On the Effectiveness of Security Countermeasures for Critical Infrastructures

被引:30
|
作者
Hausken, Kjell [1 ]
He, Fei [2 ]
机构
[1] Univ Stavanger, Fac Social Sci, N-4036 Stavanger, Norway
[2] Texas A&M Univ, Dept Mech & Ind Engn, Kingsville, TX USA
基金
美国国家科学基金会;
关键词
Game theory; government; protection; resource allocation; terrorism; threat; threat score; ATTACKS; PROTECTION; ELEMENTS; SYSTEMS; DEFENSE; RISK;
D O I
10.1111/risa.12318
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
A game-theoretic model is developed where an infrastructure of N targets is protected against terrorism threats. An original threat score is determined by the terrorist's threat against each target and the government's inherent protection level and original protection. The final threat score is impacted by the government's additional protection. We investigate and verify the effectiveness of countermeasures using empirical data and two methods. The first is to estimate the model's parameter values to minimize the sum of the squared differences between the government's additional resource investment predicted by the model and the empirical data. The second is to develop a multivariate regression model where the final threat score varies approximately linearly relative to the original threat score, sectors, and threat scenarios, and depends nonlinearly on the additional resource investment. The model and method are offered as tools, and as a way of thinking, to determine optimal resource investments across vulnerable targets subject to terrorism threats.
引用
收藏
页码:711 / 726
页数:16
相关论文
共 50 条
  • [1] Cyber security of critical infrastructures
    Maglaras, Leandros A.
    Kim, Ki-Hyung
    Janicke, Helge
    Ferrag, Mohamed Amine
    Rallis, Stylianos
    Fragkou, Pavlina
    Maglaras, Athanasios
    Cruz, Tiago J.
    [J]. ICT EXPRESS, 2018, 4 (01): : 42 - 45
  • [2] Cybercrime and the Security of Critical Infrastructures
    Skopik, Florian
    Bleier, Thomas
    [J]. ERCIM NEWS, 2012, (91): : 26 - 28
  • [3] Cyber Security of Networked Critical Infrastructures
    Abu-Nimeh, Saed
    Foo, Ernest
    Fovino, Igor Nai
    Govindarasu, Manimaran
    Morris, Thomas
    [J]. IEEE NETWORK, 2013, 27 (01): : 3 - 4
  • [4] PolyOrBAC: A security framework for Critical Infrastructures
    Abou El Kalam, A.
    Deswarte, Y.
    Baina, A.
    Kaaniche, M.
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2009, 2 (04) : 154 - 169
  • [5] Emergent information security in critical infrastructures
    Daskapan, Semir
    Vree, Willem G.
    Wagenaar, Rene W.
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2006, 2 (2-3) : 247 - 260
  • [6] Insider Threats to IT Security of Critical Infrastructures
    Gaidarski, Ivan
    Minchev, Zlatogor
    [J]. Studies in Big Data, 2021, 84 : 381 - 394
  • [7] Collaboration in Security Assessments for Critical Infrastructures
    Koester, Friedrich
    Klaas, Michael
    Nguyen, Hanh Quyen
    Braendle, Markus
    Obermeier, Sebastian
    Brenner, Walter
    [J]. CRIS: 4TH INTERNATIONAL CONFERENCE ON CRITICAL INFRASTRUCTURE, 2009, : 59 - 65
  • [8] Critical Information Infrastructures Security Modeling
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    [J]. PROCEEDINGS OF THE 24TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2019, : 82 - 88
  • [9] A Security Assessment Methodology for Critical Infrastructures
    Caselli, Marco
    Kargl, Frank
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2014), 2016, 8985 : 332 - 343
  • [10] Monitoring the Effectiveness of Security Countermeasures in a Security Risk Management Model
    Rjaibi, Neila
    Rabai, Latifa Ben Arfa
    [J]. SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 327 - 337