ebook img

Critical Infrastructure Protection VIII: 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers PDF

277 Pages·2014·12.426 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Critical Infrastructure Protection VIII: 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers

IFIP Advances in Information and Communication Technology 441 Editor-in-Chief A.JoeTurner,Seneca,SC,USA EditorialBoard FoundationsofComputerScience JacquesSakarovitch,TélécomParisTech,France Software:TheoryandPractice MichaelGoedicke,UniversityofDuisburg-Essen,Germany Education ArthurTatnall,VictoriaUniversity,Melbourne,Australia InformationTechnologyApplications ErichJ.Neuhold,UniversityofVienna,Austria CommunicationSystems AikoPras,UniversityofTwente,Enschede,TheNetherlands SystemModelingandOptimization FrediTröltzsch,TUBerlin,Germany InformationSystems JanPries-Heje,RoskildeUniversity,Denmark ICTandSociety DianeWhitehouse,TheCastlegateConsultancy,Malton,UK ComputerSystemsTechnology RicardoReis,FederalUniversityofRioGrandedoSul,PortoAlegre,Brazil SecurityandPrivacyProtectioninInformationProcessingSystems YukoMurayama,IwatePrefecturalUniversity,Japan ArtificialIntelligence TharamDillon,CurtinUniversity,Bentley,Australia Human-ComputerInteraction JanGulliksen,KTHRoyalInstituteofTechnology,Stockholm,Sweden EntertainmentComputing MatthiasRauterberg,EindhovenUniversityofTechnology,TheNetherlands IFIP–TheInternationalFederationforInformationProcessing IFIPwasfoundedin1960undertheauspicesofUNESCO,followingtheFirst WorldComputerCongressheldinParisthepreviousyear.Anumbrellaorgani- zation for societies working in information processing, IFIP’s aim is two-fold: tosupportinformationprocessingwithinitsmembercountriesandtoencourage technologytransfertodevelopingnations.Asitsmissionstatementclearlystates, IFIP’s mission is to be the leading, truly international, apolitical organizationwhichencouragesandassistsinthedevelopment,ex- ploitationandapplicationofinformationtechnologyforthebenefit ofallpeople. IFIPisanon-profitmakingorganization,runalmostsolelyby2500volunteers.It operatesthroughanumberoftechnicalcommittees,whichorganizeeventsand publications.IFIP’seventsrangefromaninternationalcongresstolocalseminars, butthemostimportantare: • TheIFIPWorldComputerCongress,heldeverysecondyear; • Openconferences; • Workingconferences. TheflagshipeventistheIFIPWorldComputerCongress,atwhichbothinvited andcontributedpapersarepresented.Contributedpapersarerigorouslyrefereed andtherejectionrateishigh. As with the Congress, participation in the open conferences is open to all and papersmaybeinvitedorsubmitted.Again,submittedpapersarestringentlyref- ereed. The working conferences are structured differently. They are usually run by a workinggroupandattendanceissmallandbyinvitationonly.Theirpurposeis tocreateanatmosphereconducivetoinnovationanddevelopment.Refereeingis alsorigorousandpapersaresubjectedtoextensivegroupdiscussion. Publications arising from IFIP events vary. The papers presented at the IFIP WorldComputerCongressandatopenconferencesarepublishedasconference proceedings,whiletheresultsoftheworkingconferencesareoftenpublishedas collectionsofselectedandeditedpapers. Anynationalsocietywhoseprimaryactivityisaboutinformationprocessingmay applytobecomeafullmemberofIFIP,althoughfullmembershipisrestrictedto onesocietypercountry.FullmembersareentitledtovoteattheannualGeneral Assembly,Nationalsocietiespreferringalesscommittedinvolvementmayapply forassociateorcorrespondingmembership.Associatemembersenjoythesame benefitsasfullmembers,butwithoutvotingrights.Correspondingmembersare not represented in IFIP bodies.Affiliated membership is open to non-national societies,andindividualandhonorarymembershipschemesarealsooffered. Jonathan Butts Sujeet Shenoi (Eds.) Critical Infrastructure Protection VIII 8thIFIPWG11.10InternationalConference,ICCIP2014 Arlington,VA, USA, March 17-19, 2014 Revised Selected Papers 1 3 VolumeEditors JonathanButts AirForceInstituteofTechnology Wright-PattersonAirForceBase Dayton,OH45433-7765,USA E-mail:jonathan.butts@afit.edu SujeetShenoi UniversityofTulsa Tulsa,OK74104-3189,USA E-mail:[email protected] ISSN1868-4238 e-ISSN1868-422X ISBN978-3-662-45354-4 e-ISBN978-3-662-45355-1 DOI10.1007/978-3-662-45355-1 SpringerHeidelbergNewYorkDordrechtLondon LibraryofCongressControlNumber:2014952306 ©IFIPInternationalFederationforInformationProcessing2014 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof thematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology nowknownorhereafterdeveloped.Exemptedfromthislegalreservationarebriefexcerptsinconnection withreviewsorscholarlyanalysisormaterialsuppliedspecificallyforthepurposeofbeingenteredand executedonacomputersystem,forexclusiveusebythepurchaserofthework.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheCopyrightLawofthePublisher’slocation, inistcurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Permissionsforuse maybeobtainedthroughRightsLinkattheCopyrightClearanceCenter.Violationsareliabletoprosecution undertherespectiveCopyrightLaw. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Whiletheadviceandinformationinthisbookarebelievedtobetrueandaccurateatthedateofpublication, neithertheauthorsnortheeditorsnorthepublishercanacceptanylegalresponsibilityforanyerrorsor omissionsthatmaybemade.Thepublishermakesnowarranty,expressorimplied,withrespecttothe materialcontainedherein. Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Contents Contributing Authors ix Preface xvii PART I CONTROL SYSTEMS SECURITY 1 Detecting Integrity Attacks on Industrial Control Systems 3 Chad Arnold, Jonathan Butts, and Krishnaprasad Thirunarayan 2 Detecting Malicious Software Execution in ProgrammableLogic 15 Controllers Using Power Fingerprinting Carlos Aguayo Gonzalez and Alan Hinton 3 Timing of Cyber-PhysicalAttacks on Process Control Systems 29 Marina Krotofil, Alvaro Cardenas, and Kishore Angrishi 4 Recovery of Structural Controllability for Control Systems 47 Cristina Alcaraz and Stephen Wolthusen 5 IndustrialControlSystemTrafficDataSetsforIntrusionDetection 65 Research Thomas Morris and Wei Gao 6 An Industrial Control System Testbed Based on Emulation, 79 Physical Devices and Simulation Haihui Gao, Yong Peng, Zhonghua Dai, Ting Wang, Xuefeng Han, and Hanjing Li vi CRITICAL INFRASTRUCTURE PROTECTION VIII PART II INFRASTRUCTURE SECURITY 7 Evidence Theory for Cyber-PhysicalSystems 95 Riccardo Santini, Chiara Foglietta and Stefano Panzieri 8 An Automated Dialog System for Conducting Security Interviews 111 for Access Control Mohammad Ababneh, Malek Athamnah, Duminda Wijesekera and Paulo Costa 9 A Survey of Critical Infrastructure Security 127 William Hurst, Madjid Merabti, and Paul Fergus PART III INFRASTRUCTURE MODELING AND SIMULATION 10 A System Dynamics Framework for Modeling Critical 141 Infrastructure Resilience Simona Cavallini, Cristina d’Alessandro, Margherita Volpe, Stefano Armenia, Camillo Carlini, Elisabeth Brein, and Pierluigi Assogna 11 Reinforcement Learning Using Monte Carlo Policy Estimation for 155 Disaster Mitigation Mohammed Talat Khouj, Sarbjit Sarkaria, Cesar Lopez, and Jose Marti 12 Accuracy of Service Area Estimation Methods Used for Critical 173 Infrastructure Recovery Okan Pala, David Wilson, Russell Bent, Steve Linger, and James Arnold PART IV RISK AND IMPACT ASSESSMENT 13 ADecisionSupportToolfora UnifiedHomelandSecurityStrategy 195 Richard White, Aaron Burkhart, Edward Chow, and Logan Maynard Contents vii 14 Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes 213 That Monitor Interdependent Physical Systems Valerio Formicola, Antonio Di Pietro, Abdullah Alsubaie, Salvatore D’Antonio, and Jose Marti 15 Assessing Potential Casualties in Critical Events 231 Simona Cavallini, Fabio Bisogni, Marco Bardoscia, and Roberto Bellotti PART V ADVANCED TECHNIQUES 16 Evaluation of Format-PreservingEncryption Algorithms for 245 Critical Infrastructure Protection Richard Agbeyibor, Jonathan Butts, Michael Grimaila, and Robert Mills 17 Asynchronous Binary Byzantine Consensus over Graphs with 263 Power-LawDegree Sequence Goitom Weldehawaryat and Stephen Wolthusen Contributing Authors Mohammad Ababneh recently received his Ph.D. degree in Information Technology from George Mason University, Fairfax, Virginia. His research interests include information security and assurance, command and control, semantic web and information systems. Richard Agbeyibor is an M.S. student in Electrical Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio. His research interests include computer and network security, digital systems and avionics. Carlos Aguayo Gonzalez is the Founder and Chief Technology Officer of PFP CyberSecurity, Vienna, Virginia. His research interests include cyber security, critical infrastructure protection, side channel information, machine learning and signal processing. Cristina Alcaraz is a Marie Curie Postdoctoral Researcher at the School of Mathematics and Information Security at Royal Holloway, University of Lon- don, London,United Kingdom. Her researchinterests include criticalinforma- tioninfrastructureprotection,SCADAsystems,smartgridsandwirelesssensor networks. Abdullah Alsubaie is a Ph.D. student in Electrical Engineering at the Uni- versityofBritishColumbia,Vancouver,Canada;andaResearcheratKingAb- dulaziz City for Science and Technology, Riyadh, Saudi Arabia. His research interests include power systems operation, smart grids and critical infrastruc- ture simulation. Kishore AngrishiisanITConsultantwithT-SystemsInternationalinHam- burg, Germany. His research interests include security and traffic engineering in data networks. x CRITICAL INFRASTRUCTURE PROTECTION VIII Stefano ArmeniaisaResearchFellowintheDepartmentofComputer,Con- trolandManagementEngineeringatSapienzaUniversityofRome,Rome,Italy. His research interests include cyber security, critical infrastructure protection, policymodeling,riskmanagement,systemdynamicsandcomplexsystemsanal- ysis. Chad Arnold is a Ph.D. student in Computer Science at Wright State Uni- versity, Dayton, Ohio. His research interests include computer and network security, critical infrastructure protection and malware analysis. James Arnold received his M.S. degree in Geography from the University of Utah, Salt Lake City, Utah. His research interests include spatial analysis, geographic information systems and remote sensing. Pierluigi Assogna is a Senior Consultant with Theorematica SpA, Rome, Italy. His research interests include knowledge management, control systems and decision support systems. Malek Athamnah is a Ph.D. student in Computer Science at Temple Uni- versity, Philadelphia, Pennsylvania. His research interests include information security and voice-based services. Marco Bardoscia is a PostdoctoralFellow atthe Abdus Salam International Centre for Theoretical Physics, Trieste, Italy. His research focuses on applica- tions of statistical physics to socio-economic systems. Roberto Bellotti is an Associate Professor of Experimental Physics at the UniversityofBariAldo Moro,Bari,Italy. His researchinterestsinclude econo- physics, medical physics and astroparticle physics. RussellBentisaResearchScientistintheEnergyandInfrastructureAnalysis Group at Los Alamos National Laboratory, Los Alamos, New Mexico. His research focuses on algorithms for planning, operating and designing the next generation of critical infrastructure systems. Fabio Bisogniis a Member of the Boardof the FORMIT Foundation, Rome, Italy. His research interests include information security economics, critical infrastructure protection and information disclosure policy. Contributing Authors xi Elisabeth Brein is a Researcher at the Rotterdam School of Management, Erasmus University Rotterdam, Rotterdam, The Netherlands. Her research focusesontheidentificationofsocialsystemvariables,suchashumanbehavior and leadership, during crisis situations. Aaron Burkhart is an M.S. student in Computer Science at the University of Colorado at Colorado Springs, Colorado Springs, Colorado; and a Software EngineerAssociateatLockheedMartininColoradoSprings,Colorado. His re- searchinterestsincludewebprogramming,cloudcomputing,computergraphics and software architectures. Jonathan Butts,Chair,IFIPWorkingGroup11.10onCriticalInfrastructure Protection, is an Assistant Professor of Computer Science and the Research Director of the Center for Cyberspace Research at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio. His research interests include critical infrastructure protection and cyber-physical systems security. Alvaro Cardenas is an Assistant Professor of Computer Science at the Uni- versity of Texas at Dallas, Richardson, Texas. His research interests include the security and privacy of cyber-physicalsystems and network security moni- toring. CamilloCarliniisaResearchFellowintheDepartmentofComputer,Control andManagementEngineeringatSapienzaUniversityofRome,Rome,Italy. His research interests include system dynamics, critical infrastructure protection, policy modeling, simulation, cyber security and complex systems analysis. Simona Cavallini is the Head of the Research and Innovation Area at the FORMIT Foundation, Rome, Italy. Her research interests include critical in- frastructure protection, interdependency analysis, economics of security and macroeconomics modeling. Edward Chow is a Professor of Computer Science at the University of Colo- radoatColoradoSprings,ColoradoSprings,Colorado. His researchfocuseson improving the performance, reliability and security of networked systems. Paulo CostaisanAssociateProfessorofSystemsEngineeringandOperations Researchat George Mason University, Fairfax, Virginia. His researchinterests are in the area of Bayesian probabilistic reasoning, with a focus on decision support and multi-source data fusion.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.