Approach to security assessment of critical infrastructures' information systems

被引:16
|
作者
Leszczyna, R. [1 ]
Fovino, I. N. [2 ]
Masera, M. [3 ]
机构
[1] Gdansk Univ Technol, Fac Management & Econ, Gdansk, Poland
[2] Global Cyber Secur Ctr, Rome, Italy
[3] Inst Energy, Joint Res Ctr, European Commiss, NL-1755 ZG Petten, Netherlands
关键词
D O I
10.1049/iet-ifs.2010.0261
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation of trust cases which provide valuable information for the end users of the infrastructure. Another new proposal is MAlSim - mobile agent-based simulator of malicious software (viruses, worms, etc). To the best of the authors' knowledge, such a simulator has not been proposed before. The present approach was applied to the verification of the security of industrial control systems and power plants. In the study, one of the experiments related to the security study of an information system of a power plant, a simulation of zero-day worm attack, is described.
引用
收藏
页码:135 / 144
页数:10
相关论文
共 50 条
  • [1] Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    [J]. PROCEEDINGS OF THE 28TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2021, : 89 - 95
  • [2] Emergent information security in critical infrastructures
    Daskapan, Semir
    Vree, Willem G.
    Wagenaar, Rene W.
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2006, 2 (2-3) : 247 - 260
  • [3] Critical Information Infrastructures Security Modeling
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    [J]. PROCEEDINGS OF THE 24TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2019, : 82 - 88
  • [4] A Security Assessment Methodology for Critical Infrastructures
    Caselli, Marco
    Kargl, Frank
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2014), 2016, 8985 : 332 - 343
  • [5] Security Strategy Analysis for Critical Information Infrastructures
    Manuel Torres, Jose
    Olav Sveen, Finn
    Maria Sarriegi, Jose
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2009, 5508 : 247 - 257
  • [6] Modelling Security of Critical Infrastructures: A Survivability Assessment
    Rodriguez, Ricardo J.
    Merseguer, Jose
    Bernardi, Simona
    [J]. COMPUTER JOURNAL, 2015, 58 (10): : 2313 - 2327
  • [7] ARCHITECTURAL MODEL FOR INFORMATION SECURITY ANALYSIS OF CRITICAL INFORMATION INFRASTRUCTURES
    Ma, Zhendong
    Smith, Paul
    Skopik, Florian
    [J]. IDIMT-2013: INFORMATION TECHNOLOGY HUMAN VALUES, INNOVATION AND ECONOMY, 2013, 42 : 197 - 204
  • [8] First step into automation of security assessment of critical infrastructures
    Bartusiak, Adam
    Kuehne, Marcel
    Nitschke, Oliver
    Laessig, Joerg
    Nicolai, Steffen
    Bretschneider, Peter
    [J]. SUSTAINABLE ENERGY GRIDS & NETWORKS, 2023, 36
  • [9] Decision Networks for Security Risk Assessment of Critical Infrastructures
    Codetta-Raiteri, Daniele
    Portinale, Luigi
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2018, 18 (03)
  • [10] Automatic Security Assessment of Critical Cyber-Infrastructures
    Anwar, Zahid
    Shankesi, Ravinder
    Campbell, Roy. H.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC, 2008, : 366 - 375