scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Critical Infrastructure Protection in 2015"


Journal ArticleDOI
TL;DR: The vulnerabilities and threats facing modern critical infrastructures with special emphasis on industrial control systems are explored, and a number of protection measures are described.

232 citations


Journal ArticleDOI
TL;DR: This paper surveys the latest methodologies and research for measuring and managing industrial-control-system-specific security metrics and introduces the "functional assurance" concept to deal with fail-safe and fail-secure industrial control system operations.

219 citations


Journal ArticleDOI
TL;DR: How a failed critical infrastructure that cannot deliver products and services impacts other critical infrastructures, and how a critical infrastructure is affected when another critical infrastructure fails, are analyzed.

108 citations


Journal ArticleDOI
TL;DR: A novel methodology for assessing the impacts of cyber attacks on critical infrastructures is proposed, inspired by research in system dynamics and sensitivity analysis; the advantages of the methodology over graph-theoretic and electrical centrality metric approaches are demonstrated.

101 citations


Journal ArticleDOI
TL;DR: A novel domain-aware anomaly detection system that detects irregular changes in Modbus/TCP SCADA control register values and develops an automatic classifier to identify the different types of registers.

83 citations


Journal ArticleDOI
TL;DR: The proposed framework offers a novel approach for comprehensively studying the elements of cyber-physical system attacks, including the attacker objectives, cyber exploitation, control-theoretic properties and physical system properties.

74 citations


Journal ArticleDOI
TL;DR: Previous dependency risk analysis research is extended to implement efficient risk mitigation by exploring the relation between dependency risk paths and graph centrality characteristics and specifying an algorithm that prioritizes critical infrastructure nodes for applying mitigation controls.

64 citations


Journal ArticleDOI
TL;DR: The CP-ADL extends the taxonomy with the means to describe relationships between semantically distinct aspects, despite the complex relationships that exist for attacks on cyber-physical systems.

59 citations


Journal ArticleDOI
TL;DR: A quantitative approach for determining the elements of a railway infrastructure that have the highest protection priority is presented and can help practitioners and policy makers obtain a better understanding of the importance and protection priority of railway infrastructure assets as well as other critical infrastructures that have network topologies.

43 citations


Journal ArticleDOI
TL;DR: The experimental results confirm the importance of defense-in-depth strategies and also highlight the embryonic state of software-defined networking security, which requires profound transformation and validation in order to be embraced by the industrial control system community.

30 citations


Journal ArticleDOI
TL;DR: This paper describes a technique that uses proxy technology to produce multiple high-interaction honeypots using a single programmable logic controller that provides a cost-effective method for distributing multiple, authentic, targetable honeypots at slightly more than the cost of a singleProgrammable Logic Controller.

Journal ArticleDOI
TL;DR: Experimental results demonstrate that an arbitrary equal error rate (EER) benchmark is achieved for all programmable logic controllers with a signal-to-noise ratio (SNR) of 5.0dB, and the correlation-based verification approach with Hilbert transform features demonstrates superior performance than with untransformed time domain features.

Journal ArticleDOI
TL;DR: The results demonstrate that low-cost software-defined radios can be used to perform accurate radio frequency fingerprinting and to identify spoofing attacks in critical IEEE 802.15.4-based infrastructure networks such as ZigBee.


Journal ArticleDOI
Cen Nan1, Giovanni Sansavini1
TL;DR: A multilayer hybrid modeling framework is proposed that supports the detailed understanding and holistic analysis of critical infrastructure systems and can help guide the identification of strategies for designing, maintaining and enhancing the performance of critical infrastructures.

Journal ArticleDOI
TL;DR: It is shown that the Urien-Piramuthu authentication protocol is vulnerable to all three attacks with attacker success probabilities of 100%, implying that the protocol cannot protect RFID systems from the attacks.

Journal ArticleDOI
TL;DR: A constraint programming formulation is proposed for the cost-optimal and robust structural design of a low-voltage grid and a design algorithm is proposed that considers the interdependence of information and communications network nodes on power grid nodes to increase the reliability of the grid.

Journal ArticleDOI
TL;DR: This work is the first to use locally-specific data for an emergency management decision support system, and although the methodology is developed for a mid-sized region, it is generalizable to any region.

Journal ArticleDOI
TL;DR: Emergency management performance and coordination patterns within and among on-scene command teams have considerable variation and teams that use less coordination during the intermediate phases of emergency management perform significantly better than teams that do not; moreover, actors who have central positions in a network are better able to achieve their performance goals.


Journal ArticleDOI
TL;DR: The experimental road lane case study demonstrates that policy networks operating within a network governance structure can negatively affect risk assessment and risk management and stresses the importance of taking measures that guarantee risk management in situations where the individuals responsible for risk management lose authority and discretion.

Journal ArticleDOI
TL;DR: Examining the GTD for the years subsequent to the WikiLeaks release reveals that there is little evidence to substantiate that WikiLeaks provided a "to-do" list for terrorists intending to attack critical infrastructure assets as was claimed by some U.S. government officials.