2,186 research outputs found

    Security hardened remote terminal units for SCADA networks.

    Get PDF
    Remote terminal units (RTUs) are perimeter supervisory control and data acquisition (SCADA) devices that measure and control actual physical devices. Cyber security was largely ignored in SCADA for many years, and the cyber security issues that now face SCADA and DCS, specifically RTU security, are investigated in this research. This dissertation presents a new role based access control model designed specifically for RTUs and process control. The model is developed around the process control specific data element called a point, and point operations. The model includes: assignment constraints that limit the RTU operations that a specific role can be assigned and activation constraints that allow a security administrator to specify conditions when specific RTU roles or RTU permissions cannot be used. RTU enforcement of the new access control model depends on, and is supported by, the protection provided by an RTU\u27s operating system. This dissertation investigates two approaches for using minimal kernels to reduce potential vulnerabilities in RTU protection enforcement and create a security hardened RTU capable of supporting the new RTU access control model. The first approach is to reduce a commercial OS kernel to only those components needed by the RTU, removing any known or unknown vulnerabilities contained in the eliminated code and significantly reducing the size of the kernel. The second approach proposes using a microkernel that supports partitioning as the basis for an RTU specific operating system which isolates network related RTU software, the RTU attack surface, from critical RTU operational software such as control algorithms and analog and digital input and output. In experimental analysis of a prototype hardened RTU connected to real SCADA hardware, a reduction of over 50% was obtained in reducing a 2.4 Linux kernel to run on actual RTU hardware. Functional testing demonstrated that different users were able to carryout assigned tasks with the limited set of permissions provided by the security hardened RTU and a series of simulated insider attacks were prevented by the RTU role based access control system. Analysis of communication times indicated response times would be acceptable for many SCADA and DCS application areas. Investigation of a partitioning microkernel for an RTU identified the L4 microkernel as an excellent candidate. Experimental evaluation of L4 on real hardware found the IPC overhead for simulated critical RTU operations protected by L4 partitioning to be sufficiently small to warrant continued investigation of the approach

    Leading for Learning Sourcebook: Concepts and Examples

    Get PDF
    Provides a detailed discussion of ideas and methods that educators can use to enhance leadership in learning. Offers examples of leaders using the ideas and tools for assessment, planning, and teaching. Includes four annotated longitudinal cases

    Resource management for data streaming applications

    Get PDF
    This dissertation investigates novel middleware mechanisms for building streaming applications. Developing streaming applications is a challenging task because (i) they are continuous in nature; (ii) they require fusion of data coming from multiple sources to derive higher level information; (iii) they require efficient transport of data from/to distributed sources and sinks; (iv) they need access to heterogeneous resources spanning sensor networks and high performance computing; and (v) they are time critical in nature. My thesis is that an intuitive programming abstraction will make it easier to build dynamic, distributed, and ubiquitous data streaming applications. Moreover, such an abstraction will enable an efficient allocation of shared and heterogeneous computational resources thereby making it easier for domain experts to build these applications. In support of the thesis, I present a novel programming abstraction, called DFuse, that makes it easier to develop these applications. A domain expert only needs to specify the input and output connections to fusion channels, and the fusion functions. The subsystems developed in this dissertation take care of instantiating the application, allocating resources for the application (via the scheduling heuristic developed in this dissertation) and dynamically managing the resources (via the dynamic scheduling algorithm presented in this dissertation). Through extensive performance evaluation, I demonstrate that the resources are allocated efficiently to optimize the throughput and latency constraints of an application.Ph.D.Committee Chair: Ramachandran, Umakishore; Committee Member: Chervenak, Ann; Committee Member: Cooper, Brian; Committee Member: Liu, Ling; Committee Member: Schwan, Karste

    An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications

    Get PDF
    We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems

    An Application of Con-Resistant Trust to Improve the Reliability of Special Protection Systems within the Smart Grid

    Get PDF
    This thesis explores an application of a con-resistant trust mechanism to improve the performance of communications-based special protection systems to further enhance their effectiveness and resiliency. New initiatives in the energy sector are paving the way for the emergent communications-based smart grid technology. Smart grids incorporate modern technologies in an effort to be more reliable and efficient. However, with the benefits of this new technology comes added risk. This research utilizes a con-resistant trust mechanism as a method to quickly identify malicious or malfunctioning protection system nodes in order to mitigate the resulting instabilities in the smart grid. The feasibility and performance of this trust architecture is demonstrated through experiments comparing a simulated special protection system implemented with a con-resistant trust mechanism and without via an analysis of variance statistical model. The simulations yield positive results when implementing the con-resistant trust mechanism within the communications-based special protection system for the smart grid

    Organization of parent knowledge.

    Get PDF
    The present study explored the association between organization of knowledge about parents and the types of relationships that adult children have with them. This study demonstrated that for fathers, types of relationships were predicted primarily by the content of parent knowledge (and not knowledge structure). However, for mothers, structure of parent knowledge was associated with three distinct types of parent-child relationships. Positively compartmentalized structures (in which positive and negative beliefs about mothers were categorized separately, and positive beliefs were rated as more important than negative ones) were associated with relationships characterized by positive attitudes and attributions and high levels of closeness, contact, and cooperation in the relationship. Positively integrative structures (in which positive and negative beliefs about mothers were categorized together, but positive beliefs were rated as more important than negative ones) were associated with relationships characterized by moderately positive attitudes, moderately high levels of closeness, positive attributions, and low levels of contact and cooperation. Negative parent structures (in which there were high levels of negative beliefs about mothers, and these negative beliefs were considered more important than positive ones by the child) were associated with relationships characterized by negative attitudes and attributions, and low levels of closeness, contact, and cooperation

    Policy Conflict Management in Distributed SDN Environments

    Get PDF
    abstract: The ease of programmability in Software-Defined Networking (SDN) makes it a great platform for implementation of various initiatives that involve application deployment, dynamic topology changes, and decentralized network management in a multi-tenant data center environment. However, implementing security solutions in such an environment is fraught with policy conflicts and consistency issues with the hardness of this problem being affected by the distribution scheme for the SDN controllers. In this dissertation, a formalism for flow rule conflicts in SDN environments is introduced. This formalism is realized in Brew, a security policy analysis framework implemented on an OpenDaylight SDN controller. Brew has comprehensive conflict detection and resolution modules to ensure that no two flow rules in a distributed SDN-based cloud environment have conflicts at any layer; thereby assuring consistent conflict-free security policy implementation and preventing information leakage. Techniques for global prioritization of flow rules in a decentralized environment are presented, using which all SDN flow rule conflicts are recognized and classified. Strategies for unassisted resolution of these conflicts are also detailed. Alternately, if administrator input is desired to resolve conflicts, a novel visualization scheme is implemented to help the administrators view the conflicts in an aesthetic manner. The correctness, feasibility and scalability of the Brew proof-of-concept prototype is demonstrated. Flow rule conflict avoidance using a buddy address space management technique is studied as an alternate to conflict detection and resolution in highly dynamic cloud systems attempting to implement an SDN-based Moving Target Defense (MTD) countermeasures.Dissertation/ThesisDoctoral Dissertation Computer Science 201
    • …
    corecore