Critical Infrastructure Protection VI 6th IFIP WG 11. 10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers

Saved in:
Bibliographic Details
Main Authors Butts, Jonathan, Shenoi, Sujeet
Format eBook
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin / Heidelberg 2013
Edition1
Subjects
Online AccessGet full text

Cover

Loading…
Table of Contents:
  • Time Delay Calculations -- Analysis of Communication Delays -- Closed-Loop Control System -- Causes of Communication Delays -- Delay Range -- Implementation of Communication Delays -- Delay Realities -- Fuzzy Logic Controller Design -- Fuzzification -- Control Rules -- Fuzzy Inference -- Defuzzification -- Thyristor Firing Angle Computation -- Simulation of Communication Delays -- Attacks Causing Communication Delays -- Conclusions -- References -- MEASURING NAME SYSTEM HEALTH -- Introduction -- Domain Name System -- DNS Overview -- DNS Threats -- DNS Incidents -- DNS Health and Security -- MeNSa Framework -- Framework Components -- Reference Architecture -- Point of View -- Metrics -- Framework Application -- Experimental Evaluation -- Measurements and Metrics -- Aggregation and Experimental Results -- Discussion -- Conclusions -- References -- EMERGENCY MESSAGES IN THE COMMERCIAL MOBILE ALERT SYSTEM -- Introduction -- CMAS Limitations -- CMAS Enhancement -- ERApp Considerations -- CMAS Architectural Enhancement -- CMAS Encoding Schemes -- Experimental Evaluation -- Conclusions -- References -- IV INFRASTRUCTURE MODELING AND SIMULATION -- A ONE-DIMENSIONAL SPARSE SPACE-TIME SPECIFICATION OF THE GENERALIZED RAILROAD CROSSING -- Introduction -- Background -- Region Connection Calculus -- Spatial-Temporal Logics -- Generalized Railroad Crossing -- Sparse Space-Time -- Sparse Space-Time Soundness -- Sparse Space-Time Completeness -- Sparse Space-Time GRC Specification -- GRC Safety -- GRC Liveness -- Comparison of Specifications -- Original GRC Specification -- Shape Calculus GRC Specification -- Sparse Space-Time GRC Specification -- Discussion -- Conclusions -- Acknowledgements -- References -- A NETWORKED EVIDENCE THEORY FRAMEWORK FOR CRITICAL INFRASTRUCTURE MODELING -- Introduction -- Background -- Evidence Theory
  • Intro -- Title -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- THE EUROPEAN PERSPECTIVE OF TELECOMMUNICATIONS AS A CRITICAL INFRASTRUCTURE -- Introduction -- European Telecommunications Sector -- Infrastructure Approach -- Proposed Classification Method -- Italian Case Study -- Italian Telecommunications Sector -- Telecom Italia -- Conclusions -- References -- IMPLEMENTING CRITICAL INFORMATION INFRASTRUCTURE PROTECTION STRUCTURES IN DEVELOPING COUNTRIES -- Introduction -- Background -- Protection Structures -- CIIP Framework for Developing Nations -- Two-Factor Development -- CIIP Framework Development -- Stages of Development -- Initial Development -- Intermediate Development -- Mature Development -- Conclusions -- References -- INTEGRITY-ORGANIZATION BASED ACCESS CONTROL FOR CRITICAL INFRASTRUCTURE SYSTEMS -- Introduction -- Background -- OrBAC Security Model -- Integrity Requirements -- Integrity-OrBAC Model -- Assigning Integrity Levels -- I-OrBAC Model Components -- Access Control Policy Example -- Flexible Integrity Levels -- Integrity Principle Expressed via I-OrBAC -- Conclusions -- References -- II CONTROL SYSTEMS SECURITY -- ANALYSIS OF FIELD DEVICES USED IN INDUSTRIAL CONTROL SYSTEMS -- Introduction -- PLC Overview -- Hardware Analysis -- Example Device Analysis -- General Findings -- Firmware Analysis -- Acquiring Firmware -- Identifying the Device Architecture -- Communication Backplane Analysis -- Identifying Physical Properties -- Analyzing Pin Logic -- Translating Backplane Traffic into Bytes -- Analyzing the Backplane Protocol -- Dissecting Backplane Traffic -- Conclusions -- Acknowledgements -- References -- A FIRMWARE VERIFICATION TOOL FOR PROGRAMMABLE LOGIC CONTROLLERS -- Introduction -- Background -- Tool Design and Evaluation -- Evaluation Environment -- Design -- Evaluation Results -- Analysis
  • Data Fusion in the Network Context -- Data Fusion Algorithm -- Application Scenario -- Conclusions -- Acknowledgement -- References -- ENABLING THE EXPLORATION OF OPERATING PROCEDURES IN CRITICAL INFRASTRUCTURES -- Introduction -- Background -- Evidence Theory -- Data Fusion in the Network Context -- Data Fusion Algorithm -- Application Scenario -- Conclusions -- Acknowledgement -- References
  • Discussion -- Impact -- Conclusions -- Acknowledgements -- References -- QUANTIFYING CONTROLLER RESILIENCE USING BEHAVIOR CHARACTERIZATION -- Introduction -- Background -- Behavior Characterization Methodology -- PLC Behavior Characterization -- PLC Program Development -- Petri Net Derivation -- Analysis and Findings -- Reachability Matrix -- Metrics -- Extending the Implementation -- Conclusions -- References -- USING BLOOM FILTERS TO ENSURE ACCESS CONTROL AND AUTHENTICATION REQUIREMENTS FOR SCADA FIELD DEVICES -- Introduction -- Background -- FD-SPP Challenge Response Authentication -- FD-SPP Access Control -- Bloom Filters -- Using a Dual Bloom Filter -- Evaluation -- Performance -- False Positives -- Reducing the False Positive Rate -- Conclusions -- References -- AGENT INTERACTION AND STATE DETERMINATION IN SCADA SYSTEMS -- Introduction -- Background -- G{π}-Calculus -- Coordinated Attack -- Distributed Detection -- Conclusions -- References -- III INFRASTRUCTURE SECURITY -- INFRASTRUCTURE PROTECTION IN THE DUTCH FINANCIAL SECTOR -- Introduction -- Dutch Financial Sector Approach -- Sector-Specific Protection -- Critical Products and Services -- Dutch Financial Infrastructure -- International Context -- Organizational Structures and Measures -- Cross-Border Structures and Measures -- Challenges -- Analysis -- Proposed Model -- Conclusions -- References -- PRIVACY-PRESERVING POWER USAGE CONTROL IN THE SMART GRID -- Introduction -- Problem Statement -- Related Work -- Privacy-Preserving Protocols -- Implementation -- f1TPUC Protocol -- f2TPUC Protocol -- Protocol Efficiency and Privacy -- Protocol Complexity -- Protocol Privacy -- Conclusions -- Acknowledgements -- References -- EFFECTS OF TIME DELAYS IN THE ELECTRIC POWER GRID -- Introduction -- Communication Delays in the Power Grid -- Critical Timing Requirements -- Delay Components