%0 Conference Proceedings %T Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems %+ Università degli Studi di Napoli “Parthenope” = University of Naples (PARTHENOPE) %+ Italian National agency for new technologies, Energy and sustainable economic development [Frascati] (ENEA) %+ University of British Columbia (UBC) %+ King Abdulaziz City for Science and Technology [Riyadh] (KACST) %A Formicola, Valerio %A Pietro, Antonio, Di %A Alsubaie, Abdullah %A D’antonio, Salvatore %A Marti, Jose %Z Part 4: Risk and Impact Assessment %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 8th International Conference on Critical Infrastructure Protection (ICCIP) %C Arlington, United States %Y Jonathan Butts %Y Sujeet Shenoi %I Springer %3 Critical Infrastructure Protection VIII %V AICT-441 %P 213-229 %8 2014-03-17 %D 2014 %R 10.1007/978-3-662-45355-1_14 %K Cyber attacks %K wireless sensor networks %K attack impact %Z Computer Science [cs]Conference papers %X This paper describes a next-generation security information and event management (SIEM) platform that performs real-time impact assessment of cyber attacks that target monitoring and control systems in interdependent critical infrastructures. To assess the effects of cyber attacks on the services provided by critical infrastructures, the platform combines security analysis with simulations produced by the Infrastructure Interdependencies Simulator (i2Sim). The approach is based on the mixed holistic reductionist (MHR) methodology that models the relationships between functional components of critical infrastructures and the provided services. The effectiveness of the approach is demonstrated using a scenario involving a dam that feeds a hydroelectric power plant. The scenario considers an attack on a legacy SCADA system and wireless sensor network that reduces electricity production and degrades the services provided by the interdependent systems. The results demonstrate that the attack is detected in a timely manner, risk assessment is performed effectively and service level variations can be predicted. The paper also shows how the impact of attacks on services can be estimated when limits are imposed on information sharing. %G English %Z TC 11 %Z WG 11.10 %2 https://inria.hal.science/hal-01386766/document %2 https://inria.hal.science/hal-01386766/file/978-3-662-45355-1_14_Chapter.pdf %L hal-01386766 %U https://inria.hal.science/hal-01386766 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-ICCIP %~ IFIP-WG11-10 %~ IFIP-AICT-441