Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet

Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet

Rafal Leszczyna, Igor Nai Fovino
DOI: 10.4018/978-1-4666-2964-6.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim – Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we conducted in 2007. The attack scenarios developed for the implementation in the new configuration of the laboratory are described.
Chapter Preview
Top

Critical industrial infrastructures usually adopt ad-hoc network layouts, which are normally tailor-made for each installation. The communication protocols used, for example in typical SCADA Master-Slave architectures, are ad-hoc, and constitute a completely separate world with its own vulnerabilities and attack patterns, different from the traditional ICT world. In that field, several academic works have been written. For an accessible survey, we point the interested reader to (Igure, Laughter, & Williams, 2006).

Complete Chapter List

Search this Book:
Reset