Title: Mining intelligence data in the benefit of critical infrastructures security: vulnerability modelling, simulation and assessment, system of systems engineering

Authors: Adrian V. Gheorghe, Dan Vamanu

Addresses: Batten Endowed Chair Systems Engineering, Department of Engineering Management and Systems Engineering, Old Dominion University, 241 Kaufmann Hall, Norfolk, VA 23529, USA. ' 'Horia Hulubei' National Institute of Physics and Nuclear Engineering, Bucharest, Romania

Abstract: Within the approach of this paper, we shall use the appropriate concept of quantitative vulnerability assessment, and see the world as a System of Systems (SOS) in relation to the protection of critical infrastructures at national level. In the context of this work the SOS comprising of 278 systems – the World States, or countries. The system as described above as a collection of critical infrastructures, resources, political-related indicators, etc., is made of subsystems. Conceive all subsystem sections and subsections as defined via indicators. The macroscopic hypothesis is made by the implicit assumption that a system is (equivalent to) its set of measurable indicators. The indicator choice is governed by both availability and appropriateness. Key working assumption is that the most appropriate indicators for vulnerability assessment should be sought in relation with intelligence sources. Hence, the use as primary indicator source the CIA World Factbook, yearly issues 2000–2006 covering a telling epoch in World|s vulnerability history in relation to a variety of critical infrastructure systems, associated resources and demographic and political content of implementation.

Keywords: critical infrastructures; vulnerability assessment; system of systems; SOS; intelligence data mining; infrastructure security: vulnerability modelling; simulation; system of systems engineering; SOSE.

DOI: 10.1504/IJSSE.2008.018142

International Journal of System of Systems Engineering, 2008 Vol.1 No.1/2, pp.189 - 221

Published online: 02 May 2008 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article