Security management of critical infrastructures is a complex task as a great variety of technical and socio-political information is needed to realistically predict the risk of intentional malevolent acts. In the present study, a methodology based on Limited Memory Influence Diagram (LIMID) has been developed for the protection of critical infrastructures via cost-effective allocation of security measures. LIMID is an extension of Bayesian network (BN) intended for decision-making, allowing for efficient modelling of complex systems while accounting for interdependencies and interaction of system components. The probability updating feature of BN has been used to investigate the effect of vulnerabilities on adversaries’ preferences when planning attacks. Moreover, the proposed methodology has been shown to be able to identify an optimal defensive strategy given an attack through maximizing defenders’ expected utility. Despite being demonstrated via a chemical facility, the methodology can easily be tailored to a wide variety of critical infrastructures.
Misuri A., Khakzad N., Reniers G., Cozzani V. (2019). A Bayesian network methodology for optimal security management of critical infrastructures. RELIABILITY ENGINEERING & SYSTEM SAFETY, 191, 1-14 [10.1016/j.ress.2018.03.028].
A Bayesian network methodology for optimal security management of critical infrastructures
Misuri A.Investigation
;Cozzani V.
Supervision
2019
Abstract
Security management of critical infrastructures is a complex task as a great variety of technical and socio-political information is needed to realistically predict the risk of intentional malevolent acts. In the present study, a methodology based on Limited Memory Influence Diagram (LIMID) has been developed for the protection of critical infrastructures via cost-effective allocation of security measures. LIMID is an extension of Bayesian network (BN) intended for decision-making, allowing for efficient modelling of complex systems while accounting for interdependencies and interaction of system components. The probability updating feature of BN has been used to investigate the effect of vulnerabilities on adversaries’ preferences when planning attacks. Moreover, the proposed methodology has been shown to be able to identify an optimal defensive strategy given an attack through maximizing defenders’ expected utility. Despite being demonstrated via a chemical facility, the methodology can easily be tailored to a wide variety of critical infrastructures.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.