IFIP TC6 Open Digital Library

Critical Infrastructure Protection 2007: Hanover, New Hampshire, USA

Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007

Eric Goetz, Sujeet Shenoi

Springer, IFIP 253, ISBN: 978-0-387-75461-1



Contents

Themes and Issues

On the Security Implications of Disruptive Technologies.

Neil Robinson, Lorenzo Valeri

 3-14

Cyber Security: Are Economic Incentives Adequate?

Scott Dynes, Eric Goetz, Michael Freeman

 15-27

Government Intervention in Information Infrastructure Protection.

Dan Assaf

 29-39

Infrastructure Security

Security of Information Flow in the Electric Power Grid.

Han Tang, Bruce M. McMillin

 43-56

Securing Positive Train Control Systems.

Mark Hartong, Rajni Goel, Duminda Wijesekera

 57-72

Lessons Learned from the Maroochy Water Breach.

Jill Slay, Michael Miller

 73-82

Reducing Risk in Oil and Gas Production Operations.

Stig Ole Johnsen, Rune Ask, Randi Roisli

 83-95

Control Systems Security

Securing Current and Future Process Control Systems.

Robert K. Cunningham, Steven Cheung, Martin W. Fong, Ulf Lindqvist, David M. Nicol, Ronald Pawlowski, Eric Robinson, William H. Sanders, Sankalp Singh, Alfonso Valdes, Bradley Woodworth, Michael Zhivich

 99-115

Security Strategies for SCADA Networks.

Rodrigo Chandia, Jesús González, Tim Kilpatrick, Mauricio Papa, Sujeet Shenoi

 117-131

Security Enhancements for Distributed Control Systems.

Jeffrey L. Hieb, James H. Graham, Sandip C. Patel

 133-146

Security Challenges of Reconfigurable Devices in the Power Grid.

Suvda Myagmar, Roy H. Campbell, Marianne Winslett

 147-160

Intrusion Detection and Event Monitoring in SCADA Networks.

Paul W. Oman, Matthew Phillips

 161-173

Passive Scanning in Modbus Networks.

Jesús González, Mauricio Papa

 175-187

Formal Modeling and Analysis of the Modbus Protocol.

Bruno Dutertre

 189-204

Security Analysis of Multilayer SCADA Protocols.

Janica Edmonds, Mauricio Papa, Sujeet Shenoi

 205-221

Remote Forensic Analysis of Process Control Systems.

Regis Friend Cassidy, Adrian Chavez, Jason Trent, Jorge Urrea

 223-235

Creating a European SCADA Security Testbed.

Henrik Christiansson, Eric A. M. Luiijf

 237-247

Network Infrastructure Security

Protecting Internet Services from Low-Rate DoS Attacks.

Yajuan Tang, Xiapu Luo, Rocky K. C. Chang

 251-265

Detecting Wormhole Attacks in Wireless Sensor Networks.

Yurong Xu, Guanling Chen, James Ford, Fillia Makedon

 267-279

Detecting Non-Discoverable Bluetooth Devices.

Daniel Cross, Justin Hoeckle, Michael K. Lavine, Jason Rubin, Kevin Snow

 281-293

Infrastructure Interdependendencies

Risk Analysis in Interdependent Infrastructures.

Yacov Y. Haimes, Joost Santos, Kenneth G. Crowther, Matthew Henry, Chenyang Lian, Zhenyu Yan

 297-310

Analysis of Interdependencies Between Italy's Economic Sectors.

Roberto Setola

 311-321

The ISE Metamodel for Critical Infrastructures.

Felix Flentge, Uwe Beyer

 323-336

Multigraph Dependency Models for Heterogeneous Infrastructures.

Nils Kalstad Svendsen, Stephen D. Wolthusen

 337-350

Visualizing Cascading Failures in Critical Cyber Infrastructures.

Jason K. Kopylec, Anita D'Amico, John R. Goodall

 351-364

Risk Assessment

A Service-Oriented Approach for Assessing Infrastructure Security.

Marcelo Masera, Igor Nai Fovino

 367-379

Analysis of Electrical Power and Oil and Gas Pipeline Failures.

Jeffrey S. Simonoff, Carlos E. Restrepo, Rae Zimmerman, Zvia Naphtali

 381-394