IFIP TC6 Open Digital Library

Critical Infrastructure Protection 2011: Hanover, NH, USA

Critical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers

Jonathan Butts, Sujeet Shenoi

Springer, IFIP Advances in Information and Communication Technology 367, ISBN: 978-3-642-24863-4



Contents

Themes and Issues

Using Deception to Shield Cyberspace Sensors.

Mason Rice, Daniel Guernsey, Sujeet Shenoi

 3-18

Botnets as an Instrument of Warfare.

Eric Koziel, David Robinson

 19-28

Control Systems Security

Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems.

Jason Reeves, Ashwin Ramaswamy, Michael E. Locasto, Sergey Bratus, Sean W. Smith

 31-46

A Plant-Wide Industrial Process Control Security Problem.

Thomas Richard McEvoy, Stephen D. Wolthusen

 47-56

Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing.

Rebecca Shapiro, Sergey Bratus, Edmond Rogers, Sean W. Smith

 57-72

Security Analysis of VPN Configurations in Industrial Control Environments.

Sanaz Rahimi, Mehdi R. Zargham

 73-88

Infrastructure Security

Implementing Novel Defense Functionality in MPLS Networks Using Hyperspeed Signaling.

Daniel Guernsey, Mason Rice, Sujeet Shenoi

 91-106

Creating a Cyber Moving Target for Critical Infrastructure Applications.

Hamed Okhravi, Adam Comella, Eric Robinson, Stephen Yannalfo, Peter Michaleas, Joshua Haines

 107-123

An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making.

Yujue Wang, Carl Hauser

 125-135

Enhancing the Usability of the Commercial Mobile Alert System.

Paul Ngo, Duminda Wijesekera

 137-149

Real-Time Detection of Covert Channels in Highly Virtualized Environments.

Anyi Liu, Jim X. Chen, Li Yang

 151-164

Infrastructure Modeling and Simulation

Analyzing Cyber-Physical Attacks on Networked Industrial Control Systems.

Béla Genge, Igor Nai Fovino, Christos Siaterlis, Marcelo Masera

 167-183

Using an Emulation Testbed for Operational Cyber Security Exercises.

Christos Siaterlis, Andres Perez-Garcia, Marcelo Masera

 185-199

Analyzing Intelligence on WMD Attacks Using Threaded Event-Based Simulation.

Qi Fang, Peng Liu 0005, John Yen, Jonathan H. Morgan, Donald Shemanski, Frank E. Ritter

 201-216