Technosocial Modeling of IED Threat Scenarios and Attack

نویسندگان

  • Paul Whitney
  • Alan Brothers
  • Garill Coles
  • Jonathan Young
  • Katherine Wolf
  • Sandy Thompson
  • David Niesen
  • John Madsen
  • Cindy Henderson
چکیده

This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The models are computational representations of process models and associated social factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Insider Threat Analysis Using Information-Centric Modeling

Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling systems have yet to be deployed in practice. This paper demonstrates the feasibility of applying CAGs to insider threat analysis. In particular, it describes the design and operation of an information-centric, graphics-o...

متن کامل

Predicting the Impact of Climate Change on U.S. Power Grids and Its Wider Implications on National Security

We discuss our technosocial analytics research and development on predicting and assessing the impact of climate change on U.S. power-grids and the wider implications for national security. The ongoing efforts extend cutting-edge modeling theories derived from climate, energy, social sciences, and national security domains to form a unified system coupled with an interactive visual interface fo...

متن کامل

PROGRESSIVE COLLAPSE ANALYSIS OF RCC STRUCTURES

The  study  aims  to  investigate  the  progressive  collapse  behaviour  of  RCC  building  under extreme  loading  events  such  as  gas  explosion  in  kitchen,  terroristic  attack,  vehicular collisions  and  accidental  overloads.  The  behavioural  changes  have  been  investigated  and node displacements  are computed when the building is subjected to sudden collapse of the  load beari...

متن کامل

DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees

This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical decomposition of complex scenarios into simple, easily understandable and quantifiable actions. Methods based on threat trees and Bayesian networks are two well-known approaches to security modeling. However there exist more t...

متن کامل

The psychological effects of improvised explosive devices (IEDs) on UK military personnel in Afghanistan.

OBJECTIVE To explore the psychological consequences of improvised explosive device (IED) exposure as IEDs have been the greatest threat to UK military personnel in Afghanistan though the mental health consequences of IED exposure are largely unknown. METHOD Deployed UK military personnel completed a survey while deployed in Afghanistan. Combat personnel and those dealing specifically with the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009