Advertisement

Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis

  • Michał Choraś
  • Adam Flizikowski
  • Rafał Kozik
  • Witold Hołubowicz
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6027)

Abstract

In this paper, a decision aid tool (DAT) for Critical Infrastructure threats analysis and ranking is presented. We propose the ontology-based approach that provides classification, relationships and reasoning about vulnerabilities and threats of the critical infrastructures. Our approach is a part of research within INSPIRE project for increasing security and protection through infrastructure resilience.

Keywords

Decision Support System Critical Infrastructure Wide Area Network SCADA System Threat Analysis 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    INSPIRE Project, Description of Work (2008)Google Scholar
  2. 2.
    D’Antonio, S., Khelil, A., Romano, L., Suri, N.: Increasing Security and Protection through Infrastructure REsilience: the INSPIRE Project. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 109–118. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  3. 3.
    Critical infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies, Tyson Macaulay (August 2008)Google Scholar
  4. 4.
    Lewis, T.G.: Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. Wiley Interscience, Hoboken (2006)CrossRefGoogle Scholar
  5. 5.
    McClanahan, R.H.: The benefits of networked SCADA systems utilizing IP-enabled networks. In: Arkansas Electric Cooperative Corporation, IEEE, Los Alamitos (2002)Google Scholar
  6. 6.
    ISO/IEC 13335-1:2004, Information Technology - Security Techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security managementGoogle Scholar
  7. 7.
    Michał, C., Rafał, R., Adam, F., Witold, H.: Ontology-based description of networks vulnerabilities. Polish Journal of Environmental Studies, 5c (2008)Google Scholar
  8. 8.
    Stamp, J., Dillinger, J., Young, W.: Common Vulnerabilities in Critical Infrastructure Control Systems. In: Networked Systems Survivability and Assurance Department, Jennifer DePoy, Information Operations Red Team Assessments Department, Sandia National Laboratories (May 22, 2003)Google Scholar
  9. 9.
    Identification of Vulnerabilities - INSPIRE Deliverable D.2.2 (April 2009)Google Scholar
  10. 10.
    SWRL: A Semantic Web Rule Language Combining OWL and RuleML, W3C Member Submission, http://www.w3.org/Submission/SWRL/
  11. 11.
    Qiong, W., Wenyin, L., Yihan, Y., Chuan, Z., Li, Y.: Intelligent Decision Support System for Power Grid Dispatching Based on Multi-Agent System. In: Proc. of International Conference on Power System Technology, pp. 1–5 (2006)Google Scholar
  12. 12.
    Xiao-Feng, D., Yu-Jiong, G., Kun, Y.: Study on Intelligent Maintenance Decision Support System Using for Power Plant Equipment. In: Proc. of the IEEE International Conference on Automation and Logistics Qingdao, China, September 2008, pp. 96–100 (2008)Google Scholar
  13. 13.
    Zhang, Z., Yang, Z., Zhang, P., Mao, Z., Hao, J.: Hierarchical Network-based Safety Assessment Decision Support System for Thermal Power Plants. In: Proc. of the 2009 IEEE International Conference on Networking, Sensing and Control, Okayama, Japan, March, 2009, pp. 592–596 (2009)Google Scholar
  14. 14.
    Lee, S.J., Mo, K., Seong, P.H.: Development of an Integrated Decision Support System to Aid the Cognitive Activities of Operators in Main Control Rooms of Nuclear Power Plants. In: Proc. of IEEE Symposium on Computational Intelligence in Multicriteria Decision Making (MCDM), pp. 146–152 (2007)Google Scholar
  15. 15.
    Zhang, B.-P., Wu, G.-X., Shang, S.-Y.: Research on Decision Support System of Water Pollution Control Based On Immune Agent. In: Proc. of International Symposium on Computer Science and Computational Technology, ISCSCT, vol. 1, pp. 114–117 (2008)Google Scholar
  16. 16.
    Xie, L., Wang, Z., Bian, L.: The Research of Oilfield Flood Precaution Decision Support System. In: Proc. of International Seminar on Business and Information Management, ISBIM 2008, December 2008, vol. 2, pp. 236–239 (2008)Google Scholar
  17. 17.
    Michał, C., Flizikowski, A., Kozik, R., Renk, R., Hołubowicz, W.: Ontology-Based Reasoning Combined with Inference Engine for SCADA-ICT Interdependencies, Vulnerabilities and Threats Analysis. In: Pre-Proc of 4th International Workshop on Critical Information Infrastructures Security, CRITIS 2009, Bonn, Germany, Fraunhofer IAIS, pp. 203–214 (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Michał Choraś
    • 1
    • 2
  • Adam Flizikowski
    • 1
    • 2
  • Rafał Kozik
    • 2
  • Witold Hołubowicz
    • 1
    • 3
  1. 1.ITTI Ltd.Poznań
  2. 2.Institute of Telecommunications, UT&LS Bydgoszcz 
  3. 3.Adam Mickiewicz UniversityPoznań

Personalised recommendations