Critical Infrastructure Protection XIV 14th IFIP WG 11 10 International Conference ICCIP 2020 Arlington VA USA March 16 17 2020 Revised Selected Papers 1st edition by Jason Staggs, Sujeet Shenoi – Ebook PDF Instant Download/DeliveryISBN: 3030628406, 9783030628406
Full download Critical Infrastructure Protection XIV 14th IFIP WG 11 10 International Conference ICCIP 2020 Arlington VA USA March 16 17 2020 Revised Selected Papers 1st edition after payment.
Product details:
ISBN-10 : 3030628406
ISBN-13 : 9783030628406
Author: Jason Staggs, Sujeet Shenoi
The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security; Vehicle Infrastructure Security; Telecommunications Systems Security; Industrial Control Systems Security; Cyber-Physical Systems Security; and Infrastructure Modeling and Simulation. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
Critical Infrastructure Protection XIV 14th IFIP WG 11 10 International Conference ICCIP 2020 Arlington VA USA March 16 17 2020 Revised Selected Papers 1st Table of contents:
I AVIATION INFRASTRUCTURE SECURITY
1 CYBER-PHYSICAL SECURITY OF AIR TRAFFIC SURVEILLANCE SYSTEMS
1. Introduction
2. ADS-B System
3. Related Work
4. Threat Model
5. MSDND
6. Graph-Based Detection System
6.1 Finding Independent Paths
6.2 Eliminating Subpaths
7. MSDND Analysis
7.1 Altimeter Failure
7.2 GPS Satellite Failure
8. Conclusions
Acknowledgement
References
2 SIMULATION-BASED LOGIC BOMB IDENTIFICATION AND VERIFICATION FOR UNMANNED AERIAL VEHICLES
1. Introduction
2. Background
2.1 Critical Infrastructure Applications
2.2 Documented Vulnerabilities
2.3 Logic Bombs
2.4 Black Box Testing
3. Proposed Methodology
3.1 Goals
3.2 General Approach
3.3 Test Suite Overview
3.4 Logic Bomb Creation
3.5 Test Missions
4. Experimental Results and Analysis
4.1 Logic Bomb Effectiveness
4.2 Transit Mission
4.3 Circle Mission
4.4 Spline Circle Mission
4.5 Free Area Survey Mission
5. Conclusions
References
3 ASSESSING THE CYBER RISK OF SMALL UNMANNED AERIAL VEHICLES
1. Introduction
2. Background and Related Work
3. Proposed Risk Assessment Framework
3.1 Base Metrics
3.2 Temporal Metrics
3.3 Environmental Metrics
4. Risk Scoring System
4.1 Base Score
4.2 Temporal Score
4.3 Environmental Score
5. Case Study
5.1 UAV Model 1
5.2 UAV Model 2
5.3 UAV Model 3
5.4 Mission Scenario 1
5.5 Mission Scenario 2
5.6 Mission Scenario 3
5.7 Risk Assessment Results
6. Analysis
6.1 Benefits
6.2 Drawbacks and Challenges
7. Conclusions
References
4 CYBER STATE REQUIREMENTS FOR DESIGN AND VALIDATION OF TRUST IN THE CRITICAL TRANSPORTATION INFRAST
1. Introduction
2. Aviation Data Challenges
3. Data Trustworthiness
4. Data Protection
5. Data Collection and Analysis
6. Recommendations
7. Related Work
8. Conclusions
Acknowledgements
References
II VEHICLE INFRASTRUCTURE SECURITY
5 AN EFFICIENT BLOCKCHAIN AUTHENTICATION SCHEME FOR VEHICULAR AD-HOC NETWORKS
1. Introduction
2. Background
2.1 Vehicular Ad-Hoc Networks
2.2 Blockchains
2.3 Digital Signatures
2.4 MSDND
3. Proposed Scheme
3.1 Vehicle Registration Protocol
3.2 Block Creation Protocol
3.3 Platoon Join Protocol
3.4 Intra-Platoon Communications Protocol
3.5 Platoon Leave Protocol
4. Security Proofs
5. Related Work
6. Conclusions
Acknowledgement
References
6 ENGAGING EMPIRICAL DYNAMIC MODELING TO DETECT INTRUSIONS IN CYBER-PHYSICAL SYSTEMS
1. Introduction
2. Background
2.1 Cyber-Physical Systems and Time Series
2.2 Empirical Dynamic Modeling
2.3 Related Work
3. Proposed Methodology
3.1 Datasets
3.2 Empirical Dynamic Modeling Techniques
4. Analysis Results
4.1 Linear Data
4.2 Nonlinear Data
5. Conclusions
References
III TELECOMMUNICATIONS SYSTEMS SECURITY
7 MULTI-CHANNEL SECURITY THROUGHDATA FRAGMENTATION
1. Introduction
2. Background
2.1 CIA Triad
2.2 Transport Layer Security
2.3 Data Fragmentation
2.4 Diffie-Hellman Key Exchange
2.5 Regulatory Standards
2.6 Summary
3. Proposed Framework
3.1 Goals
3.2 Tunability
3.3 Operation
4. Insights
4.1 Implementation Challenges
4.2 Time and Storage Complexity
4.3 Attack Mitigation
5. Discussion
5.1 TCP/IP Implementation
5.2 Critical Infrastructure Implementation
6. Conclusions
References
8 SECURING AN INFINIBAND NETWORK AND ITS EFFECT ON PERFORMANCE
1. Introduction
2. InfiniBand Architecture
2.1 InfiniBand Components
2.2 Software Architecture
2.3 IPoIB, RDMA and RoCE
2.4 Communications Model
2.5 InfiniBand Security Features
3. InfiniBand Security
3.1 Vulnerabilities
3.2 GUID Spoofing
3.3 Protocol Implementation Security
3.4 Vulnerability Assessment
4. Case Studies
4.1 Testbed Setup
4.2 Case Study 1: Traffic Monitoring
4.3 Case Study 2: Security Implementation
4.4 Case Study 3: Performance
5. Results
5.1 Case Study 1 Results
5.2 Case Study 2 Results
5.3 Case Study 3 Results
6. Conclusions
References
IV INDUSTRIAL CONTROLSYSTEMS SECURITY
9 CYBER-RESILIENT SCADA SYSTEMS VIA SECURE STATE RESTORATION
1. Introduction
2. Background
2.1 Control Theory
2.2 SCADA System Virtualization
2.3 Cyber Resilience
3. Related Work
4. Proposed Methodology
4.1 Overview
4.2 Capturing State
4.3 Determining State
4.4 Storing State
4.5 Restoring State
5. Experimental Verification
5.1 Mathematical Analysis
5.2 Timing Analysis
5.3 Summary
6. Discussion
6.1 Strengths
6.2 Limitations
7. Conclusions
References
10 VULNERABILITY ASSESSMENTS OF BUILDING MANAGEMENT SYSTEMS
1. Introduction
2. Related Work
3. Building Energy Metering System
3.1 System Components
3.2 Vulnerability Assessment
3.3 Smart Lighting System
3.4 System Components
3.5 Communications Protocol Analysis
3.6 Vulnerability Assessment
4. Conclusions
References
11 FORENSIC INVESTIGATION OF A HACKED INDUSTRIAL ROBOT
1. Introduction
2. Universal Robots UR3 Robot
3. Attacking the UR3 Robot
3.1 Network Attack
3.2 Physical Attack
3.3 Discussion
4. Digital Forensic Investigation
4.1 Image Acquisition
4.2 Image Analysis
5. Discussion
5.1 Network Attack
5.2 Physical Attack
5.3 Recommendations
6. Conclusions
Acknowledgement
References
V CYBER-PHYSICAL SYSTEMS SECURITY
12 DISTRIBUTED BIAS DETECTION INCYBER-PHYSICAL SYSTEMS
1. Introduction
2. Related Work
3. Problem Definition
3.1 Attack Model
3.2 Graph Approach
3.3 Distinguishing Victim from Attacker
3.4 False Positives and False Negatives
3.5 Smart Attacker
3.6 Smart Grid Example
4. Proposed Solution
4.1 Residual Sum
4.2 Statistical Behavior
4.3 Resource Requirements
4.4 Published Residuals
4.5 Action and Queue-Based Inspection
5. Experimental Results
6. Conclusions
Acknowledgement
References
13 COMPARISON OF DESIGN-CENTRIC AND DATA-CENTRIC METHODS FOR DISTRIBUTED ATTACK DETECTION IN CYBER-P
1. Introduction
2. Related Work
3. Background
3.1 Secure Water Treatment Plant
3.2 Evaluation Metrics
4. SWaT Rule Evaluation
4.1 Design-Centric Method
4.2 Data-Centric Methods
5. Conclusions
Acknowledgements
References
VI INFRASTRUCTURE MODELINGAND SIMULATION
14 A MODEL-BASED SAFETY-SECURITY RISK ANALYSIS FRAMEWORK FOR INTERCONNECTED CRITICAL INFRASTRUCTURES
1. Introduction
2. Proposed Framework
3. Framework Building Blocks
3.1 DRBD Configurations
3.2 Attack-Fault Trees
3.3 Rome Scenario
4. Stochastic Timed Automata
5. Property Verification Using UPPAAL SMC
6. Evaluation of the Rome Scenario
6.1 Experimental Setup
6.2 Experimental Results
7. Conclusions
References
15 CREATING A CROSS-DOMAIN SIMULATION FRAMEWORK FOR RISK ANALYSES OF CITIES
1. Introduction
2. Simulation Approaches
2.1 Supply Network Simulation
2.2 Interdependency Graphs
2.3 Cascading Effects
3. ODYSSEUS Simulation Approach
3.1 Intra-Domain Level Simulation
3.2 Inter-Domain Level Simulation
4. Application Areas and Limitations
4.1 Application Areas
4.2 Limitations
5. Conclusions
Acknowledgements
References
16 MODELING TELECOMMUNICATIONS INFRASTRUCTURES USING THE CISIApro 2.0 SIMULATOR
1. Introduction
2. Literature Review
3. Modeling Interdependencies
4. Dynamic Risk Propagation via CISIApro 2.0
4.1 CISIApro 2.0 Implementation Details
4.2 CISIApro 2.0 Mathematical Structure
4.3 CISIApro 2.0 Dynamics
5. Telecommunications Network Scenario
6. Scenario Simulation Results
7. Conclusions
Acknowledgement
References
17 Correction to: Cyber-Resilient SCADA Systems via Secure State Restoration
People also search for Critical Infrastructure Protection XIV 14th IFIP WG 11 10 International Conference ICCIP 2020 Arlington VA USA March 16 17 2020 Revised Selected Papers 1st:
international journal of critical infrastructure protection
office of cybersecurity and critical infrastructure protection
national critical infrastructure protection program
nerc critical infrastructure protection
national critical infrastructure protection centre
Tags: Critical Infrastructure, Protection, International Conference, Arlington VA USA, Revised Selected Papers, Jason Staggs, Sujeet Shenoi