Use-Misuse Case Driven Analysis of Positive Train Control

Forensic analysis helps identify the causes of crimes and accidents. Determination of cause, however, requires detailed knowledge of a system’s design and operational characteristics. This paper advocates that “use cases,” which specify operational interactions and requirements, and “misuse cases,” which specify potential misuse or abuse scenarios, can be used to analyze and link forensic evidence and create postincident reconstructions. Use-misuse case analysis techniques involving non-probabilistic and probabilistic methods are described and applied to Positive Train Control (PTC) Systems — a network-based automated system that controls the movements of passenger and freight trains.

[1]  Finn V. Jensen,et al.  Bayesian Networks and Decision Graphs , 2001, Statistics for Engineering and Information Science.

[2]  Jeroen Keppens,et al.  A model based reasoning approach for generating plausible crime scenarios from evidence , 2003, ICAIL.

[3]  S. Craven,et al.  Security of ATCS wireless railway communications , 2005 .

[4]  David A. Dampier,et al.  Preparing for Large-Scale Investigations with Case Domain Modeling , 2005, DFRWS.

[5]  Yacov Y. Haimes,et al.  Risks of Terrorism to Information Technology and to Critical Interdependent Infrastructures , 2004 .

[6]  Jan Jürjens,et al.  Use Case Oriented Development of Security-Critical Systems , 2003 .

[7]  P.V. Craven,et al.  A brief look at railroad communication vulnerabilities , 2004, Proceedings. The 7th International IEEE Conference on Intelligent Transportation Systems (IEEE Cat. No.04TH8749).

[8]  Andreas L. Opdahl,et al.  Templates for Misuse Case Description , 2001 .

[9]  Brian Falkenhainer,et al.  Compositional Modeling: Finding the Right Model for the Job , 1991, Artif. Intell..

[10]  Craig Larman,et al.  Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and the Unified Process , 2001 .

[11]  Henry Prakken,et al.  Modelling reasoning about evidence in legal procedure , 2001, ICAIL '01.

[12]  David B. Dunson,et al.  Bayesian Data Analysis , 2010 .

[13]  Dianxiang Xu,et al.  Threat-Driven Architectural Design of Secure Information Systems , 2018, ICEIS.

[14]  Owen Rambow,et al.  Conceptual modeling through linguistic analysis using LIDA , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.

[15]  Jeroen Keppens,et al.  Centre for Intelligent Systems and Their Applications on Compositional Modelling on Compositional Modelling on Compositional Modelling* , 2022 .