IFIP TC6 Open Digital Library

Critical Infrastructure Protection 2010: Washington, DC, USA

Critical Infrastructure Protection IV - Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers

Tyler Moore, Sujeet Shenoi

Springer, IFIP Advances in Information and Communication Technology 342, ISBN: 978-3-642-16805-5



Contents

Thems and Issues

Security At What Cost?

Neil Robinson, Dimitris Potoglou, Chong Kim, Peter Burge, Richard Warnes

 3-15

Foreign Direct Investment in an Era of Increased Threats to Critical Infrastructures.

Dan Assaf

 17-27

Critical Information Infrastructure Protection in the Developing World.

Ian Ellefsen, Sebastiaan H. von Solms

 29-40

Control Systems Security

Modeling Control System Failures and Attacks - The Waterloo Campaign to Oil Pipelines.

Jonathan Butts, Mason Rice, Sujeet Shenoi

 43-62

High Security with Low Latency in Legacy SCADA Systems.

Rouslan Solomakhin, Patrick P. Tsang, Sean W. Smith

 63-79

Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes.

Thomas Richard McEvoy, Stephen D. Wolthusen

 81-94

Distributed Intrusion Detection System for SCADA Protocols.

Igor Nai Fovino, Marcelo Masera, Michele Guglielmi, Andrea Carcano, Alberto Trombetta

 95-110

Infrastructure Security

Distributed IP Watchlist Generation for Intrusion Detection in the Electrical Smart Grid.

Ray Klump, Matthew Kwiatkowski

 113-126

Security Analysis of the MPLS Label Distribution Protocol.

Daniel Guernsey, Aaron Engel, Jonathan Butts, Sujeet Shenoi

 127-139

U.S. Federal Oversight of Rail Transportation of Toxic by Inhalation Materials.

Mark Hartong, Rajni Goel, Duminda Wijesekera

 141-155

Protecting the Food Supply Chain from Terrorist Attack.

María Jesús Álvarez, Ainara Alvarez, Maria Carla De Maggio, Ainhoa Oses, Marcella Trombetta, Roberto Setola

 157-167

Infrastructure Modeling and Simulation

Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments.

Nils Lunden, Robin Sveen, Hans Lund, Nils Kalstad Svendsen, Stephen D. Wolthusen

 171-183

Assessing the Economic Loss and Social Impact of Information System Breakdowns.

Fabio Bisogni, Simona Cavallini

 185-198

Modeling Inoperability Propagation Using Bayesian Networks.

Zaw Zaw Aung, Kenji Watanabe

 199-212

Risk Management

Resilience in Risk Analysis and Risk Assessment.

Stig Ole Johnsen

 215-227

A Manufacturer-Specific Security Assessment Methodology for Critical Infrastructure Components.

Thomas Brandstetter, Konstantin Knorr, Ute Rosenbaum

 229-244

An Advanced Decision-Support Tool for Electricity Infrastructure Operations.

Yousu Chen, Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Craig Allwardt, Jian Ma, Frank L. Greitzer

 245-260