Abstract
The design of complex Physical Protection Systems (PPSs) still raises some challenges despite the high number of technologies for smart surveillance. One reason is the lack of effective methodologies able to support the PPS designer in evaluating the effectiveness of the system on varying design choices. Indeed, an estimation of the system vulnerability should be performed in the early phases of the PPS design. This paper introduces a model-based methodology for the quantitative estimation of the vulnerability of a PPS. The proposed methodology clearly defines a compositional approach which takes advantage from the usage of predefined patterns for the creation of vulnerability models. In particular, the paper proposes some Petri Net patterns able to capture the behavioural aspects of several assets and actors involved in attacking/defending scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
A risk assessment methodology for physical security. white paper. Technical report, SANDIA National Laboratories (2008)
Global terrorism database [199503200014]. Technical report, National Consortium for the Study of Terrorism and Responses to Terrorism, START (2012)
Information technology security techniques information security management systems overview and vocabulary. Technical report, ISO/IEC (2014)
Bernardi, S., Donatelli, S., Horvath, A.: Compositionality in the GreatSPN tool and its application to the modelling of industrial applications. In: DAIMI PB: Workshop Proceedings Practical Use of High-level Petri Nets, University of Aarhus, Department of Computer Science, pp. 127–146 (2000)
Bernardi, S., Flammini, F., Marrone, S., Merseguer, J., Papa, C., Vittorini, V.: Model-driven availability evaluation of railway control systems. In: Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. LNCS, vol. 6894, pp. 15–28. Springer, Heidelberg (2011)
Bucci, G., Carnevali, L., Ridi, L., Vicario, E.: Oris: a tool for modeling, verification and evaluation of real-time systems. International Journal on Software Tools for Technology Transfer 12(5), 391–403 (2010)
Busi, N.: Analysis issues in petri nets with inhibitor arcs. Theor. Comput. Sci. 275(1-2), 127–177 (2002)
Carney, J.: Why integrate physical and logical security? Technical report, Cisco (2011)
Chiola, G., Ajmone-Marsan, M., Balbo, G., Conte, G.: Generalized stochastic petri nets. a definition at the net level and its implications. IEEE Transactions on Software Engineering 19(2), 89–107 (1993)
Cox Jr, L.A.: Some limitations of risk = threat × vulnerability × consequence for risk analysis of terrorist attacks. Risk Analysis 28(6) (2008)
Flammini, F., Gaglione, A., Mazzocca, N., Pragliola, C.: Optimisation of security system design by quantitative risk assessment and genetic algorithms. Int. J. of Risk Assessment and Management 15, 205–221 (2011)
Flammini, F., Marrone, S., Mazzocca, N., Pappalardo, A., Pragliola, C., Vittorini, V.: Trustworthiness evaluation of multi-sensor situation recognition in transit surveillance scenarios. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES Workshops 2013. LNCS, vol. 8128, pp. 442–456. Springer, Heidelberg (2013)
Flammini, F., Marrone, S., Mazzocca, N., Vittorini, V.: Petri net modelling of physical vulnerability. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 128–139. Springer, Heidelberg (2013)
Garcia, M.L.: Vulnerability Assessment of Physical Protection Systems. Butterworth-Heinemann (December 2005)
Garcia, M.L.: Design and Evaluation of Physical Protection Systems. Butterworth-Heinemann (October 2007)
The Open Group. Risk taxonomy. Technical report, The Open Group (2009)
Güdemann, M., Ortmeier, F.: Model-based multi-objective safety optimization. In: Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. LNCS, vol. 6894, pp. 423–436. Springer, Heidelberg (2011)
Hunt, S.: Physical security information management (PSIM): The basics. Technical report, Cisco (2011)
Johnson, R.G.: Physical Security Assessment. Critical Infrastructure Security - WIT Press (2011)
Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Foundations of attack–defense trees. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 80–95. Springer, Heidelberg (2011)
Lewis, T.G., Darken, R.P., Mackin, T., Dudenhoeffer, D.: Model-Based Risk Analysis for Critical Infrastructures. Critical Infrastructure Security - WIT Press (2011)
Marrone, S., Nardone, R., Tedesco, A., D’Amore, P., Vittorini, V., Setola, R., Cillis, F.D., Mazzocca, N.: Vulnerability modeling and analysis for critical infrastructure protection applications. International Journal of Critical Infrastructure Protection 6(34), 217–227 (2013)
Naedele, M., Janneck, J.W.: Design patterns in petri net system modeling. In: Proceedings of the Fourth IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 1998, pp. 47–54 (1998)
Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-based evaluation: from dependability to security. IEEE Transactions on Dependable and Secure Computing 1(1), 48–65 (2004)
Pederson, P., Dudenhoeffer, D., Hartley, S., Permann, M.: Critical infrastructure and interdependency modeling: A survey of US and international research. Technical report, Idaho National Laboratory (2006)
Sendall, S., Kozaczynski, W.: Model transformation: the heart and soul of model-driven software development. IEEE Software 20(5), 42–45 (2003)
Sibertin-Blanc, C.: Cooperative nets. In: Valette, R. (ed.) ICATPN 1994. LNCS, vol. 815, pp. 471–490. Springer, Heidelberg (1994)
Stoneburner, G., Goguen, A.Y., Feringa, A.: Sp 800-30. risk management guide for information technology systems. Technical report, Gaithersburg, MD, United States (2002)
Van der Aalst, W.M.P., Ter Hofstede, A.H.M., Kiepuszewski, B., Barros, A.P.: Workflow patterns. Distributed and Parallel Databases 14(1), 5–51 (2003)
Zhou, A., Qu, B.-Y., Li, H., Zhao, S.-Z., Suganthan, P.N., Zhangd, Q.: Multiobjective evolutionary algorithms: A survey of the state of the art. Swarm and Evolutionary Computation 1(1), 32–49 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Flammini, F., Gentile, U., Marrone, S., Nardone, R., Vittorini, V. (2014). A Petri Net Pattern-Oriented Approach for the Design of Physical Protection Systems. In: Bondavalli, A., Di Giandomenico, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science, vol 8666. Springer, Cham. https://doi.org/10.1007/978-3-319-10506-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-10506-2_16
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10505-5
Online ISBN: 978-3-319-10506-2
eBook Packages: Computer ScienceComputer Science (R0)