Open Access

Anticipating complex network vulnerabilities through abstraction-based analysis

Security Informatics20121:9

DOI: 10.1186/2190-8532-1-9

Received: 11 October 2011

Accepted: 7 March 2012

Published: 22 August 2012


Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of real-world scale and complexity. The potential of the proposed approach is illustrated via case studies involving a realistic electric power grid, a gene regulatory network, and a general class of social network dynamics.


Complex networks Finite state abstraction Vulnerability analysis Electric power grids Biological networks Social movements


It is widely recognized that technological, biological, and social networks, while impressively robust in most circumstances, can fail catastrophically in response to focused attacks. Indeed, this combination of robustness and fragility appears to be an inherent property of complex, evolving networks ranging from the Internet and electric power grids to gene regulatory networks and financial markets e.g.,[15]. As a consequence, there is significant interest in developing methods for reliably detecting and characterizing the vulnerabilities of these networks e.g.,[6, 7].

The challenges of vulnerability analysis are particularly daunting in the case of complex networks. Most such networks are large-scale “systems of systems”, so that analysis methods must be computationally efficient. Additionally, because these networks perform reliably almost all of the time, standard techniques for finding vulnerabilities (e.g., computer simulations, “red teaming”) can be ineffective and, in any case, are not guaranteed to identify all vulnerabilities. These observations suggest that, in order to be practically useful, any method for analyzing vulnerabilities of complex networks should be scalable, to enable analysis of networks of real-world complexity, and rigorous, so that for instance it is guaranteed to find all vulnerabilities of a given class.

This paper presents a new approach to vulnerability analysis which possesses these properties. The proposed methodology is based upon aggressive abstraction – dramatically simplifying, property preserving abstraction of the network of interest[4]. Once an aggressive abstraction is derived, all required analysis is performed using the abstraction. Analytic conclusions are then mapped back to the original network and interpreted there; this mapping is possible because of the property preserving nature of the abstraction procedure.

Our focus is on dynamical systems with uncountable state spaces, as many complex networks are of this type. We begin by identifying a large and important class of dynamical networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for recognizing such networks and for computing their abstraction. We then offer a methodology which combines these finite state models with formal analytics from theoretical computer science[8] to provide a comprehensive vulnerability analysis process for large-scale networks. The potential utility of the proposed approach to vulnerability analysis is illustrated through case studies involving a realistic electric power grid, a gene regulatory network, and a general class of social network dynamics.


This section introduces the class of network models to be considered in the paper and briefly summarizes some technical background that will be useful in our development.

The evolution to ensure robust performance in complex networks typically leads to systems that possess a “hybrid” structure, exhibiting both continuous and discrete dynamics[4]. More precisely, these networks often evolve to become hybrid dynamical systems – feedback interconnections of switching systems, which have discrete state sets, with systems whose dynamics evolve on continuous state spaces[9].

More quantitatively, consider the following definitions for hybrid dynamical system (HDS) models:

Definition 2.1: A continuous-time HDS is a control system
HDSct q + = h ( q , k ) , dx/dt = f q ( x , u ) , k = p ( x ) ,

where qQ (with |Q| finite) and xXn (with X bounded) are the states of the discrete and continuous systems that make up the HDS, um is the control input, h defines the discrete system dynamics, {fq} is a family of vector fields characterizing the continuous system dynamics, and p defines a partition of state space X into subsets with labels k{1, …, K}.

Definition 2.2: A discrete-time HDS is a control system
HDSdt q + = h ( q , k ) , x + = f q ( x , u ) , k = p ( x ) .

We sometimes refer to an HDS using the symbol ΣHDS if the nature of the continuous system (continuous- or discrete-time) is either unimportant or clear from the context.

The concept of finite state abstraction for an infinite state system is illustrated in Figure1. Consider a complex network with states that evolve on a continuous space and an analysis question of interest. Such a situation is depicted at the bottom of Figure1, where the continuous dynamics are shown as curves on a continuous state space (blue region), and the analysis question involves deciding whether states in the green region can evolve to the red region. Reachability questions of this sort are difficult to answer for generic complex networks. However, if it is possible to construct a finite state abstraction of the network which possesses equivalent dynamics, then the analysis task becomes much easier. To see this, observe from Figure1 that a finite state abstraction of the original dynamics takes the form of a graph, where the states are graph vertices (nodes within the blue region at top) and feasible state transitions define the graph’s directed edges. Reachability analysis is straightforward with a graph, and if the complex network and its abstraction have equivalent reachability properties then the much simpler graph analysis also characterizes the reachability of the original system.
Figure 1

Finite state abstraction. Cartoon illustrates that the abstraction preserves network dynamics: trajectories of the infinite state system (curves in blue region at bottom) are mapped to equivalent finite state trajectories (sequences of state transitions at top).

Reachability assessment, while valuable, is typically not sufficient to answer real-world vulnerability analysis questions. For instance, suppose that the red region in Figure1 is the set of failure states. It may be of interest to determine if all system trajectories which reach the red region first pass through the white “alerting” region, so there is warning of impending failure, or whether all trajectories which reach the red region subsequently return to the blue “normal” region, and thereby recover from failure. Addressing these more intricate questions requires that the analysis be conducted using a language which allows a nuanced description of, and reasoning about, network dynamics. We show in[4] that linear temporal logic (LTL) provides such a language, enabling quantitative specification of a broad range of complex network vulnerability problems. LTL extends propositional logic by including temporal operators, thereby allowing dynamical phenomena to be analyzed, and is similar to natural language and thus is easy to use[10].

As we wish to use LTL to analyze the dynamics of complex networks and we model these networks as HDS, we tailor our definition of LTL to be compatible with this setting:

Definition 2.3: The syntax of LTL consists of

atomic propositions (q,k), where q Q is an HDS discrete state and k K is a label for a subset in the continuous system state space partition;

formulas composed from atomic propositions using a grammar of Boolean (ϕ θ, ¬ϕ) and temporal (ϕU θ, ϕ) operators.

The semantics of LTL follows from interpreting formulas on trajectories of HDS, that is, on sequences of (q, k) pairs: (q, k) = (q0, k0), (q1, k1), …, (qT, kT).

The Boolean operators and ¬ are disjunction and negation, as usual. The temporal operators U and are read “until” and “next”, respectively, with ϕU θ specifying that ϕ must hold until θ holds and ϕ signifying that ϕ will be true at the next time instant (see[10] for a more thorough description).

Abstractions which preserve LTL also preserve all vulnerabilities expressible as LTL formulas; this property is stated more precisely in Section 4, where a formal definition is given for system vulnerability, and is also explained in[4]. Thus we seek an abstraction procedure which preserves LTL: given a system representation Σ1, the procedure should generate a system abstraction Σ2 which is such that {Σ1 |= ϕ} 2 |= ϕ} for all LTL formulas ϕ (where | = denotes formula satisfaction). Bisimulation is a powerful method for abstracting finite state systems to yield simpler finite state systems that are equivalent from the perspective of LTL[10]. However, the problem of constructing finite state bisimulations for continuous state systems is largely unexplored (but see the seminal work[11, 12]). Indeed, one of the contributions of this paper is to develop a theoretically sound, practically implementable approach to obtaining finite state bisimulations for complex network models.

Bisimulation is typically defined for transition systems, so we first introduce this notion (see[10] for details):

Definition 2.4: A transition system is a four-tuple T = (S, →, Y, h) with state set S, transition relation → S × S, output set Y, and output map h: S → Y. T is finite if |S| is finite.

Transition relation → defines admissible state transitions, so (q, q)→, denoted q → q, if T can transition from q to q.

Bisimilar transition systems share a common output set and have dynamics which are equivalent from the perspective of these outputs:

Definition 2.5: Transition systems TS = (S, →S, Y, hS) and TP = (P, →P, Y, hP) are bisimilar via relation R S × P if:

s ~ p hS(s) = hP(p) (R respects observations);

s ~ p, s →S s p ~ s such that p →P p (TP simulates TS, denoted TS TP);

p ~ s, p →P p s ~ p such that s →S s (TP TS),

where ~ denotes equivalence under relation R.

A standard result from theoretical computer science e.g.,[10] shows that bisimulation preserves LTL:

Proposition 2.1: If T1 and T2 are bisimilar transition systems and ϕ is an LTL formula then {T1 |= ϕ} { T2 |= ϕ}.

The following statements offer an alternative definition for bisimulation, which is easily shown to be equivalent to the one presented in Definition 2.5 and is useful in the subsequent development:

Definition 2.6: A finite partition Φ: S → P of the state space S of transition system T = (S, →, Y, h) naturally induces a quotient transition system T/~ = (P, →~, Y, h~) of T provided that

Φ(s) = Φ(s) (denoted s ~ s) h(s) = h(s);

h~(p) = h(s) if p = Φ(s);

~ is defined so that Φ(s) →~ Φ(s) iff s → s.

Transition system T and its quotient T/~ are bisimilar if an additional condition holds:

Proposition 2.2: Suppose T/~ is defined as in Definition 2.6 and, in addition, Φ(s) →~ Φ(s) s′′ ~ s s′′′ ~ s such that s′′ → s′′′. Then T and T/~ are bisimilar.

Finally, we introduce a class of continuous state (control) systems which is important in applications.

Definition 2.7: The continuous-time system dx/dt = f(x,u), with f: n×mn, is differentially flat if there exists (flat) outputs zm such that z = H(x), x = F1(z, dz/dt, …, drz/dtr), and u = F2(z, dz/dt, …, drz/dtr) for some integer r and maps H, F1, F2.

Definition 2.8: The discrete-time system x + = f(x,u) is difference flat (with memory k) if there exists (flat) outputs zm such that z = H(x), x(t) = F1(z(t), z(t + 1), …, z(t + k − 1)), and u(t) = F2(z(t), z(t + 1), …, z(t + k − 1)) for some maps H, F1, F2.

Background on flat systems may be found in[13]. Many real-world control systems are flat, including all controllable linear systems as well as all feedback linearizable systems. Perhaps more importantly, the complex, evolving networks underlying so much of advanced technology, biology, and social processes frequently possess flat subsystems.

Finite state abstraction

In this section we demonstrate that hybrid systems with (differentially or difference) flat continuous systems admit finite state bisimulations and present algorithms for constructing the bisimilar abstractions.

Consider an HDS of the form given in Definition 2.1 or 2.2. The following provides a transition system representation for the continuous system dynamics of HDS:

Definition 3.1: The transition system model T HDSc for the continuous system portion of ΣHDS is the collection THDSc = {Tqk}, with one transition system Tqk = (Xqk, →qk, Yqk, hqk) specified for each (q, k) pair. Each Tqk has bounded state space Xqk, finite output set Yqk, an output map hqk: Xqk → Yqk that defines a finite partition of Xqk with labels yYqk, and transition relation →qk reflecting the discrete- or continuous-time dynamics:

for discrete-time continuous systems, x →qk x iff u such that x = fq(x,u) on subset k;

for continuous-time continuous systems, x →qk x iff there is a trajectory x: [0, T] → Xqk of dx/dt = fq(x,u), a time t (0,T), and adjacent partitions of Xqk labeled y, yYqk such that x(0) = x, x(T) = x, x([0,t))y, and x((t,T])y.

We make the standard assumption that k: X → K partitions the HDS continuous system state space X into polytopes and that all HDS discrete system transitions are triggered by k transitions[9] (see Definitions 2.1 and 2.2).

Definition 3.1 allows ΣHDS to be modeled as a feedback interconnection of two transition systems, one with continuous state space and one with finite state set:

Definition 3.2: The transition system T HDS associated with the HDS given in Definition 2.1 or 2.2 is a feedback interconnection of 1.) the continuous system transition system THDSc = {Tqk} given in Definition 3.1 and 2.) the transition system associated with the HDS discrete system, given by THDSd = (Q, →d, Q, id), where id is the identity map and q →d q iff k such that q = h(q, k). Thus THDS = (Q × X, →HDS, Q × Y, hHDS), where Q × X = q (k {q} × Xqk), Q × Y = q (k {q} × Yqk), and the definitions for →HDS and hHDS follow immediately from the transition relation and output map definitions specified for THDSc and THDSd.

Because the transition system THDSd corresponding to the HDS discrete system is already a finite state system, the main challenge in abstracting HDS to finite state systems is associated with finding finite state bisimulations for the continuous systems THDSc = {Tqk}. This is made explicit in the following

Theorem 1: If each transition system Tqk associated with THDS is bisimilar to some finite quotient transition system Tqk/~ = (Yqk, →~, Yqk, id) and the state space quotient partitions defined by the hqk satisfy a mild compatibility condition then THDS admits a finite bisimulation.

Proof: The proof is straightforward and is given in[4].

Theorem 1 shows that the key step in obtaining a finite state bisimulation for HDS THDS, and thus for ΣHDS, is constructing bisimulations for the continuous state transition systems Tqk. We therefore focus on this latter problem for the remainder of the section. Our first main result along these lines is for difference flat continuous systems:

Theorem 2: Given any finite partition π: Z → Y of the flat output space Z of a difference flat system, the associated transition system TF = (X, →, Y, π ° H) admits a bisimilar quotient TF/~.

Proof: Consider the equivalence relation R that identifies state pairs (x, x′) which generate identical sets of k-length output symbol sequences y = y0 y1 … yk−1, and the quotient system TF/~ induced by R. R defines a finite partition of X (both |Y| and k are finite), and x ~ x π ° H(x) = π ° H(x) so that R respects observations. TF ∟ TF/~ follows immediately from the definition of quotient systems. To see that TF/~ ∟ TF, note that flatness ensures any symbol string y = yk yk+1 … is realizable by transition system TF; thus x ~ x at time t implies that x and x can transition to equivalent states at time t + 1. Therefore, from Definition 2.5, TF and TF/~ are bisimilar.

Remark 3.1: Efficient algorithms exist for checking if a given system is difference flat, so Theorem 2 provides a practically implementable means of identifying discrete-time continuous state systems which admit finite bisimulation[4].

Remark 3.2: The flat output trajectory completely defines the evolution of a difference flat system. As a consequence, because any finite partition of flat output space induces a finite bisimilar quotient for the flat system, this partition can be refined to yield any desired level of detail in the abstraction.

An analogous result holds for differentially flat HDS continuous systems. Our development of this result requires the following lemmas.

Lemma 3.1: A control system is differentially flat iff it is dynamic feedback linearizable.

Proof: The proof is given in[14].

Lemma 3.2: Control system Σ admits a finite bisimulation iff any representation of Σ obtained through coordinate transformation and/or invertible feedback also admits a finite bisimulation.

Proof: The proof is given in[12].

Lemmas 3.1 and 3.2 suggest the following procedure for constructing finite bisimulations for differentially flat systems: 1.) transform the flat system into a linear control system via feedback linearization, 2.) compute a finite bisimulation for the linear system, and 3.) map the bisimilar model back to the original system representation. As a result, we focus on building finite bisimulations for linear control systems.

In particular, the control system of interest is one “chain” of a Brunovsky normal form (BNF) system ΣBNF[4]:
dx 1 / dt = x 2 , dx 2 / dt = x 3 , dx n / dt = u .

Concentrating on this system entails no loss of generality, as any controllable linear system can be modeled as a collection of these single chain systems, one for each input, and the decoupled nature of the chains ensures we can abstract each one independently and then “patch” the abstractions together to obtain an abstraction for the full system.

Consider the following partition of the (assumed bounded) state space X n of ΣBNF:

Definition 3.3: Partition π ε is the map πε: X → Y that partitions X into subsets yis = {xX | x1[iε, (i + 1)ε), sign(x2) = s1, …, sign(xn) = sn-1}, where i is an integer and s is an (n−1)-vector of “signs” specifying a particular orthant of X.

Note that πε partitions X into “slices” orthogonal to the x1-axis.

We are now in a position to state

Theorem 3: The transition system TBNF = (X, →, Y, πε) associated with system ΣBNF and partition πε admits a finite bisimilar quotient TBNF/~ = (Y, →~, Y, id).

Proof: TBNF/~ is finite because |Y| is finite. Assume →~ is constructed so that πε(x) →~ πε(x) x → x, with the latter specified as in Definition 3.1. Then all the conditions of Definition 2.6 are satisfied, and from Proposition 2.2 we need only show πε(x) →~ πε(x) x′′~x x′′′~x such that x′′ → x′′′. This amounts to demonstrating that if x can be driven through face F of slice πε(x) then any x′′ in that slice can be driven through F as well, which can be shown by checking this property for the system x1(n) = u on each orthant of X (see e.g.,[13] for a proof that system x1(n) = u possesses this property).

Remark 3.3: The result given in Theorem 3 is most useful in situations where the control input u can be chosen large relative to the system “drift”. Abstraction methods for applications in which control authority is limited are given in[4].

Next we turn to the task of computing finite bisimulations for HDS. We focus on constructing bisimulations for HDS continuous systems, as HDS discrete systems already possess finite state representations, and in particular on abstracting differentially flat continuous systems; the derivation of algorithms for difference flat continuous systems is analogous but simpler and is therefore omitted (see[4]).

Consider, without loss of generality (see Lemma 3.1), the problem of computing a finite state abstraction for continuous-time linear control system Σlc: dx/dt = Ax + Bu (where A,B are matrices). The transition system associated with Σlc is Tlc = (X, →lc, Y, h), with h: X → Y any finite, hypercubic partition of X and →lc specified as in Definition 3.1. The finite state abstraction of interest is quotient system Tlc/~ = (Y, →lc~, Y, id). Observe that in order to obtain Tlc/~ it is only necessary to determine the set of admissible transition relations →lc~.

As most applications of interest involve large-scale systems, it is desirable to develop efficient algorithms for computing →lc~. We now introduce such a procedure. The algorithm decides whether a transition y →lc~ y between two adjacent cells of the lattice y, y is allowed, and is repeated for all candidate transitions of interest. We begin by summarizing a simple algorithm, based on computational linear system results given in[15], for deciding whether y →lc~ y is admissible. Let k be the number of the coordinate axis orthogonal to the common face between y and y, V be the set of vertices shared by y and y, and akT represent row k of A. Define Πk(w) to be the projection of vector w onto axis k, and suppose y < y. Then y →lc~ y iff Πk(Avi + Bu) > 0 for some vi V and uU. An algorithm which “operationalizes” this observation is

Algorithm 3.1:

If y < y:

If any element of row k of B is nonzero, y →lc~ y is true. STOP.

Repeat until y →lc~ y is determined to be true or all vertices have been checked:

Select a vertex vi V.

Compute the inner product p = akT vi.

If p > 0 then y →lc~ y is true. STOP.

If y →lc~ y has not been found to be true it is false.

If y > y: Algorithm is the same except that the comparison p > 0 is replaced by p < 0.

A difficulty with Algorithm 3.1 is that the number of vertices shared by two adjacent cells is 2n−1, so that checking them becomes unmanageable even for moderately-sized systems. Interestingly, the algorithm can be modified so that feasibility of a transition can be tested by considering only a single well-chosen vertex, independent of the size of the model. The new algorithm is therefore extremely efficient and can be applied to very large systems. Let v0 be the lowest vertex (in a component-wise sense) shared by y, y and let ak+ (ak) be the sum of positive (negative) elements of row k of A, excluding the diagonal. We can now state

Algorithm 3.2[4, 16]:

If y < y:

If any element of row k of B is nonzero, y →lc~ y is true. STOP.

Compute the inner product p = akT v0.

If p + ak+ > 0 then y →lc~ y is true. STOP.

Otherwise y →lc~ y is false.

If y > y: Algorithm is the same except that the comparison p + ak+ > 0 is replaced by p + ak < 0.

A Matlab program which implements Algorithm 3.2 is presented in[4]. This program has been applied to systems with n = 10 000 state variables using desktop computers. Additionally, standard timing studies reveal that the computational cost of Algorithm 3.2 scales quadratically in the system state space dimension n (while Algorithm 3.1 scale exponentially in n), providing further support for the argument that this approach to abstraction can be applied to problems of real-world scale and complexity.

Vulnerability analysis

This section considers the vulnerability assessment problem: given a complex network and a class of failures of interest, does there exist an attack which causes the system to experience such failure? Other important vulnerability analysis tasks, including vulnerability exploitation and mitigation, are investigated in[4]. The proposed approach to vulnerability assessment leverages the finite state abstraction results derived in the preceding section. The basic idea is straightforward: given an HDS model for a network of interest and a class of failures of concern: 1.) construct a finite bisimulation for the HDS network model, 2.) conduct the vulnerability analysis on the system abstraction, and 3.) map the analysis results back to the original system model.

Observe that the proposed approach possesses desirable characteristics. For instance, the analytic process is scalable, because both the abstraction methodology[4] and the tools available for detecting vulnerabilities in finite state systems [e.g., 8] are scalable. Additionally, the analysis is rigorous. Because HDS vulnerabilities are expressible as LTL formulas, and bisimulation preserves LTL, the original complex network and its abstraction have identical vulnerabilities. Formal analysis tools such as model checking[8] can be structured to identify all vulnerabilities of the finite state abstraction, and bisimilarity then implies that the approach is guaranteed to find all vulnerabilities of the original network as well.

We now quantify the proposed approach to vulnerability assessment. It is supposed that the complex network of interest can be modeled as an HDS, ΣHDS, and that the network’s desired or “normal” behavior can be characterized with an LTL formula ϕ; generalizing the situation to a set of LTL formulas {ϕi} is straightforward. Consider the following

Definition 4.1: Given an HDS ΣHDS and an LTL encoding ϕ of the desired network behavior, the vulnerability assessment problem involves determining whether ΣHDS can be made to violate ϕ.

The proposed vulnerability assessment method employs bounded model checking (BMC), a powerful technique for deciding whether a given finite state transition system satisfies a particular LTL specification over a finite, user-specified time horizon[8]. Briefly, BMC checks whether a finite transition system T satisfies an LTL specification ϕ on a time interval [0, k], denoted T | = k ϕ, in two steps: 1.) translate T | = k ϕ to a proposition [T, ϕ]k which is satisfied by, and only by, transition system trajectories that violate ϕ (this is always possible), and 2.) check if [T, ϕ]k is satisfiable using a modern SAT solver[8]. Note that because modern SAT solvers are extremely powerful, this approach to model checking can be implemented with problems of real-world scale.

We are now in a position to state our vulnerability assessment algorithm. Let THDS denote the transition system associated with ΣHDS, and consider the vulnerability assessment problem given in Definition 4.1. We have

Algorithm 4.1: Vulnerability assessment
  1. 1.

    Construct a finite bisimilar abstraction T for THDS using the results of Section 3.

  2. 2.

    Check satisfiability of [T, ϕ]k using BMC:


if [T, ϕ]k is not satisfiable then T is not vulnerable and thus ΣHDS is not vulnerable (on time horizon k);

if [T, ϕ]k is satisfiable then T, and therefore ΣHDS, is vulnerable, and the SAT solver “witness” is an exploitation of the vulnerability.

To illustrate the utility of the proposed approach to vulnerability assessment we apply the analytic method to an important complex network: an electric power (EP) grid. EP grids are naturally represented as HDS, with the continuous system modeling the generator and load dynamics as well as power flow constraints and the discrete system capturing protection logic switching and other “supervisory” behavior:

Definition 4.2: The HDS power grid model Σ EP takes the form
EP q + = h q , k , v , dx / dt = f q x , y , u , 0 = g q x , y , k = p x , y ,

where q and x are the discrete and continuous system states, v and u denote exogenous inputs, y is the vector of “algebraic variables”, and all other terms are analogous to those introduced in Definition 2.1.

The continuous system portion of grid model ΣEP is feedback linearizable[17], which implies the continuous system is differentially flat and consequently that ΣEP admits a finite abstraction. Additionally, it can be shown that grid vulnerabilities are expressible as LTL formulas composed of atomic propositions which depend only on q and k[18]. Thus Algorithm 4.1 is directly applicable to power grids.

We now summarize the results of a vulnerability assessment for the 20bus grid shown in Figure2. This grid provides a simple but useful representation of a real, national-scale EP system for which (proprietary) data are available to us[4]. The grid can be modeled as an HDS ΣEP of the form given in Definition 4.2. The report[4] gives a Matlab encoding of the specific HDS model used in this study. Because the model ΣEP corresponds to a real-world grid, the behaviors of the model and the actual grid can be compared. For example, the real grid recently experienced a large cascading voltage collapse, and data was collected for this event. We simulated this cascading outage (see Figure3, top plot) and found close agreement between the behavior of the actual grid and the model ΣEP. Observe that this result is encouraging given the well-known difficulties associated with reproducing such cascading dynamics with computer models (see, e.g.,[17, 18]).
Figure 2

One-line diagram for the 20-bus EP grid model used in the vulnerability assessment case study.

Figure 3

Sample simulation results for 20-bus EP grid model. Plot at the top is from the model validation study and shows the evolution of voltages at all 20 buses; these voltage time series are in good agreement with those observed in the corresponding cascading voltage collapse for the actual grid. Plot at bottom depicts voltage timec series which result from applying the vulnerability exploitation procedure designed using the proposed finite state abstraction methodology.

Vulnerability assessment was performed using Algorithm 4.1. It was assumed that the grid’s attacker wishes to drive the voltage at bus 11 to unacceptably low levels, so that the loads at this bus would not be served, and that the attacker has only limited grid access. In particular, we consider here a scenario in which the attacker can gain assess to the generator at bus 2 via cyber means[18]. Note that this class of vulnerabilities is interesting because the access point – the generator at bus 2 – is geographically remote from the target of the attack – the loads at bus 11.

The first step in the vulnerability assessment procedure specified in Algorithm 4.1 involves constructing a finite state bisimulation T for ΣEP; this abstraction is computed using Algorithm 3.2. The second step in Algorithm 4.1 is to apply BMC to T to determine if it is possible to realize the attack objective, i.e., low voltage at bus 11, through admissible manipulation of the generator at bus 2. We employed NuSMV, an open source software tool for formal verification of finite state systems, for this analysis[19]. This vulnerability assessment reveals that it is possible for the attacker to realize the given objective via the assumed grid access, and gives a finite state “trace” of one means of exploiting the vulnerability. Using this trace, we synthesize an exploitation attack which is directly implementable with the HDS model ΣEP. Sample simulation results are shown in Figure3 (bottom plot). It can be seen from the bus voltage time series in Figure3 that the attacker’s goals can indeed be realized, in this case by initiating a cascading voltage collapse which takes down bus 11 as well as most of the rest of the grid.


This paper presents an approach for analyzing complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed using the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We identify an important class of complex networks which admit vulnerability-preserving, finite state abstractions, provide efficient algorithms for computing these abstractions, and offer a vulnerability analysis methodology that combines finite state network representations with formal analytics to enable rigorous vulnerability analysis for networks of real-world scale and complexity. The considerable potential of the method is demonstrated through a case study involving a realistic electric power grid model.

We now demonstrate that the proposed approach to analyzing complex network dynamics can also be applied to biological and social systems. Consider first a biological example. Many aspects of the physiology of living organisms oscillate with a period of approximately 24 hours, corresponding to the duration of a day, and the molecular basis for this circadian rhythm has been quantified in several organisms. For instance, a useful model for the gene regulatory network responsible for circadian rhythm in Drosophila melanogaster (fruit fly) is[20]:
dM P dt = v sP K IP n K IP n + C N n v mP M P K mP + M P k d M P , dP 0 dt = k sP M P V 1 P P 0 K 1 P + P 0 + V 2 P P 1 K 2 P + P 1 k d P 0 , dP 1 dt = V 1 P P 0 K 1 P + P 0 V 2 P P 1 K 2 P + P 1 V 3 P P 0 K 3 P + P 1 + V 4 P P 2 K 4 P + P 2 k d P 1 , dP 2 dt = V 3 P P 1 K 3 P + P 1 V 4 P P 2 K 4 P + P 2 k 3 P 2 2 + k 4 C v dP P 2 K dP + P 2 k d P 2 , dC dt = k 3 P 2 2 k 4 C k 1 C + k 2 C N k dC C, dC N dt = k 1 C k 2 C N k dC C,

where MP, P0, P1, P2, C, and CN are state variables corresponding to the concentrations of the constituents of the circadian rhythm gene network, vsP is an exogenous (control) input signal associated with the light–dark cycle of the environment, and all other terms are constant model parameters.

As is evident from Definition 2.7, a differentially flat system possesses (flat) outputs, equal in number to the number of inputs, which permit the system states and inputs to be recovered through algebraic manipulation of these outputs and their time derivatives. In the case of Drosophila circadian rhythm, CN is one such flat output. To see this, note that C and its time derivatives can be obtained from the sixth equation through manipulation of CN and its derivatives. These terms, in turn, permit P2 (and its derivatives) to be obtained from the fifth equation, and continuing in this way up the “chain” of equations gives all of the states and the input vsP. Thus the system states and input can be obtained from knowledge of CN and its derivatives, proving that the above gene network model for Drosophila circadian rhythm is differentially flat. This, in turn, implies that the model admits a finite state bisimulation (Theorem 3).

We have constructed a finite state model for Drosophila using Algorithm 3.2, and then applied Algorithm 4.1 to this finite state representation to identify gene network vulnerabilities. More specifically, this methodology was employed to identify gene network parameters whose manipulation would quickly and efficiently reset the phase of Circadian rhythm. The parameters nominated by this analysis are:

mRNA transcription rate;

mRNA degradation rate;

protein translation rate.

It is worth noting that these Circadian phase vulnerabilities are identical to the “control targets” obtained in[21] through a substantially more involved, computationally-intensive sensitivity analysis.

Consider next the phenomenon of social movements, that is, large, informal groupings of individuals and/or organizations focused on a particular issue, for instance of political, social, economic, or religious significance e.g.,[22]. Given the importance of social movements and the desire to understand their emergence and growth, numerous mathematical representations have been proposed to characterize their dynamics. For example,[23] suggests a model in which each individual in a population of interest can be in one of three states – member (of the movement), potential member, and ex-member – and interactions between individuals can lead to transitions between these affiliation states (e.g., potential members can be persuaded to become members). In particular,[23] proposes the following model for social movement dynamics:
sm dP / dt = λ βPM + δ 1 E , dM / dt = βPM δ 2 ME δ 3 M , dE / dt = δ 2 ME + δ 3 M δ 1 E ,

where P, M, and E denote the fractions of potential members, members, and ex-members in the population, Λ can be interpreted to be the system’s input, and β, δ1, δ2, δ3 are nonnegative constants related to the probabilities of individuals undergoing the various state transitions. It is worth noting that this model is shown in[23] to provide a good description for the growth of real-world social movements.

This model for social dynamics is differentially flat with flat output E. To see this, observe that M and its time derivatives can be obtained from the third equation through manipulation of E and its derivatives. These terms, in turn, permit P (and its derivatives) to be obtained from the second equation. Finally, knowledge of P, M, E, and their derivatives allows the input Λ to be recovered from the first equation. Thus all of the system states as well as the input can be obtained from knowledge of E and its derivatives, which shows that the social movement model is differentially flat. This, in turn, implies that the model admits a finite state bisimilar abstraction (see Theorem 3).

We now consider the vulnerability of social movement dynamics. In order to make this analysis more interesting, the dynamics Σsm is extended to enable modeling of social movements propagation on networks with realistic topologies. More specifically, it is known that real-world social networks possess community structure, that is, the presence of densely connected groupings of individuals which have only relatively few links to other groups e.g.,[22, 23], and we are interested in modeling and analyzing social movement dynamics on these networks. One way to construct such a representation is to model movement dynamics as consisting of two components: 1.) intra-community dynamics, involving frequent interactions between individuals within the same community and the resulting gradual change in the concentrations of movement members, and 2.) inter-community dynamics, in which the movement jumps from one community to another, for instance because a movement member “visits” a new community.

It is natural to model these dynamics via HDS, with the continuous system representing intra-community dynamics via Σsm, or its finite state abstraction, the discrete system capturing the inter-community dynamics (e.g., using a simple switching rule), and the interplay betweenbetween these dynamics being represented by the HDS feedback structure. A detailed description of the manner in which HDS models can be used to capture general social dynamics on networks with realistic topologies is given in[22], and the basic idea is illustrated in Figure4.
Figure 4

Modeling social dynamics on networks with community structure via HDS. The cartoon at top left depicts a network with three communities. The cartoon at right illustrates dynamics within a community k and between communities i and j. The schematic at bottom left shows the basic HDS feedback structure, in which the HDS discrete and continuous systems model the inter-community and intra-community dynamics, respectively.

We have constructed a finite state model for Σsm using Algorithm 3.2, and then connected these intra-community dynamics models together to represent the complete intra- and inter-community dynamics. We applied Algorithm 4.1 to this finite state representation to identify social movement vulnerabilities. More specifically, this methodology was employed to identify the characteristics of social movement dynamics which are most important for movement success. This analysis indicates that a key indicator of the ultimate success of a social movement is significant early dispersion of a movement across network communities; interestingly, this measure should be more predictive than the early volume of movement activity (which is a standard metric for predictive analysis of social dynamics).

Author’s contributions

RC and KG designed the research, RC developed the theoretical results, RC and KG developed the computational algorithms, and RC wrote the paper. All authors read and approved the final manuscript.


This work was supported by the U.S. Department of Defense and the Laboratory Directed Research and Development Program at Sandia National Laboratories. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000.


Authors’ Affiliations

Sandia National Laboratories
New Mexico Institute of Mining and Technology


  1. Carlson J, Doyle J: Complexity and Robustness. Proc. National Academy of Sciences USA 2002, 99: 2538–2545. 10.1073/pnas.012582499View ArticleGoogle Scholar
  2. Doyle J, Alderson D, Li L, Low S, Roughan M, Shalunov S, Tanaka R, Willinger W: The ‘Robust Yet Fragile’ Nature of the Internet. Proc. National Academy of Sciences USA 2005, 102: 14497–14502. 10.1073/pnas.0501426102View ArticleGoogle Scholar
  3. Ormerod P, Colbaugh R: Cascades of Failure and Extinction in Evolving Complex Systems. J Artificial Societies and Social Simulation 2006, 9: 4.Google Scholar
  4. Colbaugh R, Glass K, Willard G SAND2008–7327. In Analysis of Complex Networks Using Aggressive Abstraction. Sandia National Laboratories, Albuquerque, NM; 2008. Additional file 1 Additional file 1View ArticleGoogle Scholar
  5. LaViolette R, Glass K, Colbaugh R: Deep Information from Limited Observation of ‘Robust Yet Fragile’ Systems. Physica A 2009, 388: 3283–3287. 10.1016/j.physa.2009.05.019View ArticleGoogle Scholar
  6. National Infrastructure Protection Plan. U.S. Department of Homeland Security, Washington DC; 2009.
  7. Chen H, Yang C, Chau M, Li S (Eds): Intelligence and Security Informatics. Lecture Notes in Computer Science, Springer, Berlin; 2009.Google Scholar
  8. Clarke E, Grumberg O, Peled D: Model Checking. MIT Press, Cambridge, MA; 1999.Google Scholar
  9. Majumdar R, Tabuada P (Eds): Hybrid Systems: Computation and Control. Lecture Notes in Computer Science, Springer, Berlin; 2009.Google Scholar
  10. Milner R: Communication and Concurrency. Prentice-Hall, NJ; 1989.MATHGoogle Scholar
  11. Alur R, Henzinger T, Lafferriere G, Pappas G: Discrete Abstractions of Hybrid Systems. Proc. IEEE 2000, 88: 971–984.View ArticleGoogle Scholar
  12. Tabuada P, Pappas G: Linear Time Logic Control of Discrete-Time Linear Systems. IEEE Trans. Automatic Control 2006, 51: 1862–1877.MathSciNetView ArticleGoogle Scholar
  13. Martin P, Murray R, Rouchon P: “Flat Systems, Equivalence, and Trajectory Generation”, CDS Report 2003–008. California Institute of Technology, Pasadena, CA; 2003.Google Scholar
  14. Aranda-Bricaire E, Moog C, Pomet J: A Linear Algebraic Framework for Dynamic Feedback Linearization. IEEE Trans. Automatic Control 1995, 40: 127–132. 10.1109/9.362886MATHMathSciNetView ArticleGoogle Scholar
  15. Habets L, van Schuppen J: A Control Problem for Affine Dynamical Systems on a Full-dimensional Polytope. Automatica 2004, 40: 21–35. 10.1016/j.automatica.2003.08.001MATHMathSciNetView ArticleGoogle Scholar
  16. Gardiner J, Colbaugh R: Development of a Scalable Bisimulation Algorithm, ICASA Technical Report. New Mexico Institute of Mining and Technology, Socorro, NM; 2006.Google Scholar
  17. Ilic M, Zaborszky J: Dynamics and Control of Large Electric Power Systems. Wiley, NY; 2000.Google Scholar
  18. Stamp J, Colbaugh R, Laviolette R, McIntyre A, Richardson B: “Impacts Analysis for Cyber Attack on Electric Power Systems”, SAND2008–7300. Sandia National Laboratories, Albuquerque, NM; 2008.Google Scholar
  19. NuSMV: a new symbolic model checker. , downloaded July 2007 , downloaded July 2007
  20. Goncalves J, Yi T: “Drosophila Circadian Rhythms: Stability, Robustness Analysis, and Model Reduction”. MTNS, Leuven, Belgium; 2004.Google Scholar
  21. Bagheri N, Stelling J, Doyle F: Circadian Phase Resetting via Single and Multiple Control Targets. PLoS Comput. Biol. 2008, 4: e1000104. 10.1371/journal.pcbi.1000104MathSciNetView ArticleGoogle Scholar
  22. Colbaugh R, Glass K Proc. IEEE Multi-Conference on Systems and Control. In “Predictive Analysis for Social Processes I: Multi-Scale Hybrid System Modeling, and II: Predictability and Warning Analysis”. Saint Petersburg, Russia; 2009.Google Scholar
  23. Hedstrom P Understanding Choice, Explaining Behavior. In Explaining the Growth Patterns of Social Movements. Oslo University Press, Oslo, Norway; 2006.Google Scholar


© Colbaugh and Glass; licensee Springer. 2012

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.