Apply STAMP to critical infrastructure protection

被引:14
|
作者
Laracy, Joseph R. [1 ]
Leveson, Nancy G. [1 ]
机构
[1] MIT, Complex Syst Res Lab, 77 Massachusetts Ave, Cambridge, MA 02139 USA
关键词
D O I
10.1109/THS.2007.370048
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
Classical risk-based or game theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable for security risks. Additionally, these models suffer from serious deficiencies when they are applied to software-intensive, complex engineering systems. Recent work in the area of system safety engineering has led to the development of a new accident model for system safety that acknowledges the dynamic complexity of accidents. System-Theoretic Accident Models and Processes (STAMP) applies principles from control theory to enforce constraints on hazards and thereby prevent accidents. Appreciating the similarities between safety and security while still acknowledging the differences, this paper introduces the use of STAMP to security problems. In particular, it is applied to identify and mitigate the threats that could emerge in critical infrastructure systems such as the air transportation network.
引用
收藏
页码:215 / +
页数:2
相关论文
共 50 条
  • [31] A Platform for Simulation and Analysis of Critical Infrastructure Protection
    Kuo, Li-Jung
    Fan, Chin-Feng
    Yih, Swu
    Kao, Yung-Yu
    Lin, Ching-Ting
    JOURNAL OF INTERNET TECHNOLOGY, 2009, 10 (02): : 145 - 153
  • [32] CRITICAL INFRASTRUCTURE PROTECTION: THREATS MINING AND ASSESSMENT
    Digioia, Giusj
    Panzieri, Stefano
    INTERNATIONAL DEFENSE AND HOMELAND SECURITY SIMULATION WORKSHOP (DHSS 2012), 2012, : 67 - 72
  • [33] Trust and Reputation Management for Critical Infrastructure Protection
    Caldeira, Filipe
    Monteiro, Edmundo
    Simoes, Paulo
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, 2010, 92 : 39 - 47
  • [34] Critical networked infrastructure protection from adversaries
    Quijano, Eduardo G.
    Rios Insua, David
    Cano, Javier
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2018, 179 : 27 - 36
  • [35] Systemic challenges for critical information infrastructure protection
    Masera, M
    Cyberspace Security and Defense: Research Issues, 2005, 196 : 57 - 73
  • [36] On Critical Infrastructure Protection in America and Inspiration to China
    Pei Yan
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (5TH), VOL III, 2009, : 61 - 67
  • [37] The Protection of Critical Infrastructure Objects - Technical Principles
    Manas, Pavel
    DURABILITY OF CRITICAL INFRASTRUCTURE, MONITORING AND TESTING, ICDCF 2016, 2017, : 239 - 248
  • [38] Multisensor system for the protection of critical infrastructure of seaport
    Kastek, Mariusz
    Dulski, Rafal
    Zyczkowski, Marek
    Szustakowski, Mieczyslaw
    Trzaskawka, Piotr
    Ciurapinski, Wieslaw
    Grelowska, Grazyna
    Gloza, Ignacy
    Milewski, Stanislaw
    Listewnik, Karol
    UNATTENDED GROUND, SEA, AND AIR SENSOR TECHNOLOGIES AND APPLICATIONS XIV, 2012, 8388
  • [39] Autonomic Critical Infrastructure Protection (ACIP) System
    Al Baalbaki, Bilal
    Al-Nashif, Youssif
    Hariri, Salim
    Kelly, Douglas
    2013 ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2013,
  • [40] Some methodical aspects of critical infrastructure protection
    Bochkov, Alexander
    Lesnykh, Valery
    Zhigirev, Nikolai
    Lavrukhin, Yuri
    SAFETY SCIENCE, 2015, 79 : 229 - 242