Combining Bayesian Networks and Fishbone Diagrams to Distinguish between Intentional Attacks and Accidental Technical Failures

Conference Paper (2019)
Author(s)

Saba Chockalingam (TU Delft - Technology, Policy and Management)

Wolter Pieters (TU Delft - Technology, Policy and Management)

Andre M. H. Teixeira (Uppsala University)

N. Khakzad (TU Delft - Technology, Policy and Management)

Pieter van Gelder (TU Delft - Technology, Policy and Management)

Research Group
Safety and Security Science
DOI related publication
https://doi.org/10.1007/978-3-030-15465-3_3 Final published version
More Info
expand_more
Publication Year
2019
Language
English
Research Group
Safety and Security Science
Pages (from-to)
31-50
Publisher
Springer
ISBN (print)
978-3-030-15464-6
ISBN (electronic)
978-3-030-15465-3
Event
The Fifth International Workshop on Graphical Models for Security (2018-07-08 - 2018-07-08), Mathematical Institute, University of Oxford, Oxford, United Kingdom
Downloads counter
350
Collections
Institutional Repository
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Because of modern societies' dependence on industrial control systems, adequate response to system failures is essential. In order to take appropriate measures, it is crucial for operators to be able to distinguish between intentional attacks and accidental technical failures. However, adequate decision support for this matter is lacking. In this paper, we use Bayesian Networks (BNs) to distinguish between intentional attacks and accidental technical failures, based on contributory factors and observations (or test results). To facilitate knowledge elicitation, we use extended fishbone diagrams for discussions with experts, and then translate those into the BN formalism. We demonstrate the methodology using an example in a case study from the water management domain.

Files

License info not available