IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v169y2018icp515-530.html
   My bibliography  Save this article

Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network

Author

Listed:
  • Argenti, Francesca
  • Landucci, Gabriele
  • Reniers, Genserik
  • Cozzani, Valerio

Abstract

Chemical facilities may be targets of deliberate acts of interference triggering major accidents (fires, explosion, toxic dispersions) in process and storage units. Standard methodologies for vulnerability assessment are based on qualitative or semi-quantitative tools, currently not tailored for this type of facilities and not accounting for the role of physical protection systems. In the present study, a quantitative approach to the probabilistic assessment of vulnerability to external attacks is presented, based on the application of a dedicated Bayesian Network (BN). BN allowed the representation of interactions among attack impact vectors and resistance of process units, which determine the final outcomes of an attack. A specific assessment of protection systems, based on experts’ elicitation of performance data, allowed providing a knowledge support to the evaluation of probabilities. The application to an industrial case study allowed the assessment of the potentialities of the approach, which may support both the evaluation of the vulnerability of a given facility, and the performance assessment of the security physical protection system in place.

Suggested Citation

  • Argenti, Francesca & Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio, 2018. "Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 515-530.
  • Handle: RePEc:eee:reensy:v:169:y:2018:i:c:p:515-530
    DOI: 10.1016/j.ress.2017.09.023
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832016305208
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2017.09.023?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Setola, Roberto & De Porcellinis, Stefano & Sforna, Marino, 2009. "Critical infrastructure dependency assessment using the input–output inoperability model," International Journal of Critical Infrastructure Protection, Elsevier, vol. 2(4), pages 170-178.
    2. Johansson, Jonas & Hassel, Henrik & Zio, Enrico, 2013. "Reliability and vulnerability analyses of critical infrastructures: Comparing two approaches in the context of power systems," Reliability Engineering and System Safety, Elsevier, vol. 120(C), pages 27-38.
    3. Kjell Hausken, 2011. "Protecting complex infrastructures against multiple strategic attackers," International Journal of Systems Science, Taylor & Francis Journals, vol. 42(1), pages 11-29.
    4. Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2011. "Evaluating the damage associated with intentional network disintegration," Reliability Engineering and System Safety, Elsevier, vol. 96(4), pages 433-439.
    5. Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio & Salzano, Ernesto, 2015. "Vulnerability of industrial facilities to attacks with improvised explosive devices aimed at triggering domino scenarios," Reliability Engineering and System Safety, Elsevier, vol. 143(C), pages 53-62.
    6. Chopra, Shauhrat S. & Khanna, Vikas, 2015. "Interconnectedness and interdependencies of critical infrastructures in the US economy: Implications for resilience," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 436(C), pages 865-877.
    7. Aven, Terje, 2013. "Probabilities and background knowledge as a tool to reflect uncertainties in relation to intentional acts," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 229-234.
    8. Reniers, G.L.L. & Sörensen, K. & Khan, F. & Amyotte, P., 2014. "Resilience of chemical industrial areas through attenuation-based security," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 94-101.
    9. Marrone, Stefano & Nardone, Roberto & Tedesco, Annarita & D'Amore, Pasquale & Vittorini, Valeria & Setola, Roberto & De Cillis, Francesca & Mazzocca, Nicola, 2013. "Vulnerability modeling and analysis for critical infrastructure protection applications," International Journal of Critical Infrastructure Protection, Elsevier, vol. 6(3), pages 217-227.
    10. Kjell Hausken, 2018. "A cost–benefit analysis of terrorist attacks," Defence and Peace Economics, Taylor & Francis Journals, vol. 29(2), pages 111-129, February.
    11. Wu, Baichao & Tang, Aiping & Wu, Jie, 2016. "Modeling cascading failures in interdependent infrastructures under terrorist attacks," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 1-8.
    12. Øystein Amundrud & Terje Aven & Roger Flage, 2017. "How the definition of security risk can be made compatible with safety definitions," Journal of Risk and Reliability, , vol. 231(3), pages 286-294, June.
    13. Kjell Hausken, 2002. "Probabilistic Risk Analysis and Game Theory," Risk Analysis, John Wiley & Sons, vol. 22(1), pages 17-27, February.
    14. Aven, Terje, 2007. "A unified framework for risk and vulnerability analysis covering both safety and security," Reliability Engineering and System Safety, Elsevier, vol. 92(6), pages 745-754.
    15. Kriaa, Siwar & Pietre-Cambacedes, Ludovic & Bouissou, Marc & Halgand, Yoran, 2015. "A survey of approaches combining safety and security for industrial control systems," Reliability Engineering and System Safety, Elsevier, vol. 139(C), pages 156-178.
    16. Salzano, Ernesto & Cozzani, Valerio, 2005. "The analysis of domino accidents triggered by vapor cloud explosions," Reliability Engineering and System Safety, Elsevier, vol. 90(2), pages 271-284.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Wu, Jiansong & Zhang, Linlin & Bai, Yiping & Reniers, Genserik, 2022. "A safety investment optimization model for power grid enterprises based on System Dynamics and Bayesian network theory," Reliability Engineering and System Safety, Elsevier, vol. 221(C).
    2. Huang, Wencheng & Li, Linqing & Liu, Hongyi & Zhang, Rui & Xu, Minhao, 2021. "Defense resource allocation in road dangerous goods transportation network: A Self-Contained Girvan-Newman Algorithm and Mean Variance Model combined approach," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
    3. Dong, Mingxin & Zhang, Zhen & Liu, Yi & Zhao, Dong Feng & Meng, Yifei & Shi, Jihao, 2023. "Playing Bayesian Stackelberg game model for optimizing the vulnerability level of security incident system in petrochemical plants," Reliability Engineering and System Safety, Elsevier, vol. 235(C).
    4. Zhang, Laobing & Reniers, Genserik & Chen, Bin & Qiu, Xiaogang, 2019. "CCP game: A game theoretical model for improving the scheduling of chemical cluster patrolling," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    5. Iaiani, Matteo & Casson Moreno, Valeria & Reniers, Genserik & Tugnoli, Alessandro & Cozzani, Valerio, 2021. "Analysis of events involving the intentional release of hazardous substances from industrial facilities," Reliability Engineering and System Safety, Elsevier, vol. 212(C).
    6. Zhou, Xingyuan & van Gelder, P.H.A.J.M. & Liang, Yongtu & Zhang, Haoran, 2020. "An integrated methodology for the supply reliability analysis of multi-product pipeline systems under pumps failure," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    7. Deng, Yu-Jing & Li, Ya-Qian & Qin, Yu-Hua & Dong, Ming-Ru & Liu, Bin, 2020. "Optimal defense resource allocation for attacks in wireless sensor networks based on risk assessment model," Chaos, Solitons & Fractals, Elsevier, vol. 137(C).
    8. Rongchen Zhu & Xiaofeng Hu & Xin Li & Han Ye & Nan Jia, 2020. "Modeling and Risk Analysis of Chemical Terrorist Attacks: A Bayesian Network Method," IJERPH, MDPI, vol. 17(6), pages 1-23, March.
    9. Iaiani, Matteo & Sorichetti, Riccardo & Tugnoli, Alessandro & Cozzani, Valerio, 2024. "Modelling standoff distances to prevent escalation in shooting attacks to tanks storing hazardous materials," Reliability Engineering and System Safety, Elsevier, vol. 241(C).
    10. Li, Xiaofeng & Chen, Guohua & Amyotte, Paul & Khan, Faisal & Alauddin, Mohammad, 2023. "Vulnerability assessment of storage tanks exposed to simultaneous fire and explosion hazards," Reliability Engineering and System Safety, Elsevier, vol. 230(C).
    11. Cats, Oded & Hijner, Anne Mijntje, 2021. "Quantifying the cascading effects of passenger delays," Reliability Engineering and System Safety, Elsevier, vol. 212(C).
    12. Ding, Long & Khan, Faisal & Ji, Jie, 2022. "A novel vulnerability model considering synergistic effect of fire and overpressure in chemical processing facilities," Reliability Engineering and System Safety, Elsevier, vol. 217(C).
    13. Wang, Fan & Li, Heng & Dong, Chao & Ding, Lieyun, 2019. "Knowledge representation using non-parametric Bayesian networks for tunneling risk analysis," Reliability Engineering and System Safety, Elsevier, vol. 191(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    2. Chen, Chao & Yang, Ming & Reniers, Genserik, 2021. "A dynamic stochastic methodology for quantifying HAZMAT storage resilience," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
    3. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    4. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    5. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    6. Ahmed Shokry & Piero Baraldi & Andrea Castellano & Luigi Serio & Enrico Zio, 2021. "Identification of Critical Components in the Complex Technical Infrastructure of the Large Hadron Collider Using Relief Feature Ranking and Support Vector Machines," Energies, MDPI, vol. 14(18), pages 1-19, September.
    7. Baraldi, Piero & Castellano, Andrea & Shokry, Ahmed & Gentile, Ugo & Serio, Luigi & Zio, Enrico, 2020. "A Feature Selection-based Approach for the Identification of Critical Components in Complex Technical Infrastructures: Application to the CERN Large Hadron Collider," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    8. Øystein Amundrud & Terje Aven & Roger Flage, 2017. "How the definition of security risk can be made compatible with safety definitions," Journal of Risk and Reliability, , vol. 231(3), pages 286-294, June.
    9. Ouyang, Min, 2017. "A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks," European Journal of Operational Research, Elsevier, vol. 262(3), pages 1072-1084.
    10. Almoghathawi, Yasser & Selim, Shokri & Barker, Kash, 2023. "Community structure recovery optimization for partial disruption, functionality, and restoration in interdependent networks," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    11. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    12. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    13. Wu, Baichao & Tang, Aiping & Wu, Jie, 2016. "Modeling cascading failures in interdependent infrastructures under terrorist attacks," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 1-8.
    14. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    15. Zhang, Laobing & Reniers, Genserik & Chen, Bin & Qiu, Xiaogang, 2019. "CCP game: A game theoretical model for improving the scheduling of chemical cluster patrolling," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    16. Askeland, Tore & Flage, Roger & Aven, Terje, 2017. "Moving beyond probabilities – Strength of knowledge characterisations applied to security," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 196-205.
    17. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    18. Chao Fang & Piao Dong & Yi-Ping Fang & Enrico Zio, 2020. "Vulnerability analysis of critical infrastructure under disruptions: An application to China Railway High-speed," Journal of Risk and Reliability, , vol. 234(2), pages 235-245, April.
    19. Linn Svegrup & Jonas Johansson & Henrik Hassel, 2019. "Integration of Critical Infrastructure and Societal Consequence Models: Impact on Swedish Power System Mitigation Decisions," Risk Analysis, John Wiley & Sons, vol. 39(9), pages 1970-1996, September.
    20. Longxia Qian & Ren Zhang & Mei Hong & Hongrui Wang & Lizhi Yang, 2016. "A new multiple integral model for water shortage risk assessment and its application in Beijing, China," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 80(1), pages 43-67, January.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:169:y:2018:i:c:p:515-530. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.