ebook img

Critical Infrastructure Protection III: Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers PDF

256 Pages·2009·4.348 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Critical Infrastructure Protection III: Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers

IFIP Advances in Information and Communication Technology 311 Editor-in-Chief A.JoeTurner,Seneca,SC,USA EditorialBoard FoundationsofComputerScience MikeHinchey,Lero,Limerick,Ireland Software:TheoryandPractice BertrandMeyer,ETHZurich,Switzerland Education BernardCornu,CNED-EIFAD,Poitiers,France InformationTechnologyApplications RonaldWaxman,EDAStandardsConsulting,Beachwood,OH,USA CommunicationSystems GuyLeduc,UniversitédeLiège,Belgium SystemModelingandOptimization JacquesHenry,UniversitédeBordeaux,France InformationSystems BarbaraPernici,PolitecnicodiMilano,Italy RelationshipbetweenComputersandSociety ChrisanthiAvgerou,LondonSchoolofEconomics,UK ComputerSystemsTechnology PaoloPrinetto,PolitecnicodiTorino,Italy SecurityandPrivacyProtectioninInformationProcessingSystems KaiRannenberg,GoetheUniversityFrankfurt,Germany ArtificialIntelligence MaxA.Bramer,UniversityofPortsmouth,UK Human-ComputerInteraction AnneliseMarkPejtersen,CenterofCognitiveSystemsEngineering,Denmark EntertainmentComputing RyoheiNakatsu,NationalUniversityofSingapore IFIP–TheInternationalFederationforInformationProcessing IFIPwasfoundedin1960undertheauspicesofUNESCO,followingtheFirst WorldComputerCongressheldinParisthepreviousyear.Anumbrellaorgani- zation for societies working in information processing, IFIP’s aim is two-fold: tosupportinformationprocessingwithinitsmembercountriesandtoencourage technologytransfertodevelopingnations.Asitsmissionstatementclearlystates, IFIP’s mission is to be the leading, truly international, apolitical organizationwhichencouragesandassistsinthedevelopment,ex- ploitationandapplicationofinformationtechnologyforthebenefit ofallpeople. IFIPisanon-profitmakingorganization,runalmostsolelyby2500volunteers.It operatesthroughanumberoftechnicalcommittees,whichorganizeeventsand publications.IFIP’seventsrangefromaninternationalcongresstolocalseminars, butthemostimportantare: • TheIFIPWorldComputerCongress,heldeverysecondyear; • Openconferences; • Workingconferences. TheflagshipeventistheIFIPWorldComputerCongress,atwhichbothinvited andcontributedpapersarepresented.Contributedpapersarerigorouslyrefereed andtherejectionrateishigh. As with the Congress, participation in the open conferences is open to all and papersmaybeinvitedorsubmitted.Again,submittedpapersarestringentlyref- ereed. The working conferences are structured differently. They are usually run by a workinggroupandattendanceissmallandbyinvitationonly.Theirpurposeis tocreateanatmosphereconducivetoinnovationanddevelopment.Refereeingis lessrigorousandpapersaresubjectedtoextensivegroupdiscussion. Publications arising from IFIP events vary. The papers presented at the IFIP WorldComputerCongressandatopenconferencesarepublishedasconference proceedings,whiletheresultsoftheworkingconferencesareoftenpublishedas collectionsofselectedandeditedpapers. Anynationalsocietywhoseprimaryactivityisininformationmayapplytobe- comeafullmemberofIFIP,althoughfullmembershipisrestrictedtoonesociety percountry.FullmembersareentitledtovoteattheannualGeneralAssembly, Nationalsocietiespreferringalesscommittedinvolvementmayapplyforasso- ciateorcorrespondingmembership.Associatemembersenjoythesamebenefits asfullmembers,butwithoutvotingrights.Correspondingmembersarenotrep- resentedinIFIPbodies.Affiliatedmembershipisopentonon-nationalsocieties, andindividualandhonorarymembershipschemesarealsooffered. Charles Palmer Sujeet Shenoi (Eds.) Critical Infrastructure Protection III ThirdAnnual IFIP WG 11.10 International Conference on Critical Infrastructure Protection Hanover, New Hampshire, USA, March 23-25, 2009 Revised Selected Papers 1 3 VolumeEditors CharlesPalmer DartmouthCollege,I3P Hanover,NH03755,USA E-mail:[email protected] SujeetShenoi UniversityofTulsa Tulsa,OK74104,USA E-mail:[email protected] LibraryofCongressControlNumber:2009935462 CRSubjectClassification(1998):B.8,C.4,B.1.3,B.2.3,B.7.3,C.2,I.6 ISSN 1868-4238 ISBN-10 3-642-04797-1SpringerBerlinHeidelbergNewYork ISBN-13 978-3-642-04797-8SpringerBerlinHeidelbergNewYork Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable toprosecutionundertheGermanCopyrightLaw. springer.com ©IFIPInternationalFederationforInformationProcessing2009 PrintedinGermany Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper SPIN:12768615 06/3180 543210 Contents Contributing Authors ix Preface xv PART I RISK MANAGEMENT 1 Information Risk Management and Resilience 3 Scott Dynes 2 Does the Liberalization of the European Railway Sector Increase 19 Systemic Risk? Marc Laperrouza 3 Risk-Based Criticality Analysis 35 Marianthi Theoharidou, Panayiotis Kotzanikolaou and Dimitris Gritzalis 4 Modeling and Managing Risk in Billing Infrastructures 51 Fabrizio Baiardi, Claudio Telmon and Daniele Sgandurra PART II CONTROL SYSTEMS SECURITY 5 A Taxonomy of Attacks on the DNP3 Protocol 67 Samuel East, Jonathan Butts, Mauricio Papa and Sujeet Shenoi 6 Design and Implementation of a Secure Modbus Protocol 83 Igor Nai Fovino, Andrea Carcano, Marcelo Masera and Alberto Trombetta vi CRITICAL INFRASTRUCTURE PROTECTION III 7 Providing Situational Awareness for Pipeline Control Operations 97 JonathanButts,HugoKleinhans,RodrigoChandia, MauricioPapa and Sujeet Shenoi 8 Enhancing the Safety, Security and Resilience of ICT and SCADA 113 Systems Using Action Research Stig Johnsen, Torbjorn Skramstad and Janne Hagen 9 AnOntologyforIdentifyingCyberIntrusionInducedFaultsinPro- 125 cess Control Systems Jeffrey Hieb, James Graham and Jian Guan 10 Using Physical Models for Anomaly Detection in Control Systems 139 Nils Svendsen and Stephen Wolthusen 11 Detecting Anomalies in Process Control Networks 151 Julian Rrushi and Kyoung-Don Kang PART III INFRASTRUCTURE SECURITY 12 Nondeducibility-Based Analysis of Cyber-Physical Systems 169 Thoshitha Gamage and Bruce McMillin 13 Stack-BasedBufferOverflowsinHarvardClassEmbeddedSystems 185 Kristopher Watts and Paul Oman 14 Secure Cross-Domain Train Scheduling 199 Mark Hartong, Rajni Goel and Duminda Wijesekera PART IV INFRASTRUCTURE MODELING AND SIMULATION 15 AHolistic-ReductionisticApproachforModelingInterdependencies 215 Stefano De Porcellinis, Gabriele Oliva, Stefano Panzieri and Roberto Setola Contents vii 16 Ontology-BasedCritical Infrastructure Modeling and Simulation 229 Vincenzo Masucci, Francesco Adinolfi, Paolo Servillo, Giovanni Dipoppa and Alberto Tofani 17 A Framework for Modeling Interdependencies in Japan’s Critical 243 Infrastructures Zaw Zaw Aung and Kenji Watanabe Contributing Authors Francesco Adinolfi is a Senior Researcher at the Research Center for Infor- mationandCommunicationsTechnologies(CRIAI),Portici,Italy. Hisresearch interests include knowledge management systems, ontologies and knowledge models, grid computing and open-source platforms. Zaw Zaw Aung is a Ph.D. student of Information Science and Control En- gineering at Nagaoka University of Technology, Nagaoka, Japan. His research interests include operational risk management, interdependency analysis and critical infrastructure modeling. Fabrizio Baiardi is a ProfessorofInformatics atthe UniversityofPisa,Pisa, Italy. Hisresearchinterestsincludecriticalinfrastructureprotection,riskman- agementofinformationandcommunicationssystems,andvirtualization-based approaches. Jonathan Butts is a Ph.D. student in Computer Science at the University of Tulsa, Tulsa, Oklahoma. His research interests include network, telecommuni- cations and SCADA systems security. Andrea Carcano is a Researcher at the University of Insubria, Varese, Italy. His researchinterests include industrial SCADA protocols and architectures. Rodrigo Chandia is a Ph.D. student in Computer Science at the University of Tulsa, Tulsa, Oklahoma. His research interests include SCADA security, computer security and open-source software development methodologies. Stefano De Porcellinis is a Researcherat University Campus Bio-Medico of Rome, Rome, Italy. His research interests include critical infrastructure mod- eling, simulation environments for complex systems, and fuzzy and nonlinear control techniques. x CRITICAL INFRASTRUCTURE PROTECTION III Giovanni DipoppaisaSeniorResearcherintheDepartmentofModelingand SimulationatENEACasacciaLaboratories,Rome,Italy. Hisresearchinterests includereal-timeembeddedsystems,machinelearningandoperationsresearch. Scott Dynes is a Senior Research Fellow at the Center for Digital Strategies, Tuck School of Business, Dartmouth College, Hanover, New Hampshire. His research interests include information risk management and the resilience of critical infrastructures to cyber disruptions. SamuelEastreceivedhisM.S.degreeinComputerSciencefromtheUniversity ofTulsa,Tulsa,Oklahoma. His researchinterestsinclude networksecurityand SCADA systems security. Thoshitha Gamage is a Ph.D. student in Computer Science at the Missouri University of Science and Technology, Rolla, Missouri. His research interests include information assurance, infrastructure protection and formal methods. Rajni Goel is an Associate Professor of Information Systems and Decision SciencesatHowardUniversity,Washington,DC.Herresearchinterestsinclude information assurance, forensics, control systems security and data mining. James Graham is the Henry Vogt Professor of Computer Science and En- gineering at the University of Louisville, Louisville, Kentucky. His research interests include information security, digital forensics, critical infrastructure protection, high performance computing and intelligent systems. Dimitris Gritzalis is a Professor of ICT Security and the Director of the InformationSecurityandCriticalInfrastructureProtectionResearchGroupat Athens University of Economics and Business, Athens, Greece. His research interests include critical ICT infrastructure protection, security in ubiquitous computing, IT security paradigms, VoIP security and IT security education. Jian Guan is anAssociate ProfessorofComputer InformationSystems inthe College of Business and Public Administration at the University of Louisville, Louisville, Kentucky. His researchinterests include ontologicalmodeling, fault diagnosis and sales force automation systems. Janne Hagen is a Ph.D. candidate in Computer and Information Science from the Norwegian Defence Research Establishment, who is studying at the University of Oslo, Oslo, Norway. Her research interests include information security, critical infrastructure protection and risk assessment. Contributing Authors xi Mark HartongisaSeniorElectronicsEngineerwiththeOfficeofSafety,Fed- eralRailroadAdministration,U.S.DepartmentofTransportation,Washington, DC.Hisresearchinterestsinclude informationassurance,digitalforensics,net- work security, control systems security, risk analysis and theoretical computer science. Jeffrey Hieb is an Assistant Professor of Engineering Fundamentals at the University of Louisville, Louisville, Kentucky. His research interests include informationsecurity,honeypots,digitalforensics,secureoperatingsystemsand engineering education. Stig Johnsen is a Senior ResearchScientist at SINTEF, Trondheim, Norway. Hisresearchinterestsincludeinformationsecurity,SCADAsystems,integrated oil and gas operations, and plant safety. Kyoung-Don Kang is an Assistant Professor of Computer Science at the State University of New York at Binghamton, Binghamton, New York. His researchinterestsinclude real-timedataservices,wirelesssensornetworks,and wireless network and embedded system security. Hugo Kleinhans is a Ph.D. student in Computer Science at the University of Tulsa, Tulsa, Oklahoma. His research interests include distributed systems, critical infrastructure protection, digital forensics and cyber policy. Panos KotzanikolaouisaLecturerofITSecurityandPrivacyattheUniver- sityofPiraeus,Piraeus,Greece;andaSeniorMemberoftheInformationSecu- rity and Critical Infrastructure Protection Research Group at Athens Univer- sity of Economicsand Business,Athens, Greece. His researchinterests include critical ICT infrastructure protection, mobile code/agent security, intelligent network security and sensor network security. Marc Laperrouza is a PostdoctoralFellow in the College of Management at the Swiss FederalInstitute ofTechnology,Lausanne,Switzerland. His research interests include the reform and regulation of network industries. Marcelo Maserais a Scientific Officer atthe Institute for the Protectionand Security of the Citizen, Joint Research Center of the European Commission, Ispra,Italy. Hisresearchinterestsincludethesecurityofnetworkedsystemsand systems of systems, risk governance, and control systems and communication systems security.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.