Developing a Distributed System for Infrastructure Protection
نویسندگان
چکیده
Y our business increasingly relies on computer-controlled systems vulnerable to intrusion and destruction. The recent distributed denial of service attacks (DDoS) against e-commerce companies showed that this vulnerability extends beyond your own corporate networks:The very infrastructure of the Internet is at risk.When infoterrorists use the networks’ high connectivity and low security to launch attacks against critical information infrastructure systems, they can not only disrupt global e-commerce and communications, but can also adversely affect other critical infrastructure services such as energy, transportation, healthcare,finance,and water supply. How can organizations protect these systems from infoterrorism? They must leverage modern information technologies to create an infrastructure protection process that can operate quickly and seamlessly.We propose a six-stage protection process that involves intelligence gathering, analysis, interdiction, detection, response,and recovery.To implement this process, we’ve designed an underlying Web-like architecture that will serve as a platform for the decentralized monitoring and management of critical infrastructures. THE PROTECTION PROCESS The recent spate of DDoS attacks revealed two disturbing trends:
منابع مشابه
Adaptive Protection Based on Intelligent Distribution Networks with the Help of Network Factorization in the Presence of Distributed Generation Resources
Factorizing a system is one of the best ways to make a system intelligent. Factorizing the protection system, providing the right connecting agents, and transmitting the information faster and more reliably can improve the performance of a protection system and maintain system reliability against distributed generation resources. This study presents a new method for coordinating network protect...
متن کاملCritical Information Infrastructure Protection in the Developing World
Critical information infrastructure protection (CIIP) has long been an area of concern, from its beginnings with the creation of the Internet to recent high-profile distributed denial-of-service attacks against critical systems. Critical systems rely heavily on information infrastructures; a disruption of the information infrastructure can hinder the operation of critical systems. The developed...
متن کاملDeveloping a distributed system for infrastructure protection - IT Professional
Y our business increasingly relies on computer-controlled systems vulnerable to intrusion and destruction. The recent distributed denial of service attacks (DDoS) against e-commerce companies showed that this vulnerability extends beyond your own corporate networks:The very infrastructure of the Internet is at risk.When infoterrorists use the networks’ high connectivity and low security to laun...
متن کاملPolicy Based Management for Critical Infrastructure Protection
Our current societies are fully dependent on large complex critical infrastructures (LCCIs). These LCCIs are large scale distributed systems that are highly interdependent, both physically and in their greater reliance on the information infrastructure, which logically introduce vulnerabilities. Failures, accidents, physical or cyber attacks can provoke major damages which can proliferate by ca...
متن کاملProviding a protection method to support distributed generation against transient voltage instability
The analysis of transient stability in electric power systems and the penetration coefficient of scattered productions play important roles in the regulation of protective equipment, so these parameters should be considered two main factors in the electrical protection of power networks. Overcurrent relays are used as one of the simplest and most effective solutions for power system protection....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000