Share Email Print

Proceedings Paper

A reference model for model-based design of critical infrastructure protection systems
Author(s): Young Don Shin; Cheol Young Park; Jae-Chon Lee
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Today’s war field environment is getting versatile as the activities of unconventional wars such as terrorist attacks and cyber-attacks have noticeably increased lately. The damage caused by such unconventional wars has also turned out to be serious particularly if targets are critical infrastructures that are constructed in support of banking and finance, transportation, power, information and communication, government, and so on. The critical infrastructures are usually interconnected to each other and thus are very vulnerable to attack. As such, to ensure the security of critical infrastructures is very important and thus the concept of critical infrastructure protection (CIP) has come. The program to realize the CIP at national level becomes the form of statute in each country. On the other hand, it is also needed to protect each individual critical infrastructure. The objective of this paper is to study on an effort to do so, which can be called the CIP system (CIPS). There could be a variety of ways to design CIPS’s. Instead of considering the design of each individual CIPS, a reference model-based approach is taken in this paper. The reference model represents the design of all the CIPS’s that have many design elements in common. In addition, the development of the reference model is also carried out using a variety of model diagrams. The modeling language used therein is the systems modeling language (SysML), which was developed and is managed by Object Management Group (OMG) and a de facto standard. Using SysML, the structure and operational concept of the reference model are designed to fulfil the goal of CIPS’s, resulting in the block definition and activity diagrams. As a case study, the operational scenario of the nuclear power plant while being attacked by terrorists is studied using the reference model. The effectiveness of the results is also analyzed using multiple analysis models. It is thus expected that the approach taken here has some merits over the traditional design methodology of repeating requirements analysis and system design.

Paper Details

Date Published: 22 May 2015
PDF: 10 pages
Proc. SPIE 9478, Modeling and Simulation for Defense Systems and Applications X, 94780A (22 May 2015); doi: 10.1117/12.2177141
Show Author Affiliations
Young Don Shin, Samsung Thales Co., Ltd. (Korea, Republic of)
Cheol Young Park, George Mason Univ. (United States)
Jae-Chon Lee, Ajou Univ. (Korea, Republic of)

Published in SPIE Proceedings Vol. 9478:
Modeling and Simulation for Defense Systems and Applications X
Eric J. Kelmelis, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?