Can critical infrastructures rely on the Internet?

被引:0
|
作者
Fischer, W [1 ]
Lepperhoff, N [1 ]
机构
[1] Forschungszentrum Julich, Syst Anal & Technol Evaluat, D-52425 Julich, Germany
关键词
Internet disturbances; priority service; packet loss; worm attack; IPv6; critical infrastructure;
D O I
10.1016/j.cose.2005.04.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The functionality of critical infrastructures (CI) depends more and more on an operative Internet, which has to secure data packet transport even during Internet Exchange Point (IX) failures and "worm" attacks. The paper focuses on the questions: Do priority services for data packets which could be implemented in an Internet Protocol, version 6 (lPv6) world reduce Cl packet loss during IX failures or a worm attack? Do priority services, used by two Cls, lead to competition between their packets during failures and attacks? Under what circumstances do priority services offer a safety margin for Cl packet transport? Simulation shows that priority services produce dialectics of alleviation and risks during an attack. They ensure routing update information thus making routing more stable and thereby reducing packet losses, in particular for Cl data packets. Whereas priority service always matters during Cl failures, that service itself could tie a risk for packet transport if a worm takes up the highest priority class, reserved for routing information, to ensure its unhampered propagation. Therefore, the remedy defenders introduce a crisis, i.e. priority service, which could be abused by those attacking the network. (C) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:485 / 491
页数:7
相关论文
共 50 条
  • [1] Can We Rely on Internet in the Era of Hepatitis C Cure?
    Gupta, Nancy
    Sandhu, Gurpratap
    Singh, Harkirat
    Forman, Leanne
    AMERICAN JOURNAL OF GASTROENTEROLOGY, 2015, 110 : S890 - S890
  • [2] Internet of Things as an Attack Vector to Critical Infrastructures of Cities
    Gallegos-Segovia, Pablo L.
    Bravo-Torres, Jack F.
    Argudo-Parra, Johnny J.
    Sacoto-Cabrera, Erwin J.
    Larios-Rosillo, Victor M.
    2017 INTERNATIONAL CARIBBEAN CONFERENCE ON DEVICES, CIRCUITS AND SYSTEMS (ICCDCS), 2017, : 117 - 120
  • [3] Assessing the security of internet-connected critical infrastructures
    Ghani, Hamza
    Khelil, Abdelmajid
    Suri, Neeraj
    Csertan, Gyoergy
    Goenczy, Laszlo
    Urbanics, Gabor
    Clarke, James
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2713 - 2725
  • [4] Research on Critical Infrastructures and Critical Information Infrastructures
    Yusufovna, Feruza Sattarova
    Alisherovich, Farkhod Alisherov
    Choi, Minkyu
    Cho, Eun-Suk
    Abdurashidovich, Furkhat Tadjibayev
    Kim, Tai-hoon
    2009 SYMPOSIUM ON BIO-INSPIRED LEARNING AND INTELLIGENT SYSTEMS FOR SECURITY (BLISS 2009), 2009, : 97 - +
  • [5] Assessing the security of Internet paths: A case study of Dutch critical infrastructures
    Khadka, Shyam Krishna
    Bayhan, Suzan
    Holz, Ralph
    Hesselman, Cristian
    ANRW 2024 - Proceedings of the 2024 Applied Networking Research Workshop, : 67 - 73
  • [6] Can complexity science support the engineering of critical network infrastructures?
    Alderson, David L.
    Doyle, John C.
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 3937 - +
  • [7] An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
    Bairagi, Anupam Kumar
    Khondoker, Rahamatullah
    Islam, Rafiqul
    INFORMATION SECURITY JOURNAL, 2016, 25 (4-6): : 197 - 212
  • [8] A Blockchain-Based Architecture for Enabling Cybersecurity in the Internet-of-Critical Infrastructures
    Ragab, Mahmoud
    Altalbe, Ali
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1579 - 1592
  • [9] Support you can rely on
    British Dental Journal, 2018, 225 : 989 - 989
  • [10] Can We Rely On Translations?
    Zeydel, Edwin H.
    MODERN LANGUAGE JOURNAL, 1941, 25 (05): : 402 - 404