Security vulnerability assessment of gas pipelines using Discrete-time Bayesian network

被引:44
作者
Fakhravar, Donya [1 ,3 ]
Khakzad, Nima [2 ]
Reniers, Genserik [2 ]
Cozzani, Valerio [1 ]
机构
[1] Alma Mater Studiorum Univ Bologna, Dipartimento Ingn Civile Chim Ambientale & Mat, Bologna, Italy
[2] Delft Univ Technol, Fac Technol Policy & Management, Safety & Secur Sci Grp, Delft, Netherlands
[3] Delft Univ Technol, Safety & Secur Sci Grp, Delft, Netherlands
关键词
Security vulnerability assessment; Physical countermeasures; Relative attractiveness; Attack tree; Discrete-time Bayesian network; Gas pipeline; GAME-THEORETICAL MODEL; PROCESS FACILITIES; TERRORIST ATTACKS; SAFETY ANALYSIS; PROCESS SYSTEMS; RISK ANALYSIS; INFRASTRUCTURE; EXPLOSION; SCENARIOS; INDUSTRY;
D O I
10.1016/j.psep.2017.08.036
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Security of chemical and oil & gas facilities became a pressing issue after the terrorist attacks of 9/11, due to relevant quantities of hazardous substances that may be present in these sites. Oil & gas pipelines, connecting such facilities, might be potential targets for intentional attacks. The majority of methods addressing pipeline security are mostly qualitative or semi-quantitative, based on expert judgment and thus potentially subjective. In the present study, an innovative security vulnerability assessment methodology is developed, based on Discrete-time Bayesian network (DTBN) technique to investigate the vulnerability of a hazardous facility (pipeline in this study) considering the performance of security countermeasures in place. The methodology is applied to an illustrative gas pipeline in order to rank order the pipeline segments based upon their criticality. (C) 2017 Institution of Chemical Engineers. Published by Elsevier B.V. All rights reserved.
引用
收藏
页码:714 / 725
页数:12
相关论文
共 34 条
  • [11] Ebeling C., 1997, RELIABILITY AND MAIN
  • [12] Edge K. S., 2006, MIL COMM C MILCOM WA
  • [13] European Gas Pipeline Incident Data Group (EGIG), 2015, 14R0403 EGIG
  • [14] Fakhravar D., 2016, SECURITY RISK ASSESS
  • [15] Exploiting Bayesian Networks for the Analysis of Combined Attack Trees
    Gribaudo, Marco
    Iacono, Mauro
    Marrone, Stefano
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2015, 310 : 91 - 111
  • [16] Jensen Finn V., 2007, CAUSAL BAYESIAN NETW
  • [17] A multi-criteria decision making approach to security assessment of hazardous facilities
    Khakzad, Nima
    Reniers, Genserik
    van Gelder, Pieter
    [J]. JOURNAL OF LOSS PREVENTION IN THE PROCESS INDUSTRIES, 2017, 48 : 234 - 243
  • [18] Vulnerability analysis of process plants subject to domino effects
    Khakzad, Nima
    Reniers, Genserik
    Abbassi, Rouzbeh
    Khan, Faisal
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2016, 154 : 127 - 136
  • [19] Using graph theory to analyze the vulnerability of process plants in the context of cascading effects
    Khakzad, Nima
    Reniers, Genserik
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2015, 143 : 63 - 73
  • [20] Risk Management of Domino Effects Considering Dynamic Consequence Analysis
    Khakzad, Nima
    Khan, Faisal
    Amyotte, Paul
    Cozzani, Valerio
    [J]. RISK ANALYSIS, 2014, 34 (06) : 1128 - 1138