Skip to main content

A Dynamic Risk Assessment (DRA) Methodology for High Impact Low Probability (HILP) Security Risks

Short Paper

  • Conference paper
  • First Online:
Critical Information Infrastructures Security (CRITIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11777))

  • 846 Accesses

Abstract

This paper proposes a Dynamic Risk Assessment (DRA) methodology applicable to the so-called High Impact Low Probability (HILP) security risks which, by their very nature, are difficult to identify or occur only infrequently. DRA is based on the processing of Weak Signals (WSs) to protect critical infrastructures and soft targets against HILP security risks before they materialise. DRA allows to rank WSs according to the reliability and credibility of the sources and to correlate them to obtain threat precursors. Experimental results have shown that DRA is effective and helps suppressing irrelevant alerts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A WS can be defined as “A seemingly random or disconnected piece of information that at first appears to be background noise but can be recognized as part of a significant pattern by viewing it through a different frame or connecting it with other pieces of information” [14].

  2. 2.

    https://www.letscrowd.eu.

References

  1. UK Government Office for Science: Blackett Review of High Impact Low Probability Risks, London (2011)

    Google Scholar 

  2. Ezell, B., Bennet, S., von Winterfeldt, D., Sokolowski, J., Collins, A.: Probabilistic risk analysis and terrorism risk. Risk Anal. 30(4), 575–589 (2010)

    Article  Google Scholar 

  3. Brynielsson, J., Horndahl, A., Johansson, F., Kaati, L., Martenson, C., Svenson, P.: Analysis of weak signals for detecting lone wolf terrorists. In: 2012 IEEE European Intelligence and Security Informatics Conference (2012)

    Google Scholar 

  4. Paté-Cornell, M.L.: Fusion of intelligence information: a Bayesian approach. Risk Anal. 22(3), 445–454 (2002)

    Article  Google Scholar 

  5. Holopainen, M., Toivonen, M.: Weak signals: ansoff today. Futures 44, 198–205 (2012)

    Article  Google Scholar 

  6. Chakir, E., Moughit, M., Khamlichi, Y.: A real-time risk assessment model for intrusion detection systems. In: 2017 IEEE International Symposium on Networks, Computers and Communications (ISNCC) (2017)

    Google Scholar 

  7. North Atlantic Treaty Organization (NATO) Information Handling Services: Annex to STANAG 2022 (Edition 8) (1992)

    Google Scholar 

  8. Vu, H.: Deep Abnormality Detection in Video Data, Melbourne (2017)

    Google Scholar 

  9. Xu, D., Ricci, E., Yan, Y., Song, J., Sebe, N.: Learning deep representations of appearance and motion for anomalous event detection (2015)

    Google Scholar 

  10. Hasan, M., Choi, J., Neumann, J., Roy-Chowdhury, A.K., Davis, L.S.: Learning temporal regularity in video sequences, Las Vegas (2016)

    Google Scholar 

  11. Strom, K.J., Hollywood, J.P.M.: Using 911 calls to detect terrorism threats, June 2009. https://www.nij.gov/journals/263/pages/911-calls.aspx

  12. Lucas, P.J.F.: Certainty-factor-like structures in Bayesian belief networks. Knowl.-Based Syst. 14, 327–335 (2001)

    Article  Google Scholar 

  13. UK HM Treasury: Orange Book: Management of risk - Principles and Concepts, London (2004)

    Google Scholar 

  14. Schoemaker, P.J.H., Day, G.S.: How to make sense of weak signals. MIT Sloan Manag. Rev. 50(3), 80–89 (2009)

    Google Scholar 

Download references

Acknowledgements

This paper is based on the work carried out in the LETSCROWD project that has received funding from the European Union’s Horizon 2020 research and innovation programme under Grant Agreement number 740466.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Carlo Dambra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dambra, C., Graf, C., Arias, J., Gralewski, A. (2020). A Dynamic Risk Assessment (DRA) Methodology for High Impact Low Probability (HILP) Security Risks. In: Nadjm-Tehrani, S. (eds) Critical Information Infrastructures Security. CRITIS 2019. Lecture Notes in Computer Science(), vol 11777. Springer, Cham. https://doi.org/10.1007/978-3-030-37670-3_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37670-3_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37669-7

  • Online ISBN: 978-3-030-37670-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics