CyberwarNovel network model to help in cyberwarfare, conservation, and disease prevention

Published 11 July 2012

Computer networks are the battlefields in cyberwarfare, as exemplified by the U.S. recent use of computer viruses to attack Iran’s nuclear program; researchers develop a computer model which could help military strategists devise the most damaging cyber attacks as well as guard America’s critical infrastructure

Computer networks are the battlefields in cyberwarfare, as exemplified by the U.S. recent use of computer viruses to attack Iran’s nuclear program. A computer model developed at the University of Missouri could help military strategists devise the most damaging cyber attacks as well as guard America’s critical infrastructure. The model also could benefit other projects involving interconnected groups, such as restoring ecosystems, halting disease epidemics and stopping smugglers.

Our model allows users to identify the best or worst possible scenarios of network change,” said Tim Matisziw, assistant professor of geography and engineering at MU. “The difficulty in evaluating a networks’ resilience is that there are an infinite number of possibilities, which makes it easy to miss important scenarios. Previous studies focused on the destruction of large hubs in a network, but we found that in many cases the loss of smaller facilities can be just as damaging. Our model can suggest ways to have the maximum impact on a network with the minimum effort.”

A University of Missouri release reports that limited resources can hinder law enforcement officers’ ability to stop criminal organizations. Matisziw’s model could help design plans which efficiently use a minimum of resources to cause the maximum disruption of trafficking networks and thereby reduce flows of drugs, weapons, and exploited people. In a similar fashion, disease outbreaks could be mitigated by identifying and then blocking important links in their transmission, such as airports.

There are some networks, however, that society needs to keep intact. After the breakdown of such a network, the model can be used to evaluate what could have made the disruption even worse and help officials prevent future problems. For example, after an electrical grid failure, such as the recent blackout in the eastern United States, future system failures could be pinpointed using the model. The critical weak points in the electrical grid could then be fortified before disaster strikes.

The model also can determine whther a plan is likely to create the strongest network possible. For example, when construction projects pave over wetland ecosystems, the law requires that new wetlands be created. Ecologists have noted, however, that these new wetlands are often isolated from existing ecosystems and have little value to wildlife. Matisziw’s model could help officials plan the best places for new wetlands so they connect with other natural areas and form wildlife corridors or stretches of wilderness that connect otherwise isolated areas and allow them to function as one ecosystem.

Matisziw’s model was documented in the publicly available journal PLoS ONE. Making such a powerful tool widely available won’t be a danger, Matisziw said. To use his model, a network must be understood in detail. Since terrorists and other criminals don’t have access to enough data about the networks, they won’t be able to use the model to develop doomsday scenarios.

— Read more in Timothy C. Matisziw et al., “Robustness Elasticity in Complex Networks,” PLoS ONE 7, no. (10 July 2012): e39788 (doi:10.1371/journal.pone.0039788)

Homeland Security, Criminal Justice, Law & Public Policy - Master of Science Legal Studies 100% online - CALU Global Online
view counter
view counter