Utilization of the EASI model in the matters of critical infrastructure protection and its verification via the OTB SAF simulation tool

Similar documents
Conditions for testing effects of radio-frequency electromagnetic fields on electronic devices

II. BULGARIAN E-READINESS ASSESSMENT MODEL AND METHODOLOGY FOR QUANTITATIVE ASSESSMENT

Hardware protection of metallic loops against sabotage

Keywords: Injection molding, mold, surface, roughness, fluidity, rubber.

Novel Approach to Intelligent Video Surveillance System Illumination Measurement

CRITICAL INFRASTRUCTURE SAFETY AND PROTECTION IN SLOVAK REPUBLIC RESEARCH AND EDUCATION

Electromagnetic field distribution within a semi anechoic chamber

Intelligent Video Surveillance System Evaluation Methods

S&T Stakeholders Conference

Slovak University of Technology in Bratislava Institute of Information Engineering, Automation, and Mathematics PROCEEDINGS

ANALYSIS OF MEASUREMENT ACCURACY OF CONTACTLESS 3D OPTICAL SCANNERS

Life Cycle Management of Station Equipment & Apparatus Interest Group (LCMSEA) Getting Started with an Asset Management Program (Continued)

Chapter 4. Research Objectives and Hypothesis Formulation

AN OVERVIEW OF THE STATE OF MARINE SPATIAL PLANNING IN THE MEDITERRANEAN COUNTRIES MALTA REPORT

How to accelerate sustainability transitions?

Bases for Modelling the Impacts of the Critical Infrastructure Failure

Minimizing of Transmitting Antenna s Reflections When Performing EMI Tests

LEARNING FROM THE AVIATION INDUSTRY

Time Scales Comparisons Using Simultaneous Measurements in Three Frequency Channels

BIM EXECUTION PLAN IN CZECH REPUBLIC

The Role Of Public Policy In Innovation Processes Brussels - May 4 th, 2011

Recent Progress on Forced Oscillation Detection and Source Locating Findings at Peak Reliability. NASPI Work Group Meeting

VERIFICATION OF MATHEMATICAL MODEL FOR SMALL POWER SOURCES

Automated Machine Guidance An Emerging Technology Whose Time has Come?

MEASUREMENT OF ROUGHNESS USING IMAGE PROCESSING. J. Ondra Department of Mechanical Technology Military Academy Brno, Brno, Czech Republic

Helical Antenna Design for Image Transfer

A study on facility management application scenario of BIMGIS modeling data

Optimization of FSS Filters

AC Power Monitoring Application Brief

Research assessment and evaluation in Russian fundamental science

Years 9 and 10 standard elaborations Australian Curriculum: Digital Technologies

Mid Term Exam SES 405 Exploration Systems Engineering 3 March Your Name

High Explosive Radio Telemetry System. Federal Manufacturing & Technologies. R. Johnson, FM&T; B. Mclaughlin, FM&T;

Modelling Programme for Education at University of Defence

Improving Emergency Response and Human- Robotic Performance

zforce AIR Touch Sensor Specifications

STRATEGIC ACTIVITY PLAN

Buildings typology education in the Faculty of Architecture at Slovak University of Technology in Bratislava, Slovakia

HIGH DEFINITION RADAR SECURITY SOLUTIONS

Image Display and Perception

Design of Structure Filtering IoT Wireless Communication

CONDITION MONITORING OF THRUST BALL BEARINGS USING CONTINUOUS AE

1. Future Vision of Office Robot

ANALYSIS OF ELECTRON CURRENT INSTABILITY IN E-BEAM WRITER. Jan BOK, Miroslav HORÁČEK, Stanislav KRÁL, Vladimír KOLAŘÍK, František MATĚJKA

Social Innovation and new pathways to social changefirst insights from the global mapping

ARRIVAL TIME DETECTION IN THIN MULTILAYER PLATES ON THE BASIS OF AKAIKE INFORMATION CRITERION

MINISTRY OF AGRICULTURE, LIVESTOCK & FISHERIES STATE DEPARTMENT OF FISHERIES AND BLUE ECONOMY

Real Remote Experiment with Embedded Synchronized Simulation Remote Wave Laboratory

Virtual Reality Devices in C2 Systems

National approaches to the dissemination of demographic statistics and their implication for the Demographic Yearbook

Trunking Information Control Console

It is intended to provide an overall analysis of the Lao market and opportunities for improved cookstove (ICS) dissemination.

f n = n f 1 n = 0, 1, 2.., (1)

Conference Summary Report

DESIGN TYPOLOGY AND DESIGN ORGANISATION

Component Package Decapsulation Process with Analogue Signature Analysis Support

Situation awareness for SME renaissance. Technical University of Košice Slovak Republic

(R) Aerospace First Article Inspection Requirement FOREWORD

Protections of embededded system inputs

Executive Development Course: Digital Government for Transformation Towards Sustainable and Resilient Societies the Singapore Experience

Research on aircraft components assembly tolerance design and simulation technology

Years 3 and 4 standard elaborations Australian Curriculum: Digital Technologies

Total Situational Awareness (With No Blind Spots)

SAUDI ARABIAN STANDARDS ORGANIZATION (SASO) TECHNICAL DIRECTIVE PART ONE: STANDARDIZATION AND RELATED ACTIVITIES GENERAL VOCABULARY

Statistical Timing Analysis of Asynchronous Circuits Using Logic Simulator

2013 Honeywell Users Group Americas. Andy Nichols, Bob Zapata Effective Use of Large Screen Technology Using Visual Thesaurus Shapes

Wind Turbine Analysis for. Cape Cod Air Force Station Early Warning Radar. and Beale Air Force Base Upgraded Early Warning Radar.

The System Safety Assessment by the Use of Programming Tools during the Licensing Process

Domain Understanding and Requirements Elicitation

INVESTMENT IN COMPANIES ASSOCIATED WITH NUCLEAR WEAPONS

RETINAR SECURITY SYSTEMS Retinar PTR & Retinar OPUS Vehicle Mounted Applications

Theory of Structures-I (CE-206)

The Real-Time Control System for Servomechanisms

The essential role of. mental models in HCI: Card, Moran and Newell

LYNX CE CENTRAL CONTROL FOR NETWORK VP. General Specifications

Interconnection OTBSAF and NS-2

Centre Name Centre Number Candidate Name Candidate Number

Statistic evaluation of deviation between guaranteed and measured turbine efficiency

NON-DESTRUCTIVE TESTING OF ARTIFICIAL JOINTS WITH DEFECTS BY EDDY CURRENT METHOD

STI OUTLOOK 2002 COUNTRY RESPONSE TO POLICY QUESTIONNAIRE CZECH REPUBLIC. 1. General framework and trends in science, technology and industry policy

MAGNATEST D. Magneto-Inductive Component Testing for Magnetic and Electrical Properties

Novel Approach to the Video Surveillance System Image Operational Properties Evaluation

Site. General Requirements Evaluation*

Wireless temperature controller E N RFTC-50/G

Expression Of Interest

Group of Administrative Co-operation Under the R&TTE Directive. 5 th R&TTE Market Surveillance Campaign on WLAN 5 GHz

Systems. Professor Vaughan Pomeroy. The LRET Research Collegium Southampton, 11 July 2 September 2011

Active Elimination of Low-Frequency Harmonics of Traction Current-Source Active Rectifier

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer.

Lego Mindstorms as a Simulation of Robotic Systems

PHALANX INTELEGENT SAFETY SYSTEMS

VIDEO DATABASE FOR FACE RECOGNITION

Short-Range UWB Radar Application: Problem of Mutual Shadowing between Targets

ARTES Competitiveness & Growth Full Proposal. Requirements for the Content of the Technical Proposal. Part 3B Product Development Plan

ATELIER ROTTERDAM CALL FOR ARCHITECTS: NEW BUILDING TYPOLOGIES FOR THE ENERGY TRANSITION

Summary of the Report by Study Group for Higher Quality of Life through Utilization of IoT and Other Digital Tools Introduced into Lifestyle Products

With Wisdom We Explore

Address by the Executive Secretary of the Preparatory Commission for the Comprehensive Nuclear-Test-Ban Treaty Organization. Mr.

EXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF

INTERNAL CONCRETE INSPECTION AND EVALUATION METHODS FOR STEEL PLATE-BONDED SLABS BY USING ELASTIC WAVES VIA ANCHOR BOLTS

Transcription:

Utilization of the EASI model in the matters of critical infrastructure protection and its verification via the OTB SAF simulation tool LUDEK LUKAS, MARTIN HROMADA Tomas Bata University in Zlín T.G.Masaryka 5555, 760 0 Zlín CZECH REPUBLIC lukas@fai.utb.cz, hromada@fai.utb.cz, http://web.fai.utb.cz/ Abstract: The importance of critical infrastructure protection is perceived mainly through the lens of sustaining a functional continuity of society from economical and social standpoint. This fact has contributed to the creation of legislative, normative and institutional tools which are to form security environment and real approaches to critical infrastructure protection. It is obvious that the utilization of physical protection systems is one of the significant aspects of critical infrastructure protection, however, it is necessary to say that it lacks a comprehensive approach to determining optimal structural and functional demands on these systems. This article focuses on the utilization of the EASI model in the context of structure and functionality verification of the proposed physical security system of an component of the critical infrastructure and on verification of the outputs emerging from the EASI model via the OTB SAF simulation tool. Key-Words: Critical infrastructure protection, physical security systems, EASI model, OTB SAF simulation tool, mechanical safety device, technical safety devices. Introduction Critical infrastructure protection is currently guided by an implementation of a 2008/4/ES directive on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. In Slovakia, the implementation process is perceived through a passing of a law 45/20 Coll. on critical infrastructure which specifies the identification and designation process of both the national and European critical infrastructures. Despite these facts, it lacks a comprehensive approach to protection and the process itself will be formed after the above-mentioned identification and designation process will be completed. The law makes it clear that one of the possible aspects of protection is utilization of security devices, by which (from 0 par. 2) mechanical barrier systems, technical security devices, physical protection, administrative measures, schedule measures and their combination [] are understood. This formulation, however, does not specify the optimal combination or its relation to functionality, neither does it set the necessary usage range of the mentioned security measures groups. It is obvious that in this process it will be necessary to use a simulation tool which, after having specified individual entities that will be entering the simulation process, would be a suitable means for the verification of the security measures structure and functionality and the operation of physical protection in case of breach into the protected space. 2 Physical security system of an element of the critical infrastructure In order to articulate the optimal system structure and functionality of the physical protection system of an element of the critical infrastructure, it is necessary to define the key functions of the already mentioned system and its sub-systems. In association with the comprehensive utilization of the physical protection system, three main system functions and its sub-systems parameters are considered: Detection detection of an adversary with the use of technical security devices (AIR, PIR, MW Bistatic, MW Monostatic, dual sensor, etc.) and verification of the alarm information via the closed-circuit television (CCTV); parameter probability of detection, the time needed for the verification of alarm information and probability of successful communication. Delay hindering of the adversary with the use of mechanical barrier systems (fences, gates, barriers, grids, security doors, glass and other); parameter breaking resistance Response the response of the object s guards preventing or interrupting the activity of the adversary or his arrest even with the use of ISBN: 978--6804-004-6 3

routine measures; parameter the time needed for the guards to transfer from A to B [2]. After this process implementation, a referential model of critical infrastructure element was created. It was subsequently divided into 8 security zones (Fig..) Fig. : Referential object divided into 8 security zones Each of the defined zones was subsequently assessed by parameters (the adversary detection probability technical security devices, breaking resistance mechanical barrier systens, time needed to verify the alarm information CCTV, adversary and guards time dependence in the guarded object and successful communication probability of the guards as well as standard deviations from these parameters) for individual sub-systems of the physical security system of the element KI. Based on this process, a physical protection system structure of a critical infrastructure component was determined. Fig. 2 The actual process of evaluation of structural properties is seen as assigning point to a particular component of the physical protection system according to its properties and determination that is expected with the distribution of critical infrastructure component into security classes, reflecting the growing criticism of the objects. Point s will be in the range of -4, where the of 4 reflects the usability of security systems in the highest security for the largest class of criticality of the element. While respecting the defined structure of the physical protection, the whole system can be expressed in points of relations () and Table [3]: B Mi Ei Fi () -Numeric of security system -Numeric of mechanical barrier systems -Numeric of electronic security systems -Numeric of physical and schedule protection. Table Maximal and minimal s of critical infrastructure components physical protection system Minim. Mbs B= m3 i= m Minim. Ess M i + e8 Ei + Min. F f 2 i i= e i= f Security level SL F Minim. Ps Maxim. Ps 3 5 7 IV 7 88 9 35 5 III 49 70 5 9 3 II 27 48 3 5 2 I 20 26 Mbs mechanical barrier systems, SL security level, Ess Electronic security systems, F physical and schledule security, Ps Critical Infrastructure component physical protection system, Fig. 2: The determined physical protection system structure of a critical infrastructure component 3 Evaluation of the system structural properties for physical protection of the critical infrastructure component In cases of application of the same procedure in the evaluation of other systems for physical protection of critical infrastructure elements in the sector, it is possible to express the average level of protection of critical infrastructure in this sector, then this is qualitatively expressed (see Table 2). ISBN: 978--6804-004-6 32

B norm B B norm B min B max O ki K B B = B B max min min (2) -Numeric of security system -Normative numeric of security system -20 minimal of security system -88 maximal of security system K Oki = Bnorm, k K k= (3) -Numeric of the security level in critical infrastructure sector -The number of critical infrastructure components in a given sector P D P S P T P T - Probability of detection, - Probability of detection ability, - Probability of successful transfer, - Probability of successful assessment, For this reason, an EASI (Estimate of Adversary Sequence Interruption) model was chosen. This model assesses and works with already determined parameters of the physical security system components where the outcome is estimation of adversary sequence interruption which is today used by National laboratories, Sandia USA and was published by M. L. Garcia, The Design and Evaluation of Physical Protection Systems, 2007. Fig. 3. Table 2 Quantitative explanation of security level in critical infrastructure sector [3] Interval Levels of KI protection in the sector <-0,294; -0,04> Poor <0; 0,088> Low <0,03; 0,42> Low to medium <0,426; 0,735> Medium to high <0,750; > High level of protection 4 Model EASI (Estimate of Adversary Sequence Interruption/ pravdepodobnosť prerušenia činnosti narušiteľa) According to the above, structural assessment of the physical protection system of a critical infrastructure component lacks assessment of its functionality which specifies both the relation between the activity of the adversary and the guards and at the same time takes into account and utilizes the dependencies that emerge from basic structure and functionality demands and main system functions, which has been presented in the previous parts of this text. These dependencies may also be expressed by this relation: P D = P S P T P A [4/5] Fig. 3: EASI model 5 EASI model output verification process via OTB SAF simulation tool In order to raise the EASI outputs relevance and of estimate of adversary sequence interruption in the object, it is necessary to simulate the movement of the adversary and guards with a simulation tool which works with parameters specified for the EASI model and with real conditions. In this context, the OTB SAF simulation tool (OneSEMI-Automated Forces Testbed / OneSAF Testbed Baseline; Science Aplications International Corporation San Diego California USA; national representative Lynx Ltd. Košice), in which a physical protection system built-in by a penetration test is defined, enters the process of physical protection system functionality assessment of the critical infrastructure elements and EASI model outputs verification. The critical infrastructure element penetration tests of the physical security system were carried out in the referential object in Fig. 4. These tests were also considered to be a form of the EASI model verification. ISBN: 978--6804-004-6 33

Fig. 4: 3D model of the referential object According to the carried-out simulations, the EASI model is, in the context of verification of the physical protection systems functionality, an applicable model. This is in relation to potential purloin or destruction of the protected interest in terms of the critical infrastructure component. The following tables and graphs give the evidence. Table 3 Security level I - asset abstraction Number of zones overcome 0 2 3 4 5 6 7 8 EASI model output estimate of adversary sequence interruption EASI model simulation verification via OTB SAF tool 0,9699352 0,969388 0,9640465 0,937656 0,7589453 0,0223934 0 0,023595 0 Fig. 5: Graph of EASI model verification via OTB SAF tool for Security class I asset abstraction Table 3 Security level I detonating system Number of zones overcome 0 2 3 4 5 6 7 8 EASI model output estimate of adversary sequence interruption EASI model simulation verification via OTB SAF tool 0,9699352 0,969388 0,9640465 0,937656 0,7589453 0,0223934 0 0,023595 0 Fig. 6: Graph of EASI model verification via OTB SAF tool for Security class I detonating system initialization ISBN: 978--6804-004-6 34

According to the tables and graphs it follows that in the case of 2 security zones being overcome, the physical protection system functionality was not substantially impacted (see Fig. 7), which was confirmed by the EASI model outcomes 0,9460 and also the simulation itself. Fig. 9: Detonating system initialization and destruction of the protected interest 6 Conclusion Fig. 7: Penetration tests of the FO system proposed In the case of 4 security zones being overcome (Fig. 8), the probability dropped to 0,7597 and in certain extreme cases the physical protection system was partially breached. Fig. 8: Adversary s activity in the protected object Only when 5 security zones were overcome, the probability of sequence interruption represented by the EASI model was 0,0227 which was confirmed by the simulations whose output was initialization of a detonating system and destruction of the protected interest (Fig. 9). The proposed structure and physical protection system function parameters of a critical infrastructure component are acceptable mainly on the base of the carried-out verification, which was perceived as a synthesis of existing approaches to property and person protection in the civil and military sector. According to the conclusions, the crucial aspect in verifying theoretical basis not only in relation to generating input parameters into the chosen EASI model but also to individual outputs verification following from the EASI model was the application of OTB SAF simulation tool for the verification of the physical protection system functionality and structure as a critical infrastructure component. A significant contribution of the simulation tool can be seen mainly in the possibility to verify a defined system in terms of multiple substantial threats such as purloin or manipulation with the protected interest or its destruction by the detonating system. One of the possible alternatives in the simulations (in relation to the detonating system application intent) was the physical annihilation of the adversary, but with regard to the character of activity of private security agencies, this form of stopping the adversary was relinquished. With support of the Ministry of Interior of the Czech Republic under the Research Project No. VG20204067 and by the European Regional Development Fund under the project CEBIA-Tech No. CZ..05/2..00/03.0089. ISBN: 978--6804-004-6 35

References: [] SR. Zákon 45/20 o kritickej infraštruktúre : Zbierka zákonov č. 45/20. In Zbierka zákonov č. 45/20. 20, Čiastka 9, s. 434-442. Dostupný také z WWW: <http://www.zbierka.sk/zz/predpisy/default.asp x?predpisid=20&filename=zz20-00045-020&rocnik=20>. [2] GARCIA, M. L. The Design and Evaluation of Physical Protection Systems, Second edition, Sandia National Laboratories, 2007, p. 273-289, ISBN 0: 0-7506-8352. [3] HROMADA, M. Stanovení odolnosti kritickej infraštruktúry praktický príklad /Critical Infrastructure Resilience Determination Practical example /. In: Security Magazín, 200, num- 92, p. 25-27, ISBN 20-8723.. [4] GARCIA, M. L. The Design and Evaluation of Physical Protection Systems, Second edition, Sandia National Laboratories, 2007, p. 275, ISBN 0: 0-7506-8352. [5] LUKÁŠ, L., HROMADA, M. Možnosti hodnocení odolnosti kritické infrastruktury/ Evaluating the Resistance of Critical Infrastructure. In: Bezpečnost v informační společnosti, Brno, 2009, p. 56, ISBN 978-80- 723-653-3 ISBN: 978--6804-004-6 36