首页> 外文会议>International Carnahan Conference on Security Technology >Threats Analysis and Security Analysis for Critical Infrastructures: Risk Analysis Vs. Game Theory
【24h】

Threats Analysis and Security Analysis for Critical Infrastructures: Risk Analysis Vs. Game Theory

机译:关键基础设施的威胁分析和安全分析:风险分析与。博弈论

获取原文

摘要

The last twenty years have brought numerous enhancements in technologies for Critical Infrastructure Protection, but risk assessment still represents a significant challenge to be addressed, as threats strongly depend on human action. This paper presents a novel model for addressing threats and security analysis, based on fundamental concepts of Game theory, basing it only from intelligent and rational decisionmakers, without any other definition. The framework aims to identify preferred strategies of the attacker's action and to measure the propensity to perpetrate an attack. Assessment begins with the analysis of experiences (developed through processing of the cases collected in the Global Terrorism Database and the study of propaganda materials of terrorist organizations) and proceeds through the identification of clusters of attacker strategies. The purpose of the paper is to reach the definition of the utility function of the attacker, including indicators of the expected damage due to the specific threat and of the deterrent strategies adopted by the defender using, as a case study, a free access area of Rome-Fiumicino international airport, Italy.
机译:在过去的20年中,关键基础设施保护技术得到了许多改进,但是由于威胁很大程度上取决于人类的行动,因此风险评估仍然是要解决的重大挑战。本文基于博弈论的基本概念,提出了一种用于应对威胁和安全分析的新颖模型,该模型仅基于聪明而理性的决策者,而没有任何其他定义。该框架旨在确定攻击者行动的首选策略,并衡量实施攻击的倾向。评估始于对经验的分析(通过处理全球恐怖主义数据库中收集到的案件以及研究恐怖组织的宣传材料来发展),然后通过确定攻击者战略集群来进行。本文的目的是为了定义攻击者的效用函数,包括指示由于特定威胁而造成的预期损害的指标以及防御者采用免费访问区域(作为案例研究)所采用的威慑策略的指标。意大利罗马-菲乌米奇诺国际机场。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号