A Security Architecture Framework for Critical Infrastructure with Ring-based Nested Network Zones

被引:0
|
作者
Chaisuriya, Sarayut [1 ]
Keretho, Somnuk [1 ]
Sanguanpong, Surasak [1 ]
Praneetpolgrang, Prasong [2 ]
机构
[1] Kasetsart Univ, Fac Engn, Bangkok, Thailand
[2] Sripatum Univ, Fac Informat Technol, Bangkok, Thailand
关键词
Security Architecture; Nested Zones; Critical Infrastructure; Attack Hops; Defense in Depth;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The defense-in-depth approach has been widely recommended for designing critical information infrastructure, however, the lack of holistic design guidelines makes it difficult for many organizations to adopt the concept. Therefore, this paper proposes a holistic architectural framework and guidelines based on ring-based nested network zones for designing such highly secured information systems. This novel security architectural framework and guidelines offer the overall structural design and implementation options for holistically designing the N-tier/shared nothing system architectures. The implementation options, e.g. for the zone's perimeters, are recommended to achieve different capability levels of security or to trade off among different required security attributes. This framework enables the adaptive capability suitable for different real-world contexts. This paper also proposes an attack-hops verification approach as a tool to evaluate the architectural design.
引用
收藏
页码:248 / 253
页数:6
相关论文
共 50 条
  • [21] Security Certification of Cyber Physical Systems for Critical Infrastructure based on the Compositional MILS Architecture
    Hohenegger, Andreas
    Krummeck, Gerald
    Banos, Janie
    Ortega, Alvaro
    Hager, Michal
    Sterba, Jiri
    Kertis, Tomas
    Novobilsky, Petr
    Prochazka, Jan
    Caracuel, Benito
    Sanz, Ana Lourdes
    Ramos, Francisco
    Blasum, Holger
    Brotz, Mario
    Fuchsen, Rudolf
    Fumaroli, Guillaume
    Neskudla, Jan
    Rollo, Jan
    Burgstaller, Lisa
    Truskaller, Martina
    Koch, Klaus-Michael
    Hametner, Reinhard
    Rauscher, Sandro
    Tummeltshammer, Peter
    Golatowski, Frank
    Schulz, Thorsten
    IECON 2021 - 47TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2021,
  • [22] Ring-Based Identity Based Encryption - Asymptotically Shorter MPK and Tighter Security
    Abla, Parhat
    Liu, Feng-Hao
    Wang, Han
    Wang, Zhedong
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT III, 2021, 13044 : 157 - 187
  • [23] Implementing a Security Architecture for Safety-Critical Railway Infrastructure
    Eckel, Michael
    Kuzhiyelil, Don
    Krauss, Christoph
    Zhdanova, Maria
    Katzenbeisser, Stefan
    Cosic, Jasmin
    Drodt, Matthias
    Pitrolle, Jean-Jacques
    2021 INTERNATIONAL SYMPOSIUM ON SECURE AND PRIVATE EXECUTION ENVIRONMENT DESIGN (SEED 2021), 2021, : 215 - 226
  • [24] A Multi-layered Security Architecture for Modelling Critical Infrastructure
    Blackwell, Clive
    PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 17 - 24
  • [25] Power fairness in a scalable ring-based wireless mesh network
    Huang, Jane-Hwa
    Wang, Li-Chun
    Chang, Chung-Ju
    2007 IEEE 66TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, 2007, : 341 - 346
  • [26] A network security architecture using the zachman framework
    Ramadan, A. B.
    Hefnawi, M.
    MANAGING CRITICAL INFRASTRUCTURE RISKS: DECISION TOOLS AND APPLICATION FOR PORT SECURITY, 2007, : 133 - +
  • [27] Capacity and QoS for a scalable ring-based wireless mesh network
    Huang, Jane-Hwa
    Wang, Li-Chun
    Chang, Chung-Ju
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (11) : 2070 - 2080
  • [28] A Ring-Based Wireless Optical Network to Reduce the Handover Latency
    Mukhopadhyay, Atri
    Das, Goutam
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2015, 33 (17) : 3687 - 3697
  • [29] Ring-based linear network coding on erroneous cyclic networks
    Samady-khaftari, Vahid
    Esmaeili, Morteza
    IET COMMUNICATIONS, 2016, 10 (18) : 2582 - 2590
  • [30] High level architecture-based framework for modeling interdependent critical infrastructure systems
    Magoua, Joseph Jonathan
    Wang, Fei
    Li, Nan
    SIMULATION MODELLING PRACTICE AND THEORY, 2022, 118