Predicting the Effects of DDoS Attacks on a Network of Critical Infrastructures

被引:8
作者
Hurst, William [1 ]
Shone, Nathan [1 ]
Monnet, Quentin [2 ]
机构
[1] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool, Merseyside, England
[2] Univ Paris Est, UPEC, LACL, EA 4219, F-94010 Creteil, France
来源
CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING | 2015年
关键词
Critical Infrastructure; Cyber-Attack Distributed Denial of Service; Simulation; Cascading Failure; SERVICE ATTACKS;
D O I
10.1109/CIT/IUCC/DASC/PICOM.2015.256
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last decade, the level of critical infrastructure technology has been steadily transforming in order to keep pace with the growing demand for the services offered. The implementation of the smart grid, which relies on a complex and intelligent level of interconnectivity, is one example of how vital amenity provision is being refined. However, with this change, the risk of threats from the digital domain must be calculated. Superior interconnectivity between infrastructures means that the future cascading impacts of successful cyber-attacks are unknown. One such threat being faced in the digital domain is the Distributed Denial of Service (DDoS) attack. A DDoS has the goal of incapacitating a server, network or service, by barraging a target with external data traffic in the form of communication requests. DDoS have the potential to cause a critical infrastructure outage, and the subsequent impact on a network of such infrastructures is yet unknown. In this paper, an approach for assessing the future impacts of a cyber-attack in a network of critical infrastructures is presented; with a focus on DDoS attacks. A simulation of a critical infrastructure network provides data to represent both normal run-time and an attack scenario. Using this dataset, a technique for assessing the future impact of disruptions on integrated critical infrastructure network, is demonstrated.
引用
收藏
页码:1698 / 1703
页数:6
相关论文
共 20 条
[1]  
[Anonymous], SMART WIREL SENSOR N
[2]  
[Anonymous], 2010, INT J AD HOC SENSOR, DOI DOI 10.5121/ijasuc.2010.1301
[3]  
BBC Technology News, BBC TECHNOLOGY NEWS
[4]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[5]  
European Commission, SMART GRID MET
[6]   A Survey of Botnet and Botnet Detection [J].
Feily, Maryam ;
Shahrestani, Alireza ;
Ramadass, Sureswaran .
2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, :268-+
[7]   A survey on the applicability of trust management systems for wireless sensor networks [J].
Fernandez-Gago, M. Carmen ;
Roman, Rodrigo ;
Lopez, Javier .
THIRD INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, :25-+
[8]  
Haris S. H. C., 2010, Proceedings of the 2010 Second International Conference on Network Applications Protocols and Services (NETAPPS 2010), P240, DOI 10.1109/NETAPPS.2010.50
[9]  
Islam MH, 2009, P 2009 INT C ADV COM, P675
[10]  
Kavitha C., 2014, P INT C INF COMM EMB, P1