Security management of critical infrastructures is a complex task as a great variety of technical and socio-political information is needed to realistically predict the risk of intentional malevolent acts. In the present study, a methodology based on Limited Memory Influence Diagram (LIMID) has been developed for the protection of critical infrastructures via cost-effective allocation of security measures. LIMID is an extension of Bayesian network (BN) intended for decision-making, allowing for efficient modelling of complex systems while accounting for interdependencies and interaction of system components. The probability updating feature of BN has been used to investigate the effect of vulnerabilities on adversaries’ preferences when planning attacks. Moreover, the proposed methodology has been shown to be able to identify an optimal defensive strategy given an attack through maximizing defenders’ expected utility. Despite being demonstrated via a chemical facility, the methodology can easily be tailored to a wide variety of critical infrastructures.

A Bayesian network methodology for optimal security management of critical infrastructures / Misuri A.; Khakzad N.; Reniers G.; Cozzani V.. - In: RELIABILITY ENGINEERING & SYSTEM SAFETY. - ISSN 0951-8320. - STAMPA. - 191:(2019), pp. 106112.1-106112.14. [10.1016/j.ress.2018.03.028]

A Bayesian network methodology for optimal security management of critical infrastructures

Misuri A.
Investigation
;
Cozzani V.
Supervision
2019

Abstract

Security management of critical infrastructures is a complex task as a great variety of technical and socio-political information is needed to realistically predict the risk of intentional malevolent acts. In the present study, a methodology based on Limited Memory Influence Diagram (LIMID) has been developed for the protection of critical infrastructures via cost-effective allocation of security measures. LIMID is an extension of Bayesian network (BN) intended for decision-making, allowing for efficient modelling of complex systems while accounting for interdependencies and interaction of system components. The probability updating feature of BN has been used to investigate the effect of vulnerabilities on adversaries’ preferences when planning attacks. Moreover, the proposed methodology has been shown to be able to identify an optimal defensive strategy given an attack through maximizing defenders’ expected utility. Despite being demonstrated via a chemical facility, the methodology can easily be tailored to a wide variety of critical infrastructures.
2019
A Bayesian network methodology for optimal security management of critical infrastructures / Misuri A.; Khakzad N.; Reniers G.; Cozzani V.. - In: RELIABILITY ENGINEERING & SYSTEM SAFETY. - ISSN 0951-8320. - STAMPA. - 191:(2019), pp. 106112.1-106112.14. [10.1016/j.ress.2018.03.028]
Misuri A.; Khakzad N.; Reniers G.; Cozzani V.
File in questo prodotto:
Eventuali allegati, non sono esposti

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11585/740783
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 38
  • ???jsp.display-item.citation.isi??? 32
social impact