Jihadist attacks on Critical Infrastructure
نویسندگان
چکیده
منابع مشابه
Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy
The Distributed Network Protocol v3.0 (DNP3) is one of the most widely used protocols, to control national infrastructure. Widely used interactive packet manipulation tools, such as Scapy, have not yet been augmented to parse and create DNP3 frames (Biondi 2014). In this paper we extend Scapy to include DNP3, thus allowing us to perform attacks on DNP3 in real-time. Our contribution builds on E...
متن کاملOn Critical Infrastructure Protection and International Agreements
This paper evaluates the prospects for protecting critical social functions from “cyber” attacks carried out over electronic information networks. In particular, it focuses on the feasibility of devising international laws, conventions or agreements to deter and/or punish perpetrators of such attacks. First, it briefly summarizes existing conventions and laws, and explains to which technologica...
متن کاملOn Hardening Problems in Critical Infrastructure Systems
The power and communication networks are highly interdependent and form a part of the critical infrastructure of a country. Similarly, dependencies exist within the networks itself. It is essential to have a model which captures these dependencies precisely. Previous research has proposed certain models but these models have certain limitations. The limitations of the aforementioned models have...
متن کاملDetecting Attacks in Electric Power System Critical Infrastructure Using Rough Classifi cation Algorithm
This paper presents an alternative technique for improving the security of Electric Power Control Systems by implementing anomaly detection methods to identify attacks and faults. By using Rough Sets Classifi cation Algorithm, a set of rules can be defi ned. The alternative approach tries to reduce the number of input variables and the number of examples, offering a more compact set of examples...
متن کاملDefending Critical Infrastructure
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions by attacker and defender. We illustrate with examples of the US Strategic Petroleum Reserve, the US Border Patrol at Yuma, Arizona, and an ele...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Belügyi Szemle
سال: 2020
ISSN: 2677-1632,2062-9494
DOI: 10.38146/bsz.spec.2020.1.7