Introduction To Safety Science: Pieter Van Gelder
Introduction To Safety Science: Pieter Van Gelder
Safety Science
Delft
University of 2/50
Technology
Delft
University of 3/50
Technology
Delft
University of 4/50
Technology
• Bayesian networks
• Security risk analysis
• Old examination questions
Delft
University of 5/50
Technology
Delft
University of 6/50
Technology
Delft
University of 7/50
Technology
Delft
University of 8/50
Technology
Delft
University of 9/50
Technology
Probabilistic inference
Malware attack Denial of service ...
True 5% True 1%
False 95% False 99%
Delft
University of 10/50
Technology
Delft
University of 11/50
Technology
Predictive reasoning
Predictive reasoning
Diagnostic reasoning
Bayes theorem
• P(MA=true | IC=slow) = P(IC = slow | MA =true) *
P(MA=true)/P(IC=slow)
Delft
University of 15/50
Technology
Inter-causal reasoning
Delft
University of 16/50
Technology
Delft
University of 17/50
Technology
Observations
• A Bayesian network is a probabilistic graphical model that
represents a set of random variables and their conditional
dependencies via a directed acyclic graph. It is very suitable to
represent the probabilistic relationships between causes
(attacks) and consequences (symptoms), indicated by the arcs in
the graph.
• The Bayesian network can be used for probabilistic inference,
predictive reasoning, diagnostic reasoning and intercausal
reasoning.
Delft
University of 18/50
Technology
Observations
• Bayesian networks are updated, and new (failure) probabilities
can be recalculated, when new data is observed, which can be
called a learning process.
• Software is available at:
• https://download.bayesfusion.com/files.html?category=Academ
ia
• Background information available at:
• Bayesian network models in cyber security: a systematic review, S
Chockalingam, W Pieters, A Teixeira, P van Gelder, 2017 Nordic
Conference on Secure IT Systems, 105-122.
Delft
University of 19/50
Technology
Delft
University of 20/50
Technology
Delft
University of 21/50
Technology
Delft
University of 22/50
Technology 22
Challenge the future
Security Risk Analysis
Consequence 1.1. Critical units
assessment 1.2. Severity of consequences
1
Delft
University of 23/50
Technology 23
Challenge the future
Threat assessment
Delft
University of 24/50
Technology 24
Challenge the future
Security Risk Analysis
Consequence 1.1. Critical units
assessment 1.2. Severity of consequences
1
Attractiveness
analysis 3. Evaluate attractiveness of the target
3
Delft
University of 25/50
Technology 25
Challenge the future
Attractiveness analysis
• Potential for causing maximum casualties
• Potential for causing maximum economic damage
• Proximity of the target to densely populated area
• Proximity of critical units to the object’s boundary
• High reputation of the target
• Recognizability of critical units
Delft
University of 26/50
Technology 26
Challenge the future
Security Risk Analysis
Consequence 1.1. Critical units
assessment 1.2. Severity of consequences
1
Attractiveness
assessment 3. Evaluate attractiveness of the target
3
Vulnerability
analysis 4. Evaluate vulnerability of the target
4
Delft
University of 27/50
Technology 27
Challenge the future
Vulnerability analysis
• Etc.
Delft
University of 28/50
Technology 28
Challenge the future
Security Risk Analysis
Consequence 1.1. Critical units
assessment 1.2. Severity of consequences
1
Attractiveness
assessment 3. Evaluate attractiveness of the target
3
Vulnerability
assessment 4. Evaluate vulnerability of the target
4
Security risk
analysis Security Risk = F (Attack likelihood , consequence)
5
Delft
University of 29/50
Technology 29
Challenge the future
Risk Matrix
Severity
Catastrophic Major Moderate Minor
Likelihood
Delft
University of 30/50
Technology 30
Challenge the future
Nash Equilibrium as an input for
security risk analysis
Delft
University of 31/50
Technology
Delft
University of 32/50
Technology
Payoff matrix
Delft
University of 33/50
Technology
Delft
University of 34/50
Technology
Solution:
• Attacker attacks A with probability 9/16 = 0.5625
• Defender defends A with probability 6/16 = 0.375
Delft
University of 35/50
Technology
Delft
University of 36/50
Technology
Observation
Game-theoretic models and methods can help
analysts think more clearly and effectively about
the risks of adversarial situations by clarifying what
should be modeled as decision variables for different
players (i.e., the strategy sets of the players, which
may include which targets to attack, under what conditions,
when, and how) and what should be modeled
as chance or consequence variables.
Delft
University of 37/50
Technology
Threat, vulnerability,
impact
“The probability of attack on each target (sometimes referred to
as “threat” probabilities in the terrorism risk analysis literature) is
an output of the analysis, rather than an unknown input to be
guessed at (e.g., via expert elicitation).”
Delft
University of 38/50
Technology
Delft
University of 39/50
Technology
Game-theoretic Patrolling in
Areas with Complex
Terrain to Combat
Poaching
Prof. Tambe,
University of
• University of Southern California, USA Southern
California,
USA
http://teamcore.usc.edu/papers/2016/AAAI16Demo_PAWS.pdf
Delft
University of 40/50
Technology
Delft
University of 41/50
Technology
Delft
University of 42/50
Technology
P(IDS) 0,020485
P(IDS|In)*P(In) 0,000495
P(In|IDS) 0,024164
Delft
University of 43/50
Technology
Delft
University of 44/50
Technology
• Car in A, B of C
A B C
Delft
University of 45/50
Technology
• Theorem of Bayes:
Pinf o | A PA 1/ 2 * 1/ 3
PA | inf o 1/ 3
Pinf o Pinf o
Pinf o | C PC 1 * 1/ 3
PC | inf o 2/3
Pinf o Pinf o
Delft
University of 46/50
Technology
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0 200 400 600 800 1000 1200 1400 1600 1800 2000
Delft
University of 47/50
Technology
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0 200 400 600 800 1000 1200 1400 1600 1800 2000
Delft
University of 48/50
Technology
Delft
University of 49/50
Technology
Bulb 1
Fuse
Switch
Bulb 2
Power
Source
Delft
University of 50/50
Technology
Delft
University of 51/50
Technology
B1 B2
Power source
Fuse Switch
Delft
University of 52/50
Technology
1-(1-0.1)*(1-0.1)*(1-0.1)*(1-0.1*0.1) = 0.278
Delft
University of 53/50
Technology
Delft
University of 54/50
Technology
Delft
University of 55/50
Technology
Delft
University of 56/50
Technology
Delft
University of 57/50
Technology
Delft
University of 59/50
Technology
Delft
University of 60/50
Technology
Delft
University of 61/50
Technology
Delft
University of 62/50
Technology
Delft
University of 63/50
Technology
Delft
University of 64/50
Technology
Delft
University of 65/50
Technology
Delft
University of 66/50
Technology
Delft
University of 67/50
Technology
Delft
University of 68/50
Technology
Delft
University of 69/50
Technology
Delft
University of 70/50
Technology
Delft
University of 71/50
Technology
STROOMVOORZIENING
Delft
University of 72/50
Technology
Delft
University of 73/50
Technology
Delft
University of 74/50
Technology
P(A|B) = P(B|A)P(A)/P(B)
P(fatality | no seatbelt) =
P(no seatbelt | fatality) P(fatality) / P(no seatbelt)
= 0.85*0.01/0.20 = 0.042
Delft
University of 75/50
Technology
System failure = (A ⋂ B) U (B ⋂ C) U D B
= [(A ⋂ B) U (B ⋂ C)] U D
= [(0.1*0.1)+(0.1*0.1)-0.1*0.1*0.1]
+ 0.1 = 0.19+0.1 = 0.29
Delft
University of 76/50
Technology
Delft
University of 77/50
Technology
B
C
A B B C
Delft
University of 78/50
Technology
Delft
University of 79/50
Technology
Delft
University of 80/50
Technology
Delft
University of 81/50
Technology