A Cooperative Cyber Defense for Securing Critical Infrastructures
نویسندگان
چکیده
With the growth of Internet connectivity critical national infrastructures have grown intertwined in complex networked relationships. At electrical substations, it is common to find equipment from several companies together administered remotely by several contractors via the Internet. The the threat of nation-state and terrorist cyber attacks further complicates the ad hoc arrangement until the complexity of the situation becomes difficult even to describe [11]. Defensive actions and policy changes by one company may have far-reaching negative consequences on the partner organizations in the infrastructure. Currently, no cyber defense is designed to protect such interdependent multi-enterprise infrastructures. Human-only or machine-only approaches are now insufficient. The former are slow but adaptable, while the latter are limited by their specialization. In either case, humans must accept ultimate responsibility for the actions of automated systems. We believe the solution lies in mixedinitiative [13] defense unifying the complementary qualities of both humanand machine-based approaches. We describe the Cooperative Infrastructure Defense (CID), a new cyber-defense paradigm whose unique features are: • CID makes humans an intrinsic part of the solution without requiring them to have direct control. • CID enables diverse organizations within an infrastructure to cooperate in an adaptive cyber defense. • CID unifies complex-adaptive swarm intelligence, logical rational agents, and human insight. The resulting system actually turns false positives into beneficial forms of positive feedback for improved performance.
منابع مشابه
SCADA Cyber Attacks and Security Vulnerabilities: Review
SCADA plays a vital role in critical infrastructures. As the modern IT technology become very advanced, the threat on industrial control system (ICS) and SCADA security become a big concern of every critical infrastructures operator. With the recent cyber-attacks, the urge to secure the critical infrastructure is a big issue especially for those countries that uses critical infrastructures. In ...
متن کاملA Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures
Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. In this paper we address securing cyber infrastructures for ubiquitous computing environments, like smart buildings and campuses. Our emphasis here is to construct a middleware-based critical cyber infrastructure (CCI) that encompasses heterogeneous components and binds networks, proces...
متن کاملA Methodology for Designing Resilient and Smart Critical Infrastructures
Critical infrastructures are rapidly converging toward digital technologies in order to provide advanced information services, efficient management, and resource utilization. This has led to the proliferation of ubiquitous connectivity to critical infrastructures (electrical grid, utility networks, finance, etc.) that are connecting homes, businesses, and government resources. This will drive t...
متن کاملDetermining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures
Industrial Control Systems (ICS) monitor and control industrial processes, and enable automation in industry facilities. Many of these facilities are regarded as Critical Infrastructures (CIs). Due to the increasing use of Commercial-Off-The-Shelf (COTS) IT products and connectivity offerings, CIs have become an attractive target for cyberattacks. A successful attack could have significant cons...
متن کاملDynamic Watermarking: Active Defense of Networked Cyber-Physical Systems
The coming decades may see the large scale deployment of networked cyber-physical systems to address global needs in areas such as energy, water, healthcare, and transportation. However, as recent events have shown, such systems are vulnerable to cyber attacks. Being safety critical, their disruption or misbehavior can cause economic losses or injuries and loss of life. It is therefore importan...
متن کامل