%0 Conference Proceedings %T Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project %+ Computer Science and Communications Research Unit [Luxembourg] (CSC) %+ Department of Electrical and Information Engineering %+ Service Science & Innovation Department (SSI) %A Schaberreiter, Thomas %A Varrette, Sébastien %A Bouvry, Pascal %A Röning, Juha %A Khadraoui, Djamel %Z Part 2: Security Engineering %< avec comité de lecture %( Lecture Notes in Computer Science %B 1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES) %C Regensburg, Germany %Y Alfredo Cuzzocrea %Y Christian Kittl %Y Dimitris E. Simos %Y Edgar Weippl %Y Lida Xu %I Springer %3 Security Engineering and Intelligence Informatics %V LNCS-8128 %P 269-287 %8 2013-09-02 %D 2013 %K Critical infrastructures %K dependency analysis %K risk monitoring %K security modelling %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X Critical infrastructure (CI) services (like electricity, telecommunication or transport) are constantly consumed by the society and are not expected to fail. A common definition states that CIs are so vital to our society that a disruption would have a severe impact on both the society and the economy. CI security modelling was introduced in previous work to enable on-line risk monitoring in CIs that depend on each other by exchanging on-line risk alerts expressed in terms of a breach of Confidentiality, a breach of Integrity and degrading Availability (CIA). One important aspect for the accuracy of the model is the decomposition of CIs into CI security modelling elements (CI services, base measurements and dependencies). To assist in CI decomposition and provide more accurate results a methodology based on dependency analysis was presented in previous work.In this work a proof-of-concept validation of the CI decomposition methodology is presented. We conduct a case study in the context of the Grid’5000 project, an academic computing grid with clusters distributed at several locations in France and Luxembourg. We show how a CI security model can be established by following the proposed CI decomposition methodology and we provide a discussion of the resulting model as well as experiences during the case study. %G English %2 https://inria.hal.science/hal-01506574/document %2 https://inria.hal.science/hal-01506574/file/978-3-642-40588-4_19_Chapter.pdf %L hal-01506574 %U https://inria.hal.science/hal-01506574 %~ SHS %~ GRID5000 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-WG %~ IFIP-TC8 %~ IFIP-CD-ARES %~ IFIP-WG8-4 %~ IFIP-WG8-9 %~ IFIP-LNCS-8128 %~ SILECS