Research Article  Open Access
Sensitivity of Importance Metrics for Critical Digital Services Graph to Service Operators’ SelfAssessment Errors
Abstract
Interdependency of critical digital services can be modeled in the form of a graph with exactly known structure but with edge weights subject to estimation errors. We use standard and custom centrality indexes to measure each service vulnerability. Vulnerability of all nodes in the graph gets aggregated in a number of ways into a single network vulnerability index for services whose operation is critical for the state. This study compares sensitivity of various centralities combined with various aggregation methods to errors in edge weights reported by service operators. We find that many of those combinations are quite robust and can be used interchangeably to reflect various perceptions of network vulnerability. We use graphs of source files’ dependencies for a number of opensource projects, as a good analogy for real critical services graph, which will remain confidential.
1. Introduction
Correct operation of digital services and infrastructures has since long become critical for societies, and therefore demands coordinated actions for maintenance and incident response. The Directive on Security of Network and Information Systems (NIS [1]), by the European Parliament, provides a framework for coherent implementation of security measures by European Union member states. Due to the scale and dynamics of digital networks, effective and efficient protection of their operation must be assisted by intelligent decision support systems operating at national level. Such systems should be(i)Complete, i.e., possessing information about all critical services in the country(ii)Automated, i.e., minimizing human factor in daily operations as well as in network model construction(iii)Coupled, i.e., exchanging information at international level
Researchers, industry, and regulators stay aware of the above challenges and come up accordingly with ideas of such systems (cf., e.g., [2, 3] and references therein). Notably, Polish government is supporting National Cybersecurity Platform (NPC), a R&D project whose goal is to address the first two of the above issues, i.e., actually implement and deploy a system supporting security operation centers (SOCs). A crucial phase of NPC operation is creation of a graph modeling interdependent digital services run by various operators. This process is done semiautomatically from SOC perspective: service dependencies are discovered in depthfirst search fashion, by interviewing subsequent operators with online questionnaires.
Apart from privacy and organizational obstacles, filling a questionnaire can be a challenge of its own for an operator. For a given own service, an operator is asked to report services preconditioning its correct operation, and to provide estimates of their impact on own service in terms of availability, confidentiality, and integrity (CIA) [4]. While the earlier is quite straightforward (as it can be based on inspection of business contracts, service level agreements (SLAs), and invoices or any other formal documents), measuring the magnitude of service dependencies is prone to errors and bias. But, on the other hand, the national critical services network model is built exactly with this info. The model includes routines for vulnerability calculation for each service. Vulnerabilities in turn get combined into a scalar index of overall network vulnerability.
Our goal is to examine how the above process is sensitive to incorrect information about mutual service impact as reported by operators, with the assumption that the structure of the network is known fully and correctly. Such information is crucial because that the scalar index value will be reported to SOCs and, consequently, will play the role of the main threat indicator.
We organized the paper as follows. A network model of services is presented in the remaining part of this section. A suite of methods for calculation of service vulnerability and for aggregation of vulnerabilities into a scalar vulnerability index are described in Section 2. It is followed by the section with discussion of results (Section 3), and we conclude in Section 4.
The network of interdependent digital services is modeled as a directed graph:where is a list of ordered vertices, representing services, , and E is a list of ordered edges: if operation of service influences operation of service . The impact of such influence is defined by the operator of service on a discrete scale from 1 to 10. All the information about the graph structure and service impact can be expressed conveniently by adjacency matrix , whose element is equal to the impact value or zero if there is no edge . Here, we assume to operate with respect to only one impact aspect, e.g., how much the loss of service i availability influences service j availability. There can be nine such aspects in total, . It is possible to combine them all into one scalar coefficient, when some assumptions on their meaning are made, e.g., if one considers them as probabilities.
Such graph model extension with edge weights represented actually by a matrix of up to nine aspects of impact demands developing new graph algorithms—or picking up one of the aspects, like it is done in this paper. It makes the model universal enough to accommodate both digital services and physical infrastructure elements. In the latter case, one refers to just the availability aspect. For example, availability of backup power supply may influence availability and integrity of the physical access control system; hence, an operator has to address the influence in two aspects: and .
Topology of a service graph represents existence of service interdependencies, while edge weights stand for intensity of those interdependencies. When combined, they make it possible to calculate the overall vulnerability of each service. There are many ways such vulnerability could be formulated; we express its definition aswhere is some function defined over adjacency matrix that computes vector of vulnerabilities for each service, respectively.
While contains complete information about vulnerability of each service, a single scalar index γ of overall network vulnerability would be much more convenient in everyday use. Like for individual vulnerabilities, its calculation can be accomplished in many ways; we denote this process aswhere is some function defined over vulnerability vector.
The major practical problem concerns credibility of γ, which is computed indirectly from whose values are not objective. They come from the questionnaires and are a result of selfassessment process by service operators, whose accuracy depends on their cybersecurity awareness and maturity of methodologies used in service impact estimation. An objective approach to vulnerability estimation would require excessive provocative tests on critical services or postmortem analyses, both of which are costly and undesirable.
Therefore, we must assume that, contrary to structure of service dependencies that is known and correct, the reported impact values differ from true ones by some errors:where ξ is realization of a random variable with uniform discrete distribution . Here, N is the maximum impact estimation error in the tenstar rating scale. Note that in (4), we curb disturbed rating within the original scale of one to ten stars. Consequently, we denote calculated vulnerabilities of serivces for the reported values of as
Star ratings have been commonplace practice in many fields where user feedback is required. While facilitating the questioning process from a psychological perspective, it complicates analysis of statistical properties of responses, as it has been reported in [5]. The same authors claim that scales with more than seven stars provide too many possibilities and spoil the quality of a poll. Likewise, providing the respondent a scale with odd number of stars prompts him a safe and lazy option to hit the middle of the scale, which also reduces response quality.
In our case, we kept the original 10star scale as proposed by the NPC riskanalysis team. Such scale leaves operator no “middle” option, unlike grade “3” on 5star scale. Indeed, we do not want operators to answer neutrally because, opposite to, e.g., hotel ranking, there is no “neutral” answer other than absence of the edge connecting the two services. Moreover, finer scale makes room for elaborating more precise instructions on selfassessment and answering in the future. As regards the choice of distribution for ξ, it came from papers [5, 6]. The cited authors applied disturbances of moderate scale of one to two stars only.
The main aim of this paper is to evaluate sensitivity of various definitions of service vulnerability, , and of importance aggregation functions, , to errors in user assessment of service impacts.
2. Materials and Methods
2.1. Importance Definitions
There exist a number of recognized and widely known definitions of vertex structural importance that can be used as candidates for . In parlance of networks, they are usually called node centralities [7]. Some of them are trivial ones, like node degree—they are useful but out of scope of this study as they do not consider link weights, i.e., impact values. Some others are related to network flow maximization problems [8]. They also are inappropriate here because software malfunctions, unlike flows, are indivisible, and on the contrary, replicable. This is why we decided to consider the following three ways to calculate service vulnerability:(i) Page Rank. Values of meet equation , where is adjacency matrix normalized so that the sum of elements in each column of equals one. Vulnerability of a service calculated this way reflects therefore vulnerability of all other services that service depends on. Such was exactly the original idea of web page rank calculation, by Google founders [9]. In our case, a service is a counterpart of a web page. Note, however, that such normalization, necessary from theoretical point of view, weakens impact of vertices with high outdegree. While reasonable for a user clicking through web pages, this assumption does not necessarily hold in case of, e.g., spreading failures, as they may affect dependent services equally strongly, independently of their number.(ii) Reach Centrality. Values of represent fraction of all services whose operation may affect a given service. To account for service impact, a weighted variant is used [10]. Originally, any affecting increases by . In the weighted version, this amount depends on average link weight on the shortest path from to , in relation to average link weight in the graph. With such approach, a kind of weighted impact summation is performed for each service; however, without concern for important structural properties of the graph as, for example, existence of bridges.(iii) Maximum Input. Values of are solution of the following equation:The aim of the above formula is to calculate centralities like for page rank; however, taking into account only currently most important factors. Algorithm (6) is repeated until convergence, guaranteed by curbing the outcome within interval, consistent with our rating scheme. Finally, a strongest impact path is created for each dependent service, which identifies most crucial parts of the graph, and service vulnerabilities, accordingly. However, it ignores all relations outside the path, even if they stay close to the path in terms of their importance.
Service vulnerabilities calculated above are based on incoming edges and in fact have the meaning of service susceptibility to failure.
2.2. Aggregation Functions
Vulnerabilities can be aggregated by equation (3) into a single network vulnerability index γ in many ways. Here, we propose three of them:(i), the mean of : it represents the total of service vulnerabilities, without regard for their distribution. While providing a good measure of overall vulnerability, it hides the existence of extraordinary vulnerable services in the network.(ii), the median: it represents the typical value of service vulnerability in the network, i.e., it discards extreme values.(iii), the maximum: contrary to , the service with biggest vulnerability is picked up, regardless of vulnerability of the other ones.
2.3. Sensitivity of Vulnerability to SelfAssessment Errors
For any instance of reported impact matrix, , we can calculate corresponding and finally, vulnerability index —using any combination of ’s and ’s provided above. Then, we can calculate the difference between vulnerabilities calculated for reported and for real impact values.
In the context of difference between two sets of services, we may introduce yet another measure based on difference in ordering of the most important services there: . It uses Levenshtein distance [11] to compare the contents and order of first five most important services in and in . The Levenshtein distance counts the number of edit operations to apply to one sequence to convert it to another sequence. In our case, fiveelement sequences are compared. Edit operations are: insertion, deletion, and change of a single element in a sequence. For example, if and , the five most important services would be and , respectively. It takes three operations to transform one set into the other: two for swapping of with , and one for replacement of with —and therefore, the edit distance equals three.
2.4. Used Networks
In practice, the service graph G and reported impact values are compiled after a laborious process of questioning service operators about their services relationship structure and relationship intensity. A sample real graph of services made this way is presented in Figure 1. Reconstruction of service dependencies between operators is particularly hard, since such information is often considered confidential. Collected data are inherently sensitive because they may serve as well for improving network reliability as for attacking its weakest points. Such observation has been made previously in case of critical infrastructure modeling and holds also for digital services. The papers [12, 13] cover sectorwise interdependency analysis and summarize modeling approaches, respectively. All the authors express their concern about privacy of the collected data; consequently, only a small fraction of interdependencies is presented in [12]. Similarly, we decided to carry out our study for networks whose operation is partially analogous to the interplay of digital services instead of the real network.
We found that networks of source code dependencies are a close analogy. First, they represent software components, on a much smaller scale though. Second, the dependency between modules can be relatively easily tracked by static code analysis. Third, failure or malfunction of one software module influences the operation of all modules that depend on it, although differently. Fourth, module dependencies in opensource projects appear not in predefined way but represent current needs of programmers, as already reported in [14]. Finally, dependencies between source code modules as well as between essential services can be relatively easily traced, while their intensity can not.
All networks analyzed in this study describe software module dependencies in Javascript (JS) projects available from hosting platform github.com. Dependencies have been found by using the static code analysis tool, Madge http://www.npmjs.com/package/madge. Project properties are given in Table 1. Projects differ in size; moreover, some of them happen to have circular dependencies of the code, which also happens for real digital services. A sample graph of dependencies is shown in Figure 2.

3. Results and Discussion
Formula (7) calculates the vulnerability estimation error for a single realization of . To assess the error in statistical sense, one would need to calculate analytically how ξ affects , , and finally, δ. In this paper, we rather present results of cursory estimation of δ, based on random sampling of for a number of M samples, . We calculate the following statistics from sample distributions of δ:(i)Mean average absolute error, (ii)Mean average relative error, (iii)Standard deviation of error, (iv)Standard deviation of error, relative to true value,
They all are comprehensive measures of how errors of operators impact estimation affects errors of network vulnerability, given any of the proposed formulas of and .
All the reasoning provided above concerns a single instance of , whose values are chosen randomly. In order to draw more general conclusions about the properties of chosen combination of and , we need to repeat calculations for a number of test cases. Let us call them experiments—nonzero values of new impact factor matrix are chosen and disturbed using equation (4) in each experiment. Finally, all θ’s are calculated, accordingly. Sample graphical results from two series of 1,000 experiments each for Airbnb network are given in Figure 3. In all our analyses, from now on, the number of experiments will be equal to the number of samples in each experiment, M.
(a)
(b)
Figures 3(a) and 3(b) show various characters of vulnerability errors. In some aspects, the two demonstrated examples bear similarity, e.g., γ, and the average of δ is negatively correlated. (Intuitively, the more highscore links in the network, the less important is error by one star in impact estimation by the service operator.) Next, some configurations result in more discrete error distribution—as in case (b) where the switching nature of median manifests in striped dot patterns. Finally, histograms show how much variable are vulnerability errors across experiments. For example, we see that in case (a) they are quite stable, clustered closely around one value, while in case (b) they show much bigger variability.
Results in Figure 3 justify the need for deeper inspection of the nature of observed errors. However, to compare sensitivity of many networks in multidimensional parameter space of ’s, ’s, and N’s, we have to develop a simpler approach. We propose to calculate and compare average values of, θ’s, i.e., , , , and , over all performed experiments. Such averaged indicators are collected in Tables 2–6, each table for a different project.





The figures given in Tables 2–6 cover all combinations of five graphs, three importance indices , four importance aggregation functions , and two amplitudes of estimation error N. Basically, we search this space to find valuable combinations of ’s and ’s. A valuable combination is characterized by(i)Small total error for all considered projects and values of N—we want the approach to be independent of graph structure(ii)Big sensitivity S to change of N, for all projects (pick the worst case)—we want operators’ errors of estimation to really influence the value of overall metrics θ(iii)Small standard deviation of error, for all projects (pick the worst case)—we want small variance of θ’s, in general
Candidate combinations of and should therefore be in general tolerant to imprecise information provided by operators, but at the same time, sensitive to the scale of such lack of precision. Moreover, it is desirable that errors in network vulnerability calculated by such combination do not vary widely. We check the last two requirements with respect to the worst results found for the analyzed projects. Results of such threecriteria scoring are presented in Figure 4, projected on three planes. The axes have been selected or adjusted so that markers located near an axis correspond to combinations that perform better. Visual comparison provided in Figure 4 does not determine strictly the optimum combination, but makes it possible to observe that, in general, performance indices do not vary widely—at least so that using linear axis scaling will do to reveal differences. Secondly, markers get clustered mainly with respect to their color, which means that the choice of aggregation method is more important than the choice of algorithm for importance index calculation.
As analyzed combinations form a cloud in 3D space, we may find a Pareto front, i.e., a set of nondominated combinations. They are(i)—the average of reach centrality(ii)—the average page rank(iii)—the median of page rank(iv)—the maximum of page rank(v)—the average of maximum input importance
4. Conclusions
It should be reminded that research reported here is done in context of a large project aiming to build a nationwide model of critical services network. While integrity of the resulting graph can be obtained by careful automated inspection of questionnaires filed by service operators, the estimated reported impact between services will be biased and inherently erroneous. Therefore, it was worth to study sensitivity of some candidate synthetic metrics of overall network vulnerability with respect to incorrect input. We felt it correct to use networks of software module dependencies because of their functional and structural similarity to network of critical services, let alone that such real networks will probably remain confidential.
The study shows that all three proposed formulas for individual service vulnerability calculation are valuable. This is rather a positive observation, as each of them has its own specifics and can be used under various circumstances. Also, almost all proposed ways of vulnerability aggregation into a single vulnerability index are useful (except the Levenshtein distance, which shows much variation and has turned out to be useless). Naturally, combinations of formulas appropriate for capturing “extreme” phenomena, as , will have show variability.
The main takeaway is that it is safe to apply mean or median aggregation of individual service vulnerability, whatever is the formula for importance calculation. Such aggregated value may serve as a single, comprehensive vulnerability index. Note that being robust to errors in graph edge weights, it will be affected by major structural graph changes—e.g., edge removal as result of realtime detected failure. Our previous work has shown that networks of autonomous systems (AS) can be really badly affected by just one link failure, contrary to widespread belief in Internet robustness [15].
One should remember that results reported here were based on the sound assumption of analogy between critical services and software modules. This assumption will eventually get verified in practice, once the national cybersecurity platform is operational and filled with data. We look forward to compare properties of vulnerability calculation formulas calculated here by random sampling with careful expert judgment and postmortem analyses for real services graph.
Data Availability
The open source code used to support the findings of this study is publicly available on http://github.com and can be downloaded and processed with tools indicated in this paper. The proprietary Python code created by the author to analyze data used to support the findings of this study is available from the corresponding author upon request.
Conflicts of Interest
The author declares that there are no conflicts of interest regarding the publication of this paper.
Acknowledgments
The work presented in this paper has been supported by the Polish National Centre for Research and Development grant (CYBERSECIDENT/369195/I/NCBR/2017).
References
 The European Commission, The Directive on Security of Network and Information Systems, The European Commission, Brussels, Belgium, 2016.
 J. Hingant, M. Zambrano, F. J. Pérez, I. Pérez, and M. Esteve, “Hybint: a hybrid intelligence system for critical infrastructures protection,” Security and Communication Networks, vol. 2018, Article ID 5625860, 13 pages, 2018. View at: Publisher Site  Google Scholar
 G. Settanni, F. Skopik, Y. Shovgenya et al., “A collaborative cyber incident management system for european interconnected critical infrastructures,” Journal of Information Security and Applications, vol. 34, pp. 166–182, 2017. View at: Publisher Site  Google Scholar
 W. Stallings, L. Brown, M. D. Bauer, and A. K. Bhattacharjee, Computer Security: Principles and Practice, Pearson Education, Upper Saddle River, NJ, USA, 2012.
 M. Medo and J. R. Wakeling, “The effect of discrete vs. continuousvalued ratings on reputation and ranking systems,” EPL (Europhysics Letters), vol. 91, no. 4, Article ID 48004, 2010. View at: Publisher Site  Google Scholar
 W. W. Moe and M. Trusov, “The value of social dynamics in online product ratings forums,” Journal of Marketing Research, vol. 48, no. 3, pp. 444–456, 2011. View at: Publisher Site  Google Scholar
 Networkx Manual, Centrality Methods Reference, 2019, https://networkx.github.io/documentation/stable/reference/algorithms/centrality.html.
 U. Brandes and D. Fleischer, “Centrality measures based on current flow,” in Annual Symposium on Theoretical Aspects of Computer Science, pp. 533–544, Springer, Berlin, Germany, 2005. View at: Publisher Site  Google Scholar
 L. Page, S. Brin, R. Motwani, and W. Terry, “The pagerank citation ranking: bringing order to the web,” Tech. Rep., Stanford InfoLab, Stanford, CA, USA, 1999. View at: Google Scholar
 E. Mones, L. Vicsek, and T. Vicsek, “Hierarchy measure for complex networks,” PLoS One, vol. 7, no. 3, Article ID e33799, 2012. View at: Publisher Site  Google Scholar
 V. Levenshtein, “Binary codes capable of correcting deletions, insertions, and reversals,” Soviet Physics Doklady, vol. 10, no. 8, pp. 707–710, 1966. View at: Google Scholar
 C.N. Huang, J. J. H. Liou, and Y.C. Chuang, “A method for exploring the interdependencies and importance of critical infrastructures,” KnowledgeBased Systems, vol. 55, pp. 66–74, 2014. View at: Publisher Site  Google Scholar
 M. Ouyang, “Review on modeling and simulation of interdependent critical infrastructure systems,” Reliability Engineering & System Safety, vol. 121, pp. 43–60, 2014. View at: Publisher Site  Google Scholar
 M. Kamola, “How to verify conway’s law for open source projects,” IEEE Access, vol. 7, pp. 38469–38480, 2019. View at: Publisher Site  Google Scholar
 K. Mariusz and A. Piotr, “Network resilience analysis: review of concepts and a countrylevel. case study,” Computer Science, vol. 15, no. 3, p. 311, 2014. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2019 Mariusz Kamola. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.