Ontology-based Disruption Scenario Generation for Critical Infrastructure

نویسندگان

  • Paolo Trucco
  • Boris Petrenj
  • Massimiliano De Ambroggi
چکیده

Critical Infrastructures (CIs) are exposed to a wide spectrum of threats which vary in nature and can be either internal or external. THREVI2 project aims at assisting Authorities and Operators to get comprehensive information of all potential disruption scenarios relevant for CIP through creating a comprehensive and multi-dimensional all-hazards catalogue for CI. It consists of two ontologies (CI systems and Hazards & Threats affecting CI) connected through vulnerability and (inter)dependency models. Its final implementation in a software tool (PATHFINDER) is aimed to support analysts in specifying the overall system of systems and generating a set of relevant disruption scenarios. The paper presents the adopted ontology development process and describes the main features of the final integrated set of ontologies. CI ontology covers Energy, Transport, Water and Telecommunications sectors, comprising 11 subsectors in total – each being described through two sub-ontologies (physical and functional) interconnected within the service delivery topology. Hazard & Threat ontology systematically characterises different typologies of events, their attributes, types and possible effects to CI systems. The validation process of the final ontologies is also described. Finally, the progress and challenges in modeling interdependencies is discussed, as well as further developments that will take place.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generalised Topological and Functional Ontologies for Disruption Scenario Description in Critical Infrastructure Systems

The systematic and complete identification of relevant accident scenarios for Critical Infrastructure is still one of the major challenges to achieve higher resilience performance. THREVI2 project aims to answer to this Authorities’ and Operators’ important need. It is implemented by elaborating three coordinated ontologies (CI systems, Hazards & Threats affecting CI, CI interdependencies) and ...

متن کامل

Agent-based modelling to identify possible measures in case of Critical Infrastructure disruption

Understanding critical infrastructures and in particular protecting them in case of natural or man-made threats or disasters is the objective of our research. As use case, the security of the power supply in the year 2030 for the city of Karlsruhe was selected. This scenario contains interdependencies between the electrical power grid and IT components as well as critical infrastructures such a...

متن کامل

Scenario-based modeling for multiple allocation hub location problem under disruption risk: multiple cuts Benders decomposition approach

The hub location problem arises in a variety of domains such as transportation and telecommunication systems. In many real-world situations, hub facilities are subject to disruption. This paper deals with the multiple allocation hub location problem in the presence of facilities failure. To model the problem, a two-stage stochastic formulation is developed. In the proposed model, the number of ...

متن کامل

Strategies for the Future of Medicine in Iran Based on a Scenario Planning

Background: The rapid and increasing growth of technology in the artificial intelligence era and its impact on fundamentals changes in the development of science including biomedicine and health presents a need for the future studies in medical sciences. This project is striving to provide a desirable model based on authentic forecasting models in order to clarify the probable and uncertain fut...

متن کامل

Security Stress: Evaluating ICT Robustness Through a Monte Carlo Method

Haruspex is a suite of tools that apply a Monte Carlo method to the risk assessment of an ICT infrastructure. These tools support a scenario-based assessment where in each scenario some intelligent agents compose elementary attacks against the infrastructure to reach some prede ned goals. To support through this suite, the comparison of alternative designs of an infrastructure, we introduce the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014