Probabilistic assessment of integrated safety and security related abnormal events: a case of chemical plants

Abstract Conventional risk assessment of chemical plants considers process accident related causal factors. In the current geopolitical situation, chemical plants have become the target of terrorism attacks, making security concerns as important as safety. To protect the public and environment from undue risks, security related causal factors need to be considered as part of the risk analysis of chemical plants. This paper presents an integrated approach to dynamically assess the occurrence probability of abnormal events. The abnormal event is a state of a process plant arrived either due to a process accident or an intentional (terrorist) threat. This approach considers both safety and security related risk factors in a unified framework. A Bayesian network is used to model specific evolution scenarios of process accidents directly initiated from security related factors and the interaction of causal factors. This model enables to dynamically analyze the occurrence probabilities of abnormal events and causal factors given evidence; it could also capture the impacts of interaction among safety and security related causal factors on these occurrence probabilities. The proposed approach is applied to an oil storage tank to demonstrate its applicability and effectiveness. It is observed that the effect of dependency between correlative accidental and security related factors significantly change the occurrence probability of abnormal events in dynamical assessment.

[1]  Cheng-Chung Lin,et al.  A study of storage tank accidents , 2006 .

[2]  Bilal M Ayyub,et al.  Risk analysis for critical asset protection. , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[3]  Faisal Khan,et al.  Dynamic safety analysis of process systems by mapping bow-tie into Bayesian network , 2013 .

[4]  Genserik Reniers,et al.  Security risk assessment and protection in the chemical and process industry , 2015 .

[5]  Igor Nai Fovino,et al.  Integrating cyber attacks within fault trees , 2009, Reliab. Eng. Syst. Saf..

[6]  Yacov Y. Haimes,et al.  Strategic Responses to Risks of Terrorism to Water Resources , 2002 .

[7]  Nima Khakzad,et al.  Protecting Chemical Plants against Terrorist Attacks: A Review , 2015 .

[8]  Jai P. Gupta,et al.  Site Security: for Chemical Process Industries , 2011 .

[9]  Faisal I. Khan,et al.  Functional quantitative security risk analysis (QSRA) to assist in protecting critical process infrastructure , 2017, Reliab. Eng. Syst. Saf..

[10]  Bilal M. Ayyub,et al.  Multicriteria Security System Performance Assessment Using Fuzzy Logic , 2007 .

[11]  Ludovic Piètre-Cambacédès,et al.  Modeling safety and security interdependencies with BDMP (Boolean logic Driven Markov Processes) , 2010, 2010 IEEE International Conference on Systems, Man and Cybernetics.

[12]  Faisal Khan,et al.  Risk Analysis of Dust Explosion Scenarios Using Bayesian Networks , 2015, Risk analysis : an official publication of the Society for Risk Analysis.

[13]  Miroljub Grozdanovic,et al.  Framework for human error quantification , 2006 .

[14]  Nima Khakzad,et al.  Dynamic safety risk analysis of offshore drilling , 2014 .

[15]  Kathryn B. Laskey,et al.  An Application of Bayesian Networks to Antiterrorism Risk Management for Military Planners , 2005 .

[16]  Zhi Yuan,et al.  Dynamic occupational risk model for offshore operations in harsh environments , 2016, Reliab. Eng. Syst. Saf..

[17]  Barry M. Horowitz,et al.  A risk-based methodology for combating terrorism , 2003, IEEE Systems and Information Engineering Design Symposium, 2003.

[18]  Y. F. Khalil,et al.  A novel probabilistically timed dynamic model for physical security attack scenarios on critical infrastructures , 2016 .

[19]  E. Broughton The Bhopal disaster and its aftermath: a review , 2005, Environmental health : a global access science source.

[20]  Jan Erik Vinnem,et al.  Root causes of hydrocarbon leaks on offshore petroleum installations , 2015 .

[21]  Mark Adrian van Staalduinen,et al.  A Barrier Based Methodology to Assess Site Security Risk , 2015 .

[22]  Bilal M Ayyub,et al.  Critical Asset and Portfolio Risk Analysis: An All‐Hazards Framework , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[23]  Zhilong Chen,et al.  Using game theory to optimize allocation of defensive resources to protect multiple chemical facilities in a city against terrorist attacks , 2016 .

[24]  Balbir S. Dhillon Human Reliability and Error in Transportation Systems , 2007 .

[25]  Faisal Khan,et al.  Methods and models in process safety and risk management: Past, present and future , 2015 .

[26]  Terje Aven,et al.  A unified framework for risk and vulnerability analysis covering both safety and security , 2007, IEEE Engineering Management Review.

[27]  Valerio Cozzani,et al.  The assessment of the attractiveness of process facilities to terrorist attacks , 2015 .

[28]  J. P. Gupta,et al.  Security risk assessment: applying the concepts of fuzzy logic. , 2010, Journal of hazardous materials.

[29]  Faisal Khan,et al.  SVAPP methodology: A predictive security vulnerability assessment modeling method , 2016 .

[30]  Faisal Khan,et al.  Quantitative risk analysis of offshore drilling operations: A Bayesian approach , 2013 .

[31]  Benoît Iung,et al.  Overview on Bayesian networks applications for dependability, risk analysis and maintenance areas , 2012, Eng. Appl. Artif. Intell..