Skip to main content

2018 | OriginalPaper | Buchkapitel

3. Single Plant Protection: A Game-Theoretical Model for Improving Chemical Plant Protection

verfasst von : Laobing Zhang, Genserik Reniers

Erschienen in: Game Theory for Managing Security in Chemical Industrial Areas

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we introduce a game theoretic model for protecting a chemical plant from intelligent attackers. The model is named Chemical Plant Protection Game, abbreviated as “CPP Game” [1]. The CPP Game is developed based on the general intrusion detection approach in chemical plants. To this end, the general intrusion detection approach is firstly introduced. We develop and explain the CPP Game by modelling its players, strategies, and payoffs. Afterwards in Sect. 3.3, different equilibrium concepts are used to predict the outcome of the CPP Game [2]. An analysis of the inputs and outputs of the game is provided in Sect. 3.4, from an industrial practice point of view [3]. Finally, conclusions are drawn at the end of this chapter.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhang L, Reniers G. A game-theoretical model to improve process plant protection from terrorist attacks. Risk Anal. 2016;36(12):2285–97.CrossRef Zhang L, Reniers G. A game-theoretical model to improve process plant protection from terrorist attacks. Risk Anal. 2016;36(12):2285–97.CrossRef
2.
Zurück zum Zitat Zhang L, Reniers G. Applying a Bayesian Stackelberg game for securing a chemical plant. J Loss Prev Process Ind. 2018;51:72–83.CrossRef Zhang L, Reniers G. Applying a Bayesian Stackelberg game for securing a chemical plant. J Loss Prev Process Ind. 2018;51:72–83.CrossRef
3.
Zurück zum Zitat Zhang L, Reniers G, Chen B, Qiu X. Integrating the API SRA methodology and game theory for improving chemical plant protection. J Loss Prev Process Ind. 2018;51(Suppl C):8–16.CrossRef Zhang L, Reniers G, Chen B, Qiu X. Integrating the API SRA methodology and game theory for improving chemical plant protection. J Loss Prev Process Ind. 2018;51(Suppl C):8–16.CrossRef
4.
Zurück zum Zitat Skaperdas S. Contest success functions. Econ Theory. 1996;7(2):283–90.CrossRef Skaperdas S. Contest success functions. Econ Theory. 1996;7(2):283–90.CrossRef
5.
Zurück zum Zitat API. Security risk assessment methodology for the petroleum and petrochemical industries. In: 780 ARP, editor. 2013. API. Security risk assessment methodology for the petroleum and petrochemical industries. In: 780 ARP, editor. 2013.
6.
Zurück zum Zitat Brown G, Carlyle M, Salmerón J, Wood K. Defending critical infrastructure. Interfaces. 2006;36(6):530–44.CrossRef Brown G, Carlyle M, Salmerón J, Wood K. Defending critical infrastructure. Interfaces. 2006;36(6):530–44.CrossRef
7.
Zurück zum Zitat Baybutt P. Issues for security risk assessment in the process industries. J Loss Prev Process Ind. 2017;49(Part B):509–18.CrossRef Baybutt P. Issues for security risk assessment in the process industries. J Loss Prev Process Ind. 2017;49(Part B):509–18.CrossRef
8.
Zurück zum Zitat Talarico L, Reniers G, Sörensen K, Springael J. MISTRAL: a game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries. Reliab Eng Syst Saf. 2015;138:105–14.CrossRef Talarico L, Reniers G, Sörensen K, Springael J. MISTRAL: a game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries. Reliab Eng Syst Saf. 2015;138:105–14.CrossRef
9.
Zurück zum Zitat Moulin H, Vial J-P. Strategically zero-sum games: the class of games whose completely mixed equilibria cannot be improved upon. Int J Game Theory. 1978;7(3–4):201–21.CrossRef Moulin H, Vial J-P. Strategically zero-sum games: the class of games whose completely mixed equilibria cannot be improved upon. Int J Game Theory. 1978;7(3–4):201–21.CrossRef
10.
Zurück zum Zitat Lemke CE, Howson J, Joseph T. Equilibrium points of bimatrix games. J Soc Ind Appl Math. 1964;12(2):413–23.CrossRef Lemke CE, Howson J, Joseph T. Equilibrium points of bimatrix games. J Soc Ind Appl Math. 1964;12(2):413–23.CrossRef
11.
Zurück zum Zitat Rao NS, Poole SW, Ma CY, He F, Zhuang J, Yau DK. Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Anal. 2015;36:694–710.CrossRef Rao NS, Poole SW, Ma CY, He F, Zhuang J, Yau DK. Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Anal. 2015;36:694–710.CrossRef
12.
Zurück zum Zitat Zhuang J, Bier VM. Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Oper Res. 2007;55(5):976–91.CrossRef Zhuang J, Bier VM. Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Oper Res. 2007;55(5):976–91.CrossRef
13.
Zurück zum Zitat Gibbons R. A primer in game theory. New York: Harvester Wheatsheaf; 1992. Gibbons R. A primer in game theory. New York: Harvester Wheatsheaf; 1992.
14.
Zurück zum Zitat Conitzer V, Sandholm T, editors. Computing the optimal strategy to commit to. In: Proceedings of the 7th ACM conference on electronic commerce; 2006: ACM. Conitzer V, Sandholm T, editors. Computing the optimal strategy to commit to. In: Proceedings of the 7th ACM conference on electronic commerce; 2006: ACM.
15.
Zurück zum Zitat Shoham Y, Leyton-Brown K. Multiagent systems: algorithmic, game-theoretic, and logical foundations. Cambridge: Cambridge University Press; 2008.CrossRef Shoham Y, Leyton-Brown K. Multiagent systems: algorithmic, game-theoretic, and logical foundations. Cambridge: Cambridge University Press; 2008.CrossRef
16.
Zurück zum Zitat Ceppi S, Gatti N, Basilico N, editors. Computing Bayes-Nash equilibria through support enumeration methods in Bayesian two-player strategic-form games. In: Proceedings of the 2009 IEEE/WIC/ACM international joint conference on web intelligence and intelligent agent technology-Volume 02; 2009: IEEE Computer Syociety. Ceppi S, Gatti N, Basilico N, editors. Computing Bayes-Nash equilibria through support enumeration methods in Bayesian two-player strategic-form games. In: Proceedings of the 2009 IEEE/WIC/ACM international joint conference on web intelligence and intelligent agent technology-Volume 02; 2009: IEEE Computer Syociety.
17.
Zurück zum Zitat Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S, editors. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems-Volume 2; 2008: international foundation for autonomous agents and multiagent systems. Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S, editors. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems-Volume 2; 2008: international foundation for autonomous agents and multiagent systems.
18.
Zurück zum Zitat IENM. Letter of 26 April 2013 to the parliament. In: 2013/19920 MvIIB, editor. 2013. IENM. Letter of 26 April 2013 to the parliament. In: 2013/19920 MvIIB, editor. 2013.
19.
Zurück zum Zitat Reniers G, Van Erp H. Operational safety economics: a practical approach focused on the chemical and process industries. Chichester: Wiley; 2016.CrossRef Reniers G, Van Erp H. Operational safety economics: a practical approach focused on the chemical and process industries. Chichester: Wiley; 2016.CrossRef
20.
Zurück zum Zitat Clark DJ, Riis C. Contest success functions: an extension. Econ Theory. 1998;11(1):201–4.CrossRef Clark DJ, Riis C. Contest success functions: an extension. Econ Theory. 1998;11(1):201–4.CrossRef
21.
Zurück zum Zitat Guan P, Zhuang J. Modeling resources allocation in attacker-defender games with “Warm Up” CSF. Risk Anal. 2016;36(4):776–91.CrossRef Guan P, Zhuang J. Modeling resources allocation in attacker-defender games with “Warm Up” CSF. Risk Anal. 2016;36(4):776–91.CrossRef
Metadaten
Titel
Single Plant Protection: A Game-Theoretical Model for Improving Chemical Plant Protection
verfasst von
Laobing Zhang
Genserik Reniers
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-92618-6_3