Process Safety and Environmental Protection 1 0 2 ( 2 0 1 6 ) 473–484 Contents lists available at ScienceDirect Process Safety and Environmental Protection journal h om ep age: www.elsevier.com/locate/ps ep A novel probabilistically timed dynamic model for physical security attack scenarios on critical infrastructures Y.F. Khalil Physical Sciences Department, United Technologies Research Center (UTRC), 411 Silver Lane, East Hartford, CT, USA a r t i c l e i n f o Article history: Received 14 February 2016 Received in revised form 25 April 2016 Accepted 1 May 2016 Available online 6 May 2016 Keywords: Physical security Critical infrastructures High-value assets Probabilistic models Time to compromise Mission time a b s t r a c t This study proposes a novel probabilistically timed dynamic model for physical security attack scenarios on critical infrastructures (CIs). The model simulates attacker’s attempts to compromise exploitable vulnerabilities in targeted CIs. Attacker’s times to successfully compromise physical barriers, intrusion detection systems, and standby safety systems are modeled as random variables represented by user-defined probability distributions. The model assumes a highly skilled attacker, tracks his cumulative time to compromise targeted assets relative to an estimated mission time, and calculates mission success probability under imperfect information. The model uses Monte Carlo sampling technique to propa- gate uncertainties of input parameters to calculate statistics of mission success probability. Model’s utility is demonstrated by a postulated case study in which an attacker attempts to launch undetected and unmitigated fire in 1-out-of-4 protected areas within a chemical process plant. Destroying one of these protected areas represents attacker’s mission success in disrupting plant operation in addition to causing property damage. Visual flowcharting and dynamic attack tree logic are used to describe systematic execution of the attack. Simu- lation results show 64.4% mission success probability with 4.7% standard deviation. Benefits of proposed model include its use in security training to quantify probabilistic outcomes of what ifscenarios, uncover exploitable vulnerabilities, and implement defensive strategies to improve CI’s resilience under attack. The modeling framework can be extended to cyber security applications. © 2016 The Institution of Chemical Engineers. Published by Elsevier B.V. All rights reserved. Abbreviations: BE, basic event; CB, circuit breaker; CI, critical infrastructure; CPS, cyber-physical systems; CS, cutsets (in fault tree analysis); DAT, dynamic attack tree; DiD, defense in depth; ET, event tree; ETA, event tree analysis; FL, flammable liquid; FSS, fire suppres- sion system; FT, fault tree; FTA, fault tree analysis; FW, firewater; FWP, firewater pump; HVAC, heating, ventilation, and air conditioning; IDS, intrusion detection system; MCS, Monte Carlo sampling technique; MOV, motor-operated value; MS, mission success from attacker’s viewpoint denotes achieving his malicious intent within a predetermined mission time; MTTSC, mean time to successfully compromise an exploitable vulnerability; MT, mission time, represents the window of opportunity available to attacker to accomplish a malevolent goal; MV, manual valve; PAN, priority AND Gate (used in dynamic fault trees); QRA, quantitative risk assessment; SDAS, smoke detection and alarm system; T-1, flammable liquid storage tank; T-2, firewater storage tank. E-mail address: khalilyf@utrc.utc.com http://dx.doi.org/10.1016/j.psep.2016.05.001 0957-5820/© 2016 The Institution of Chemical Engineers. Published by Elsevier B.V. All rights reserved.