Integrated management of safety and security barriers in chemical plants to cope with emerging cyber-physical attack risks under uncertainties

Journal Article (2024)
Author(s)

Shuaiqi Yuan (TU Delft - Safety and Security Science)

Genserik L.L. Reniers (Universiteit Antwerpen, TU Delft - Safety and Security Science, Katholieke Universiteit Leuven)

M. Yang (TU Delft - Safety and Security Science)

Safety and Security Science
DOI related publication
https://doi.org/10.1016/j.ress.2024.110320
More Info
expand_more
Publication Year
2024
Language
English
Safety and Security Science
Volume number
250
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Chemical facilities face threats from accidental and intentional events, including the rising concern of cyber-physical (C2P) attacks in the digitized industrial control system era. Addressing major accident risks from safety hazards and C2P attacks requires an immediate unified framework for safety and security barrier management. This study presents a systematic risk-based approach to integrate conventional safety risks with emerging C2P attack risks. Adverse scenarios are identified, integrated into an attack-tree-bow-tie diagram, and modelled using a Bayesian network (BN). A vulnerability assessment model is developed to quantify industrial control system vulnerability to C2P attacks, considering uncertainties in attackers' knowledge levels. Monte Carlo simulations are used to handle uncertainty propagation in risk assessment, allowing the use of probability distributions for BN root nodes. Sensitivity analysis identifies critical factors/events, guiding the proposal of candidate strategies for barrier improvements. Combining cost-effectiveness analysis with a risk matrix yields the optimal strategy for safety and security barrier enhancements based on risk estimations. A hypothetical case study demonstrates the proposed approach's effectiveness in integrated safety and security barrier management, considering security vulnerability patching and safety barrier maintenance scheduling from a cost-effective perspective.