Emergent information security in critical infrastructures

被引:2
|
作者
Daskapan, Semir [1 ]
Vree, Willem G. [1 ]
Wagenaar, Rene W. [1 ]
机构
[1] Delft Univ Technol, POB 5015, NL-2600 GA Delft, Netherlands
关键词
fault tolerance; complexity; self-organisation; critical infrastructures; network security; immune system;
D O I
10.1504/IJCIS.2006.009441
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The growing tendency to inter-weaving infrastructures makes them more complex, less manageable, and more vulnerable to random system failures. Several information systems are usually added to manage and control such infrastructures. However, in this internet era these information infrastructures have increasingly become the targets of sophisticated (denial of service) attacks, which cause random failures. Common technologies designed to improve the resilience of critical nodes in such information infrastructures are based on costly, dedicated, and limited redundant hardware systems. This paper explores the possibility to apply self-organisation and resource sharing techniques between the security nodes to increase the infrastructure resilience. It is possible then to achieve perpetual availability without dedicated redundant systems.
引用
收藏
页码:247 / 260
页数:14
相关论文
共 50 条
  • [1] Critical Information Infrastructures Security Modeling
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    [J]. PROCEEDINGS OF THE 24TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2019, : 82 - 88
  • [2] Security Strategy Analysis for Critical Information Infrastructures
    Manuel Torres, Jose
    Olav Sveen, Finn
    Maria Sarriegi, Jose
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2009, 5508 : 247 - 257
  • [3] Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    [J]. PROCEEDINGS OF THE 28TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2021, : 89 - 95
  • [4] ARCHITECTURAL MODEL FOR INFORMATION SECURITY ANALYSIS OF CRITICAL INFORMATION INFRASTRUCTURES
    Ma, Zhendong
    Smith, Paul
    Skopik, Florian
    [J]. IDIMT-2013: INFORMATION TECHNOLOGY HUMAN VALUES, INNOVATION AND ECONOMY, 2013, 42 : 197 - 204
  • [5] EMERGENT RISKS IN CRITICAL INFRASTRUCTURES
    Dynes, Scott
    [J]. CRITICAL INFRASTRUCTURE PROTECTION II, 2008, 290 : 3 - 16
  • [6] Approach to security assessment of critical infrastructures' information systems
    Leszczyna, R.
    Fovino, I. N.
    Masera, M.
    [J]. IET INFORMATION SECURITY, 2011, 5 (03) : 135 - 144
  • [7] Research on Critical Infrastructures and Critical Information Infrastructures
    Yusufovna, Feruza Sattarova
    Alisherovich, Farkhod Alisherov
    Choi, Minkyu
    Cho, Eun-Suk
    Abdurashidovich, Furkhat Tadjibayev
    Kim, Tai-hoon
    [J]. 2009 SYMPOSIUM ON BIO-INSPIRED LEARNING AND INTELLIGENT SYSTEMS FOR SECURITY (BLISS 2009), 2009, : 97 - +
  • [8] The Invisible Hand? Critical Information Infrastructures, Commercialisation and National Security
    Newlove-Eriksson, Lindy
    Giacomello, Giampiero
    Eriksson, Johan
    [J]. INTERNATIONAL SPECTATOR, 2018, 53 (02): : 124 - 140
  • [9] Blockchain Based Sharing of Security Information for Critical Infrastructures of the Finance Sector
    Karagiannis, Ioannis
    Mavrogiannis, Konstantinos
    Soldatos, John
    Drakoulis, Dimitris
    Troiano, Ernesto
    Polyviou, Ariana
    [J]. COMPUTER SECURITY: ESORICS 2019 INTERNATIONAL WORKSHOPS, IOSEC, MSTEC, AND FINSEC, 2020, 11981 : 226 - 241
  • [10] Integrating information security requirements in critical infrastructures: smart metering case
    AlAbdulkarim, Layla
    Lukszo, Zofia
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2010, 6 (02) : 187 - 209