• DocumentCode
    265199
  • Title

    Computational Red Teaming for physical security assessment

  • Author

    Tan, Te ; Porter, Stuart ; Tan, Te ; West, Geoff

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Curtin Univ. Sarawak, Miri, Malaysia
  • fYear
    2014
  • fDate
    4-7 June 2014
  • Firstpage
    258
  • Lastpage
    263
  • Abstract
    Computational Red Teaming (CRT) is a computational approach to test defences. In this paper, we use develop a CRT system to assess the physical security of any building, provided the building is designed with Building Information Models (BIM). BIMs are similar to 3D Computer Aided Design (CAD) models but with the addition of extra layers of information on the building system and components. Through a demonstration attack on a facility, this paper shows how a CRT approach to physical security assessment leads to a deeper and wider analysis of the building. The Red Team attacks every room under varying capabilities. The Blue Team analyses the attack data and strengthens the defences against further attack. Each attack-defend cycle yields a rich set of data that can be analysed by the user. We show that our algorithm performs at O(KLn(m+nlogn)) time. We present the effectiveness of our system based on recent developments in physical security assessment.
  • Keywords
    CAD; buildings (structures); security; structural engineering computing; 3D computer aided design; BIM; CAD model; building information model; computational red teaming; physical security assessment; Algorithm design and analysis; Buildings; Computational modeling; Rocks; Security; Solid modeling; Space exploration; Building Information Models; Computational Red Teaming; Physical Security Assessment; Simulation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 2014 IEEE 4th Annual International Conference on
  • Conference_Location
    Hong Kong
  • Print_ISBN
    978-1-4799-3668-7
  • Type

    conf

  • DOI
    10.1109/CYBER.2014.6917471
  • Filename
    6917471