A Cooperative Cyber Defense for Securing Critical Infrastructures

نویسندگان

  • Glenn Fink
  • Jereme Haack
  • Wendy Maiden
چکیده

With the growth of Internet connectivity critical national infrastructures have grown intertwined in complex networked relationships. At electrical substations, it is common to find equipment from several companies together administered remotely by several contractors via the Internet. The the threat of nation-state and terrorist cyber attacks further complicates the ad hoc arrangement until the complexity of the situation becomes difficult even to describe [11]. Defensive actions and policy changes by one company may have far-reaching negative consequences on the partner organizations in the infrastructure. Currently, no cyber defense is designed to protect such interdependent multi-enterprise infrastructures. Human-only or machine-only approaches are now insufficient. The former are slow but adaptable, while the latter are limited by their specialization. In either case, humans must accept ultimate responsibility for the actions of automated systems. We believe the solution lies in mixedinitiative [13] defense unifying the complementary qualities of both humanand machine-based approaches. We describe the Cooperative Infrastructure Defense (CID), a new cyber-defense paradigm whose unique features are: • CID makes humans an intrinsic part of the solution without requiring them to have direct control. • CID enables diverse organizations within an infrastructure to cooperate in an adaptive cyber defense. • CID unifies complex-adaptive swarm intelligence, logical rational agents, and human insight. The resulting system actually turns false positives into beneficial forms of positive feedback for improved performance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SCADA Cyber Attacks and Security Vulnerabilities: Review

SCADA plays a vital role in critical infrastructures. As the modern IT technology become very advanced, the threat on industrial control system (ICS) and SCADA security become a big concern of every critical infrastructures operator. With the recent cyber-attacks, the urge to secure the critical infrastructure is a big issue especially for those countries that uses critical infrastructures. In ...

متن کامل

A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures

Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. In this paper we address securing cyber infrastructures for ubiquitous computing environments, like smart buildings and campuses. Our emphasis here is to construct a middleware-based critical cyber infrastructure (CCI) that encompasses heterogeneous components and binds networks, proces...

متن کامل

A Methodology for Designing Resilient and Smart Critical Infrastructures

Critical infrastructures are rapidly converging toward digital technologies in order to provide advanced information services, efficient management, and resource utilization. This has led to the proliferation of ubiquitous connectivity to critical infrastructures (electrical grid, utility networks, finance, etc.) that are connecting homes, businesses, and government resources. This will drive t...

متن کامل

Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures

Industrial Control Systems (ICS) monitor and control industrial processes, and enable automation in industry facilities. Many of these facilities are regarded as Critical Infrastructures (CIs). Due to the increasing use of Commercial-Off-The-Shelf (COTS) IT products and connectivity offerings, CIs have become an attractive target for cyberattacks. A successful attack could have significant cons...

متن کامل

Dynamic Watermarking: Active Defense of Networked Cyber-Physical Systems

The coming decades may see the large scale deployment of networked cyber-physical systems to address global needs in areas such as energy, water, healthcare, and transportation. However, as recent events have shown, such systems are vulnerable to cyber attacks. Being safety critical, their disruption or misbehavior can cause economic losses or injuries and loss of life. It is therefore importan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008