The Resource Critical infrastructure protection IX : 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers, edited by Mason Rice, Sujeet Shenoi

Critical infrastructure protection IX : 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers, edited by Mason Rice, Sujeet Shenoi

Label
Critical infrastructure protection IX : 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers
Title
Critical infrastructure protection IX
Title remainder
9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers
Statement of responsibility
edited by Mason Rice, Sujeet Shenoi
Title variation
ICCIP 2015
Creator
Contributor
Editor
Subject
Genre
Language
eng
Summary
The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues, Control Systems Security, Cyber-Physical Systems Security, Infrastructure Security, Infrastructure Modeling and Simulation, Risk and Impact Assessment. This book is the ninth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of nineteen edited papers from the Ninth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2015. Critical Infrastructure Protection IX is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Mason Rice is an Assistant Professor of Computer Science at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA
Member of
Cataloging source
NUI
Dewey number
005.8
Illustrations
illustrations
Image bit depth
0
Index
no index present
Language note
English
LC call number
QA76.9.A25
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2015
http://bibfra.me/vocab/lite/meetingName
IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Rice, Mason
  • Shenoi, Sujeet
Series statement
IFIP Advances in Information and Communication Technology,
Series volume
466
http://library.link/vocab/subjectName
  • Computer networks
  • Computer science
  • Computer security
  • Computers and civilization
  • Computers
  • Management information systems
  • Computer networks
  • Computer science
  • Computer security
  • Computers
  • Computers and civilization
  • Management information systems
  • Computer Science
  • Systems and Data Security
  • Management of Computing and Information Systems
  • Legal Aspects of Computing
  • Computers and Society
Label
Critical infrastructure protection IX : 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers, edited by Mason Rice, Sujeet Shenoi
Link
https://ezproxy.lib.ou.edu/login?url=http://link.springer.com/10.1007/978-3-319-26567-4
Instantiates
Publication
Antecedent source
mixed
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Intro; Contents; Contributing Authors; Preface; THEMES AND ISSUES; A MODEL FOR CHARACTERIZING CYBERPOWER; 1. Introduction; 2. Related Work; 3. Unified Cyberspace Model; 4. Defining Cyberpower; 4.1 Cyberpower; 4.2 State and Non-State Actors; 5. Characterizing Cyberpower; 5.1 Cyber Attack Attributes; 5.2 Cyber Attack Evaluation; 6. Conclusions; References; CYBER ATTACKS AND POLITICAL EVENTS: THE CASE OF THE OCCUPY CENTRAL CAMPAIGN; 1. Introduction; 2. Initial Violent Attacks; 3. Silent Attacks on Protest Supporters; 4. Violent Attacks on Protest Supporters; 5. Violent Attacks on the Government
  • 6. Attack Characteristics7. Motivation for the Cyber War Framework; 8. Cyber Warfare Framework; 9. Conclusions; References; ON THE SHARING OF CYBER SECURITY INFORMATION; 1. Introduction; 2. Definitions; 3. Previous Work; 4. Analytic Framework for Information Sharing; 4.1 Information Exchange Classes and Elements; 4.2 Framework Levels; 4.3 Incident Management Cycle; 4.4 Mapping the Elements to the Grid; 5. Standards and Standardization Efforts; 6. Conclusions; References; CONTROL SYSTEMS SECURITY; MODELING MESSAGE SEQUENCES FOR INTRUSION DETECTION IN INDUSTRIAL CONTROL SYSTEMS; 1. Introduction
  • 2. Background3. Sequence Attacks; 4. Sequences and Sequence Events; 5. Modeling Message Sequences; 6. Experiments and Analysis; 6.1 Modbus; 6.2 MMS; 6.3 IEC104; 6.4 Discussion; 7. Related Work; 8. Conclusions; References; INDUSTRIAL CONTROL SYSTEM FINGERPRINTING AND ANOMALY DETECTION; 1. Introduction; 2. Related Work; 3. Background; 4. Experimental Setup; 5. Fingerprinting Methodology; 6. Fingerprint-Based Anomaly Detection; 7. Conclusions; References; TRAFFIC-LOCALITY-BASED CREATION OF FLOW WHITELISTS FOR SCADA NETWORKS; 1. Introduction; 2. Background; 2.1 Network Flow and Flow Whitelists
  • 2.2 Traffic Summary2.3 Degree Centrality; 2.4 Locally Frequently-Used Ports; 3. Flow Whitelist Creation; 3.1 Overview; 3.2 Phase 1: Preparation; 3.3 Phase 2: Generation; 3.4 Phase 3: Inspection; 4. Experimental Results; 4.1 Phase 1: Preparation; 4.2 Phase 2: Generation; 4.3 Phase 3: Inspection; 4.4 Discussion; 5. Conclusions; References; A SYMBOLIC HONEYNET FRAMEWORK FOR SCADA SYSTEM THREAT INTELLIGENCE; 1. Introduction; 2. Related Work; 3. SCyPH Framework; 3.1 Overview; 3.2 Honeynet Layer; 3.3 Interaction Layer; 3.4 Infrastructure Modeling Layer; 3.5 Logging Layer; 4. GridPot; 4.1 IEC 61850
  • 4.2 Experiment Design4.3 Infrastructure Modeling; 4.4 Logging and Anomaly Detection; 4.5 Experimental Results; 5. Conclusions; References; ENHANCING A VIRTUAL SCADA LABORATORY USING SIMULINK; 1. Introduction; 2. Related Work; 3. SCADA Laboratory Overview; 3.1 Process Simulation; 3.2 Programmable Logic Controller Simulation; 3.3 Human-Machine Interface; 4. SCADA Laboratory Enhancements; 5. Experimental Results; 5.1 Normal Operation; 5.2 Startup Operation; 5.3 Attack Operation; 6. Conclusions; References; HOW INDUSTRIAL CONTROL SYSTEM SECURITY TRAINING IS FALLING SHORT; 1. Introduction
Dimensions
unknown
Extent
1 online resource (xviii, 331 pages)
File format
multiple file formats
Form of item
online
Isbn
9783319265674
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Note
SpringerLink
Other control number
10.1007/978-3-319-26567-4
Other physical details
illustrations.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)932170379
  • (OCoLC)ocn932170379
Label
Critical infrastructure protection IX : 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers, edited by Mason Rice, Sujeet Shenoi
Link
https://ezproxy.lib.ou.edu/login?url=http://link.springer.com/10.1007/978-3-319-26567-4
Publication
Antecedent source
mixed
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Intro; Contents; Contributing Authors; Preface; THEMES AND ISSUES; A MODEL FOR CHARACTERIZING CYBERPOWER; 1. Introduction; 2. Related Work; 3. Unified Cyberspace Model; 4. Defining Cyberpower; 4.1 Cyberpower; 4.2 State and Non-State Actors; 5. Characterizing Cyberpower; 5.1 Cyber Attack Attributes; 5.2 Cyber Attack Evaluation; 6. Conclusions; References; CYBER ATTACKS AND POLITICAL EVENTS: THE CASE OF THE OCCUPY CENTRAL CAMPAIGN; 1. Introduction; 2. Initial Violent Attacks; 3. Silent Attacks on Protest Supporters; 4. Violent Attacks on Protest Supporters; 5. Violent Attacks on the Government
  • 6. Attack Characteristics7. Motivation for the Cyber War Framework; 8. Cyber Warfare Framework; 9. Conclusions; References; ON THE SHARING OF CYBER SECURITY INFORMATION; 1. Introduction; 2. Definitions; 3. Previous Work; 4. Analytic Framework for Information Sharing; 4.1 Information Exchange Classes and Elements; 4.2 Framework Levels; 4.3 Incident Management Cycle; 4.4 Mapping the Elements to the Grid; 5. Standards and Standardization Efforts; 6. Conclusions; References; CONTROL SYSTEMS SECURITY; MODELING MESSAGE SEQUENCES FOR INTRUSION DETECTION IN INDUSTRIAL CONTROL SYSTEMS; 1. Introduction
  • 2. Background3. Sequence Attacks; 4. Sequences and Sequence Events; 5. Modeling Message Sequences; 6. Experiments and Analysis; 6.1 Modbus; 6.2 MMS; 6.3 IEC104; 6.4 Discussion; 7. Related Work; 8. Conclusions; References; INDUSTRIAL CONTROL SYSTEM FINGERPRINTING AND ANOMALY DETECTION; 1. Introduction; 2. Related Work; 3. Background; 4. Experimental Setup; 5. Fingerprinting Methodology; 6. Fingerprint-Based Anomaly Detection; 7. Conclusions; References; TRAFFIC-LOCALITY-BASED CREATION OF FLOW WHITELISTS FOR SCADA NETWORKS; 1. Introduction; 2. Background; 2.1 Network Flow and Flow Whitelists
  • 2.2 Traffic Summary2.3 Degree Centrality; 2.4 Locally Frequently-Used Ports; 3. Flow Whitelist Creation; 3.1 Overview; 3.2 Phase 1: Preparation; 3.3 Phase 2: Generation; 3.4 Phase 3: Inspection; 4. Experimental Results; 4.1 Phase 1: Preparation; 4.2 Phase 2: Generation; 4.3 Phase 3: Inspection; 4.4 Discussion; 5. Conclusions; References; A SYMBOLIC HONEYNET FRAMEWORK FOR SCADA SYSTEM THREAT INTELLIGENCE; 1. Introduction; 2. Related Work; 3. SCyPH Framework; 3.1 Overview; 3.2 Honeynet Layer; 3.3 Interaction Layer; 3.4 Infrastructure Modeling Layer; 3.5 Logging Layer; 4. GridPot; 4.1 IEC 61850
  • 4.2 Experiment Design4.3 Infrastructure Modeling; 4.4 Logging and Anomaly Detection; 4.5 Experimental Results; 5. Conclusions; References; ENHANCING A VIRTUAL SCADA LABORATORY USING SIMULINK; 1. Introduction; 2. Related Work; 3. SCADA Laboratory Overview; 3.1 Process Simulation; 3.2 Programmable Logic Controller Simulation; 3.3 Human-Machine Interface; 4. SCADA Laboratory Enhancements; 5. Experimental Results; 5.1 Normal Operation; 5.2 Startup Operation; 5.3 Attack Operation; 6. Conclusions; References; HOW INDUSTRIAL CONTROL SYSTEM SECURITY TRAINING IS FALLING SHORT; 1. Introduction
Dimensions
unknown
Extent
1 online resource (xviii, 331 pages)
File format
multiple file formats
Form of item
online
Isbn
9783319265674
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Note
SpringerLink
Other control number
10.1007/978-3-319-26567-4
Other physical details
illustrations.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)932170379
  • (OCoLC)ocn932170379

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...