Threat characterization in vital area identification process

Tereza Malachova, J. Malach, Z. Vintr
{"title":"Threat characterization in vital area identification process","authors":"Tereza Malachova, J. Malach, Z. Vintr","doi":"10.1109/CCST.2013.6922050","DOIUrl":null,"url":null,"abstract":"The identification of a potential attacker's targets is fundamental in the design of a physical protection system for complex technological facilities such as nuclear facilities. An attack can be carried out to sabotage, or gain control of, targets that are physically represented by different parts of systems, structures and components (SSC), or their combination. Those SSCs that need to be protected in order to prevent radiological consequences in a nuclear facility are called vital and are located within vital areas. The use of attack trees in the vital area identification is an innovative approach that enables modeling of both the SSCs and the threat including their mutual interaction. Threat characteristics are described by a well-designed and scaled set of attributes. Required attacker's capabilities to disable each SSC have to be assessed. Methods of expert opinion elicitation are mostly used for the assessment of attacker's abilities to perform malevolent events on an individual SSC represented by tree leaf nodes. This paper presents the selected findings from the attack tree implementation in the vital area identification focusing on threat and supplementary attributes for the attack tree model. The protection tree is used to evaluate and identify vital area candidates. The suggested method of threat characterization in an attack tree enables time-effective, more precise and well-documented vital area identification.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 47th International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2013.6922050","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The identification of a potential attacker's targets is fundamental in the design of a physical protection system for complex technological facilities such as nuclear facilities. An attack can be carried out to sabotage, or gain control of, targets that are physically represented by different parts of systems, structures and components (SSC), or their combination. Those SSCs that need to be protected in order to prevent radiological consequences in a nuclear facility are called vital and are located within vital areas. The use of attack trees in the vital area identification is an innovative approach that enables modeling of both the SSCs and the threat including their mutual interaction. Threat characteristics are described by a well-designed and scaled set of attributes. Required attacker's capabilities to disable each SSC have to be assessed. Methods of expert opinion elicitation are mostly used for the assessment of attacker's abilities to perform malevolent events on an individual SSC represented by tree leaf nodes. This paper presents the selected findings from the attack tree implementation in the vital area identification focusing on threat and supplementary attributes for the attack tree model. The protection tree is used to evaluate and identify vital area candidates. The suggested method of threat characterization in an attack tree enables time-effective, more precise and well-documented vital area identification.
关键区域识别过程中的威胁表征
识别潜在攻击者的目标是设计复杂技术设施(如核设施)物理保护系统的基础。攻击可以破坏或控制由系统、结构和组件(SSC)的不同部分或它们的组合物理表示的目标。那些需要保护以防止核设施产生辐射后果的核材料被称为重要材料,它们位于重要区域内。在关键区域识别中使用攻击树是一种创新的方法,可以对ssc和威胁进行建模,包括它们之间的相互作用。威胁特征由一组设计良好且可缩放的属性来描述。必须评估攻击者禁用每个SSC的能力。专家意见提取方法主要用于评估攻击者在树叶节点表示的单个SSC上执行恶意事件的能力。本文介绍了攻击树实现在关键区域识别中的一些发现,重点是攻击树模型的威胁和补充属性。保护树用于评估和识别关键候选区域。在攻击树中建议的威胁表征方法可以实现时效性,更精确和有据可查的重要区域识别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信