首页 > 最新文献

International Journal of Critical Infrastructure Protection最新文献

英文 中文
Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems 5G对相互关联的智能关键基础设施系统网络物理风险的影响
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100617
Paola Vargas, I. Tien
{"title":"Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems","authors":"Paola Vargas, I. Tien","doi":"10.1016/j.ijcip.2023.100617","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100617","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100617"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems 5G对相互依存的智能关键基础设施系统的网络物理风险的影响
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100617
Paola Vargas, Iris Tien

5 G technology promises a wide range of benefits for critical infrastructure (CI), including improved reliability, increased efficiency, cost savings, and increased worker safety. However, it also brings many new risks that CI owners and operators must be prepared for to facilitate effective risk mitigation and response. These risks, however, have not been systematically assessed for CI systems. This paper investigates how the cyber-physical risk landscape will be impacted by 5 G for four major CI sectors in detail: smart transportation, smart water, smart power, and smart oil and gas networks. Compared to prior work only examining a single CI network, the authors present a comprehensive assessment of the types of threats that these sectors can expect based on past incidents, the new vulnerabilities introduced by 5 G and existing vulnerabilities exacerbated by the introduction of more connected devices, along with mitigation recommendations for each risk. Risks associated with the rollout of and transition to 5 G, risks from 5 G network disruptions, cyberattack risks, and privacy risks are included. While each of the sectors has a unique risk profile, general themes also emerged across multiple CI networks. Notably, there will be an increased number of threat vectors from smart devices reliant on the telecommunications network to provide monitoring and control of infrastructure services. Because many of these devices are accessible by the public, the risk of social engineering attacks and vulnerability to physical hacking are exacerbated. Successful risk mitigation requires collaboration among CI's many stakeholders to implement security measures at the interfaces between connected devices to limit the access to assets in case one security measure is successfully bypassed. Due to the increased interdependencies between CI networks, operators must create backup plans to keep the most essential services running on a smaller bandwidth in case of a 5 G outage or similar failure. As 5 G capabilities continue to develop and the risk landscape evolves, ongoing research is needed and CI owners and operators should be prepared to update security measures to remain ahead of identified risks and threats.

5G技术为关键基础设施(CI)带来了广泛的好处,包括提高可靠性、提高效率、节省成本和提高工人安全性。然而,它也带来了许多新的风险,CI所有者和运营商必须做好准备,以促进有效的风险缓解和应对。然而,尚未对CI系统的这些风险进行系统评估。本文详细研究了5G将如何影响四个主要CI部门的网络物理风险格局:智能交通、智能水务、智能电力和智能油气网络。与之前只检查单个CI网络的工作相比,作者根据过去的事件、5G引入的新漏洞和因引入更多连接设备而加剧的现有漏洞,对这些部门可能面临的威胁类型进行了全面评估,并对每种风险提出了缓解建议。包括与5G的推出和过渡相关的风险、5G网络中断的风险、网络攻击风险和隐私风险。虽然每个行业都有独特的风险状况,但多个CI网络也出现了一般性主题。值得注意的是,依赖电信网络提供基础设施服务监控的智能设备的威胁载体数量将增加。由于这些设备中的许多都是公众可以访问的,因此社会工程攻击的风险和物理黑客攻击的脆弱性加剧了。成功的风险缓解需要CI的许多利益相关者之间的合作,在连接设备之间的接口上实施安全措施,以在成功绕过一项安全措施的情况下限制对资产的访问。由于CI网络之间的相互依赖性增加,运营商必须制定备份计划,以在5G中断或类似故障的情况下,保持最重要的服务在较小的带宽上运行。随着5G能力的不断发展和风险格局的演变,需要进行持续的研究,CI所有者和运营商应准备好更新安全措施,以领先于已识别的风险和威胁。
{"title":"Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems","authors":"Paola Vargas,&nbsp;Iris Tien","doi":"10.1016/j.ijcip.2023.100617","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100617","url":null,"abstract":"<div><p>5 G technology promises a wide range of benefits for critical infrastructure (CI), including improved reliability, increased efficiency, cost savings, and increased worker safety. However, it also brings many new risks that CI owners and operators must be prepared for to facilitate effective risk mitigation and response. These risks, however, have not been systematically assessed for CI systems. This paper investigates how the cyber-physical risk landscape will be impacted by 5 G for four major CI sectors in detail: smart transportation, smart water, smart power, and smart oil and gas networks. Compared to prior work only examining a single CI network, the authors present a comprehensive assessment of the types of threats that these sectors can expect based on past incidents, the new vulnerabilities introduced by 5 G and existing vulnerabilities exacerbated by the introduction of more connected devices, along with mitigation recommendations for each risk. Risks associated with the rollout of and transition to 5 G, risks from 5 G network disruptions, cyberattack risks, and privacy risks are included. While each of the sectors has a unique risk profile, general themes also emerged across multiple CI networks. Notably, there will be an increased number of threat vectors from smart devices reliant on the telecommunications network to provide monitoring and control of infrastructure services. Because many of these devices are accessible by the public, the risk of social engineering attacks and vulnerability to physical hacking are exacerbated. Successful risk mitigation requires collaboration among CI's many stakeholders to implement security measures at the interfaces between connected devices to limit the access to assets in case one security measure is successfully bypassed. Due to the increased interdependencies between CI networks, operators must create backup plans to keep the most essential services running on a smaller bandwidth in case of a 5 G outage or similar failure. As 5 G capabilities continue to develop and the risk landscape evolves, ongoing research is needed and CI owners and operators should be prepared to update security measures to remain ahead of identified risks and threats.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100617"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rule-based anomaly detection for railway signalling networks 基于规则的铁路信号网络异常检测
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100603
Markus Heinrich , Arwed Gölz , Tolga Arul , Stefan Katzenbeisser

We propose a rule-based anomaly detection system for railway signalling that mitigates attacks by a Dolev-Yao attacker who is able to inject control commands to perform semantic attacks by issuing licit but mistimed control messages. The system as well mitigates the effects of a signal box compromised by an attacker with the same effect. We consider an attacker that could cause train derailments and collisions, if our countermeasure is not employed. We apply safety principles of railway operation to create a distributed anomaly detection system that inspects incoming commands on the signals and points. The proposed anomaly detection system detects mistimed control messages against light signals, points and train detection systems that lead to derailments and collisions without producing false positives, while it requires only a small amount of overhead in terms of network communication and latency compared to normal train operation.

我们提出了一种基于规则的铁路信号异常检测系统,该系统可以减轻Dolev Yao攻击者的攻击,该攻击者能够通过发布合法但时机不对的控制消息来注入控制命令以执行语义攻击。该系统还以同样的效果减轻了被攻击者破坏的信号盒的影响。如果我们不采取对策,我们认为攻击者可能会导致列车脱轨和碰撞。我们应用铁路运营的安全原则创建了一个分布式异常检测系统,用于检查信号和点上的传入命令。所提出的异常检测系统针对光信号、点和列车检测系统检测定时错误的控制信息,这些信息会导致脱轨和碰撞,而不会产生误报,而与正常列车运行相比,它只需要少量的网络通信和延迟开销。
{"title":"Rule-based anomaly detection for railway signalling networks","authors":"Markus Heinrich ,&nbsp;Arwed Gölz ,&nbsp;Tolga Arul ,&nbsp;Stefan Katzenbeisser","doi":"10.1016/j.ijcip.2023.100603","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100603","url":null,"abstract":"<div><p><span>We propose a rule-based anomaly detection<span> system for railway signalling that mitigates attacks by a Dolev-Yao attacker who is able to inject control commands to perform semantic attacks by issuing licit but mistimed control messages. The system as well mitigates the effects of a signal box compromised by an attacker with the same effect. We consider an attacker that could cause train derailments and collisions, if our </span></span>countermeasure<span> is not employed. We apply safety principles of railway operation to create a distributed anomaly detection system that inspects incoming commands on the signals and points. The proposed anomaly detection system detects mistimed control messages against light signals, points and train detection systems that lead to derailments and collisions without producing false positives, while it requires only a small amount of overhead in terms of network communication and latency compared to normal train operation.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100603"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications AKAASH:一种可实现的控制器-导频数据链路通信的认证、密钥协议和安全切换方法
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100619
Suleman Khan, G. S. Gaba, An Braeken, Pardeep Kumar, A. Gurtov
{"title":"AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications","authors":"Suleman Khan, G. S. Gaba, An Braeken, Pardeep Kumar, A. Gurtov","doi":"10.1016/j.ijcip.2023.100619","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100619","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100619"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering 基于约束谱聚类的电网级联故障系统风险缓解策略
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100622
Mohamed Salama , Wael El-Dakhakhni , Michael Tait

Power grids are prone to damage induced by natural or anthropogenic hazard events that might disrupt the functionality of key/multiple grid components concurrently, resulting in a chain of cascade failures spreading throughout the grid. Through integrating grid operation-guided with structure-driven modeling strategies, the current study proposes an approach to manage the risks of such cascade failure (known as systemic-risks) to minimize the possibility of large-scale catastrophic blackouts. The operation-guided modeling strategy is implemented through dispatch and load shedding to rebalance power demand and supply after disruptive events. On the other hand, the grid structure-driven modeling strategy adopted intentional controlled islanding approach through employing a constrained spectral clustering algorithm. Introducing the latter algorithm within the integrated (operation + structure) cascade failure model facilitated identifying the optimal cut-set lines to separate the grid into a group of functioning sub-grids following initial failure and prior to cascade propagation. To demonstrate the utility of the developed systemic risk management strategy, an actual power grid was simulated using a high-fidelity physics-based model under different disruption scenarios to compare the cascade failure size with and without strategy implementation, considering different numbers of sub-grids. The simulations demonstrate that the integrated (dispatch & load shedding-controlled islanding) strategy can effectively boost the overall grid robustness, and subsequently its resilience, and effectively manage catastrophic blackout systemic risks.

电网容易受到自然或人为灾害事件的破坏,这些事件可能会同时破坏关键/多个电网组件的功能,导致一系列级联故障在整个电网中蔓延。通过将电网运行与结构驱动的建模策略相结合,当前的研究提出了一种管理此类级联故障风险(称为系统风险)的方法,以最大限度地减少大规模灾难性停电的可能性。运营导向建模策略通过调度和甩负荷来实现,以在破坏性事件后重新平衡电力需求和供应。另一方面,网格结构驱动的建模策略通过使用约束谱聚类算法,采用了有意控制的孤岛方法。在集成(操作+结构)级联故障模型中引入后一种算法有助于识别最佳切割集线,以在初始故障后和级联传播前将电网分离为一组功能子电网。为了证明所开发的系统风险管理策略的实用性,考虑到不同数量的子电网,在不同的中断场景下,使用基于高保真物理的模型模拟了实际电网,以比较有策略实施和没有策略实施的级联故障大小。仿真结果表明,综合(调度和减载控制孤岛)策略可以有效地提高电网的整体稳健性,进而提高其弹性,并有效地管理灾难性停电系统风险。
{"title":"Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering","authors":"Mohamed Salama ,&nbsp;Wael El-Dakhakhni ,&nbsp;Michael Tait","doi":"10.1016/j.ijcip.2023.100622","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100622","url":null,"abstract":"<div><p>Power grids are prone to damage induced by natural or anthropogenic hazard events that might disrupt the functionality of key/multiple grid components concurrently, resulting in a chain of cascade failures spreading throughout the grid. Through integrating grid operation-guided with structure-driven modeling strategies, the current study proposes an approach to manage the risks of such cascade failure (known as <em>systemic-risks</em><span>) to minimize the possibility of large-scale catastrophic blackouts. The operation-guided modeling strategy is implemented through dispatch and load shedding to rebalance power demand and supply after disruptive events. On the other hand, the grid structure-driven modeling strategy adopted intentional controlled islanding approach through employing a constrained spectral clustering<span><span> algorithm. Introducing the latter algorithm within the integrated (operation + structure) cascade failure model facilitated identifying the optimal cut-set lines to separate the grid into a group of functioning sub-grids following initial failure and prior to cascade propagation. To demonstrate the utility of the developed systemic risk management strategy, an actual power grid was simulated using a high-fidelity physics-based model under different disruption scenarios to compare the cascade failure size with and without strategy implementation, considering different numbers of sub-grids. The simulations demonstrate that the integrated (dispatch &amp; load shedding-controlled islanding) strategy can effectively boost the overall grid robustness, and subsequently its resilience, and effectively manage catastrophic blackout </span>systemic risks.</span></span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100622"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey 工业控制系统中用于入侵响应的软件定义网络方法:综述
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100615
Xabier Etxezarreta, Iñaki Garitano, Mikel Iturbe, Urko Zurutuza

Industrial Control Systems (ICSs) are a key technology for life-sustainability, social development and economic progress used in a wide range of industrial solutions, including Critical Infrastructures (CIs), becoming the primary target for multiple security attacks. With the increase of personalized and sophisticated attacks, the need for new tailored ICS cybersecurity mechanisms has increased exponentially, complying with specific ICS requirements that Information Technology (IT) security systems fail to meet. In this survey, a comprehensive study of ICS intrusion response is conducted, focusing on the use of Software-Defined Networking (SDN) for the development of intrusion response strategies in ICS. With its centralized control plane, increased programmability and global view of the entire network, SDN enables the development of intrusion response solutions that provide a coordinated response to mitigate attacks. Through the survey, an analysis of ICS security requirements and the applicability of SDN is conducted, identifying the advantages and disadvantages compared to traditional networking and protocols. Furthermore, a taxonomy on intrusion response strategies is presented, where different proposals are discussed and categorized according to intrusion response strategy and deployment environment characteristics. Finally, future research directions and challenges are identified.

工业控制系统(ICSs)是生命可持续性、社会发展和经济进步的关键技术,用于各种工业解决方案,包括关键基础设施(CI),成为多种安全攻击的主要目标。随着个性化和复杂攻击的增加,对新的定制ICS网络安全机制的需求呈指数级增长,符合信息技术(IT)安全系统无法满足的特定ICS要求。在这项调查中,对ICS入侵响应进行了全面的研究,重点是使用软件定义网络(SDN)开发ICS中的入侵响应策略。凭借其集中的控制平面、增强的可编程性和对整个网络的全局视图,SDN能够开发入侵响应解决方案,提供协调的响应以减轻攻击。通过调查,分析了ICS的安全需求和SDN的适用性,确定了与传统网络和协议相比的优势和劣势。此外,还提出了入侵响应策略的分类法,根据入侵响应策略和部署环境的特点,对不同的建议进行了讨论和分类。最后,确定了未来的研究方向和挑战。
{"title":"Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey","authors":"Xabier Etxezarreta,&nbsp;Iñaki Garitano,&nbsp;Mikel Iturbe,&nbsp;Urko Zurutuza","doi":"10.1016/j.ijcip.2023.100615","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100615","url":null,"abstract":"<div><p>Industrial Control Systems (ICSs) are a key technology for life-sustainability, social development and economic progress used in a wide range of industrial solutions, including Critical Infrastructures (CIs), becoming the primary target for multiple security attacks. With the increase of personalized and sophisticated attacks, the need for new tailored ICS cybersecurity mechanisms has increased exponentially, complying with specific ICS requirements that Information Technology (IT) security systems fail to meet. In this survey, a comprehensive study of ICS intrusion response is conducted, focusing on the use of Software-Defined Networking (SDN) for the development of intrusion response strategies in ICS. With its centralized control plane, increased programmability and global view of the entire network, SDN enables the development of intrusion response solutions that provide a coordinated response to mitigate attacks. Through the survey, an analysis of ICS security requirements and the applicability of SDN is conducted, identifying the advantages and disadvantages compared to traditional networking and protocols. Furthermore, a taxonomy on intrusion response strategies is presented, where different proposals are discussed and categorized according to intrusion response strategy and deployment environment characteristics. Finally, future research directions and challenges are identified.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100615"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the comprehensive importance of power grid nodes based on DEA 基于DEA的电网节点综合重要性评估
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100614
Xin Gao , Yunxia Ye , Wenxin Su , Linyan Chen

The safe and stable operation of the power grid is crucial to guarantee basic human demands and promote sustainable economic and social development. To better maintain the sound operation of the power grid, it is meaningful to analyse node importance and identify critical nodes based on the topology of the grid and its performance under cascading failure scenarios. Based on complex network theory, this paper proposes four node importance assessment metrics from static and dynamic perspectives. It performs a comprehensive importance assessment of power grid nodes based on data envelopment analysis (DEA) technology and then further identifies critical nodes in the system. A case study is conducted to validate the methodology. Results show that the suggested strategy may successfully identify the grid's key nodes with high accuracy and differentiation degree. This study is of great value for formulating reasonable emergency plans and improving power grid resilience.

电网的安全稳定运行对保障人类基本需求、促进经济社会可持续发展至关重要。为了更好地保持电网的良好运行,根据电网拓扑结构及其在级联故障场景下的性能,分析节点重要性并识别关键节点是有意义的。基于复杂网络理论,本文从静态和动态两个角度提出了四个节点重要性评估指标。它基于数据包络分析(DEA)技术对电网节点进行综合重要性评估,然后进一步识别系统中的关键节点。进行了一个案例研究以验证该方法。结果表明,所提出的策略可以成功地识别网格的关键节点,具有较高的精度和区分度。本研究对制定合理的应急预案、提高电网恢复能力具有重要价值。
{"title":"Assessing the comprehensive importance of power grid nodes based on DEA","authors":"Xin Gao ,&nbsp;Yunxia Ye ,&nbsp;Wenxin Su ,&nbsp;Linyan Chen","doi":"10.1016/j.ijcip.2023.100614","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100614","url":null,"abstract":"<div><p>The safe and stable operation of the power grid is crucial to guarantee basic human demands and promote sustainable economic and social development. To better maintain the sound operation of the power grid, it is meaningful to analyse node importance and identify critical nodes based on the topology of the grid and its performance under cascading failure scenarios. Based on complex network theory, this paper proposes four node importance assessment metrics from static and dynamic perspectives. It performs a comprehensive importance assessment of power grid nodes based on data envelopment analysis (DEA) technology and then further identifies critical nodes in the system. A case study is conducted to validate the methodology. Results show that the suggested strategy may successfully identify the grid's key nodes with high accuracy and differentiation degree. This study is of great value for formulating reasonable emergency plans and improving power grid resilience.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100614"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies 具有不同拓扑结构的弹性相互依赖关键基础设施的网络扩展决策评估
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100623
Achara Tiong, Hector A. Vergara

Resilient interdependent critical infrastructures (CIs) can better withstand cascading failures in disruptive events. This study proposes network expansion as a resilience improvement strategy for interdependent CIs and evaluates the influence of topology in interdependent network design for resilience optimization under disruption uncertainty. A resilience score consisting of network complexity and unmet demand metrics is introduced to quantify the resilience of expanded networks. Five synthetic interdependent network instances with random and hub-and-spoke (i.e., cluster) topologies are generated to represent CIs with heterogeneous node functions. Different network expansion opportunities are considered and critical node disruption scenarios are used to evaluate the impact of uncertain disruptions. We apply a two-stage stochastic multi-objective resilience optimization model to determine strategic investment decisions using the expected total cost and expected resilience score as competing objectives. Compromise solutions of expanded network designs are identified from Pareto optimal solutions and they are characterized according to their graph properties. The results show that expanded networks have improved resilience and the extent of improvement is affected by the network topology and type of disruption. Under critical node disruptions, a random network is more resilient than a hub-and-spoke structure due to its better connectivity. Characteristics of highly connected interdependent networks are high average node degree, high clustering coefficient, and low average shortest path length. Resilience improvement is more limited in expanded networks with a hub-and-spoke structure due to the negative impact of hub failures.

具有弹性的相互依存的关键基础设施(CI)可以更好地抵御破坏性事件中的级联故障。本研究提出网络扩展作为相互依存CI的弹性改进策略,并评估了拓扑结构在相互依存网络设计中对中断不确定性下弹性优化的影响。引入了由网络复杂性和未满足需求指标组成的弹性得分来量化扩展网络的弹性。生成了五个具有随机拓扑和轮辐拓扑(即集群)的合成相互依赖网络实例,以表示具有异构节点功能的CI。考虑了不同的网络扩展机会,并使用关键节点中断场景来评估不确定中断的影响。我们应用两阶段随机多目标弹性优化模型来确定战略投资决策,使用预期总成本和预期弹性得分作为竞争目标。从Pareto最优解中识别出扩展网络设计的折衷解,并根据其图性质对其进行表征。结果表明,扩展后的网络提高了弹性,改进程度受网络拓扑结构和中断类型的影响。在关键节点中断的情况下,随机网络比轮辐结构更具弹性,因为它具有更好的连接性。高度连通的相互依存网络具有平均节点度高、聚类系数高和平均最短路径长度低的特点。由于集线器故障的负面影响,在具有轮辐结构的扩展网络中,弹性的提高更加有限。
{"title":"Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies","authors":"Achara Tiong,&nbsp;Hector A. Vergara","doi":"10.1016/j.ijcip.2023.100623","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100623","url":null,"abstract":"<div><p><span><span>Resilient interdependent critical infrastructures (CIs) can better withstand cascading failures in disruptive events. This study proposes network expansion as a resilience improvement strategy for interdependent CIs and evaluates the influence of topology in interdependent network design for resilience optimization under disruption uncertainty. A resilience score consisting of network complexity and unmet demand metrics is introduced to quantify the resilience of expanded networks. Five synthetic interdependent network instances with random and hub-and-spoke (i.e., cluster) topologies are generated to represent CIs with heterogeneous node functions. Different network expansion opportunities are considered and critical node disruption scenarios are used to evaluate the impact of uncertain disruptions. We apply a two-stage stochastic multi-objective resilience optimization model to determine strategic investment decisions using the expected total cost and expected resilience score as competing objectives. Compromise solutions of expanded network designs are identified from </span>Pareto optimal solutions and they are characterized according to their graph properties. The results show that expanded networks have improved resilience and the extent of improvement is affected by the </span>network topology<span> and type of disruption. Under critical node disruptions, a random network is more resilient than a hub-and-spoke structure due to its better connectivity. Characteristics of highly connected interdependent networks are high average node degree, high clustering coefficient, and low average shortest path length. Resilience improvement is more limited in expanded networks with a hub-and-spoke structure due to the negative impact of hub failures.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100623"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks CAPTAIN:基于社区的IT网络高级持续威胁分析
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100620
Ali Ahmadian Ramaki , Abbas Ghaemi-Bafghi , Abbas Rasoolzadegan

Organizations that possess valuable information assets and critical infrastructure are prone to Advanced Persistent Threats (APTs). The life cycle of this type of modern attack consists of multiple stages called Intrusion Kill Chain (IKC). As one of the most common approaches to deal with these attacks, organizations’ security staff use various heterogeneous security and non-security sensors in different lines of defense (Network, Host, and Application) as the primary detection levels in the monitored IT network to log the attacker’s intrusive activities. They then model their behaviors by using logged events to detect the IKC of APT attacks. However, numerous methods proposed in the literature have three primary drawbacks: 1) the inability to use both security and non-security sensors of the three mentioned detection levels in event correlation analysis, 2) high dependence on expert knowledge in setting up and maintaining common attack patterns, and 3) incapability to provide a visual representation of the attack path for security administrators to better track on-the-fly attacks in a monitored network. This paper presents a system for Community-based Advanced Persistent Threat Analysis in IT Networks (CAPTAIN) to address the aforementioned issues and challenges. The CAPTAIN framework comprises two distinct phases (including 12 different activities) that receive raw events logged by heterogeneous sensors as input and detect possible IKCs of the APT attacks as output. This system implements a novel graph-based attackers’ behavior modeling technique for detecting the IKC of APT attacks by correlating analysis of logged events and leveraging knowledge discovery on the graph. Our evaluation of the two publicly available standard datasets, Bryant and DARPA Transparent Computing, indicates that the CAPTAIN is robust, reliable against high volume events, and can detect the IKC of APT attacks with high accuracy and low false positive rates.

拥有宝贵信息资产和关键基础架构的组织容易受到高级持续威胁(APT)的影响。这种类型的现代攻击的生命周期由多个阶段组成,称为入侵杀死链(IKC)。作为应对这些攻击的最常见方法之一,组织的安全人员使用不同防御线(网络、主机和应用程序)中的各种异构安全和非安全传感器作为受监控IT网络中的主要检测级别,以记录攻击者的侵入活动。然后,他们通过使用记录的事件来检测APT攻击的IKC,从而对自己的行为进行建模。然而,文献中提出的许多方法有三个主要缺点:1)在事件相关性分析中无法同时使用上述三种检测级别的安全和非安全传感器,2)在建立和维护常见攻击模式时高度依赖专家知识,以及3)不能为安全管理员提供攻击路径的视觉表示,以更好地跟踪被监控网络中的动态攻击。本文提出了一个基于社区的IT网络高级持久威胁分析系统(CAPTAIN),以解决上述问题和挑战。CAPTAIN框架包括两个不同的阶段(包括12个不同的活动),它们接收由异构传感器记录的原始事件作为输入,并检测APT攻击的可能IKC作为输出。该系统实现了一种新的基于图的攻击者行为建模技术,通过对记录事件的关联分析和利用图上的知识发现来检测APT攻击的IKC。我们对Bryant和DARPA Transparent Computing这两个公开可用的标准数据集的评估表明,CAPTAIN对大量事件具有鲁棒性和可靠性,并且可以高精度和低误报率检测APT攻击的IKC。
{"title":"CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks","authors":"Ali Ahmadian Ramaki ,&nbsp;Abbas Ghaemi-Bafghi ,&nbsp;Abbas Rasoolzadegan","doi":"10.1016/j.ijcip.2023.100620","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100620","url":null,"abstract":"<div><p>Organizations that possess valuable information assets and critical infrastructure are prone to Advanced Persistent Threats<span> (APTs). The life cycle of this type of modern attack consists of multiple stages called Intrusion Kill Chain (IKC). As one of the most common approaches to deal with these attacks, organizations’ security staff use various heterogeneous security and non-security sensors in different lines of defense (Network, Host, and Application) as the primary detection levels in the monitored IT network to log the attacker’s intrusive activities. They then model their behaviors by using logged events to detect the IKC of APT attacks. However, numerous methods proposed in the literature have three primary drawbacks: 1) the inability to use both security and non-security sensors of the three mentioned detection levels in event correlation analysis, 2) high dependence on expert knowledge in setting up and maintaining common attack patterns, and 3) incapability to provide a visual representation of the attack path for security administrators to better track on-the-fly attacks in a monitored network. This paper presents a system for Community-based Advanced Persistent Threat Analysis in IT Networks (CAPTAIN) to address the aforementioned issues and challenges. The CAPTAIN framework comprises two distinct phases (including 12 different activities) that receive raw events logged by heterogeneous sensors as input and detect possible IKCs of the APT attacks as output. This system implements a novel graph-based attackers’ behavior modeling technique for detecting the IKC of APT attacks by correlating analysis of logged events and leveraging knowledge discovery on the graph. Our evaluation of the two publicly available standard datasets, Bryant and DARPA Transparent Computing, indicates that the CAPTAIN is robust, reliable against high volume events, and can detect the IKC of APT attacks with high accuracy and low false positive rates.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100620"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A forensics and compliance auditing framework for critical infrastructure protection 用于关键基础设施保护的取证和遵从性审计框架
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100613
João Henriques, F. Caldeira, T. Cruz, P. Simões
{"title":"A forensics and compliance auditing framework for critical infrastructure protection","authors":"João Henriques, F. Caldeira, T. Cruz, P. Simões","doi":"10.1016/j.ijcip.2023.100613","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100613","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100613"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Critical Infrastructure Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1