Hierarchical, model-based risk management of critical infrastructures

被引:25
作者
Baiardi, F. [1 ]
Telmon, C. [1 ]
Sgandurra, D. [1 ]
机构
[1] Univ Pisa, Dipartimento Informat, I-56127 Pisa, Italy
关键词
Critical infrastructure; Risk assessment; Dependency; Countermeasure; Cost-effectiveness; Automatic tool; MINIMAL CUT SETS; MATHEMATICAL FOUNDATIONS; RANKING;
D O I
10.1016/j.ress.2009.02.001
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Risk management is a process that includes several steps, from vulnerability analysis to the formulation of a risk mitigation plan that selects countermeasures to be adopted. With reference to an information infrastructure, we present a risk management strategy that considers a sequence of hierarchical models, each describing dependencies among infrastructure components. A dependency exists anytime a security-related attribute of a component depends upon the attributes of other components. We discuss how this notion supports the formal definition of risk mitigation plan and the evaluation of the infrastructure robustness. A hierarchical relation exists among models that are analyzed because each model increases the level of details of some components in a previous one. Since components and dependencies are modeled through a hypergraph, to increase the model detail level, some hypergraph nodes are replaced by more and more detailed hypergraphs. We show how critical information for the assessment can be automatically deduced from the hypergraph and define conditions that determine cases where a hierarchical decomposition simplifies the assessment. In these cases, the assessment has to analyze the hypergraph that replaces the component rather than applying again all the analyses to a more detailed, and hence larger, hypergraph. We also show how the proposed framework supports the definition of a risk mitigation plan and discuss some indicators of the overall infrastructure robustness. Lastly, the development of tools to support the assessment is discussed. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1403 / 1415
页数:13
相关论文
共 48 条
[1]  
AMMANN P, 2002, 9 ACM C COMP COMM SE
[2]  
[Anonymous], 2001, Security Engineering: A Guide to Building Dependable Distributed Systems
[3]  
[Anonymous], 2002, Managing Information Security Risks: The OCTAVE Approach
[4]  
[Anonymous], CMUCS04122
[5]   A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism [J].
Apostolakis, GE ;
Lemon, DM .
RISK ANALYSIS, 2005, 25 (02) :361-376
[6]  
BAIARDI F, 2005, NATO ADV RES WORKSH
[7]  
BAIARDI F, 2006, 1 WORKSH CRIT INF IN
[8]  
Barber B., 1992, MEDINFO 92. Proceedings of the Seventh World Congress on Medical Informatics, P1589
[9]  
BERTOLI P, 2001, JOINT C ART INT WORK
[10]   Partial-order planning with concurrent interacting actions [J].
Boutilier, C ;
Brafman, RI .
JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 2001, 14 :105-136