Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance

نویسندگان

  • Maryam Tanha
  • Fazirulhisyam Hashim
  • Subramaniam Shamala
چکیده

Nowadays, critical infrastructures are highly integrated with state-of-the-art information and communication technologies to enhance their efficiency. Due to farreaching societal and economic impacts caused by failure or malfunction of critical infrastructures, cyber security and self-healing capability are among their salient features. A new security paradigm referred to as intrusion tolerance is envisaged to complement the existing security solutions (i.e., intrusion prevention and detection), as well as to provide availability and self-healing capabilities, particularly for the control centers as the key components of critical infrastructures. However, intrusion tolerance techniques are associated with substantial cost. In this paper, we propose an intrusion tolerant system architecture which incorporates distinctive features, namely dynamic redundancy level, and hybrid and hierarchical rejuvenation mechanism. The acquired results from security analysis of the proposed architecture show improvements compared to two established architectures. Also, analysis of the incurred cost demonstrates the costeffectiveness of the proposed architecture.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Highly Available Smart Grid Control Centers through Intrusion Tolerance

Societies’ norms of operation relies on the proper and secure functioning of several critical infrastructures, particularly modern power grid which is also known as smart grid. Smart grid is interwoven with the information and communication technology infrastructure, and thus it is exposed to cyber security threats. Intrusion tolerance proves a promising security approach against malicious atta...

متن کامل

The Effectiveness of Self-Healing Training on Psychological Capital, Distress Tolerance, and Headache of Addicts’ Spouses

Objective: The purpose of this study was to investigate the effectiveness of self-healing training on psychological capital, distress Tolerance, and headaches in addicts' spouses. Method: This study was a semi-experimental design with two group (experimental & control) and three stage (pre-test, post-test and follow up). The study population was women with addicted spouse (traditional and indus...

متن کامل

Time as a Metric for Defence in Survivable Networks

Critical infrastructures of today’s society are built over networks that require a degree of survivability not foreseen when they were built. This paper reports on work in progress in a European project that aims to safeguard critical infrastructures such as electricity and telecom networks. It assumes that there will be accidents, attacks, and failures in parts of a network. The goal of safegu...

متن کامل

Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security

Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is a high probability that systems will be successfully attacked and a critical system must fend off or at least limit the damage caused by unknown and/or undetected attacks. In prior work, we developed a Self-Cleansing...

متن کامل

The Effectiveness of Self-Healing Training (the Healing Codes) on the Sense of Cohesion in Substance-Dependent Males

Objective: The present study aimed to investigate the effectiveness of self-healing training (the healing codes) on the sense of cohesion in substance-dependent men in 2020. Method: The present research was quasi-experimental with pretest-posttest design with a control group. The statistical population included all substance-dependent males in Isfahan in 2020. Among whom, 30 people who were wil...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2015