Skip to main content
Top

2010 | Book

Critical Information Infrastructures Security

4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers

Editors: Erich Rome, Robin Bloomfield

Publisher: Springer Berlin Heidelberg

Book Series : Lecture Notes in Computer Science

insite
SEARCH

Table of Contents

Frontmatter
On Modelling of Inter-dependent Network Infrastructures by Extended Leontief Models
Abstract
We report on recent developments on stochastic chain modelling of inter-dependent network infrastructures. The problem is approached in the spirit of the Leontief tradition within the framework of the Inoperability Input/Output Modelling [6] where, instead of dealing with the sector products, inoperabilities are introduced to describe the status of the global system.
A Markov Chain evolution law replaces Leontief equilibrium condition upon external changes, thus allowing to follow the transition from an equilibrium configuration to an other and possibly mimic cascade effects triggered by unwilled disturbances. Moreover, as a variation to the “System of Systems” approach, each network is not treated like an holomorphic entity, but its inner structure is inspected. Multiple implementations of the same scenarios at different level of granularity have been compared providing evidence for intrinsic inconsistency of models disregarding the geographic distribution of networks.
Gregorio D’Agostino, Roberto Cannata, Vittorio Rosato
Critical Infrastructure Protection in Brazil - Threat Identification and Analysis
Abstract
This paper describes the Methodology for Threat Identification and Analysis (MIdA2) and its application to Brazil’s critical telecommunication infrastructure. As this effort is part of a bigger project, Brazil’s critical telecommunication infrastructure protection, other methodologies related to MIdA2 are also briefly presented to give the reader a broader perspective.
João H. A. Franco, Sérgio L. Ribeiro, Sandra M. C. Tome, Christiane M. S. Cuculo, Marcos B. Trindade, Leonardo M. Lage, Regina M. F. Souza
Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan
Abstract
In recent years, the dilemma of cyber attacks by malicious third parties targeting security vulnerabilities in information and communication systems has emerged, resulting in security incidents. This situation suggests that the establishment of proactive efforts and recurrence prevention measures are becoming imperative, especially in critical infrastructure sectors.This paper provides an analysis of 58 security incident cases, which occurred in critical infrastructures worldwide and were published in media. The purpose of the analysis is to conclude to a valid list of recurrence prevention measures that constitute good practices.
Hideaki Kobayashi, Kenji Watanabe, Takahito Watanabe, Yukinobu Nagayasu
Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations
Abstract
The simulation of critical infrastructures (CI) can involve the use of diverse domain specific simulators that run on geographically distant sites. These diverse simulators must then be coordinated to run concurrently in order to evaluate the performance of critical infrastructures which influence each other, especially in emergency or resource-critical situations. We therefore describe the design of an adaptive communication middleware that provides reliable and real-time one-to-one and group communications for federations of CI simulators over a wide-area network (WAN). The proposed middleware is composed of mobile agent-based peer-to-peer (P2P) overlays, called virtual networks (VNets), to enable resilient, adaptive and real-time communications over unreliable and dynamic physical networks (PNets). The autonomous software agents comprising the communication middleware monitor their performance and the underlying PNet, and dynamically adapt the P2P overlay and migrate over the PNet in order to optimize communications according to the requirements of the federation and the current conditions of the PNet. Reliable communications is provided via redundancy within the communication middleware and intelligent migration of agents over the PNet. The proposed middleware integrates security methods in order to protect the communication infrastructure against attacks and provide privacy and anonymity to the participants of the federation. Experiments with an initial version of the communication middleware over a real-life networking testbed show that promising improvements can be obtained for unicast and group communications via the agent migration capability of our middleware.
Gökçe Görbil, Erol Gelenbe
An Alternate Topology Generator for Joint Study of Power Grids and Communication Networks
Abstract
This article presents a method to generate conjointly topological graphs representing interdependent telecommunication and power networks. The method proposes to use a single basis, possibly random, as the common input of independent graph generation algorithms, allowing to apply different rules for different networks while preserving dependencies and interconnections’ realism. It allows to generate heterogeneous networks and is evolutionary.
Alpha Amadou Diallo, Claude Chaudet
Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems
Abstract
Recent research on intrusion detection in supervisory data acquisition and control (SCADA) and DCS systems has focused on anomaly detection at protocol level based on the well-defined nature of traffic on such networks. Here, we consider attacks which compromise sensors or actuators (including physical manipulation), where intrusion may not be readily apparent as data and computational states can be controlled to give an appearance of normality, and sensor and control systems have limited accuracy. To counter these, we propose to consider indirect relations between sensor readings to detect such attacks through concurrent observations as determined by control laws and constraints.
We use a brewery bulk and fill pasteurizer as a specimen for biochemical processes. We motivate our approach by considering possible attacks and means of detection. Here we rely on the existence of non-linear relationships which allow us to attach a greater significance to small differences in sensor readings than would otherwise be the case and demonstrate the insufficiency of existing sensor placement and measurement frequency to detect such attacks.
Thomas Richard McEvoy, Stephen D. Wolthusen
Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security
Abstract
This paper outlines the scientific goals, ongoing work and first results of the SiVe research project on critical infrastructure security. The methodology is generic while pilot studies are chosen from airport security. The outline proceeds in three major steps, (1) building a threat scenario, (2) development of simulation models as scenario refinements, and (3) assessment of alternatives. Advanced techniques of systems analysis and simulation are employed to model relevant airport structures and processes as well as offences. Computer experiments are carried out to compare and optimise alternative solutions. The optimality analyses draw on approaches to quantitative risk assessment recently developed in the operational sciences. To exploit the advantages of the various techniques, an integrated simulation workbench is build up in the project.
Marcus Breiing, Mara Cole, John D’Avanzo, Gebhard Geiger, Sascha Goldner, Andreas Kuhlmann, Claudia Lorenz, Alf Papproth, Erhard Petzel, Oliver Schwetje
Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection
Abstract
With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may give rise to severe damage for life and assets without the implementation of proper safeguards. Thus, we propose a method that is capable to reliably detect unknown, exploit-based attacks on cyber-critical infrastructures carried out over the network. We illustrate the effectiveness of the proposed method by conducting experiments on network traffic that can be found in modern industrial control systems. Moreover, we provide results of a throughput measuring which demonstrate the real-time capabilities of our system.
Patrick Düssel, Christian Gehl, Pavel Laskov, Jens-Uwe Bußer, Christof Störmann, Jan Kästner
Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis
Abstract
In this paper, a decision aid tool (DAT) for Critical Infrastructure threats analysis and ranking is presented. We propose the ontology-based approach that provides classification, relationships and reasoning about vulnerabilities and threats of the critical infrastructures. Our approach is a part of research within INSPIRE project for increasing security and protection through infrastructure resilience.
Michał Choraś, Adam Flizikowski, Rafał Kozik, Witold Hołubowicz
Application Filters for TCP/IP Industrial Automation Protocols
Abstract
The use of firewalls is a common approach usually meant to secure Automation Technology (AT) from Information Technology (TI) networks. This work proposes a filtering system for TCP/IP-based automation networks in which only certain kind of industrial traffic is permitted. All network traffic which does not conform with a proper industrial protocol pattern or with specific rules for its actions is supposed to be abnormal and must be blocked. As a case study, we developed a seventh layer firewall application with the ability of blocking spurious traffic, using an IP packet queueing engine and a regular expression library.
Aguinaldo B. Batista Jr., Tiago H. Kobayashi, João Paulo S. Medeiros, Agostinho M. Brito Jr., Paulo S. Motta Pires
Web Browser Security Update Effectiveness
Abstract
We analyze the effectiveness of different Web browser update mechanisms on various operating systems; from Google Chrome’s silent update mechanism to Opera’s update requiring a full re-installation. We use anonymized logs from Google’s world wide distributed Web servers. An analysis of the logged HTTP user-agent strings that Web browsers report when requesting any Web page is used to measure the daily browser version shares in active use. To the best of our knowledge, this is the first global scale measurement of Web browser update effectiveness comparing four different Web browser update strategies including Google Chrome. Our measurements prove that silent updates and little dependency on the underlying operating system are most effective to get users of Web browsers to surf the Web with the latest browser version.
Thomas Duebendorfer, Stefan Frei
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept
Abstract
We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere with the correct behavior of the system. The proposed IDS detects such attacks thanks to an internal representation of the controlled SCADA system and a corresponding rule language, powerful enough to express the system’s critical states. Furthermore, we detail the implementation and provide experimental comparative results.
Andrea Carcano, Igor Nai Fovino, Marcelo Masera, Alberto Trombetta
Towards Early Warning Systems – Challenges, Technologies and Architecture
Abstract
We present the architecture of an automatic early warning system (EWS) that aims at providing predictions and advice regarding security threats in information and communication technology without incorporation of cognitive abilities of humans and forms the basis for drawing a situation picture. Our EWS particularly targets the growing malware threat and shall achieve the required capabilities by combining malware collectors, malware analysis systems, malware behavior clustering, signature generation and distribution and malware/misuse detection system into an integrated process chain. The quality and timeliness of the results delivered by the EWS are influenced by the number and location of participating partners that share information on security incidents. In order to enable such a cooperation and an effective deployment of the EWS, interests and confidentiality requirements of the parties involved need to be carefully examined. We discuss technical details of the EWS components, evaluate alternatives and examine the interests of all parties involved in the anticipated deployment scenario.
Martin Apel, Joachim Biskup, Ulrich Flegel, Michael Meier
CII Protection - Lessons for Developing Countries: South Africa as a Case Study
Abstract
We explore the process followed in formulating the South African CII (Critical Information Infrastructure) identification criteria and its application. We report on a three pronged approach that defines National Security, severity of CII security incidents and roles and responsibilities for CII protection. Our Criteria assumes the existence of basic ICT security roles within a country as per application of the South African criteria and its suitability for a country with limited resources. We conclude by recommending a CII protection approach that is best suited for developing countries based on our experiences.
Mboneli Ndlangisa, Deon Herbst
Energy Theft in the Advanced Metering Infrastructure
Abstract
Global energy generation and delivery systems are transitioning to a new computerized “smart grid”. One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.
Stephen McLaughlin, Dmitry Podkuiko, Patrick McDaniel
Current Capabilities, Requirements and a Proposed Strategy for Interdependency Analysis in the UK
Abstract
The UK government recently commissioned a research study to identify the state-of-the-art in Critical Infrastructure modelling and analysis, and the government/industry requirements for such tools and services. This study (Cetifs) concluded with a strategy aiming to bridge the gaps between the capabilities and requirements, which would establish interdependency analysis as a commercially viable service in the near future. This paper presents the findings of this study that was carried out by CSR, City University London, Adelard LLP, a safety/security consultancy and Cranfield University, defense academy of the UK.
Robin Bloomfield, Nick Chozos, Kizito Salako
Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure
Abstract
An approach to Quantitative Interdependency Analysis, in the context of Large Complex Critical Infrastructures, is presented in this paper. A Discrete state–space, Continuous–time, Stochastic Process models the operation of critical infrastructure, taking interdependencies into account. Of primary interest are the implications of both model detail (that is, level of model abstraction) and model parameterisation for the study of dependencies. Both of these factors are observed to affect the distribution of cascade–sizes within and across infrastructure.
Robin Bloomfield, Lubos Buzna, Peter Popov, Kizito Salako, David Wright
Backmatter
Metadata
Title
Critical Information Infrastructures Security
Editors
Erich Rome
Robin Bloomfield
Copyright Year
2010
Publisher
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-14379-3
Print ISBN
978-3-642-14378-6
DOI
https://doi.org/10.1007/978-3-642-14379-3

Premium Partner