given the rapid evolution of threats to cyber systems, new management approaches are needed that address risk across all interdependent domains (i.e., physical, information, cognitive, and social) of cyber systems. Further, the traditional approach of hardening of cyber systems against identified threats has proven to be impossible. Therefore, in the same way that biological systems develop immunity as a way to respond to infections and other attacks, so too must cyber systems adapt to ever-changing threats that continue to attack vital system functions, and to bounce back from the effects of the attacks. Here, we explain the basic concepts of resilience in the context of systems, discuss related properties, and make business case of cyber resilience. We also offer a brief summary of ways to assess cyber resilience of a system, and approaches to improving cyber resilience.
△ Less
Submitted 7 June, 2018;
originally announced June 2018.
-
Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153
Authors:
Alexander Kott,
Benjamin Blakely,
Diane Henshel,
Gregory Wehner,
James Rowell,
Nathaniel Evans,
Luis Muñoz-González,
Nandi Leslie,
Donald W French,
Donald Woodard,
Kerry Krutilla,
Amanda Joyce,
Igor Linkov,
Carmen Mas-Machuca,
Janos Sztipanovits,
Hugh Harney,
Dennis Kergl,
Perri Nejib,
Edward Yakabovicz,
Steven Noel,
Tim Dudman,
Pierre Trepagnier,
Sowdagar Badesha,
Alfred Møller
Abstract:
This report summarizes the discussions and findings of the 2017 North Atlantic Treaty Organization (NATO) Workshop, IST-153, on Cyber Resilience, held in Munich, Germany, on 23-25 October 2017, at the University of Bundeswehr. Despite continual progress in managing risks in the cyber domain, anticipation and prevention of all possible attacks and malfunctions are not feasible for the current or fu…
▽ More
This report summarizes the discussions and findings of the 2017 North Atlantic Treaty Organization (NATO) Workshop, IST-153, on Cyber Resilience, held in Munich, Germany, on 23-25 October 2017, at the University of Bundeswehr. Despite continual progress in managing risks in the cyber domain, anticipation and prevention of all possible attacks and malfunctions are not feasible for the current or future systems comprising the cyber infrastructure. Therefore, interest in cyber resilience (as opposed to merely risk-based approaches) is increasing rapidly, in literature and in practice. Unlike concepts of risk or robustness - which are often and incorrectly conflated with resilience - resiliency refers to the system's ability to recover or regenerate its performance to a sufficient level after an unexpected impact produces a degradation of its performance. The exact relation among resilience, risk, and robustness has not been well articulated technically. The presentations and discussions at the workshop yielded this report. It focuses on the following topics that the participants of the workshop saw as particularly important: fundamental properties of cyber resilience; approaches to measuring and modeling cyber resilience; mission modeling for cyber resilience; systems engineering for cyber resilience, and dynamic defense as a path toward cyber resilience.
△ Less
Submitted 20 April, 2018;
originally announced April 2018.
-
Resilience and efficiency in transportation networks
Authors:
Alexander A. Ganin,
Maksim Kitsak,
Dayton Marchese,
Jeffrey M. Keisler,
Thomas Seager,
Igor Linkov
Abstract:
Urban transportation systems are vulnerable to congestion, accidents, weather, special events, and other costly delays. Whereas typical policy responses prioritize reduction of delays under normal conditions to improve the efficiency of urban road systems, analytic support for investments that improve resilience (defined as system recovery from additional disruptions) is still scarce. In this effo…
▽ More
Urban transportation systems are vulnerable to congestion, accidents, weather, special events, and other costly delays. Whereas typical policy responses prioritize reduction of delays under normal conditions to improve the efficiency of urban road systems, analytic support for investments that improve resilience (defined as system recovery from additional disruptions) is still scarce. In this effort, we represent paved roads as a transportation network by map** intersections to nodes and road segments between the intersections to links. We built road networks for 40 of the urban areas defined by the U.S. Census Bureau. We developed and calibrated a model to evaluate traffic delays using link loads. The loads may be regarded as traffic-based centrality measures, estimating the number of individuals using corresponding road segments. Efficiency was estimated as the average annual delay per peak-period auto commuter, and modeled results were found to be close to observed data, with the notable exception of New York City. Resilience was estimated as the change in efficiency resulting from roadway disruptions and was found to vary between cities, with increased delays due to a 5% random loss of road linkages ranging from 9.5% in Los Angeles to 56.0% in San Francisco. The results demonstrate that many urban road systems that operate inefficiently under normal conditions are nevertheless resilient to disruption, whereas some more efficient cities are more fragile. The implication is that resilience, not just efficiency, should be considered explicitly in roadway project selection and justify investment opportunities related to disaster and other disruptions.
△ Less
Submitted 21 December, 2017;
originally announced December 2017.
-
Resilience management during large-scale epidemic outbreaks
Authors:
Emanuele Massaro,
Alexander Ganin,
Nicola Perra,
Igor Linkov,
Alessandro Vespignani
Abstract:
Assessing and managing the impact of large-scale epidemics considering only the individual risk and severity of the disease is exceedingly difficult and could be extremely expensive. Economic consequences, infrastructure and service disruption, as well as the recovery speed, are just a few of the many dimensions along which to quantify the effect of an epidemic on society's fabric. Here, we extend…
▽ More
Assessing and managing the impact of large-scale epidemics considering only the individual risk and severity of the disease is exceedingly difficult and could be extremely expensive. Economic consequences, infrastructure and service disruption, as well as the recovery speed, are just a few of the many dimensions along which to quantify the effect of an epidemic on society's fabric. Here, we extend the concept of resilience to characterize epidemics in structured populations, by defining the system-wide critical functionality that combines an individual's risk of getting the disease (disease attack rate) and the disruption to the system's functionality (human mobility deterioration). By studying both conceptual and data-driven models, we show that the integrated consideration of individual risks and societal disruptions under resilience assessment framework provides an insightful picture of how an epidemic might impact society. In particular, containment interventions intended for a straightforward reduction of the risk may have net negative impact on the system by slowing down the recovery of basic societal functions. The presented study operationalizes the resilience framework, providing a more nuanced and comprehensive approach for optimizing containment schemes and mitigation policies in the case of epidemic outbreaks.
△ Less
Submitted 8 January, 2018; v1 submitted 2 October, 2017;
originally announced October 2017.
-
Stability of a Giant Connected Component in a Complex Network
Authors:
Maksim Kitsak,
Alexander A. Ganin,
Daniel A. Eisenberg,
Pavel L. Krapivsky,
Dmitri Krioukov,
David L. Alderson,
Igor Linkov
Abstract:
We analyze the stability of the network's giant connected component under impact of adverse events, which we model through the link percolation. Specifically, we quantify the extent to which the largest connected component of a network consists of the same nodes, regardless of the specific set of deactivated links. Our results are intuitive in the case of single-layered systems: the presence of la…
▽ More
We analyze the stability of the network's giant connected component under impact of adverse events, which we model through the link percolation. Specifically, we quantify the extent to which the largest connected component of a network consists of the same nodes, regardless of the specific set of deactivated links. Our results are intuitive in the case of single-layered systems: the presence of large degree nodes in a single-layered network ensures both its robustness and stability. In contrast, we find that interdependent networks that are robust to adverse events have unstable connected components. Our results bring novel insights to the design of resilient network topologies and the reinforcement of existing networked systems.
△ Less
Submitted 23 January, 2018; v1 submitted 28 September, 2017;
originally announced September 2017.
-
Security Metrics in Industrial Control Systems
Authors:
Zachary A. Collier,
Mahesh Panwar,
Alexander A. Ganin,
Alex Kott,
Igor Linkov
Abstract:
Risk is the best known and perhaps the best studied example within a much broader class of cyber security metrics. However, risk is not the only possible cyber security metric. Other metrics such as resilience can exist and could be potentially very valuable to defenders of ICS systems. Often, metrics are defined as measurable properties of a system that quantify the degree to which objectives of…
▽ More
Risk is the best known and perhaps the best studied example within a much broader class of cyber security metrics. However, risk is not the only possible cyber security metric. Other metrics such as resilience can exist and could be potentially very valuable to defenders of ICS systems. Often, metrics are defined as measurable properties of a system that quantify the degree to which objectives of the system are achieved. Metrics can provide cyber defenders of an ICS with critical insights regarding the system. Metrics are generally acquired by analyzing relevant attributes of that system. In terms of cyber security metrics, ICSs tend to have unique features: in many cases, these systems are older technologies that were designed for functionality rather than security. They are also extremely diverse systems that have different requirements and objectives. Therefore, metrics for ICSs must be tailored to a diverse group of systems with many features and perform many different functions. In this chapter, we first outline the general theory of performance metrics, and highlight examples from the cyber security domain and ICS in particular. We then focus on a particular example of a class of metrics that is different from the one we have considered in earlier chapters. Instead of risk, here we consider metrics of resilience. Resilience is defined by the National Academy of Sciences (2012) as the ability to prepare and plan for, absorb, recover from, or more successfully adapt to actual or potential adverse events. This chapter presents two approaches for the generation of metrics based on the concept of resilience using a matrix-based approach and a network-based approach. Finally, a discussion of the benefits and drawbacks of different methods is presented along with a process and tips intended to aid in devising effective metrics.
△ Less
Submitted 25 December, 2015;
originally announced December 2015.
-
Operational resilience: concepts, design and analysis
Authors:
Alexander A. Ganin,
Emanuele Massaro,
Alexander Gutfraind,
Nicolas Steen,
Jeffrey M. Keisler,
Alexander Kott,
Rami Mangoubi,
Igor Linkov
Abstract:
Building resilience into today's complex infrastructures is critical to the daily functioning of society and its ability to withstand and recover from natural disasters, epidemics, and cyber-threats. This study proposes quantitative measures that implement the definition of engineering resilience advanced by the National Academy of Sciences. The approach is applicable across physical, information,…
▽ More
Building resilience into today's complex infrastructures is critical to the daily functioning of society and its ability to withstand and recover from natural disasters, epidemics, and cyber-threats. This study proposes quantitative measures that implement the definition of engineering resilience advanced by the National Academy of Sciences. The approach is applicable across physical, information, and social domains. It evaluates the critical functionality, defined as a performance function of time set by the stakeholders. Critical functionality is a source of valuable information, such as the integrated system resilience over a time interval, and its robustness. The paper demonstrates the formulation on two classes of models: 1) multi-level directed acyclic graphs, and 2) interdependent coupled networks. For both models synthetic case studies are used to explore trends. For the first class, the approach is also applied to the Linux operating system. Results indicate that desired resilience and robustness levels are achievable by trading off different design parameters, such as redundancy, node recovery time, and backup supply available. The nonlinear relationship between network parameters and resilience levels confirms the utility of the proposed approach, which is of benefit to analysts and designers of complex systems and networks.
△ Less
Submitted 5 August, 2015;
originally announced August 2015.
-
Power-law of Aggregate-size Spectra in Natural Systems
Authors:
Matteo Convertino,
Filippo Simini,
Filippo Catani,
Igor Linkov,
Gregory A. Kiker
Abstract:
Patterns of animate and inanimate systems show remarkable similarities in their aggregation. One similarity is the double-Pareto distribution of the aggregate-size of system components. Different models have been developed to predict aggregates of system components. However, not many models have been developed to describe probabilistically the aggregate-size distribution of any system regardless o…
▽ More
Patterns of animate and inanimate systems show remarkable similarities in their aggregation. One similarity is the double-Pareto distribution of the aggregate-size of system components. Different models have been developed to predict aggregates of system components. However, not many models have been developed to describe probabilistically the aggregate-size distribution of any system regardless of the intrinsic and extrinsic drivers of the aggregation process. Here we consider natural animate systems, from one of the greatest mammals - the African elephant (\textit{Loxodonta africana}) - to the \textit{Escherichia coli} bacteria, and natural inanimate systems in river basins. Considering aggregates as islands and their perimeter as a curve mirroring the sculpting network of the system, the probability of exceedence of the drainage area, and the Hack's law are shown to be the the Korčak's law and the perimeter-area relationship for river basins. The perimeter-area relationship, and the probability of exceedence of the aggregate-size provide a meaningful estimate of the same fractal dimension. Systems aggregate because of the influence exerted by a physical or processes network within the system domain. The aggregate-size distribution is accurately derived using the null-method of box-counting on the occurrences of system components. The importance of the aggregate-size spectrum relies on its ability to reveal system form, function, and dynamics also as a function of other coupled systems. Variations of the fractal dimension and of the aggregate-size distribution are related to changes of systems that are meaningful to monitor because potentially critical for these systems.
△ Less
Submitted 7 March, 2013;
originally announced March 2013.
-
Anthropogenic Renourishment Feedback on Shorebirds: a Multispecies Bayesian Perspective
Authors:
M. Convertino,
J. F. Donoghue,
M. L. Chu-Agor,
G. A. Kiker,
R. Munoz-Carpena,
R. A. Fischer,
I. Linkov
Abstract:
In this paper the realized niche of the Snowy Plover (Charadrius alexandrinus), a primarily resident Florida shorebird, is described as a function of the scenopoetic and bionomic variables at the nest-, landscape-, and regional-scale. We identified some pos- sible geomorphological controls that influence nest-site selection and survival using data collected along the Florida Gulf coast. In particu…
▽ More
In this paper the realized niche of the Snowy Plover (Charadrius alexandrinus), a primarily resident Florida shorebird, is described as a function of the scenopoetic and bionomic variables at the nest-, landscape-, and regional-scale. We identified some pos- sible geomorphological controls that influence nest-site selection and survival using data collected along the Florida Gulf coast. In particular we focused on the effects of beach replenishment interventions on the Snowy Plover (SP), and on the migratory Pi** Plover (PP) (Charadrius melodus) and Red Knot (RK) (Calidris canutus). To quantify the relationship between past renourishment projects and shorebird species we used a Monte Carlo procedure to sample from the posterior distribution of the binomial probabilities that a region is not a nesting or a wintering ground conditional on the occurrence of a beach replenishment intervention in the same and the previous year. The results indicate that it was 2.3, 3.1, and 0.8 times more likely that a region was not a wintering ground following a year with a renourishment intervention for the SP, PP and RK respectively. For the SP it was 2.5. times more likely that a region was not a breeding ground after a renourishment event. Through a maximum entropy principle model we observed small differences in the habitat use of the SP during the breeding and the wintering season. However the habitats where RK was observed ap- peared quite different. Maintaining and creating optimal suitable habitats for SP characterized by sparse low vegetation in the foredunes areas, and uneven/low-slope beach surfaces, is the proposed conservation scenario to convert anthropic beach restorations and SP populations into a positive feedback without impacting other threatened shorebird species.
△ Less
Submitted 1 April, 2011;
originally announced April 2011.