Skip to main content

Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis

  • Conference paper
Book cover Critical Information Infrastructures Security (CRITIS 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6027))

Abstract

In this paper, a decision aid tool (DAT) for Critical Infrastructure threats analysis and ranking is presented. We propose the ontology-based approach that provides classification, relationships and reasoning about vulnerabilities and threats of the critical infrastructures. Our approach is a part of research within INSPIRE project for increasing security and protection through infrastructure resilience.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. INSPIRE Project, Description of Work (2008)

    Google Scholar 

  2. D’Antonio, S., Khelil, A., Romano, L., Suri, N.: Increasing Security and Protection through Infrastructure REsilience: the INSPIRE Project. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 109–118. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  3. Critical infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies, Tyson Macaulay (August 2008)

    Google Scholar 

  4. Lewis, T.G.: Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. Wiley Interscience, Hoboken (2006)

    Book  Google Scholar 

  5. McClanahan, R.H.: The benefits of networked SCADA systems utilizing IP-enabled networks. In: Arkansas Electric Cooperative Corporation, IEEE, Los Alamitos (2002)

    Google Scholar 

  6. ISO/IEC 13335-1:2004, Information Technology - Security Techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security management

    Google Scholar 

  7. Michał, C., Rafał, R., Adam, F., Witold, H.: Ontology-based description of networks vulnerabilities. Polish Journal of Environmental Studies, 5c (2008)

    Google Scholar 

  8. Stamp, J., Dillinger, J., Young, W.: Common Vulnerabilities in Critical Infrastructure Control Systems. In: Networked Systems Survivability and Assurance Department, Jennifer DePoy, Information Operations Red Team Assessments Department, Sandia National Laboratories (May 22, 2003)

    Google Scholar 

  9. Identification of Vulnerabilities - INSPIRE Deliverable D.2.2 (April 2009)

    Google Scholar 

  10. SWRL: A Semantic Web Rule Language Combining OWL and RuleML, W3C Member Submission, http://www.w3.org/Submission/SWRL/

  11. Qiong, W., Wenyin, L., Yihan, Y., Chuan, Z., Li, Y.: Intelligent Decision Support System for Power Grid Dispatching Based on Multi-Agent System. In: Proc. of International Conference on Power System Technology, pp. 1–5 (2006)

    Google Scholar 

  12. Xiao-Feng, D., Yu-Jiong, G., Kun, Y.: Study on Intelligent Maintenance Decision Support System Using for Power Plant Equipment. In: Proc. of the IEEE International Conference on Automation and Logistics Qingdao, China, September 2008, pp. 96–100 (2008)

    Google Scholar 

  13. Zhang, Z., Yang, Z., Zhang, P., Mao, Z., Hao, J.: Hierarchical Network-based Safety Assessment Decision Support System for Thermal Power Plants. In: Proc. of the 2009 IEEE International Conference on Networking, Sensing and Control, Okayama, Japan, March, 2009, pp. 592–596 (2009)

    Google Scholar 

  14. Lee, S.J., Mo, K., Seong, P.H.: Development of an Integrated Decision Support System to Aid the Cognitive Activities of Operators in Main Control Rooms of Nuclear Power Plants. In: Proc. of IEEE Symposium on Computational Intelligence in Multicriteria Decision Making (MCDM), pp. 146–152 (2007)

    Google Scholar 

  15. Zhang, B.-P., Wu, G.-X., Shang, S.-Y.: Research on Decision Support System of Water Pollution Control Based On Immune Agent. In: Proc. of International Symposium on Computer Science and Computational Technology, ISCSCT, vol. 1, pp. 114–117 (2008)

    Google Scholar 

  16. Xie, L., Wang, Z., Bian, L.: The Research of Oilfield Flood Precaution Decision Support System. In: Proc. of International Seminar on Business and Information Management, ISBIM 2008, December 2008, vol. 2, pp. 236–239 (2008)

    Google Scholar 

  17. Michał, C., Flizikowski, A., Kozik, R., Renk, R., Hołubowicz, W.: Ontology-Based Reasoning Combined with Inference Engine for SCADA-ICT Interdependencies, Vulnerabilities and Threats Analysis. In: Pre-Proc of 4th International Workshop on Critical Information Infrastructures Security, CRITIS 2009, Bonn, Germany, Fraunhofer IAIS, pp. 203–214 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choraś, M., Flizikowski, A., Kozik, R., Hołubowicz, W. (2010). Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis. In: Rome, E., Bloomfield, R. (eds) Critical Information Infrastructures Security. CRITIS 2009. Lecture Notes in Computer Science, vol 6027. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14379-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14379-3_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14378-6

  • Online ISBN: 978-3-642-14379-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics