Infrastructure’s Vulnerability Assessment of West Azerbaijan Province with Passive Defense Approach

Document Type : Original Article

Authors

iran university of science and technology

Abstract

The main objective of this research is to assess the vulnerability of infrastructure in West Azarbaijan province. For this purpose, the process of evaluation has been taken using the GIS. The research method is descriptive-analytic. In this research, a multi-criteria decision making model has been used to overlay the layers. The relevant spatial data has been collected from official centers and authorities of the country, and for measuring and determining the criteria, documentation in form of written sources, and questionnaires filled in by local residents and experts have been used. The results of this study indicate that the spatial distribution of infrastructure in the West Azarbaijan province is concentrated and follows a cluster pattern, and this kind of distribution multiples the spatial vulnerability of the infrastructure. Also, 10 percent of the infrastructure of the province is considered as a sensitive and important infrastructure (from provincial viewpoint), of which 45 percent of the infrastructure of the province is exposed to very high vulnerability, 16.6 percent high vulnerability, 14.2 percent moderate vulnerability, 16.4 vulnerability and 12.5 very low vulnerability. Also, the results show that the border areas of the province such as Sardasht, Piranshahr, Oshnavieh, Salmas and Maku are vulnerable regions, which need urgent attention if new infrastructures are established. Also, the results of the research particularly the density of vital and sensitive infrastructures of the province in areas of high and very high vulnerability indicate the lack of optimal management of spatial deployment of infrastructure in the province.

Keywords


  1. P. M. Comparetti, G. Salvaneschi, E. Kirda, C. Kolbitsch, C. Kruegel, and S. Zanero, “Identifying Dormant Functionality in Malware Programs,” in IEEE Symposium on Security and Privacy, 2010.##
  2. N. R. Veeramani R, “Windows API based Malware Detection and Framework Analysis,” International conference on networks and cyber security, 2012##.
  3. C. Raymond, S. Mancoridis, and M. Kam, “System           Call-based Detection of Malicious Processes,” in IEEE International Conference on Software Quality, Reliability and Security, 2015.##
  4. S. Naval, V. Laxmi, N. Gupta, M. Singh Gaur, and M. Rajarajan, “Exploring Worm Behaviors using DTW,” in Proceedings of the 7th International Conference on Security of Information and Networks, 2014.##
  5. T. Barhoom and H. Qeshta, “Worm Detection by Combination of Classification with neural networks,” in international Arab Journal of e-Technology, 2013##.
  6. D. Kharche and A. Thakare, “Internet Worm Classification and Detection using Data Mining techniques,” in IOSR Journal of Computer Engineering (IOSR- JCE), 2015.##
  7. S. C. Jeeva and E. Blessing Rajsingh, “Intelligent phishing url detection using association rule mining,” in Human-centric Computing and Information Sciences, 2016.##
  8. Y. Wang, B. Watson, J. Zheng, and S. Mukkamala, “ARP-Miner: Mining Risk Patterns of Android Malware,” International Workshop on Multi-disciplinary Trends in Artificial Intelligence, pp. 363-375, 2015.##
  9. S. Palahan, D. Babić, S. Chaudhuri, and D. Kifer, “Extraction of Statistically Significant Malware Behaviors,” in Proceedings of the 29th Annual Computer Security Applications Conference, 2013##.
  10. Y. Tang, J. Luo, B. Xiao, and G. Wei, “Concept, characteristics and defending mechanism of worms,” in IEICE transactions on Information and Systems, 2009##.
  11. M. Norouzi, A. Souri, and M. Samad Zamini, “A Data Mining Classification Approach for Behavioral Malware Detection,” Journal of Computer Networks and Communications‏, 2016.##

2.        Y. Ye, T. Li, K. Huang, Q. Jiang, and Y. Chen, “Hierarchical associative classifier (HAC) for malware,” Journal of Intelligent Information Systems, vol. 35, no. 1, pp. 1-20, 2010.##