Abstract
Traditionally, securing against environmental threats was the main focus of critical infrastructure protection. However, the emergence of cyber attacks has changed the focus – infrastructures are facing a different danger that has life-threatening consequences and the risk of significant economic losses. Clearly, conventional security techniques are struggling to keep up with the volume of innovative and emerging attacks. Fresh and adaptive infrastructure security solutions are required. This paper discusses critical infrastructures and the digital threats they face, and provides insights into current and future infrastructure security strategies.
Chapter PDF
Similar content being viewed by others
References
A. Al Islam and T. Sabrina, Detection of various denial-of-service and distributed denial-of-service attacks using RNN ensemble, Proceedings of the Twelfth International Conference on Computers and Information Technology, pp. 603–608, 2009.
R. Anderson and S. Fuloria, Who controls the off switch? Proceedings of the First IEEE International Conference on Smart Grid Communications, pp. 96–101, 2010.
M. Brownfield, Y. Gupta and N. Davis, Wireless sesnsor network denial-of-sleep attack, Proceedings of the Sixth Annual IEEE SMC Information Assurance Workshop, pp. 356–364, 2005.
L. Buttyan, D. Gessner, A. Hessler and P. Langendoerfer, Application of wireless sensor networks in critical infrastructure protection: Challenges and design options, IEEE Wireless Communications, vol. 17(5), pp. 44–49, 2010.
K. Claffy, S. Bradner and S. Meinrath, The (un)economic Internet? IEEE Internet Computing, vol. 11(3), pp. 53–58, 2007.
L. Coppolino, S. D’Antonio, L. Romano and G. Spagnuolo, An intrusion detection system for critical information infrastructures using wireless sensor network technologies, Proceedings of the Fifth IEEE International Conference on Critical Infrastructure, 2010.
L. Coyle, M. Hinchey, B. Nuseibeh and J. Fiadeiro, Guest editors’ introduction: Evolving critical systems, IEEE Computer, vol. 43(5), pp. 28–33, 2010.
F. Deng, A. Luo, Y. Zhang, Z. Chen, X. Peng, X. Jiang and D. Peng, TNC-UTM: A holistic solution to secure enterprise networks, Proceedings of the Ninth IEEE International Conference for Young Computer Scientists, pp. 2240–2245, 2008.
C. Esposito, D. Cotroneo, R. Barbosa and N. Silva, Qualification and selection of off-the-shelf components for safety critical systems: A systematic approach, Proceedings of the Fifth Latin-American Symposium on Dependable Computing Workshops, pp. 52–57, 2011.
M. Golling and B. Stelte, Requirements for a future EWS – Cyber defense in the Internet of the future, Proceedings of the Third International Conference on Cyber Conflict, 2011.
R. Guha, Z. Furqan and S. Muhammad, Discovering man-in-the-middle attacks on authentication protocols, Proceedings of the IEEE Military Communications Conference, 2007.
M. Hashim, Malaysia’s national cyber security policy: The country’s cyber defense initiatives, Proceedings of the Second Worldwide Cybersecurity Summit, 2011.
W. Hurst, M. Merabti and P. Fergus, Behavioral observation for critical infrastructure security support, Proceedings of the Seventh IEEE European Modeling Symposium, pp. 36–41, 2013.
M. Kaaniche, Resilience assessment of critical infrastructures: From accidental to malicious threats, Proceedings of the Fifth Latin-American Symposium on Dependable Computing Workshops, pp. 35–36, 2011.
D. Kang, J. Lee, S. Kim and J. Park, Analysis of cyber threats to SCADA systems, Proceedings of the IEEE Transmission and Distribution Conference and Exposition: Asia and Pacific, 2009.
E. Kartaltepe and S. Xi, Towards blocking outgoing malicious impostor emails, Proceedings of the International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 657–661, 2006.
P. Katsumata, J. Hemenway and W. Gavins, Cybersecurity risk management, Proceedings of the Military Communications Conference, pp. 890–895, 2010.
M. Kumar, D. Mukhopadhyay, H. Lele and K. Vaze, Evaluation of operator actions for beyond design basis events for AHWR, Proceedings of the Second International Conference on Reliability, Safety and Hazards, pp. 579–582, 2010.
R. Langner, Stuxnet: Dissecting a cyberwarfare weapon, IEEE Security and Privacy, vol. 9(3), pp. 49–51, 2011.
P. Li, Z. Wang and X. Tan, Characteristic analysis of virus spreading in ad hoc networks, Proceedings of the International Conference on Computational Intelligence and Security Workshops, pp. 538–541, 2007.
A. MacDermott, W. Hurst, Q. Shi and M. Merabti, Simulating critical infrastructure cascading failure, Proceedings of the Sixteenth IEEE International Conference on Modeling and Simulation, pp. 323–328, 2014.
I. Nai Fovino, M. Masera, L. Guidi and G. Carpi, An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants, Proceedings of the Third International Conference on Human System Interaction, pp. 679–686, 2010.
N. Nicholson, S. Webber, S. Dyer, T. Patel and H. Janicke, SCADA security in the light of cyber warfare, Computers and Security, vol. 31(4), pp. 418–436, 2012.
S. Pritchard, Securing the 2012 Olympics, Infosecurity, vol. 6(6), pp. 12–15, 2009.
S. Roschke, F. Cheng and C. Meinel, A flexible and efficient alert correlation platform for distributed IDS, Proceedings of the Fourth IEEE International Conference on Network and System Security, pp. 24–31, 2010.
C. Scarlat, C. Simion and E. Scarlat, Managing new technology projects: Some considerations on risk assessment in the case of NPP critical infrastructures, Proceedings of the Second IEEE International Conference on Emergency Management and Management Sciences, pp. 911–915, 2011.
E. Schweitzer, D. Whitehead, A. Risley and R. Smith, How would we know? Proceedings of the Sixty-Fourth Annual Conference for Protective Relay Engineers, pp. 310–321, 2011.
W. Seah, A. Zhi and H. Tan, Wireless sensor networks powered by ambient energy harvesting (WSN-HEAP) – Survey and challenges, Proceedings of the First International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, 2009.
F. Shiri, B. Shanmugam and N. Idris, A parallel technique for improving the performance of signature-based network intrusion detection systems, Proceedings of the Third International Conference on Communication Software and Networks, pp. 692–696, 2011.
S. Tang, The detection of Trojan horses based on data mining, Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, vol. 1, pp. 311–314, 2009.
J. Walker, B. Williams and G. Skelton, Cyber security for emergency management, Proceedings of the IEEE International Conference on Technologies for Homeland Security, pp. 476–480, 2010.
C. Wang, L. Fang and Y. Dai, A simulation environment for SCADA security analysis and assessment, Proceedings of the International Conference on Measuring Technology and Mechatronics Automation, vol. 1, pp. 342–347, 2010.
J. Wang, R. Phan, J. Whitley and D. Parish, Augmented attack tree modeling of distributed denial of services and tree based attack detection method, Proceedings of the Tenth IEEE International Conference on Computer and Information Technology, pp. 1009–1014, 2010.
Y. Wang, H. Wang, Z. Li and J. Huang, Man-in-the-middle attack on BB84 protocol and its defense, Proceedings of the Second IEEE International Conference on Computer Science and Information Technology, pp. 438–439, 2009.
W. Wen, An improved intrusion detection system, Proceedings of the International Conference on Computer Applications and System Modeling, vol. 5, pp. 212–215, 2010.
T. Wilson, C. Stewart, V. Sword-Daniels, G. Leonard, D. Johnston, J. Cole, J. Wardman, G. Wilson and S. Barnard, Volcanic ash impacts on critical infrastructure, Physics and Chemistry of the Earth, Parts A/B/C, vol. 45-46, pp. 5–23, 2011.
S. Wolthusen, GIS-based command and control infrastructure for critical infrastructure protection, Proceedings of the First IEEE International Workshop on Critical Infrastructure Protection, pp. 40–50, 2005.
H. Xue, MultiCore systems architecture design and implementation of UTM, Proceedings of the International Symposium on Information Science and Engineering, pp. 441–445, 2008.
W. Yu, S. Nargundkar and N. Tiruthani, A phishing vulnerability analysis of web-based systems, Proceedings of the IEEE Symposium on Computers and Communications, pp. 326–331, 2008.
F. Yusufovna, F. Alisherovich, M. Choi, E. Cho, F. Abdurashidovich and T. Kim, Research on critical infrastructures and critical information infrastructures, Proceedings of the Symposium on Bio-Inspired Learning and Intelligent Systems for Security, pp. 97–101, 2009.
Y. Zhang, F. Deng, Z. Chen, Y. Xue and C. Lin, UTM-CM: A practical control mechanism solution for UTM systems, Proceedings of the IEEE International Conference on Communications and Mobile Computing, pp. 86–90, 2010.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Hurst, W., Merabti, M., Fergus, P. (2014). A Survey of Critical Infrastructure Security. In: Butts, J., Shenoi, S. (eds) Critical Infrastructure Protection VIII. ICCIP 2014. IFIP Advances in Information and Communication Technology, vol 441. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45355-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-662-45355-1_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45354-4
Online ISBN: 978-3-662-45355-1
eBook Packages: Computer ScienceComputer Science (R0)