20 research outputs found
Cyber-Physical Threat Intelligence for Critical Infrastructures Security
Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors. Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well
Cyber-Physical Threat Intelligence for Critical Infrastructures Security
Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors. Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well
Critical Infrastructure Protection Metrics and Tools Papers and Presentations
Contents: Dr. Hilda Blanco: Prioritizing Assets in Critical Infrastructure Systems; Christine Poptanich: Strategic Risk Analysis; Geoffrey S. French/Jin Kim: Threat-Based Approach to Risk Case Study: Strategic Homeland Infrastructure Risk Assessment (SHIRA); William L. McGill: Techniques for Adversary Threat Probability Assessment; Michael R. Powers: The Mathematics of Terrorism Risk Stefan Pickl: SOA Approach to the IT-based Protection of CIP; Richard John: Probabilistic Project Management for a Terrorist Planning a Dirty Bomb Attack on a Major US Port; LCDR Brady Downs: Maritime Security Risk Analysis Model (MSRAM); Chel Stromgren: Terrorism Risk Assessment and Management (TRAM); Steve Lieberman: Convergence of CIP and COOP in Banking and Finance; Harry Mayer: Assessing the Healthcare and Public Health Sector with Model Based Risk Analysis; Robert Powell: How Much and On What? Defending and Deterring Strategic Attackers; Ted G. Lewis: Why Do Networks Cascade
Analysis of category co-occurrence in Wikipedia networks
Wikipedia has seen a huge expansion of content since its inception. Pages within this online
encyclopedia are organised by assigning them to one or more categories, where Wikipedia
maintains a manually constructed taxonomy graph that encodes the semantic relationship
between these categories. An alternative, called the category co-occurrence graph, can be
produced automatically by linking together categories that have pages in common. Properties
of the latter graph and its relationship to the former is the concern of this thesis.
The analytic framework, called t-component, is introduced to formalise the graphs and
discover category clusters connecting relevant categories together. The m-core, a cohesive
subgroup concept as a clustering model, is used to construct a subgraph depending on the
number of shared pages between the categories exceeding a given threshold t. The significant
of the clustering result of the m-core is validated using a permutation test. This is compared
to the k-core, another clustering model.
TheWikipedia category co-occurrence graphs are scale-free with a few category hubs and
the majority of clusters are size 2. All observed properties for the distribution of the largest
clusters of the category graphs obey power-laws with decay exponent averages around 1.
As the threshold t of the number of shared pages is increased, eventually a critical threshold
is reached when the largest cluster shrinks significantly in size. This phenomena is only
exhibited for the m-core but not the k-core. Lastly, the clustering in the category graph
is shown to be consistent with the distance between categories in the taxonomy graph
Recommended from our members
Securing Network Processors with Hardware Monitors
As an essential part of modern society, the Internet has fundamentally changed our lives during the last decade. Novel applications and technologies, such as online shopping, social networking, cloud computing, mobile networking, etc, have sprung up at an astonishing pace. These technologies not only influence modern life styles but also impact Internet infrastructure. Numerous new network applications and services require better programmability and flexibility for network devices, such as routers and switches. Since traditional fixed function network routers based on application specific integrated circuits (ASICs) have difficulty keeping pace with the growing demands of next-generation Internet applications, there is an ongoing shift in the industry toward implementing network devices using programmable network processors (NPs).
While network processors offer great benefits in terms of flexibility, their reprogrammable nature exposes potential security risks. Similar to network end-systems, such as general-purpose computers, software-based network processors have security vulnerabilities that can be attacked remotely. Recent research has shown that a new type of data plane attack is able to modify the functionality of a network processor and cause a denial-of-service (DoS) attack by sending a single malformed UDP packet. Since this attack relies solely on data plane access and does not need access to the control plane, it can be particularly difficult to control.
Hardware security monitors have been introduced to identify and eliminate these malicious packets before they can propagate and cause devastating effects in the network. However, previous work on hardware monitors only focus on single core systems with static (or very slowly changing) workloads. In network processors that use up to hundreds of parallel processor cores and have processing workloads that can change dynamically based on the network traffic, the realization of a complete multicore hardware monitoring system remains a critical challenge. Our research work in this thesis provides a comprehensive solution to this problem.
Our first contribution is the design and prototype implementation of a Scalable Hardware Monitoring Grid (SHMG). This scalable architecture balances area cost and performance overhead by using a clustered approach for multicore NP systems. In order to adapt to dynamically changing network traffic, a resource reallocation algorithm is designed to reassign the processing resources in SHMG to different network applications at runtime. An evaluation of the prototype SHMG on an Altera DE4 board demonstrates low resource and performance overheads. The functionality and performance of a runtime resource reallocation algorithm are tested using a simulation environment.
A second significant contribution of this work is a network system-level security solution for multicore network processors with hardware monitors. It addresses two key problems: (1) how to securely manage and reprogram processor cores and monitors in a deployed router in the network, and (2) how to prevent the large number of identical router devices in the network from an attack that can circumvent one specific monitoring system and lead to Internet-scale failures. A Secure Dynamic Multicore Hardware Monitoring System (SDMMon) is designed based on cryptographic principles and suitable key management to ensure the secure installation of processor binaries and monitor graphs. We present a Merkle tree based parameterizable high performance hash function that can be configured to perform a variety of functions in different devices via a 32-bit configuration parameter. A prototype system composed of both the SDMMon and the parameterizable hash is implemented and evaluated on an Altera DE4 board.
Finally, a fully-functional, comprehensive Multicore NP Security Platform, which integrates both the SHMG and the SDMMon security features, has been implemented on an Altera DE5 board
SHIFTING GROUNDS: SCIENTIFIC AND TECHNOLOGICAL CHANGE AND INTERNATIONAL REGIMES FOR THE OCEAN AND OUTER SPACE
Emerging planetary-scale environmental problems, such as climate change and space debris, indicate a growing need for effective governance regimes for domains beyond the borders of territorial nation-states. This dissertation addresses the basic question: what explains patterns of success and dysfunction in regimes for non-terrestrial spaces? Under what conditions can global commons regimes function to achieve their goals? The answer depends in a fundamental way on scientific knowledge and technological capability, which create, define, and describe the problems, interests, and practices that shape the formation and features of governance regimes, and thus create the conditions for their effective functioning. This project employs and extends recent revivalist geopolitical approaches examining the influences of material factors (geography, ecology, and technology), and applies them to explain important features of regimes for the ocean and orbital space. This approach claims that geography, ecology, and technology together constitute an influencing context, which creates specific problem structures and constrains possible solution sets, and thereby sets conditions for regime performance. In contrast, recent post-modernist and constructivist approaches discount the importance and influence of material contexts in shaping politics, and are incapable of explaining important aspects of regimes. Rationalist (interest-centered) approaches to theorizing regimes employ thin treatments of the material context, limiting their ability to explain regime content and effectiveness. The explanatory traction of material-contextual factors is demonstrated by a detailed examination of regime formation, content and effectiveness over four periods of ocean governance across five centuries, and orbital space over the last sixty years. These cases demonstrate that successful regime formation must foreground scientific uncertainty, ecological dynamics, and the balance of technological capability. To the extent that global commons regimes ignore the existence and dynamism of these material structures, they are more likely to fail to achieve their goals. Greater consideration of material contexts produces a strengthened International Relations theory of regimes. These findings also suggest ways to improve regime design, outlined in the concluding chapter
Cyber Security and Critical Infrastructures
This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues
Analysis of category co-occurrence in Wikipedia networks
Wikipedia has seen a huge expansion of content since its inception. Pages within this online
encyclopedia are organised by assigning them to one or more categories, where Wikipedia
maintains a manually constructed taxonomy graph that encodes the semantic relationship
between these categories. An alternative, called the category co-occurrence graph, can be
produced automatically by linking together categories that have pages in common. Properties
of the latter graph and its relationship to the former is the concern of this thesis.
The analytic framework, called t-component, is introduced to formalise the graphs and
discover category clusters connecting relevant categories together. The m-core, a cohesive
subgroup concept as a clustering model, is used to construct a subgraph depending on the
number of shared pages between the categories exceeding a given threshold t. The significant
of the clustering result of the m-core is validated using a permutation test. This is compared
to the k-core, another clustering model.
TheWikipedia category co-occurrence graphs are scale-free with a few category hubs and
the majority of clusters are size 2. All observed properties for the distribution of the largest
clusters of the category graphs obey power-laws with decay exponent averages around 1.
As the threshold t of the number of shared pages is increased, eventually a critical threshold
is reached when the largest cluster shrinks significantly in size. This phenomena is only
exhibited for the m-core but not the k-core. Lastly, the clustering in the category graph
is shown to be consistent with the distance between categories in the taxonomy graph
Evaluation of the new Design Summer Year weather data using parametrical buildings
The Charted Institution of Building Services Engineers (CIBSE) updated the near extreme weather (Design Summer Year – DSY) for all 14 locations in the UK in 2016. This new release attempts to address the underlying shortcomings of the previous definition where the averaged dry bulb temperature was the sole metric to choose DSY among source weather years. The aim of this research is to evaluate whether the new definition of the probabilistic DSYs can consistently represent near extreme condition. London historical weather data and their correspondent DSYs were used in this research. Dynamic thermal modelling using EnergyPlus was carried out on large number single zone offices (parametric study) which represent a large portion of cellular offices in the UK. The predicted indoor warmth from the sample building models show that these new definitions are not always able to represent near extreme conditions. Using multiple years as DSY is able to capture different types of summer warmth but how to use one or all of these DSYs to make informed judgement on overheating is rather challenging. The recommended practice from this research is to use more warm years for the evaluation of overheating and choose the near extreme weather from the predicted indoor warmt