Critical Infrastructure Protection V

5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers

Editors:

ISBN: 978-3-642-24863-4 (Print) 978-3-642-24864-1 (Online)

Table of contents (14 chapters)

  1. Front Matter

    Pages I-XIV

  2. THEMES AND ISSUES

    1. Front Matter

      Pages 1-1

    2. Chapter

      Pages 3-18

      Using Deception to Shield Cyberspace Sensors

    3. Chapter

      Pages 19-28

      Botnets as an Instrument of Warfare

  3. CONTROL SYSTEMS SECURITY

    1. Front Matter

      Pages 29-29

    2. Chapter

      Pages 31-46

      Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems

    3. Chapter

      Pages 47-56

      A Plant-Wide Industrial Process Control Security Problem

    4. Chapter

      Pages 57-72

      Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing

    5. Chapter

      Pages 73-88

      Security Analysis of VPN Configurations in Industrial Control Environments

  4. INFRASTRUCTURE SECURITY

    1. Front Matter

      Pages 89-89

    2. Chapter

      Pages 91-106

      Implementing Novel Defense Functionality in MPLS Networks Using Hyperspeed Signaling

    3. Chapter

      Pages 107-123

      Creating a Cyber Moving Target for Critical Infrastructure Applications

    4. Chapter

      Pages 125-135

      An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making

    5. Chapter

      Pages 137-149

      Enhancing the Usability of the Commercial Mobile Alert System

    6. Chapter

      Pages 151-164

      Real-Time Detection of Covert Channels in Highly Virtualized Environments

  5. INFRASTRUCTURE MODELING AND SIMULATION

    1. Front Matter

      Pages 165-165

    2. Chapter

      Pages 167-183

      Analyzing Cyber-Physical Attacks on Networked Industrial Control Systems

    3. Chapter

      Pages 185-199

      Using an Emulation Testbed for Operational Cyber Security Exercises

    4. Chapter

      Pages 201-216

      Analyzing Intelligence on WMD Attacks Using Threaded Event-Based Simulation