Computational Red Teaming for Physical Security Assessment
dc.contributor.author | Tan, Terence Peng Lian | |
dc.contributor.author | Porter, Stuart | |
dc.contributor.author | Tan, Tele | |
dc.contributor.author | West, Geoff | |
dc.contributor.editor | Hesheng Wang (Shanghai Jiaotong University, China) | |
dc.date.accessioned | 2017-01-30T15:08:49Z | |
dc.date.available | 2017-01-30T15:08:49Z | |
dc.date.created | 2015-05-22T08:32:24Z | |
dc.date.issued | 2014 | |
dc.identifier.citation | Tan, T.P.L. and Porter, S. and Tan, T. and West, G. 2014. Computational Red Teaming for Physical Security Assessment, in H. Wang (ed), 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems, Jun 4 2014, pp. 258-263. Hong Kong: Institute of Electrical and Electronics Engineers (IEEE). | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/43629 | |
dc.identifier.doi | 10.1109/CYBER.2014.6917471 | |
dc.description.abstract |
Computational Red Teaming (CRT) is a computational approach to test defences. In this paper, we use develop a CRT system to assess the physical security of any building, provided the building is designed with Building Information Models (BIM). BIMs are similar to 3D Computer Aided Design (CAD) models but with the addition of extra layers of information on the building system and components. Through a demonstration attack on a facility, this paper shows how a CRT approach to physical security assessment leads to a deeper and wider analysis of the building. The Red Team attacks every room under varying capabilities. The Blue Team analyses the attack data and strengthens the defences against further attack. Each attack-defend cycle yields a rich set of data that can be analysed by the user. We show that our algorithm performs at O(KLn(m+nlogn) time. We present the effectiveness of our system based on recent developments in physical security assessment. | |
dc.publisher | Institute of Electrical and Electronics Engineers ( IEEE ) | |
dc.subject | Physical Security Assessment | |
dc.subject | Building | |
dc.subject | Simulation | |
dc.subject | Computational Red Teaming | |
dc.subject | Information Models | |
dc.title | Computational Red Teaming for Physical Security Assessment | |
dc.type | Conference Paper | |
dcterms.source.startPage | 258 | |
dcterms.source.endPage | 263 | |
dcterms.source.title | 2014 IEEE 4th Annual International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER) | |
dcterms.source.series | 2014 IEEE 4th Annual International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER) | |
dcterms.source.isbn | 978-1-4799-3668-7 | |
dcterms.source.conference | The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems | |
dcterms.source.conference-start-date | Jun 4 2014 | |
dcterms.source.conferencelocation | Hong Kong | |
dcterms.source.place | USA | |
curtin.department | Curtin Sarawak | |
curtin.accessStatus | Fulltext not available |