1,323 research outputs found

    Transportation, Terrorism and Crime: Deterrence, Disruption and Resilience

    Get PDF
    Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks. This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and the possible mitigation or response tactics that may be effective in deterring attacks or saving lives in the event of an attack. It includes case studies that can be used as educational tools for understanding terrorist methodologies, as well as ordinary emergencies that might become a terrorist’s blueprint

    Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD

    Get PDF
    Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect intrusions and other environmental anomalies. However, the same systems used for physical-security surveillance are vulnerable to cyber-security threats, since they feature distributed hardware and software architectures often interconnected by ‘open networks’, like wireless channels and the Internet. In this paper, we show how the integrated approach to Security, Privacy and Dependability (SPD) in embedded systems provided by the SHIELD framework (developed within the EU funded pSHIELD and nSHIELD research projects) can be applied to railway surveillance systems in order to measure and improve their SPD level. SHIELD implements a layered architecture (node, network, middleware and overlay) and orchestrates SPD mechanisms based on ontology models, appropriate metrics and composability. The results of prototypical application to a real-world demonstrator show the effectiveness of SHIELD and justify its practical applicability in industrial settings

    Security risk assessment and protection in the chemical and process industry

    Get PDF
    This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical safety. That approach is beneficial for workers in the chemical industry because they recognize the steps in this model from familiar safety models .The model combines the rings-of-protection approach with generic security practices including: management and procedures, security technology (e.g. CCTV, fences, and access control), and human interactions (pro-active as well as re-active). The method is illustrated in a case-study where a practical protection plan was developed for an existing chemical company. This chapter demonstrates that the method is useful for similar chemical- and process industrial activities far beyond the Belgian borders, as well as for cross-industrial security protection. This chapter offers an insight into how the chemical sector protects itself on the one hand, and an insight into how security risk management can be practiced on the other hand

    Small unmanned airborne systems to support oil and gas pipeline monitoring and mapping

    Get PDF
    Acknowledgments We thank Johan Havelaar, Aeryon Labs Inc., AeronVironment Inc. and Aeronautics Inc. for kindly permitting the use of materials in Fig. 1.Peer reviewedPublisher PD

    Real-Time Building Management System Visual Anomaly Detection Using Heat Points Motion Analysis Machine Learning Algorithm

    Get PDF
    The multiplicity of design, construction, and use of IoT devices in homes has made it crucial to provide secure and manageable building management systems and platforms. Increasing security requires increasing the complexity of the user interface and the access verification steps in the system. Today, multi-step verification methods are used via SMS, call, or e-mail to do this. Another topic mentioned here is physical home security and energy management. Artificial intelligence and machine learning-based tools and algorithms are used to analyze images and data from sensors and security cameras. However, these tools are not always available due to the increase in data volume over time and the need for large processing resources. In this study, a new method is proposed to reduce the usage of process resources and the percentage of system error in anomaly detection by reducing visual data to critical points by using thermal cameras. This method can also be used in energy management using home and ambient temperature and user activity measurements. The statistical results of the visual comparison between the proposed method and the legacy CCTV-based visual and sensory surveillance shown in the results section demonstrate its reliability and accuracy

    WIRELESS NETWORK LOAD CORROBORATION USING MACHINE LEARNING (ML) BASED VIDEO ANALYTICS

    Get PDF
    Presented herein are techniques for correlating the output of a crowd counting machine learning (ML) algorithm, which operates on surveillance video, with observed network load to determine if a load spike is due to a valid network usage or an attacker trying to sabotage the network. The techniques presented herein include vision field classification based on access point (AP) coverage, linking of vision fields to AP coverage in DNAC UI, and consensus-based threat assessment and alerts

    Material extrusion-based additive manufacturing: G-code and firmware attacks and Defense frameworks

    Get PDF
    Additive Manufacturing (AM) refers to a group of manufacturing processes that create physical objects by sequentially depositing thin layers. AM enables highly customized production with minimal material wastage, rapid and inexpensive prototyping, and the production of complex assemblies as single parts in smaller production facilities. These features make AM an essential component of Industry 4.0 or Smart Manufacturing. It is now used to print functional components for aircraft, rocket engines, automobiles, medical implants, and more. However, the increased popularity of AM also raises concerns about cybersecurity. Researchers have demonstrated strength degradation attacks on printed objects by injecting cavities in the design file which cause premature failure and catastrophic consequences such as failure of the attacked propeller of a drone during flight. Since a 3D printer is a cyber-physical system that connects the cyber and physical domains in a single process chain, it has a different set of vulnerabilities and security requirements compared to a conventional IT setup. My Ph.D. research focuses on the cybersecurity of one of the most popular AM processes, Material Extrusion or Fused Filament Fabrication (FFF). Although previous research has investigated attacks on printed objects by altering the design, these attacks often leave a larger footprint and are easier to detect. To address this limitation, I have focused on attacks at the intermediate stage of slicing through minimal manipulations at the individual sub-process level. By doing so, I have demonstrated that it is possible to implant subtle defects in printed parts that can evade detection schemes and bypass many quality assessment checks. In addition to exploring attacks through design files or network layer manipulations, I have also proposed firmware attacks that cause damage to the printed parts, the printer, and the printing facility. To detect sabotage attacks on FFF process, I have developed an attack detection framework that analyzes the cyber and physical domain state of the printing process and detects anomalies using a series of estimation and comparison algorithms in time, space, and frequency domains. An implementation case study confirms that cyber-physical security frameworks are an effective solution against sophisticated sabotage attacks. The increasing use of 3D printing technology to produce functional components underscores the growing importance of compliance and regulations in ensuring their quality and safety. Currently, there are no standards or best practices to guide a user in making a critical printing setup forensically ready. Therefore, I am proposing a novel forensic readiness framework for material extrusion-based 3D printing that will guide standards organizations in formulating compliance criteria for important 3D printing setups. I am optimistic that my offensive and defensive research endeavors presented in this thesis will serve as a valuable resource for researchers and industry practitioners in creating a safer and more secure future for additive manufacturing

    The Challenge of Protecting Transit and Passenger Rail: Understanding How Security Works Against Terrorism

    Get PDF
    Terrorists see transit and passenger rail as an attractive target. Designed for public convenience, trains and stations offer terrorists easy access to crowds of people in confined environments where there are minimal security risks and attacks can cause high casualties. This report examines the unique attributes of the terrorist threat, how security measures against terrorism have evolved over the years, and their overall effectiveness. Does security work? Empirical evidence is hard to come by. Terrorist incidents are statistically rare and random, making it difficult to discern effects. The fact that terrorists focus most of their attacks on targets with little or no security suggests that security influences their choice of targets. Increased security does not reduce terrorism overall, but appears to push terrorists toward softer targets. These indirect effects are visible only over long periods of time. Public surface transportation poses unique challenges. It is not easy to increase security without causing inconvenience, unreasonably slowing travel times, adding significant costs, and creating vulnerable queues of people waiting to pass through security checkpoints. This has compelled rail operators to explore other options: enlisting passengers and staff in alerting authorities to suspicious objects or behavior, random passenger screening, designing new stations to facilitate surveillance and reduce potential casualties from explosions or fire, and ensuring rapid intervention

    Bus Operator Awareness Research and Development Training Program

    Get PDF
    This training is designed to enhance the abilities of bus operators to: Quickly and effectively evaluate suspicious and dangerous activities Take actions to protect yourself and your passengers, and Provide timely and accurate information to law enforcement through your control center This summary and the full instructor-led course were developed by the Transportation Security Administration (TSA) in cooperation with the National Transportation Security Center of Excellence (NTSCOE), managed through the Science and Technology Directorate of DHS. Through the intensive efforts of four universities and two federal agencies, the team conducted extensive research both nationally and abroad to identify appropriate countermeasures and related skill sets for bus operators relative to identifying suspicious and dangerous activity and reacting appropriately with a focus on life safety concerns
    • 

    corecore