Apply STAMP to critical infrastructure protection

被引:14
|
作者
Laracy, Joseph R. [1 ]
Leveson, Nancy G. [1 ]
机构
[1] MIT, Complex Syst Res Lab, 77 Massachusetts Ave, Cambridge, MA 02139 USA
关键词
D O I
10.1109/THS.2007.370048
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
Classical risk-based or game theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable for security risks. Additionally, these models suffer from serious deficiencies when they are applied to software-intensive, complex engineering systems. Recent work in the area of system safety engineering has led to the development of a new accident model for system safety that acknowledges the dynamic complexity of accidents. System-Theoretic Accident Models and Processes (STAMP) applies principles from control theory to enforce constraints on hazards and thereby prevent accidents. Appreciating the similarities between safety and security while still acknowledging the differences, this paper introduces the use of STAMP to security problems. In particular, it is applied to identify and mitigate the threats that could emerge in critical infrastructure systems such as the air transportation network.
引用
收藏
页码:215 / +
页数:2
相关论文
共 50 条
  • [41] Pipeline security - Protection of the critical infrastructure gas
    Schmidt, Jürgen
    Technische Sicherheit, 2017, 7 (09):
  • [42] Security That Matters: Critical Infrastructure and Objects of Protection
    Aradau, Claudia
    SECURITY DIALOGUE, 2010, 41 (05) : 491 - 514
  • [43] Modeling and simulation support for critical infrastructure protection
    Woodcock, Alexander E. R.
    Dockery, John. T.
    Cornwallis Group IX: Analysis for Stabilization and Counter-Terrorist Operations, 2005, 9 : 459 - 473
  • [44] Critical Infrastructure Protection Systems Effectiveness Evaluation
    Lovecek, Tomas
    Ristvej, Jozef
    Simak, Ladislav
    JOURNAL OF HOMELAND SECURITY AND EMERGENCY MANAGEMENT, 2010, 7 (01)
  • [45] Secure Sensor Networks for Critical Infrastructure Protection
    Gomez, Laurent
    Ulmer, Cedric
    2010 FOURTH INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM), 2008, : 144 - 150
  • [46] A Trusted Computing Architecture for Critical Infrastructure Protection
    Burmester, Mike
    2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 64 - 69
  • [47] A Heterogeneous Sensor Network for the Protection of Critical Infrastructure
    Berizzi, Fabrizio
    Callegari, Christian
    Giordano, Stefano
    PROCEEDINGS OF 2014 MEDITERRANEAN MICROWAVE SYMPOSIUM (MMS2014), 2014, : 349 - 354
  • [49] On building cybersecurity expertise in critical infrastructure protection
    Mishra, Sumita
    Raj, Rajendra K.
    Romanowski, Carol J.
    Schneider, Jennifer
    Critelli, Anthony
    2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,
  • [50] Autonomic risk management for critical infrastructure protection
    Ulieru, N
    Worthington, P
    INTEGRATED COMPUTER-AIDED ENGINEERING, 2006, 13 (01) : 63 - 80