IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v6y2013i3p217-227.html
   My bibliography  Save this article

Vulnerability modeling and analysis for critical infrastructure protection applications

Author

Listed:
  • Marrone, Stefano
  • Nardone, Roberto
  • Tedesco, Annarita
  • D'Amore, Pasquale
  • Vittorini, Valeria
  • Setola, Roberto
  • De Cillis, Francesca
  • Mazzocca, Nicola

Abstract

Effective critical infrastructure protection requires methodologies and tools for the automated evaluation of the vulnerabilities of assets and the efficacy of protection systems. This paper presents a modeling language for vulnerability analysis in critical infrastructure protection applications. The language extends the popular Unified Modeling Language (UML) to provide vulnerability and protection modeling functionality. The extended language provides an abstract representation of concepts and activities in the infrastructure protection domain that enables model-to-model transformations for analysis purposes. The application of the language is demonstrated through a use case that models vulnerabilities and physical protection systems in a railway station.

Suggested Citation

  • Marrone, Stefano & Nardone, Roberto & Tedesco, Annarita & D'Amore, Pasquale & Vittorini, Valeria & Setola, Roberto & De Cillis, Francesca & Mazzocca, Nicola, 2013. "Vulnerability modeling and analysis for critical infrastructure protection applications," International Journal of Critical Infrastructure Protection, Elsevier, vol. 6(3), pages 217-227.
  • Handle: RePEc:eee:ijocip:v:6:y:2013:i:3:p:217-227
    DOI: 10.1016/j.ijcip.2013.10.001
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548213000462
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2013.10.001?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Ebrahim Bagheri & Ali A. Ghorbani, 2010. "UML-CI: A reference model for profiling critical infrastructure systems," Information Systems Frontiers, Springer, vol. 12(2), pages 115-139, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Lombardi, Pio & Hänsch, Kathleen & Arendarski, Bartlomiej & Komarnicki, Przemyslaw, 2017. "Information and power terminals: A reliable microgrid infrastructure for use in disaster scenarios," International Journal of Critical Infrastructure Protection, Elsevier, vol. 19(C), pages 49-58.
    2. Chao Fang & Piao Dong & Yi-Ping Fang & Enrico Zio, 2020. "Vulnerability analysis of critical infrastructure under disruptions: An application to China Railway High-speed," Journal of Risk and Reliability, , vol. 234(2), pages 235-245, April.
    3. Nan, Cen & Sansavini, Giovanni, 2015. "Multilayer hybrid modeling framework for the performance assessment of interdependent critical infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 10(C), pages 18-33.
    4. Hadi Alizadeh & Ayyoob Sharifi, 2020. "Assessing Resilience of Urban Critical Infrastructure Networks: A Case Study of Ahvaz, Iran," Sustainability, MDPI, vol. 12(9), pages 1-20, May.
    5. Argenti, Francesca & Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio, 2018. "Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 515-530.
    6. Puuska, Samir & Rummukainen, Lauri & Timonen, Jussi & Lääperi, Lauri & Klemetti, Markus & Oksama, Lauri & Vankka, Jouko, 2018. "Nationwide critical infrastructure monitoring using a common operating picture framework," International Journal of Critical Infrastructure Protection, Elsevier, vol. 20(C), pages 28-47.
    7. Seppänen, Hannes & Luokkala, Pekka & Zhang, Zhe & Torkki, Paulus & Virrantaus, Kirsi, 2018. "Critical infrastructure vulnerability—A method for identifying the infrastructure service failure interdependencies," International Journal of Critical Infrastructure Protection, Elsevier, vol. 22(C), pages 25-38.
    8. Palleti, Venkata Reddy & Joseph, Jude Victor & Silva, Arlindo, 2018. "A contribution of axiomatic design principles to the analysis and impact of attacks on critical infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 23(C), pages 21-32.
    9. Xi Hu & Jim W. Hall & Peijun Shi & Wee Lim, 2016. "The spatial exposure of the Chinese infrastructure system to flooding and drought hazards," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 80(2), pages 1083-1118, January.
    10. Xi Hu & Jim W. Hall & Peijun Shi & Wee Ho Lim, 2016. "The spatial exposure of the Chinese infrastructure system to flooding and drought hazards," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 80(2), pages 1083-1118, January.
    11. Abigail Luxton & Marin Marinov, 2020. "Terrorist Threat Mitigation Strategies for the Railways," Sustainability, MDPI, vol. 12(8), pages 1-21, April.
    12. Mrinal Kanti Sen & Subhrajit Dutta & Golam Kabir, 2021. "Flood Resilience of Housing Infrastructure Modeling and Quantification Using a Bayesian Belief Network," Sustainability, MDPI, vol. 13(3), pages 1-24, January.
    13. Abedi, Amin & Romerio, Franco, 2020. "Multi-period vulnerability analysis of power grids under multiple outages: An AC-based bilevel optimization approach," International Journal of Critical Infrastructure Protection, Elsevier, vol. 30(C).
    14. Gentile, U. & Marrone, S. & Nardone, R. & Bellini, E., 2020. "Computer-aided security assessment of water networks monitoring platforms," International Journal of Critical Infrastructure Protection, Elsevier, vol. 31(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Rehak, David & Senovsky, Pavel & Hromada, Martin & Lovecek, Tomas & Novotny, Petr, 2018. "Cascading Impact Assessment in a Critical Infrastructure System," International Journal of Critical Infrastructure Protection, Elsevier, vol. 22(C), pages 125-138.
    2. Puuska, Samir & Rummukainen, Lauri & Timonen, Jussi & Lääperi, Lauri & Klemetti, Markus & Oksama, Lauri & Vankka, Jouko, 2018. "Nationwide critical infrastructure monitoring using a common operating picture framework," International Journal of Critical Infrastructure Protection, Elsevier, vol. 20(C), pages 28-47.
    3. Gentile, U. & Marrone, S. & Nardone, R. & Bellini, E., 2020. "Computer-aided security assessment of water networks monitoring platforms," International Journal of Critical Infrastructure Protection, Elsevier, vol. 31(C).
    4. Kampova, Katarina & Lovecek, Tomas & Rehak, David, 2020. "Quantitative approach to physical protection systems assessment of critical infrastructure elements: Use case in the Slovak Republic," International Journal of Critical Infrastructure Protection, Elsevier, vol. 30(C).
    5. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
    6. Stephan Berger & Björn Häckel & Lukas Häfner, 2021. "Organizing Self-Organizing Systems: A Terminology, Taxonomy, and Reference Model for Entities in Cyber-Physical Production Systems," Information Systems Frontiers, Springer, vol. 23(2), pages 391-414, April.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:6:y:2013:i:3:p:217-227. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.