Simulation platform for cyber-security and vulnerability analysis of critical infrastructures

被引:28
|
作者
Ficco, Massimo [1 ]
Choras, Michal [2 ]
Kozik, Rafal [2 ]
机构
[1] Univ Campania Luigi Vanvitelli, Dept Ind & Informat Engn, Via Roma 29, I-81031 Aversa, CE, Italy
[2] Univ Sci & Technol, Dept Teleinformat Syst, Bydgoszcz, Poland
关键词
Critical infrastructures; Cyber-security; Simulation; HLA; Penetration testing; Cloud computing; FRAMEWORK;
D O I
10.1016/j.jocs.2017.03.025
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The progressive advances in information and communication technology have lend modern critical infrastructures to become more and more complex and interconnected, and in continuous evolution. The increasing complex interrelation among such critical systems creates new security vulnerabilities, which can be exploited by malicious users to compromise sensible data and other systems also very far from the impact zone. Identifying and analyzing these complex interactions represent a challenge to the evaluation of the real vulnerability of each critical system. On the other hand, the evaluation of this complex and large-scale systems requires expensive and sophisticated modeling practices, simulation tools, and experimentation infrastructure. Therefore, we present a hybrid and distributed simulation platform for cyber-security analysis of large-scale critical infrastructure systems. It enables testers to assemble complex and distributed experimental scenarios in the cloud, by integrating different simulated environments, on which perform sophisticated vulnerability analysis, by exploiting penetration testing and monitoring facilities. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:179 / 186
页数:8
相关论文
共 50 条
  • [1] Cyber-Security Risk Assessment Framework for Critical Infrastructures
    Baig, Zubair
    Zeadally, Sherali
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2019, 25 (01): : 121 - 129
  • [2] Wide-area Cyber-security Analytics Solution for Critical Infrastructures
    McKeever, Padraic
    Allhof, Manuel
    Corsi, Antonello
    Sowa, Igor
    Monti, Antonello
    [J]. 2020 6TH IEEE INTERNATIONAL ENERGY CONFERENCE (ENERGYCON), 2020, : 34 - 37
  • [3] Towards Cyber-Security Protection of Critical Infrastructures by Generating Security Policy for SCADA Systems
    Feltus, Christophe
    Ouedraogo, Moussa
    Khadraoui, Djamel
    [J]. 2014 1ST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM), 2014, : 1 - 8
  • [4] Cyber security of critical infrastructures
    Maglaras, Leandros A.
    Kim, Ki-Hyung
    Janicke, Helge
    Ferrag, Mohamed Amine
    Rallis, Stylianos
    Fragkou, Pavlina
    Maglaras, Athanasios
    Cruz, Tiago J.
    [J]. ICT EXPRESS, 2018, 4 (01): : 42 - 45
  • [5] First cyber-security vulnerability database for control systems
    不详
    [J]. HYDROCARBON PROCESSING, 2008, 87 (06): : 35 - 35
  • [6] Big Data Platform for Integrated Cyber and Physical Security of Critical Infrastructures for the Financial Sector Critical Infrastructures as Cyber-Physical Systems
    Troiano, Ernesto
    Soldatos, John
    Polyviou, Ariana
    Polyviou, Andreas
    Mamelli, Alessandro
    Drakoulis, Dimitris
    [J]. 11TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS (MEDES), 2019, : 262 - 269
  • [7] Cyber Security of Networked Critical Infrastructures
    Abu-Nimeh, Saed
    Foo, Ernest
    Fovino, Igor Nai
    Govindarasu, Manimaran
    Morris, Thomas
    [J]. IEEE NETWORK, 2013, 27 (01): : 3 - 4
  • [8] Critical Infrastructure Cyber-Security Risk Management
    Spyridopoulos, Theodoros
    Maraslis, Konstantinos
    Tryfonas, Theo
    Oikonomou, George
    [J]. TERRORISTS' USE OF THE INTERNET: ASSESSMENT AND RESPONSE, 2017, 136 : 59 - 76
  • [9] A Multi-level Cyber-Security Reference Model in Support of Vulnerability Analysis
    Hacks, Simon
    Kaczmarek-Hess, Monika
    de Kinderen, Sybren
    Toepel, Daniel
    [J]. ENTERPRISE DESIGN, OPERATIONS, AND COMPUTING, EDOC 2022, 2022, 13585 : 19 - 35
  • [10] The THREAT-ARREST Cyber-Security Training Platform
    Soultatos, Othonas
    Fysarakis, Konstantinos
    Spanoudakis, George
    Koshutanski, Hristo
    Damiani, Ernesto
    Beckers, Kristian
    Wortmann, Dirk
    Bravos, George
    Ioannidis, Menelaos
    [J]. COMPUTER SECURITY: ESORICS 2019 INTERNATIONAL WORKSHOPS, IOSEC, MSTEC, AND FINSEC, 2020, 11981 : 199 - 214