Limit search to available items
Book Cover
E-book
Author IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (9th : 2015 : Arlington, Va.)

Title Critical infrastructure protection IX : 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers / edited by Mason Rice, Sujeet Shenoi
Published Cham : Springer, 2015

Copies

Description 1 online resource (xviii, 331 pages) : illustrations
Series IFIP Advances in Information and Communication Technology, 1868-4238 ; 466
IFIP advances in information and communication technology ; 466. 1868-4238
Contents Intro; Contents; Contributing Authors; Preface; THEMES AND ISSUES; A MODEL FOR CHARACTERIZING CYBERPOWER; 1. Introduction; 2. Related Work; 3. Unified Cyberspace Model; 4. Defining Cyberpower; 4.1 Cyberpower; 4.2 State and Non-State Actors; 5. Characterizing Cyberpower; 5.1 Cyber Attack Attributes; 5.2 Cyber Attack Evaluation; 6. Conclusions; References; CYBER ATTACKS AND POLITICAL EVENTS: THE CASE OF THE OCCUPY CENTRAL CAMPAIGN; 1. Introduction; 2. Initial Violent Attacks; 3. Silent Attacks on Protest Supporters; 4. Violent Attacks on Protest Supporters; 5. Violent Attacks on the Government
6. Attack Characteristics7. Motivation for the Cyber War Framework; 8. Cyber Warfare Framework; 9. Conclusions; References; ON THE SHARING OF CYBER SECURITY INFORMATION; 1. Introduction; 2. Definitions; 3. Previous Work; 4. Analytic Framework for Information Sharing; 4.1 Information Exchange Classes and Elements; 4.2 Framework Levels; 4.3 Incident Management Cycle; 4.4 Mapping the Elements to the Grid; 5. Standards and Standardization Efforts; 6. Conclusions; References; CONTROL SYSTEMS SECURITY; MODELING MESSAGE SEQUENCES FOR INTRUSION DETECTION IN INDUSTRIAL CONTROL SYSTEMS; 1. Introduction
2. Background3. Sequence Attacks; 4. Sequences and Sequence Events; 5. Modeling Message Sequences; 6. Experiments and Analysis; 6.1 Modbus; 6.2 MMS; 6.3 IEC104; 6.4 Discussion; 7. Related Work; 8. Conclusions; References; INDUSTRIAL CONTROL SYSTEM FINGERPRINTING AND ANOMALY DETECTION; 1. Introduction; 2. Related Work; 3. Background; 4. Experimental Setup; 5. Fingerprinting Methodology; 6. Fingerprint-Based Anomaly Detection; 7. Conclusions; References; TRAFFIC-LOCALITY-BASED CREATION OF FLOW WHITELISTS FOR SCADA NETWORKS; 1. Introduction; 2. Background; 2.1 Network Flow and Flow Whitelists
2.2 Traffic Summary2.3 Degree Centrality; 2.4 Locally Frequently-Used Ports; 3. Flow Whitelist Creation; 3.1 Overview; 3.2 Phase 1: Preparation; 3.3 Phase 2: Generation; 3.4 Phase 3: Inspection; 4. Experimental Results; 4.1 Phase 1: Preparation; 4.2 Phase 2: Generation; 4.3 Phase 3: Inspection; 4.4 Discussion; 5. Conclusions; References; A SYMBOLIC HONEYNET FRAMEWORK FOR SCADA SYSTEM THREAT INTELLIGENCE; 1. Introduction; 2. Related Work; 3. SCyPH Framework; 3.1 Overview; 3.2 Honeynet Layer; 3.3 Interaction Layer; 3.4 Infrastructure Modeling Layer; 3.5 Logging Layer; 4. GridPot; 4.1 IEC 61850
4.2 Experiment Design4.3 Infrastructure Modeling; 4.4 Logging and Anomaly Detection; 4.5 Experimental Results; 5. Conclusions; References; ENHANCING A VIRTUAL SCADA LABORATORY USING SIMULINK; 1. Introduction; 2. Related Work; 3. SCADA Laboratory Overview; 3.1 Process Simulation; 3.2 Programmable Logic Controller Simulation; 3.3 Human-Machine Interface; 4. SCADA Laboratory Enhancements; 5. Experimental Results; 5.1 Normal Operation; 5.2 Startup Operation; 5.3 Attack Operation; 6. Conclusions; References; HOW INDUSTRIAL CONTROL SYSTEM SECURITY TRAINING IS FALLING SHORT; 1. Introduction
Summary The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues, Control Systems Security, Cyber-Physical Systems Security, Infrastructure Security, Infrastructure Modeling and Simulation, Risk and Impact Assessment. This book is the ninth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of nineteen edited papers from the Ninth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2015. Critical Infrastructure Protection IX is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Mason Rice is an Assistant Professor of Computer Science at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA
Bibliography Includes bibliographical references
Notes English
Subject Computer networks -- Security measures -- Congresses
Computer science.
Computer security
Computers and civilization.
Computers.
Management information systems.
Electronic Data Processing
Computer Security
Computers
Management Information Systems
computers.
Computer networks -- Security measures
Computer science
Computer security
Computers
Computers and civilization
Management information systems
Genre/Form dictionaries.
proceedings (reports)
Dictionaries
Conference papers and proceedings
Dictionaries.
Conference papers and proceedings.
Dictionnaires.
Actes de congrès.
Form Electronic book
Author Rice, Mason, editor
Shenoi, Sujeet, editor
ISBN 9783319265674
3319265679
Other Titles ICCIP 2015