skip to main content
10.1145/3069593.3069612acmotherconferencesArticle/Chapter ViewAbstractPublication Pageshp3cConference Proceedingsconference-collections
research-article

A Novel Approach for Modeling Security Aspects of Physical Infrastructures

Published: 22 March 2017 Publication History

Abstract

The infrastructures like water, power, school, transportation and communication systems are essentials for daily life activities and their protection is very important especially in the context of rapidly growing international terrorism. Protection of physical infrastructure requires the deep understanding of the infrastructure building blocks, identification of threats, vulnerabilities and risks. Implementations of effective and efficient techniques for the protection of physical infrastructure are subject to the knowledge of multiple domains. Model Driven Engineering (MDE) approach addresses the problem of complexity and effectively represents the application structure and behavior within a particular domain. Existing techniques seems to be lacking in providing a common approach for modeling different types of infrastructure. In this context, we study the characteristics of physical infrastructure's protection and proposed Unified Modeling Language (UML) based meta-models. The proposed meta-models aid in defining the different aspects of infrastructure and understand its organization and behavior. On the basis of given meta-models, UML models can be derived to represent the infrastructure protection systems, threats, vulnerabilities, assets and relationships among them.

References

[1]
Franco Fiumara: The Railway Security: Methodologies and Instruments for Protecting a Critical Infrastructure. Railway Infrastructure Security, Topics in Safety, Risk, Reliability and Quality 2015, pp 25--63.
[2]
E. Bagheri and A. A. Ghorbani. 2010. Uml-ci: A reference model for profiling critical infrastructure systems, Information Systems Frontiers 2010, vol. 12, no. 2, pp. 115--139.
[3]
Object Management Group, ISO/IEC 19501:2005 - Unified Modeling Language Specification, ISO/IEC Std., 2005.
[4]
Drago, A., Marrone, S., Mazzocca, N., Nardone, R., Tedesco, A. and Vittorini, V: A model-driven approach for vulnerability evaluation of modern physical protection systems. Software & Systems Modeling 2016, pp. 1--34.
[5]
National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2016). Global Terrorism Database {Data file}. Retrieved from https://www.start.umd.edu/gtd
[6]
Marrone, S., Nardone, R., Tedesco, A., D'Amore, P., Vittorini, V., Setola, R., De Cillis, F. and Mazzocca, N.: Vulnerability modeling and analysis for critical infrastructure protection applications. International Journal of Critical Infrastructure Protection 2013, 6(3), pp. 217--227.
[7]
Pescador, A., Garmendia, A., Guerra, E., Cuadrado, J.S. and de Lara, J.: September. Pattern-based development of domain-specific modelling languages. ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS), 2015, pp. 166--175
[8]
Grangel, R., Bigand, M. and Bourey, J.P: UML Profiles for Transforming GRAI Decisional Models into UML Use Cases. IFAC Proceedings 2009 Volume 42(4), pp. 900--905.
[9]
Gran, B.A., Fredriksen, R. and Thunem, A.P.J.: September. An approach for model-based risk assessment. In International Conference on Computer Safety, Reliability, and Security 2004, pp. 311--324.
[10]
Solhaug, B. and Seehusen, F.: Model-driven risk analysis of evolving critical infrastructures. Journal of Ambient Intelligence and Humanized Computing 2014, 5(2), pp. 187--204
[11]
Del Aguila, I.M. and del Sagrado, J.: Metamodeling of Bayesian networks for decision-support systems development. Knowledge Engineering and Software Engineering (KESE8) 2012.
[12]
Major, J.A.: Advanced techniques for modeling terrorism risk. The Journal of Risk Finance 2002, Vol. 4(1), pp. 15--24.
[13]
MacDonald, D., Clements, S.L., Patrick, S.W., Perkins, C., Muller, G., Lancaster, M.J. and Hutton, W.: Cyber/physical security vulnerability assessment integration. In Innovative Smart Grid Technologies (ISGT), 2013 pp. 1--6.
[14]
Rybnicek, M., Poisel, R., Ruzicka, M. and Tjoa, S.: A Generic Approach to Critical Infrastructure Modeling and Simulation. In International Conference on Cyber Security 2012, pp. 144--151.
[15]
Rinaldi, S.M., January. Modeling and simulating critical infrastructures and their interdependencies. In Proceedings of the 37th annual Hawaii international conference on System sciences, 2004.
[16]
Rodríguez, R.J., Merseguer, J. and Bernardi, S.: Modelling security of critical infrastructures: a survivability assessment. The Computer Journal 2015, 58(10), pp. 2313--2327.
[17]
Le Sage, T., Borrion, H. and Toubaline, S.: A tool-target based approach for simulating a terrorist attack. In IEEE Conference on Technologies for Homeland Security (HST), 2012 pp. 105--110
[18]
D.C. Schmidt: Model-driven engineering. In IEEE Computer 2006, Vol. 39 (2), pp 25--31
[19]
Nunes-Vaz, R. and Lord, S.: Designing physical security for complex infrastructures. International Journal of Critical Infrastructure Protection 2014, Vol. 7(3), pp. 178--192.

Cited By

View all
  • (2019)Development of an Interaction Simulator for the Scenario Analysis of Physical Protection SystemsIEEE Access10.1109/ACCESS.2019.29242397(91509-91517)Online publication date: 2019
  1. A Novel Approach for Modeling Security Aspects of Physical Infrastructures

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    HP3C-2017: Proceedings of the International Conference on High Performance Compilation, Computing and Communications
    March 2017
    149 pages
    ISBN:9781450348683
    DOI:10.1145/3069593
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • UTM: Universiti Teknologi Malaysia

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 March 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Domain Modeling
    2. Meta-Modeling
    3. Model Driven Engineering
    4. Physical Infrastructure Security

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    HP3C-2017

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Development of an Interaction Simulator for the Scenario Analysis of Physical Protection SystemsIEEE Access10.1109/ACCESS.2019.29242397(91509-91517)Online publication date: 2019

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media