样式: 排序: IF: - GO 导出 标记为已读
-
Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2024-03-04 Taiyi Zhao, Yuchun Tang, Qiming Li, Jingquan Wang
During the post-disaster recovery process of the urban system (US), it is critical to understand the interdependencies of critical infrastructure systems (CISs) and strategically allocate resources among them. However, due to the complexity of the problem and the limitations of the perspective, the existing research usually ignores the implicit impact of interdependence and resource allocation on urban
-
False data injection in distribution system: Attacker's perspective Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2024-03-02 Poornachandratejasvi Laxman Bhattar, Naran M Pindoriya, Anurag Sharma
The distribution system is digitizing and occupying cyberspace with the help of information and communication technologies (ICTs). It is vulnerable to cyber-attacks like false data injection (FDI) and denial-of-services (DoS). However, limited research on cyber-attacks in the distribution system is reported in the literature, and these attacks are of serious concern to distribution system operators
-
-
-
DSACR: A defense-based system with adaptive cyber resilience for industrial control systems Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2024-02-09 Yi-Wei Ma, Yi-Hao Tu, Chih-Ting Shen
Industrial Control Systems (ICS) security happens often, which makes it hard for many organizations to keep a balance between operational efficiency, system efficiency, and security. A major concern is how to protect information security and make sure that ICS keep working. This study thus presents a defense-based system with adaptive cyber resilience (DSACR). DSACR will optimize the configuration
-
A watchdog model for physics-based anomaly detection in digital substations Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2024-01-17 Hussam Tarazi, Sara Sutton, John Olinjyk, Benjamin Bond, Julian Rrushi
The security of cyber–physical systems (CPS) presents new challenges stemming from computations that work primarily with live physics data. Although there is a body of previous research on detection of malware on CPS, more effective designs are needed to address limitations such mimicry attacks and other forms of evasive techniques. Relay algorithms in particular, such as differential and harmonic
-
Cross trust: A decentralized MA-ABE mechanism for cross-border identity authentication Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2024-01-17 Jian Chen, Fei Lu, Yuanzhe Liu, Sheng Peng, Zhiming Cai, Fu Mo
With an increasing demand for authenticated data exchange between jurisdictions, ensuring the privacy and security of data interactions is crucial for national security, public health, and economic vitality, becoming a fundamental national infrastructure. Current solutions can be categorized into two types: fully decentralized autonomous systems based on blockchains or centralized solutions that rely
-
A novel cost-based optimization model for electric power distribution systems resilience improvement under dust storms Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-12-29 Morteza Haghshenas, Rahmat-Allah Hooshmand, Mehdi Gholipour
In the recent years, dust storms (DSs) pose a serious threat to critical infrastructure such as power distribution networks (PDNs). During DSs, the contamination of insulators, increases the possibility of damage to the PDNs insulation system and flashover induced power outage may occur. Power outages disrupt the performance of other urban infrastructures and, in addition to heavy financial losses
-
Protection of critical infrastructures from advanced combined cyber and physical threats: The PRAETORIAN approach Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-12-21 Lazaros Papadopoulos, Konstantinos Demestichas, Eva Muñoz-Navarro, Juan José Hernández-Montesinos, Stephane Paul, Nicolas Museux, Sandra König, Stefan Schauer, Alfonso Climente Alarcón, Israel Perez Llopis, Tim Stelkens-Kobsch, Tamara Hadjina, Jelena Levak
This work describes the PRAETORIAN system, an advanced framework for the protection of critical infrastructures from combined physical and cyber threats. It integrates components for detecting threats and generating alerts related with the physical and the cyber domains of Critical Infrastructures (CIs). These alerts are correlated by a hybrid situation awareness system that calculates the cascading
-
A comparative study of cyber security intrusion detection in healthcare systems Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-12-23 Yan Zhang, Degang Zhu, Menglin Wang, Junhan Li, Jie Zhang
Due to the proliferation of network devices and the presence of sensitive information, healthcare systems have become prime targets for cyber attackers. Therefore, it is crucial to design an efficient and accurate intrusion detection system (IDS) specifically tailored for healthcare systems. In this regard, we conducted a comprehensive comparative study on network security intrusion detection in healthcare
-
A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-12-09 Khushi Jatinkumar Raval, Nilesh Kumar Jadav, Tejal Rathod, Sudeep Tanwar, Vrince Vimal, Nagendar Yamsani
Technologies such as artificial intelligence (AI), blockchain, and the Internet of Things (IoT) have converged in driving the next wave of digital revolution. Amalgamating the aforementioned advancements with critical infrastructure (CI) can significantly help society by offering a quality of life and boosting the nation’s economy and productivity. However, the lack of cybersecurity in CI gave rise
-
Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-12-06 Nazia Raza, Faegheh Moazeni
-
Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-12-04 Basem A. Alkhaleel
The resilience of interdependent critical infrastructure systems (ICISs) is critical for the functioning of society and the economy. ICISs such as power grids and telecommunication networks are complex systems characterized by a wide range of interconnections, and disruptions to such systems can cause significant socioeconomic losses. This vital role requires the adaptation of new tools and technologies
-
Need for intensive care? A socio-technical systems perspective on water supply failure preparedness in German health care facilities Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-11-27 Christine Heinzel, Sophie van der Heijden, Aljoscha Mayer, Nathalie Sänger, Simone Sandholz
Health care facilities play a crucial role in the well-being of society. They are heavily dependent on other critical infrastructures including water supply for their daily operations and failure of water supply can have severe consequences. However, health care facilities are often underprepared for this scenario. The study investigates the emergency preparedness of German health care facilities to
-
An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-11-23 Georgios Kavallieratos, Sokratis Katsikas
Nowadays, assets in space are vital for the provision of critical societal functions such as transportation, communication, production and supply of food, agriculture, etc. The increasing adoption of services provided by assets in space in our every day life, as well as the high dependence on cyberphysical systems, the increased interconnection and the commercialization of space increase the attack
-
Measurement protection to prevent cyber–physical attacks against power system State Estimation Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-11-18 Harag Margossian, Ronald Kfouri, Rita Saliba
Smart applications supporting modern power systems are susceptible to cyber–physical attacks, particularly False Data Injection attacks that manipulate the input measurements of State Estimation (SE) compromising its output states. This paper proposes an Integer Linear Programming formulation that protects an optimal number of measurement units to prevent cyber–physical attacks, enhancing the robustness
-
Ensuring the Longevity of WirelessHART Devices in Industrial Automation and Control Systems Using Distinct Native Attribute Fingerprinting Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-11-18 Matthew J. Maier, Hunter S. Hayden, Michael A. Temple, Matthew C. Fickus
Distinct native attribute fingerprinting is considered as a means to ensure the longevity of WirelessHART communication devices used in industrial automation and control systems. The aim is for these devices to reach full life expectancy using a technical cradle-to-grave lifecycle protection strategy. The protection addressed here includes pre-deployment near-cradle counterfeit device detection using
-
A systematic co-engineering of safety and security analysis in requirements engineering process Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-11-18 Sejin Jung, Junbeom Yoo, Sam Malek
Co-engineering safety and security is increasingly important in safety-critical systems as more diverse interacting functions are implemented in software. Many studies have tried to perform safety and security analyses in unified or in parallel. While the unified approach requires more complex analysis with new delicate methods, the parallel needs further improvement on additional integration activity
-
Modeling and assessing seismic resilience leveraging systems dynamic approach: A case study of society 5.0 Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-10-30 Shohreh Moradi, Md Muzahid Khan, Niamat Ullah Ibne Hossain, Mohammad Shamsuddoha, Alex Gorod
Society 5.0 is a transformation strategy centered on integrating digital technologies unveiled by the Japanese government to create a human-centric society for economic development and mitigate sustainability issues. Since societies are constantly exposed to various natural disasters like earthquakes, many precautions must be taken both before and after a disaster to minimize the damage. Seismic resilience
-
Dynamic predictive analysis of the consequences of gas pipeline failures using a Bayesian network Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-10-24 Armin Aalirezaei, Dr. Golam Kabir, Md Saiful Arif Khan
Modern natural gas pipeline failures constitute devastating disasters, as they can result in cascading secondary crises. Therefore, reduction of buried gas pipeline's reliability, has become a major concern among stakeholders and researchers in recent years. This study employs a dynamic Bayesian network to investigate the consequences of natural gas pipeline failures. We consider seven parent nodes—age
-
Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-10-12 Aviv Itzhak, Uri Ferri
Since February 2022, the Russian-Ukrainian armed conflict significantly impacted the digital landscape. This study examines the conflict's impacts on the local and global digital ecosystem. Using grey literature, we analyzed English-language data sources primarily published between November 2022 and April 2023, which were based on data sources from the commencement of the conflict to the publication
-
Editorial Board Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-08-25
Abstract not available
-
New threats and research problems for critical infrastructure Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-08-25 Roberto Setola
Abstract not available
-
A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-08-23 Jiarui Chen, Yiqin Lu, Yang Zhang, Fang Huang, Jiancheng Qin
Critical Infrastructures (CI) underpin the basic functioning of society and the economy. Proper governance of CI security management remains a crucial challenge. This study aims to construct a knowledge graph for modeling CI protection. While the previous research has focused on threat intelligence modeling and open knowledge bases, they miss considering the defense side. Accordingly, we propose a
-
National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-08-09 Tolga Ahmet Gülcan, Kadir Emrah Erginer
While many countries and international organizations with maritime security interests and rights at sea have developed new security strategies or policies in the wake of the 9/11 terrorist attacks in the United States of America, they have accordingly changed or created new maritime security strategies or doctrines with appropriate Maritime Situational Awareness (MSA) models as well. Maritime deterioration
-
Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-07-29 Achara Tiong, Hector A. Vergara
Resilient interdependent critical infrastructures (CIs) can better withstand cascading failures in disruptive events. This study proposes network expansion as a resilience improvement strategy for interdependent CIs and evaluates the influence of topology in interdependent network design for resilience optimization under disruption uncertainty. A resilience score consisting of network complexity and
-
CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-07-29 Ali Ahmadian Ramaki, Abbas Ghaemi-Bafghi, Abbas Rasoolzadegan
-
Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990–2018 Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-07-14 Jennifer S. Holmes, Agustin Palao, Mercedez Callenes, Neil Ortiz Silva, Alvaro Cardenas
Colombia has suffered a decades long internal conflict with leftist guerrillas. Its power grid has been attacked, causing significant damage to Colombian industry and disruption to citizens. This article uses data from ISA and XM (operators of the Colombian power grid) and from Centro de Investigación y Educación Popular (CINEP), a non-profit organization tracking the internal conflict in Colombia)
-
Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-07-12 Mohamed Salama, Wael El-Dakhakhni, Michael Tait
Power grids are prone to damage induced by natural or anthropogenic hazard events that might disrupt the functionality of key/multiple grid components concurrently, resulting in a chain of cascade failures spreading throughout the grid. Through integrating grid operation-guided with structure-driven modeling strategies, the current study proposes an approach to manage the risks of such cascade failure
-
AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-06-28 Suleman Khan, Gurjot Singh Gaba, An Braeken, Pardeep Kumar, Andrei Gurtov
Controller-Pilot Data Link Communications (CPDLC) are rapidly replacing voice-based Air Traffic Control (ATC) communications worldwide. Being digital, CPDLC is highly resilient and bandwidth efficient, which makes it the best choice for traffic-congested airports. Although CPDLC initially seems to be a perfect solution for modern-day ATC operations, it suffers from serious security issues. For instance
-
Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-06-25 Paola Vargas, Iris Tien
5 G technology promises a wide range of benefits for critical infrastructure (CI), including improved reliability, increased efficiency, cost savings, and increased worker safety. However, it also brings many new risks that CI owners and operators must be prepared for to facilitate effective risk mitigation and response. These risks, however, have not been systematically assessed for CI systems. This
-
A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-06-21 Matthew Boeding, Michael Hempel, Hamid Sharif, Juan Lopez, Kalyan Perumalla
The growing convergence of Information Technology and Operational Technology has enhanced communication and visibility across power grids. This, coupled with the growing use of Distributed Energy Resources in power grids, has enhanced the grid capabilities while also creating a larger attack surface for malicious actors. A common protocol vulnerable to these attacks is the IEC-61850 GOOSE protocol
-
Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-06-19 Xabier Etxezarreta, Iñaki Garitano, Mikel Iturbe, Urko Zurutuza
Industrial Control Systems (ICSs) are a key technology for life-sustainability, social development and economic progress used in a wide range of industrial solutions, including Critical Infrastructures (CIs), becoming the primary target for multiple security attacks. With the increase of personalized and sophisticated attacks, the need for new tailored ICS cybersecurity mechanisms has increased exponentially
-
A forensics and compliance auditing framework for critical infrastructure protection Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-06-17 João Henriques, Filipe Caldeira, Tiago Cruz, Paulo Simões
-
Assessing the comprehensive importance of power grid nodes based on DEA Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-06-14 Xin Gao, Yunxia Ye, Wenxin Su, Linyan Chen
The safe and stable operation of the power grid is crucial to guarantee basic human demands and promote sustainable economic and social development. To better maintain the sound operation of the power grid, it is meaningful to analyse node importance and identify critical nodes based on the topology of the grid and its performance under cascading failure scenarios. Based on complex network theory,
-
A multi-criteria framework for critical infrastructure systems resilience Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-06-14 Zhuyu Yang, Bruno Barroca, Katia Laffréchine, Alexandre Weppe, Aurélia Bony-Dandrieux, Nicolas Daclin
Critical infrastructure systems (CISs) play an essential role in modern society, as they are important for maintaining critical social functions, economic organisation, and national defence. Recently, CISs resilience has gained popularity in both academic and policy filed facing increased natural or technological disasters. Resilience assessments have become convenient and common tools for disaster
-
Protocol study and anomaly detection for server-driven traffic in SCADA networks Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-06-10 Chih-Yuan Lin, Simin Nadjm-Tehrani
Attacks against Supervisory Control and Data Acquisition (SCADA) systems operating critical infrastructures have largely appeared in the past decades. There are several anomaly detection systems that model the traffic of request–response mechanisms, where a client initiates a request to a server and the server sends back a response later. However, many modern SCADA protocols also allow server-driven
-
Editorial Board Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-06-06
Abstract not available
-
Editorial on Protection vs Resilience by Prof. Roberto Setola Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-06-06 Roberto Setola
Abstract not available
-
Rule-based anomaly detection for railway signalling networks Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-06-04 Markus Heinrich, Arwed Gölz, Tolga Arul, Stefan Katzenbeisser
We propose a rule-based anomaly detection system for railway signalling that mitigates attacks by a Dolev-Yao attacker who is able to inject control commands to perform semantic attacks by issuing licit but mistimed control messages. The system as well mitigates the effects of a signal box compromised by an attacker with the same effect. We consider an attacker that could cause train derailments and
-
A multi-source power grid's resilience enhancement strategy based on subnet division and power dispatch Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-04-28 Shuliang Wang, Qiqi Dong
A resilience enhancement strategy based on subnetting is proposed to improve the robustness and repair ability of multi-source power grids. Firstly, based on the characteristics of renewable energy and the principle of cascading failure, the network is divided into multiple stable and sustainable subnets by using the power flow data and island operation conditions in the system, and the key nodes in
-
A threat modeling language for generating attack graphs of substation automation systems Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-03-29 Engla Rencelj Ling, Mathias Ekstedt
The substation automation system consists of many different complex assets and data flows. The system is also often externally connected to allow for remote management. The complexity and remote access to the substation automation system makes it vulnerable to cyber attacks. It also makes it difficult to assess the overall security of the system. One method of assessing the potential threats against
-
Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM) Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-03-14 Wensheng Wang, Faezeh Karimi, Kaveh Khalilpour, David Green, Manos Varvarigos
This study explores network science algorithms for the robustness analysis of electricity networks. We first investigate the characteristics of key network models including random graphs, small-world, and scale-free networks. Then, various measures are explored for the robustness of such networks against failure or attack, utilizing topological features and percolation theory. Both weighted and unweighted
-
A review on effective alarm management systems for industrial process control: Barriers and opportunities Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-03-08 Faizan E Mustafa, Ijaz Ahmed, Abdul Basit, Um-E-Habiba Alvi, Saddam Hussain Malik, Atif Mahmood, Paghunda Roheela Ali
The effective robust management of plant requires the implementation of industrial alarm systems in a very significant capacity. The core objective of alarms is to warn the operator of critical operational deviations and these operational anomalies can sometimes result in operators receiving significantly more alarms in a short period of time than they can manage, which is known as alarm flooding.
-
Vulnerability analysis of urban road networks based on traffic situation Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-02-07 Ziqi Wang, Yulong Pei, Jing Liu, Hehang Liu
Traffic congestion is a global issue, which occurs during rush hour but also in situations of emergency causing massive congestion. This paper proposes a method for building a weighted road network by using the real-time traffic situation and the inherent characteristics of Urban Road Networks (URNs). To research the cascading failure vulnerability of URNs three kinds of node importance indexes are
-
Vulnerable underground entrance understanding for visual surveillance systems Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-02-02
Protecting critical infrastructure through visual surveillance is of vital importance, especially in underground entrance environments where large chunks of sloping glass ceilings are particularly susceptible to various types of terrorist activity. However, owing to the diversity of underground entrance environments, understanding them remains a challenge. Traditional 3D layout and object pose estimation
-
A two-stage stochastic multi-objective resilience optimization model for network expansion of interdependent power-water networks under disruption Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2023-01-26 Achara Tiong, Hector A. Vergara
Network expansion of interdependent critical infrastructures under disruption uncertainty is modeled as a mixed-integer two-stage stochastic multi-objective optimization program. In this model, expected total cost and expected post-disaster resilience are considered competing objectives. Network resilience is quantified through network complexity and unmet demand. Functional relationships between critical
-
Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2022-12-15 James Ashworth, Jason Staggs, Sujeet Shenoi
Modern commercially-available vehicles have active or passive keyless entry systems. In the case of an active keyless entry system, an individual presses a button on a key fob that transmits a radio frequency signal to its paired vehicle that unlocks the doors. In the case of a passive keyless entry system, a vehicle senses an approaching individual and signals the key fob to respond with a radio frequency
-
A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2022-12-16 Kübra Bitirgen, Ümmühan Başaran Filik
A smart grid (SG) consists of an interconnection of an electrical grid, communication, and information networks. The rapid developments of SG technologies have resulted in complex cyber–physical systems. Due to these complexities, the attack surfaces of SGs broaden, and their vulnerabilities to cyber–physical threats increase. SG security systems focus on the protection of significant units and sub-systems
-
Critical link identification algorithm for power communication networks in SDN architecture Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2022-12-06 Bing Fan, Hongtao Tan, Yaqun Li
With the maturity of software-defined network (SDN) technology, its application in power communication networks (PCNs) is being introduced. SDN controllers can assign working and backup routes for arriving serve requests and provide one-to-one (1:1) protection, which is crucial for the transmission of power system data with high reliability and delay requirements. For PCNs in SDN architecture, a critical
-
Managing the cyber risk in a multipolar world Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2022-12-03 Roberto Baldoni
Abstract not available
-
Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2022-11-30 Shuliang Wang, Jingya Sun, Jianhua Zhang, Qiqi Dong, Xifeng Gu, Chen Chen
In recent years, some game models were proposed to protect critical infrastructure networks. But they mainly focused on the protection of key nodes, and there are rarely models to consider the fixed-point use of resources. Hence, in this paper, we propose a non-zero-sum simultaneous game model based on the Cournot model. Meanwhile, we presented a novel method of critical node centrality identification
-
The wireless network jamming problem subject to protocol interference using directional antennas and with battery capacity constraints Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2022-11-06 Johnathon D. Huff, William B. Leonard, Hugh R. Medal
Wireless networks support the operation and maintenance of a variety of critical infrastructure, and keeping these networks functional in the face of adversarial adversity is a paramount concern of infrastructure managers. Supporting these networks’ continued operability requires a robust understanding of wireless-network functionality, including of the ways in which adversaries may seek to jam such
-
Feasibility of critical infrastructure protection using network functions for programmable and decoupled ICS policy enforcement over WAN Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2022-11-09 Stuart M. Baxley, Nicholas Bastin, Deniz Gurkan, William Arthur Conklin
Industrial control systems (ICS) represent a major component of our critical infrastructure. With the increasing need for more control and monitoring of such systems, ICS have seen an increase in connectivity to wide area networks (WAN) exposing aging equipment to rapidly evolving cybersecurity threats. Furthermore, the ICS data requires a reliability measure from the networks for critical functions
-
Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2022-10-30 Victor Bolbot, Ketki Kulkarni, Päivi Brunou, Osiris Valdez Banda, Mashrura Musharraf
Ships and maritime infrastructure are becoming increasingly interconnected as the maritime industry is undergoing the industry 4.0 revolution. This development is associated with novel risk types such as the increased potential for successful cyberattacks. Several review studies have investigated the regulatory framework in connection to maritime cybersecurity, the vulnerabilities in maritime systems
-
Identifying critical and vulnerable links: A new approach using the Fisher information matrix Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2022-10-26 Beatriz Martinez-Pastor, Maria Nogal, Alan O’Connor, Rui Teixeira
In traffic networks, some elements are more prone to suffer or to create disruptive situations, and the identification of these elements becomes a challenge due to the large number of possible threats. The following paper presents two new methodologies to identify and rank vulnerable and critical links of traffic networks. These methodologies use the Fisher Information Matrix, and the analysis of eigenvalues
-
Mitigation of the impact of disturbances in gas transmission systems Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2022-09-29 Ivars Zalitis, Aleksandrs Dolgicers, Laila Zemite, Sebastian Ganter, Vytis Kopustinskas, Bogdan Vamanu, Jörg Finger, Clemente Fuggini, Ilmars Bode, Jevgenijs Kozadajevs, Ivo Häring
The current study presents a novel method for mitigating the consequences of disturbances in gas transmission systems (GTSs). The method presented was developed during the SecureGas project for identification of critical infrastructure and risk and resilience analysis. The method determines the optimal response strategies consisting of detailed coordination of demand curtailment for consumer nodes
-
Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2022-09-28 Ayesha Rahman, Ghulam Mustafa, Abdul Qayyum Khan, Muhammad Abid, Muhammad Hanif Durad
Modbus is considered the defacto standard of industrial control systems as obvious from the fact that most vendors in the automation industry support Modbus protocol. Despite its wide popularity, Modbus is not secure because the time period in which it was introduced security was not considered to be a concern for closed isolated Industrial Control Systems (ICS) systems, therefore, in today’s era of
-
Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2022-08-31 Manikant Panthi, Tanmoy Kanti Das
The smart grid has gained a reputation as the advanced paradigm of the power grid. It is a complicated cyber-physical system that combines information and communication technology (ICT) with a traditional grid that can remotely control operations. It provides the medium for exchanging real-time data between the company and users through the advanced metering infrastructure (AMI) and smart meters. However
-
Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review Int. J. Crit. Infrastruct. Prot. (IF 3.6) Pub Date : 2022-08-18 Godslove Ampratwum, Robert Osei-Kyei, Vivian W.Y. Tam
This study explores the concept of public private partnership (PPP) in building critical infrastructure resilience (CIR) by looking at the attributes and objectives of the key stakeholders in PPP; government and private critical infrastructure (CI) operators. Although extant studies have been conducted on critical infrastructure resilience, the concept of PPP in CIR has not received much attention