Skip to main content

A Petri Net Pattern-Oriented Approach for the Design of Physical Protection Systems

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2014)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 8666))

Included in the following conference series:

Abstract

The design of complex Physical Protection Systems (PPSs) still raises some challenges despite the high number of technologies for smart surveillance. One reason is the lack of effective methodologies able to support the PPS designer in evaluating the effectiveness of the system on varying design choices. Indeed, an estimation of the system vulnerability should be performed in the early phases of the PPS design. This paper introduces a model-based methodology for the quantitative estimation of the vulnerability of a PPS. The proposed methodology clearly defines a compositional approach which takes advantage from the usage of predefined patterns for the creation of vulnerability models. In particular, the paper proposes some Petri Net patterns able to capture the behavioural aspects of several assets and actors involved in attacking/defending scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A risk assessment methodology for physical security. white paper. Technical report, SANDIA National Laboratories (2008)

    Google Scholar 

  2. Global terrorism database [199503200014]. Technical report, National Consortium for the Study of Terrorism and Responses to Terrorism, START (2012)

    Google Scholar 

  3. Information technology security techniques information security management systems overview and vocabulary. Technical report, ISO/IEC (2014)

    Google Scholar 

  4. Bernardi, S., Donatelli, S., Horvath, A.: Compositionality in the GreatSPN tool and its application to the modelling of industrial applications. In: DAIMI PB: Workshop Proceedings Practical Use of High-level Petri Nets, University of Aarhus, Department of Computer Science, pp. 127–146 (2000)

    Google Scholar 

  5. Bernardi, S., Flammini, F., Marrone, S., Merseguer, J., Papa, C., Vittorini, V.: Model-driven availability evaluation of railway control systems. In: Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. LNCS, vol. 6894, pp. 15–28. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  6. Bucci, G., Carnevali, L., Ridi, L., Vicario, E.: Oris: a tool for modeling, verification and evaluation of real-time systems. International Journal on Software Tools for Technology Transfer 12(5), 391–403 (2010)

    Article  Google Scholar 

  7. Busi, N.: Analysis issues in petri nets with inhibitor arcs. Theor. Comput. Sci. 275(1-2), 127–177 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  8. Carney, J.: Why integrate physical and logical security? Technical report, Cisco (2011)

    Google Scholar 

  9. Chiola, G., Ajmone-Marsan, M., Balbo, G., Conte, G.: Generalized stochastic petri nets. a definition at the net level and its implications. IEEE Transactions on Software Engineering 19(2), 89–107 (1993)

    Article  Google Scholar 

  10. Cox Jr, L.A.: Some limitations of risk = threat × vulnerability × consequence for risk analysis of terrorist attacks. Risk Analysis 28(6) (2008)

    Google Scholar 

  11. Flammini, F., Gaglione, A., Mazzocca, N., Pragliola, C.: Optimisation of security system design by quantitative risk assessment and genetic algorithms. Int. J. of Risk Assessment and Management 15, 205–221 (2011)

    Article  Google Scholar 

  12. Flammini, F., Marrone, S., Mazzocca, N., Pappalardo, A., Pragliola, C., Vittorini, V.: Trustworthiness evaluation of multi-sensor situation recognition in transit surveillance scenarios. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES Workshops 2013. LNCS, vol. 8128, pp. 442–456. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  13. Flammini, F., Marrone, S., Mazzocca, N., Vittorini, V.: Petri net modelling of physical vulnerability. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 128–139. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  14. Garcia, M.L.: Vulnerability Assessment of Physical Protection Systems. Butterworth-Heinemann (December 2005)

    Google Scholar 

  15. Garcia, M.L.: Design and Evaluation of Physical Protection Systems. Butterworth-Heinemann (October 2007)

    Google Scholar 

  16. The Open Group. Risk taxonomy. Technical report, The Open Group (2009)

    Google Scholar 

  17. Güdemann, M., Ortmeier, F.: Model-based multi-objective safety optimization. In: Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. LNCS, vol. 6894, pp. 423–436. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  18. Hunt, S.: Physical security information management (PSIM): The basics. Technical report, Cisco (2011)

    Google Scholar 

  19. Johnson, R.G.: Physical Security Assessment. Critical Infrastructure Security - WIT Press (2011)

    Google Scholar 

  20. Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Foundations of attack–defense trees. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 80–95. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  21. Lewis, T.G., Darken, R.P., Mackin, T., Dudenhoeffer, D.: Model-Based Risk Analysis for Critical Infrastructures. Critical Infrastructure Security - WIT Press (2011)

    Google Scholar 

  22. Marrone, S., Nardone, R., Tedesco, A., D’Amore, P., Vittorini, V., Setola, R., Cillis, F.D., Mazzocca, N.: Vulnerability modeling and analysis for critical infrastructure protection applications. International Journal of Critical Infrastructure Protection 6(34), 217–227 (2013)

    Article  Google Scholar 

  23. Naedele, M., Janneck, J.W.: Design patterns in petri net system modeling. In: Proceedings of the Fourth IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 1998, pp. 47–54 (1998)

    Google Scholar 

  24. Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-based evaluation: from dependability to security. IEEE Transactions on Dependable and Secure Computing 1(1), 48–65 (2004)

    Article  Google Scholar 

  25. Pederson, P., Dudenhoeffer, D., Hartley, S., Permann, M.: Critical infrastructure and interdependency modeling: A survey of US and international research. Technical report, Idaho National Laboratory (2006)

    Google Scholar 

  26. Sendall, S., Kozaczynski, W.: Model transformation: the heart and soul of model-driven software development. IEEE Software 20(5), 42–45 (2003)

    Article  Google Scholar 

  27. Sibertin-Blanc, C.: Cooperative nets. In: Valette, R. (ed.) ICATPN 1994. LNCS, vol. 815, pp. 471–490. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  28. Stoneburner, G., Goguen, A.Y., Feringa, A.: Sp 800-30. risk management guide for information technology systems. Technical report, Gaithersburg, MD, United States (2002)

    Google Scholar 

  29. Van der Aalst, W.M.P., Ter Hofstede, A.H.M., Kiepuszewski, B., Barros, A.P.: Workflow patterns. Distributed and Parallel Databases 14(1), 5–51 (2003)

    Article  Google Scholar 

  30. Zhou, A., Qu, B.-Y., Li, H., Zhao, S.-Z., Suganthan, P.N., Zhangd, Q.: Multiobjective evolutionary algorithms: A survey of the state of the art. Swarm and Evolutionary Computation 1(1), 32–49 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Flammini, F., Gentile, U., Marrone, S., Nardone, R., Vittorini, V. (2014). A Petri Net Pattern-Oriented Approach for the Design of Physical Protection Systems. In: Bondavalli, A., Di Giandomenico, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science, vol 8666. Springer, Cham. https://doi.org/10.1007/978-3-319-10506-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10506-2_16

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10505-5

  • Online ISBN: 978-3-319-10506-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics