Adaptive Cyber Security for Critical Infrastructure

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Abstract

In the modern era, much of worldwide critical operations from a variety of different sectors are managed by industrial control systems (ICS). A typical ICS includes an extensive range of computerized devices, control systems, and networking appliances used to manage efficiently an industrial process across large geographical areas. ICS underpin sensitive and critical national infrastructures such as water treatment and energy production and transportation. The consequences of a successful attack against them can lead to shutting the infrastructure down which has major impacts such as production stoppages or safety implications for people, the environment, and assets. At the same time, running a process while the infrastructure is under attack or compromised also has safety implications, potentially catastrophic. This work-in-progress focuses on an adaptive approach, able to alter the defensive posture while providing assurances about operational capacity (or downgrading it) and safety. Our approach involves transforming policies from simply a means to enforce security requirements defined a priori, to adaptive objects that are capable to evolve in response to unfolding attacks. We use a case study of reconnaissance attacks and moving target defense as a means to realize such adaptive security policies.
Original languageEnglish
Title of host publication2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)
PublisherAssociation for Computing Machinery (ACM)
Pages304-305
ISBN (Electronic)9781665409674
ISBN (Print)9781665409681
DOIs
Publication statusPublished - 24 Jun 2022

Publication series

NameIEEE/ACM International Conference on Cyber-Physical Systems (ICCPS)
PublisherIEEE
ISSN (Electronic)2642-9500

Fingerprint

Dive into the research topics of 'Adaptive Cyber Security for Critical Infrastructure'. Together they form a unique fingerprint.

Cite this