Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance
نویسندگان
چکیده
Nowadays, critical infrastructures are highly integrated with state-of-the-art information and communication technologies to enhance their efficiency. Due to farreaching societal and economic impacts caused by failure or malfunction of critical infrastructures, cyber security and self-healing capability are among their salient features. A new security paradigm referred to as intrusion tolerance is envisaged to complement the existing security solutions (i.e., intrusion prevention and detection), as well as to provide availability and self-healing capabilities, particularly for the control centers as the key components of critical infrastructures. However, intrusion tolerance techniques are associated with substantial cost. In this paper, we propose an intrusion tolerant system architecture which incorporates distinctive features, namely dynamic redundancy level, and hybrid and hierarchical rejuvenation mechanism. The acquired results from security analysis of the proposed architecture show improvements compared to two established architectures. Also, analysis of the incurred cost demonstrates the costeffectiveness of the proposed architecture.
منابع مشابه
Highly Available Smart Grid Control Centers through Intrusion Tolerance
Societies’ norms of operation relies on the proper and secure functioning of several critical infrastructures, particularly modern power grid which is also known as smart grid. Smart grid is interwoven with the information and communication technology infrastructure, and thus it is exposed to cyber security threats. Intrusion tolerance proves a promising security approach against malicious atta...
متن کاملThe Effectiveness of Self-Healing Training on Psychological Capital, Distress Tolerance, and Headache of Addicts’ Spouses
Objective: The purpose of this study was to investigate the effectiveness of self-healing training on psychological capital, distress Tolerance, and headaches in addicts' spouses. Method: This study was a semi-experimental design with two group (experimental & control) and three stage (pre-test, post-test and follow up). The study population was women with addicted spouse (traditional and indus...
متن کاملTime as a Metric for Defence in Survivable Networks
Critical infrastructures of today’s society are built over networks that require a degree of survivability not foreseen when they were built. This paper reports on work in progress in a European project that aims to safeguard critical infrastructures such as electricity and telecom networks. It assumes that there will be accidents, attacks, and failures in parts of a network. The goal of safegu...
متن کاملIncorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is a high probability that systems will be successfully attacked and a critical system must fend off or at least limit the damage caused by unknown and/or undetected attacks. In prior work, we developed a Self-Cleansing...
متن کاملThe Effectiveness of Self-Healing Training (the Healing Codes) on the Sense of Cohesion in Substance-Dependent Males
Objective: The present study aimed to investigate the effectiveness of self-healing training (the healing codes) on the sense of cohesion in substance-dependent men in 2020. Method: The present research was quasi-experimental with pretest-posttest design with a control group. The statistical population included all substance-dependent males in Isfahan in 2020. Among whom, 30 people who were wil...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 17 شماره
صفحات -
تاریخ انتشار 2015