The last twenty years have brought numerous enhancements in technologies for Critical Infrastructure Protection, but risk assessment still represents a significant challenge to be addressed, as threats strongly depend on human action. This paper presents a novel model for addressing threats and security analysis, based on fundamental concepts of Game theory, basing it only from intelligent and rational decisionmakers, without any other definition. The framework aims to identify preferred strategies of the attacker's action and to measure the propensity to perpetrate an attack. Assessment begins with the analysis of experiences (developed through processing of the cases collected in the Global Terrorism Database and the study of propaganda materials of terrorist organizations) and proceeds through the identification of clusters of attacker strategies. The purpose of the paper is to reach the definition of the utility function of the attacker, including indicators of the expected damage due to the specific threat and of the deterrent strategies adopted by the defender using, as a case study, a free access area of Rome-Fiumicino international airport, Italy.

Threats analysis and security analysis for critical infrastructures. Risk analysis vs. game theory / Napolitano, Pierpaolo; Rossi, Giuliano; Lombardi, Mara; Garzia, Fabio; Ilariucci, Massimo; Forino, Giuseppe. - (2018). (Intervento presentato al convegno 52nd Annual IEEE International Carnahan Conference on Security Technology, ICCST 2018 tenutosi a Montreal; Canada) [10.1109/CCST.2018.8585725].

Threats analysis and security analysis for critical infrastructures. Risk analysis vs. game theory

NAPOLITANO, PIERPAOLO
;
Rossi, Giuliano;Lombardi, Mara;Garzia, Fabio;Forino, Giuseppe
2018

Abstract

The last twenty years have brought numerous enhancements in technologies for Critical Infrastructure Protection, but risk assessment still represents a significant challenge to be addressed, as threats strongly depend on human action. This paper presents a novel model for addressing threats and security analysis, based on fundamental concepts of Game theory, basing it only from intelligent and rational decisionmakers, without any other definition. The framework aims to identify preferred strategies of the attacker's action and to measure the propensity to perpetrate an attack. Assessment begins with the analysis of experiences (developed through processing of the cases collected in the Global Terrorism Database and the study of propaganda materials of terrorist organizations) and proceeds through the identification of clusters of attacker strategies. The purpose of the paper is to reach the definition of the utility function of the attacker, including indicators of the expected damage due to the specific threat and of the deterrent strategies adopted by the defender using, as a case study, a free access area of Rome-Fiumicino international airport, Italy.
2018
52nd Annual IEEE International Carnahan Conference on Security Technology, ICCST 2018
critical Infrastructure security; game theory for security risk analysis; security risk analysis; threat analysis; electrical and electronic engineering; law
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Threats analysis and security analysis for critical infrastructures. Risk analysis vs. game theory / Napolitano, Pierpaolo; Rossi, Giuliano; Lombardi, Mara; Garzia, Fabio; Ilariucci, Massimo; Forino, Giuseppe. - (2018). (Intervento presentato al convegno 52nd Annual IEEE International Carnahan Conference on Security Technology, ICCST 2018 tenutosi a Montreal; Canada) [10.1109/CCST.2018.8585725].
File allegati a questo prodotto
File Dimensione Formato  
Napolitano_Threats-analysis-security_2018.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 665.51 kB
Formato Adobe PDF
665.51 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1223118
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? 0
social impact