Pub Date : 2009-06-12DOI: 10.1109/CRIS.2009.5071492
O. S. Ligaarden
During the last years, mutual dependencies have been apparent in several incidents in critical infrastructures. This has lead to increased focus on the protection of critical infrastructures. One challenge in protecting critical infrastructures is to understand the impact that mutual dependencies have on the overall risk level. In order to do such an analysis, we first need to be able to model dependencies in critical infrastructures. Several inter-connected critical infrastructures make up a system of systems. In our current work in the DIGIT project we are evaluating whether UML and SysML can be suitable candidates for modeling dependencies in systems of systems. In this paper we will present some preliminary results of the use of UML to model dependencies in systems of systems.
{"title":"Using UML to model dependencies in systems of systems","authors":"O. S. Ligaarden","doi":"10.1109/CRIS.2009.5071492","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071492","url":null,"abstract":"During the last years, mutual dependencies have been apparent in several incidents in critical infrastructures. This has lead to increased focus on the protection of critical infrastructures. One challenge in protecting critical infrastructures is to understand the impact that mutual dependencies have on the overall risk level. In order to do such an analysis, we first need to be able to model dependencies in critical infrastructures. Several inter-connected critical infrastructures make up a system of systems. In our current work in the DIGIT project we are evaluating whether UML and SysML can be suitable candidates for modeling dependencies in systems of systems. In this paper we will present some preliminary results of the use of UML to model dependencies in systems of systems.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126312740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-12DOI: 10.1109/CRIS.2009.5071491
P. Mellstrand, Björn Ståhl
Critical infrastructure information systems are complex, open, connected and heterogeneous computer network systems and - as the name implies - play an important role for some critical infrastructure. These systems occasionally fail and the need arises to explain what happened and assert that whatever it was it will not happen again. In this abstract we describe ongoing work towards an approach for analyzing hard-to-explain behavior in software-intensive systems. This approach is based on input both from the critical infrastructure community and from diagnosing very large deeply embedded systems - two kinds of systems that share several relevant properties in regard to diagnosing malfunction.
{"title":"Analyzing systemic information infrastructure malfunction","authors":"P. Mellstrand, Björn Ståhl","doi":"10.1109/CRIS.2009.5071491","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071491","url":null,"abstract":"Critical infrastructure information systems are complex, open, connected and heterogeneous computer network systems and - as the name implies - play an important role for some critical infrastructure. These systems occasionally fail and the need arises to explain what happened and assert that whatever it was it will not happen again. In this abstract we describe ongoing work towards an approach for analyzing hard-to-explain behavior in software-intensive systems. This approach is based on input both from the critical infrastructure community and from diagnosing very large deeply embedded systems - two kinds of systems that share several relevant properties in regard to diagnosing malfunction.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132859677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-12DOI: 10.1109/CRIS.2009.5071495
R. Klein
Infrastructures like power grids and telecommunication networks are key elements of modern societies. These infrastructures are “critical” since failures, attacks or accidents at these infrastructures can severely influence the proper function of the economy, public administration and security services. Critical infrastructures have become increasingly complex and (inter)dependent. As a consequence faults might lead to cascading and escalating effects among heterogeneous infrastructures from energy supply to telecommunication, financial sector, transportation, health and public administration.
{"title":"The EU integrated project IRRIIS on CI dependencies an overview","authors":"R. Klein","doi":"10.1109/CRIS.2009.5071495","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071495","url":null,"abstract":"Infrastructures like power grids and telecommunication networks are key elements of modern societies. These infrastructures are “critical” since failures, attacks or accidents at these infrastructures can severely influence the proper function of the economy, public administration and security services. Critical infrastructures have become increasingly complex and (inter)dependent. As a consequence faults might lead to cascading and escalating effects among heterogeneous infrastructures from energy supply to telecommunication, financial sector, transportation, health and public administration.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"1484 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123367798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-12DOI: 10.1109/CRIS.2009.5071497
M. Koyabe, F. El-Moussa
Despite the current Internets critical importance, portions of its architecture are still vulnerable to attacks ranging from malicious software exploits to denial-of-service (DoS). Most of these attacks and vulnerabilities experienced on the Internet today are due to the fact that the Internet architecture and its supporting protocols was primarily designed for a benign and trustworthy environment, with little or no consideration for security issues. This however is no longer the case with todays Internet, which interconnects millions of heterogeneous hosts that span the entire globe.
{"title":"Steps towards a Clean-Slate secure Internet infrastructure","authors":"M. Koyabe, F. El-Moussa","doi":"10.1109/CRIS.2009.5071497","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071497","url":null,"abstract":"Despite the current Internets critical importance, portions of its architecture are still vulnerable to attacks ranging from malicious software exploits to denial-of-service (DoS). Most of these attacks and vulnerabilities experienced on the Internet today are due to the fact that the Internet architecture and its supporting protocols was primarily designed for a benign and trustworthy environment, with little or no consideration for security issues. This however is no longer the case with todays Internet, which interconnects millions of heterogeneous hosts that span the entire globe.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123550982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-12DOI: 10.1109/CRIS.2009.5071486
M. Marathe, C. Barrett, S. Eubank
We summarize our ongoing integrated program to represent and reason about very large co-evolving social, technological, information and organization (STIO) networks. The program comprises of four basic elements: (i) a mathematical and computational theory of co-evolving STIO networks, (ii) methods for integrating diverse data sources to generate synthetic representations of STIO networks, (iii) high performance computing oriented models for simulating the dynamical phenomenon of interest on these networks, and (iv) an integrated high performance oriented pervasive cyber-environment that provides analysts and decision makers a web-based environment that provides seamless access to the models and synthetic networks for policy planning and response. We will illustrate some of these ideas by discussing the development of information-support environments for supporting the study of epidemics in social as well as wireless networks.
{"title":"Policy informatics for co-evolving socio-technical networks","authors":"M. Marathe, C. Barrett, S. Eubank","doi":"10.1109/CRIS.2009.5071486","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071486","url":null,"abstract":"We summarize our ongoing integrated program to represent and reason about very large co-evolving social, technological, information and organization (STIO) networks. The program comprises of four basic elements: (i) a mathematical and computational theory of co-evolving STIO networks, (ii) methods for integrating diverse data sources to generate synthetic representations of STIO networks, (iii) high performance computing oriented models for simulating the dynamical phenomenon of interest on these networks, and (iv) an integrated high performance oriented pervasive cyber-environment that provides analysts and decision makers a web-based environment that provides seamless access to the models and synthetic networks for policy planning and response. We will illustrate some of these ideas by discussing the development of information-support environments for supporting the study of epidemics in social as well as wireless networks.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124025870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-12DOI: 10.1109/CRIS.2009.5071484
L. AlAbdulkarim, Z. Lukszo
Over the past few years there has been a keen interest in smart metering across countries of the European Union. This has been strongly motivated by the EU Energy Efficiency Directive, which among other things aims to minimize the environmental impacts of energy generation and to meet the commitments made on climate change under the Kyoto Protocol. However, the system implementation choices and the roll-out process vary among those countries that have already embarked on the implementation of the system. In this paper we present an overview of the smart metering system implementation in the Netherlands, to conclude about possible lessen learnt applicable for different countries coping with transition problems in the energy sector changing from a traditional hierarchical governance structure into a future system with various different distributed generation sources.
在过去的几年里,欧盟各国对智能电表产生了浓厚的兴趣。欧盟能源效率指令(EU Energy Efficiency Directive)大力推动了这一举措,该指令旨在最大限度地减少能源生产对环境的影响,并履行《京都议定书》(Kyoto Protocol)对气候变化做出的承诺。但是,在已经开始实施该制度的国家中,系统实施的选择和推广过程各不相同。在本文中,我们概述了智能计量系统在荷兰的实施,以总结可能的学习适用于不同国家应对能源部门从传统的分层治理结构转变为具有各种不同分布式发电源的未来系统的过渡问题。
{"title":"Smart metering for the future energy systems in the Netherlands","authors":"L. AlAbdulkarim, Z. Lukszo","doi":"10.1109/CRIS.2009.5071484","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071484","url":null,"abstract":"Over the past few years there has been a keen interest in smart metering across countries of the European Union. This has been strongly motivated by the EU Energy Efficiency Directive, which among other things aims to minimize the environmental impacts of energy generation and to meet the commitments made on climate change under the Kyoto Protocol. However, the system implementation choices and the roll-out process vary among those countries that have already embarked on the implementation of the system. In this paper we present an overview of the smart metering system implementation in the Netherlands, to conclude about possible lessen learnt applicable for different countries coping with transition problems in the energy sector changing from a traditional hierarchical governance structure into a future system with various different distributed generation sources.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131695877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-12DOI: 10.1109/CRIS.2009.5071490
T. Aura
Many critical services have become dependent on the Internet as a communication medium. This has highlighted the vulnerability of the Internet to denial-of-service attacks. While the TPC/IP protocol stack was never intended to provide guaranteed quality of service, many of the vulnerabilities are simple accidents and make it unnecessarily easy for DoS attackers to reach their goals. In this talk, I suggest that DoS-resistance is becoming a key requirement for all network protocols and draw examples mostly from the design of mobility protocols.
{"title":"Thinking about denial of service in Internet protocols","authors":"T. Aura","doi":"10.1109/CRIS.2009.5071490","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071490","url":null,"abstract":"Many critical services have become dependent on the Internet as a communication medium. This has highlighted the vulnerability of the Internet to denial-of-service attacks. While the TPC/IP protocol stack was never intended to provide guaranteed quality of service, many of the vulnerabilities are simple accidents and make it unnecessarily easy for DoS attackers to reach their goals. In this talk, I suggest that DoS-resistance is becoming a key requirement for all network protocols and draw examples mostly from the design of mobility protocols.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121282019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-04-01DOI: 10.1109/CRIS.2009.5071489
V. Prevelakis
Telephony as implemented today is not secure. We know that wiretaps (both legal and illegal) are widely used all over the world with ease and impunity. This is due to the fact that the vast majority of voice communications are in the clear.
{"title":"Is secure telephony possible or even desirable?","authors":"V. Prevelakis","doi":"10.1109/CRIS.2009.5071489","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071489","url":null,"abstract":"Telephony as implemented today is not secure. We know that wiretaps (both legal and illegal) are widely used all over the world with ease and impunity. This is due to the fact that the vast majority of voice communications are in the clear.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"30 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121003742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}