A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures
Abstract
:1. Introduction with Grand Challenge
- Monitor and Collect Data: The OPA system has comprehensive monitoring tools designed to continuously gather data from various system components, including network traffic, user activity, and resource consumption. These data play a critical role in facilitating real-time analysis and the identification of potential threats.
- Detect Security Threats: The OPA utilizes predefined thresholds and advanced machine learning algorithms to identify anomalies and discrepancies between expected and actual system behavior. These detection mechanisms can recognize emerging threats like unauthorized access attempts, data manipulation, and abnormal usage patterns, ensuring the early detection of potential attacks.
- React and Adapt in Real-Time: The OPA facilitates the automatic reconfiguration of security measures in response to identified threats. This capability enables the system to independently adjust to changing cyber threats by implementing suitable countermeasures, including firewalls, encryption, and user access limitations. Additionally, it includes self-healing functionality, which allows the system to recuperate from security breaches without requiring human intervention.
- Provide Human Oversight: While automation is crucial for promptly addressing cyber threats, the OPA also incorporates measures for human oversight. Critical decisions, such as significant system reconfigurations or the implementation of specific countermeasures, as well as decisions on security investments based on the allocated budget, can be reviewed and approved by humans, thus maintaining a balance between automation and control.
- Identifying security and safety requirements.
- Designing and implementing the OPA to meet these requirements.
- Validating the system’s ability to detect and respond to cyber threats in real time.
2. State of the Art
3. Open (Sub-)Challenges
3.1. Transversal Challenges
3.2. Monitoring Challenges
- CH1: White-box and black-box assessment: Distinguishing between white-box and black-box assessment processes is paramount. The objective is to gather internal execution data (white-box) from critical infrastructure components without delving into their source code structure (black-box). This methodology promotes transparency and facilitates the evaluation of both functional and non-functional properties, all while maintaining alignment with the principles of loose coupling and implementation neutrality.
- CH2: Data collection vs. data management: It is crucial to differentiate monitoring data collection features from those necessary for knowledge management and validation. This distinction is vital for smart collection classification and prediction, assisting in development and assessment activities. By clearly delineating these aspects, the monitor can enhance its ability to categorize and predict data effectively, contributing to a more innovative and informed approach to development and assessment tasks.
- CH3: Managing countermeasures: The knowledge management process enables the customization of manual or automatic countermeasures tailored to risk analysis results. This flexibility empowers the mitigation of vulnerability detection risks during monitoring activities. By incorporating this capability, the system gains the advantage of adapting countermeasures in response to the identified risks, enhancing overall security measures.
3.3. Detection Challenges
3.4. Mitigation Challenges
- The abstract firewall model consists of a singular list of rules, which are sequentially examined against certain fields of the packet header until a match is found with a rule that specifies an action of ACCEPT or DROP. In contrast, IPTABLES evaluates packets against a more complex framework of rule lists organized into chains and tables [48], following a specific pathway deeply outlined in [62], where the Packet Flow in Netfilter and Generale Networking’s well-known diagram depicts all paths foreseen for a packet entering an IPTABLES firewall. In general, the chosen path depends on the source and destination IP addresses: whether the packet originates from outside or from the firewall itself, and whether the recipient is external or the firewall itself. On the other hand, the mitigation challenge proposed here shall only deal with packets originating from outside the firewall, and whose recipient is external. For this reason, Figure 2 only shows the packets’ path of interest for us through the packet processing diagram (PPD), a subset of that which is depicted in [62]. In particular, each element of the flow followed by a packet entering an IPTABLES firewall is a sequence of rules belonging to the chain whose name is prefixed by C: and contained in the table listed in the name that is prefixed by T:. The two elements outlined by the red line highlight the sequence of rules which will be addressed by the mitigation challenge proposed here.
- The abstract firewall model operates on the assumption that only the packet header fields are compared to each rule, meaning that it acts as a stateless firewall. On the other hand, IPTABLES supports more advanced checks, such as determining whether the packet is part of an established connection, and can enact actions that alter the netfilter status that has already been assessed.
4. Reference Architecture
Target System Requirements
- (Open Source) Virtualization Technology aimed at supporting effective system and service isolation;
- (Well-Defined) Semantic introspection capabilities (i.e., the possibility of being able to understand the inner structure and workings of the components);
- (Restricted/Protected Access) Computing environments such as kernel-based (e.g., eBPF) or CPU-assisted ones (e.g., Enclaves/ringlevels).
- Obtain raw network data captured either at the network or host level (i.e., in the form of PCAP packet capture files for offline analysis, or to access live raw PCAP data);
- Provide the possibility to generate legitimate traffic, as well as to perpetrate attacks on the network, for implementation and testing activities.
- It is possible to represent user actions as a series of sequential events. For example, these sequences can be mapped using characteristics extracted from deep/machine learning (D/ML) models by fitting them to the user’s typical behavior since event sequence patterns present usual, accurate, and readable trends of the user behavior.
- It is possible to make use of suitable classification approaches to distinguish between normal and unusual behavior to identify possible attacks through DL or XAI methodologies.
- Runtime performance of each firewall;
- Configuration of each firewall;
- System topology, in order to know all cascaded firewalls to be loaded with (a part of) the traffic causing unacceptable overloading of a certain firewall.
- Some kind of monitoring, relying on the time needed by packets to cross firewalls. In this case, some additional hardware equipment or features are needed, e.g., packet time stamping. Another way can be through taking into account the (average) length of the firewall internal queue of messages waiting for processing in a suitable time window. In both cases, a detection alert shall be raised when some threshold is reached.
- Firewall configurations are both downloaded and uploaded.
- System topology is stored in a suitable repository, but this cannot be enough for systems whose configurations can change quickly. In this case, automatic techniques that are able to keep the system aligned and its description (model) should be available.
5. Proposed Approaches and Solutions
- Explain the implementation of a specific architecture component and discuss in detail its features, challenges, and peculiarities.
- Showcase the adaptability and flexibility of the proposed architecture to the different application domains, HW/SW components, and systems.
- Showcase the integration of additional components and tools to leverage the overall features of the proposed architecture.
5.1. Instantiating the Monitoring Component
5.1.1. Mobile Control Panel
- Control Interface: It allows us to monitor and control the motion of machines. This interface includes hardware components such as touchscreens, buttons, and software for user-friendly usage and visualization.
- PLC (Programmable Logic Controller): It is the component that executes programmed instructions based on input signals and predefined logic.
- Motion Controllers: They translate commands from the PLC into precise movements for the connected machines; therefore, they are responsible for regulating speed, acceleration, and deceleration to ensure smooth operation.
- Sensors: Different sensors (such as proximity sensors, encoders, and vision systems) are used to monitor the system or enable (reaction) activity, such as to adjust machine movements. Sometimes, a sensor gateway can aggregate or transmit data from multiple sensors, acting as a bridge between sensors and the broader network infrastructure.
- Communication Protocols: Specific communication protocols can be used to exchange data with other machines or systems. Sometimes, a Message Broker can simplify communication or ensure reliable and scalable message delivery across heterogeneous systems.
- Lack of Authentication and Authorization: Weaknesses in access control systems could provide unwanted users access to critical features. Attackers could be able to take over the machinery in the absence of adequate identification and authorization procedures, which might cause production interruptions or safety risks.
- Insecure Communication Protocols: Without proper encryption or authentication, the communication protocols or Message Broker can open the path to illegal command injection, data manipulation, and eavesdropping by network-acquired attackers.
- Insufficient Firmware Security: Firmware vulnerabilities or backdoors could be exploited to gain unauthorized access to the panel’s functionalities and compromise the entire safety of the system.
- Lack of Security Updates: Regular security updates or patches are the most effective way to avoid system vulnerability and malware attacks.
- Physical Access: If not controlled, physical access can bypass security controls or directly manipulate the control panel to disrupt production or cause damage.
- Inadequate Network Segmentation: A breach in one part of the networks could potentially compromise the control panels and vice versa.
- Supply Chain Risks: Supply chain attacks can introduce malware, backdoors, or other security vulnerabilities into the manufacturing environment, compromising integrity and security.
- Human Factors: Insider threats or unintentional actions by employees, such as negligent handling of credentials, failure to follow security protocols, or falling victim to social engineering attacks, can also be exposed to cybersecurity risks.
- Legacy Systems: Outdated or unsupported software, making them more susceptible to exploitation due to the lack of security updates and patches.
- Lack of Security Awareness: Insufficient training and awareness regarding the best practices of cybersecurity can lead to inadvertent actions compromising the security of motion control panels.
5.1.2. Monitoring Component
- Access Control Engine manages the Mobile Control Panel access and enforces specific security policies defined by the Business Managers and Administrators. This component interacts with the monitoring component to send the proper authorization decision.
- Monitoring provides a dynamic and flexible solution to transparent access control network execution or a specific sensor. It works in synergy with the Reaction component for sending notifications to specific security or performance constraints in case of violations. Such constraints are not mandatorily specified at system startup. Still, they can be automatically set via the rule engines at runtime by injecting new rules on the event processors. The monitoring component is responsible for the motion control panel, the complex event processing, and for the Access Control Engine, actuators, and sensors. It is also able to manage the generation of access control request.
- A Firewall and Message Broker: This component collaborates with the monitoring by collecting performance and traffic figures to detect anomalies that can be mitigated by reconfiguring in real-time (parts of) the TS, e.g., active network devices in particular, like firewalls, as thoroughly addressed in Section Firewall Reconfiguration.
- Scenario 1: Each employee can use the Mobile Control Panel only during business hours (from 8 a.m. to 8 p.m.);
- Scenario 2: Only an authorized employee can update the Mobile Control Panel firmware during business hours;
- Scenario 3: The supervisor can access the Mobile Control Panel anytime.
5.2. Instantiating the Detection Component
5.2.1. Machine Learning-Based Detection
5.2.2. ROS Testbed
5.3. Instantiating the Reaction Component
Firewall Reconfiguration
5.4. Financial Perspective
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Langner, R. Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Secur. Priv. 2011, 9, 49–51. [Google Scholar] [CrossRef]
- Chen, T.M. Stuxnet, the real start of cyber warfare? [Editor’s Note]. IEEE Netw. 2010, 24, 2–3. [Google Scholar] [CrossRef]
- Pratama, I.P.A.E. Tcp syn flood (dos) attack prevention using spi method on csf: A poc. Bull. Comput. Sci. Electr. Eng. 2020, 1, 63–72. [Google Scholar] [CrossRef]
- Cambiaso, E.; Papaleo, G.; Chiola, G.; Aiello, M. Slow DoS attacks: Definition and categorisation. Int. J. Trust. Manag. Comput. Commun. 2013, 1, 300–319. [Google Scholar] [CrossRef]
- Vaccari, I.; Aiello, M.; Cambiaso, E. Slowtt: A slow denial of service against iot networks. Information 2020, 11, 452. [Google Scholar] [CrossRef]
- Papaleo, G.; Cambiaso, E.; Farina, P.; Aiello, M. Perpetrate network attacks from mobile devices. In Proceedings of the 2015 Seventh International Conference on Ubiquitous and Future Networks, Sapporo, Japan, 7–10 July 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 597–602. [Google Scholar]
- Henzinger, T.A.; Karimi, M.; Kueffner, K.; Mallik, K. Runtime Monitoring of Dynamic Fairness Properties. In Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency, FAccT 2023, Chicago, IL, USA, 12–15 June 2023; ACM: New York, NY, USA, 2023; pp. 604–614. [Google Scholar] [CrossRef]
- Vierhauser, M.; Egyed, A. Runtime Monitoring for Systems of System. In Digital Transformation: Core Technologies and Emerging Topics from a Computer Science Perspective; Springer: Berlin/Heidelberg, Germany, 2023; p. 203. [Google Scholar]
- Barsocchi, P.; Calabrò, A.; Ferro, E.; Gennaro, C.; Marchetti, E.; Vairo, C. Boosting a Low-Cost Smart Home Environment with Usage and Access Control Rules. Sensors 2018, 18, 1886. [Google Scholar] [CrossRef]
- de Freitas Bezerra, D.; de Medeiros, V.W.C.; Gonçalves, G.E. Towards a control-as-a-service architecture for smart environments. Simul. Model. Pract. Theory 2021, 107, 102194. [Google Scholar] [CrossRef]
- Aceto, L.; Achilleos, A.; Attard, D.P.; Exibard, L.; Francalanza, A.; Ingólfsdóttir, A. A Monitoring Tool for Linear-Time μ HML. In Proceedings of the Coordination Models and Languages: 24th IFIP WG 6.1 International Conference, COORDINATION 2022, Held as Part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022, Lucca, Italy, 13–17 June 2022; Springer: Berlin/Heidelberg, Germany, 2022; pp. 200–219. [Google Scholar]
- Attard, D.P.; Aceto, L.; Achilleos, A.; Francalanza, A.; Ingólfsdóttir, A.; Lehtinen, K. Better late than never or: Verifying asynchronous components at runtime. In Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems: 41st IFIP WG 6.1 International Conference, FORTE 2021, Held as Part of the 16th International Federated Conference on Distributed Computing Techniques, DisCoTec 2021, Valletta, Malta, 14–18 June 2021; Springer: Berlin/Heidelberg, Germany, 2021; pp. 207–225. [Google Scholar]
- Ackermann, C.; Lindvall, M.; Cleaveland, R. Towards Behavioral Reflexion Models. In Proceedings of the ISSRE 2009, 20th International Symposium on Software Reliability Engineering, Mysuru, Karnataka, India, 16–19 November 2009; IEEE Computer Society: Piscataway, NJ, USA, 2009; pp. 175–184. [Google Scholar] [CrossRef]
- Wendehals, L.; Orso, A. Recognizing Behavioral Patterns Atruntime Using Finite Automata. In Proceedings of the 2006 International Workshop on Dynamic Systems Analysis, WODA ’06, Shanghai, China, 23 May 2006; pp. 33–40. [Google Scholar] [CrossRef]
- Leenen, L.; Meyer, T.A. Artificial Intelligence and Big Data Analytics in Support of Cyber Defense. In Developments in Information Security and Cybernetic Wars; IGI Global: Hershey, PA, USA, 2019. [Google Scholar]
- Mothukuri, V.; Khare, P.; Parizi, R.M.; Pouriyeh, S.; Dehghantanha, A.; Srivastava, G. Federated learning-based anomaly detection for IoT security attacks. IEEE Internet Things J. 2021, 9, 2545–2554. [Google Scholar] [CrossRef]
- Hussain, F.; Hussain, R.; Hassan, S.A.; Hossain, E. Machine Learning in IoT Security: Current Solutions and Future Challenges. IEEE Commun. Surveys Tuts. 2020, 22, 1686–1721. [Google Scholar] [CrossRef]
- Samek, W.; Montavon, G.; Lapuschkin, S.; Anders, C.J.; Müller, K.R. Explaining deep neural networks and beyond: A review of methods and applications. Proc. IEEE 2021, 109, 247–278. [Google Scholar] [CrossRef]
- Carvalho, D.V.; Pereira, E.M.; Cardoso, J.S. Machine Learning Interpretability: A Survey on Methods and Metrics. Electronics 2019, 8, 832. [Google Scholar] [CrossRef]
- Doshi-Velez, F.; Kim, B. Towards A Rigorous Science of Interpretable Machine Learning. arXiv 2017. [Google Scholar] [CrossRef]
- Gabbrielli, M.; Martini, S. Abstract Machines. In Programming Languages: Principles and Paradigms; Undergraduate Topics in Computer Science ((UTICS)); Springer International Publishing: Cham, Switzerland, 2023; Chapter 1; pp. 1–24. [Google Scholar] [CrossRef]
- Di Pietro, R.; Lombardi, F. Security for Cloud Computing; Artec House: Boston, MA, USA, 2015; ISBN 978-1-60807-989-6. [Google Scholar]
- Baiardi, F.; Sgandurra, D. Building Trustworthy Intrusion Detection through VM Introspection. In Proceedings of the Third International Symposium on Information Assurance and Security, Manchester, UK, 29–31 August 2007; pp. 209–214. [Google Scholar] [CrossRef]
- Amit, N.; Wei, M. The Design and Implementation of Hyperupcalls. In Proceedings of the 2018 USENIX Annual Technical Conference (USENIX ATC 18), Boston, MA, USA, 11–13 July 2018; pp. 97–112. [Google Scholar]
- Sentanoe, S.; Dangl, T.; Reiser, H.P. KVMIveggur: Flexible, secure, and efficient support for self-service virtual machine introspection. Proceedings of the Twenty-Second Annual DFRWS USA. Forensic Sci. Int. Digit. Investig. 2022, 42, 301397. [Google Scholar] [CrossRef]
- Partridge, C.; Mitchell, A.; Cook, A.; Sullivan, J.; West, M. A Survey of Top-Level Ontologies—To Inform the Ontological Choices for a Foundation Data Model; CDBB: Cambridge, UK, 2020. [Google Scholar] [CrossRef]
- Lynch, K.; Ramsey, R.; Ball, G.; Schmit, M.; Collins, K. Conceptual design acceleration for cyber-physical systems. In Proceedings of the 2017 Annual IEEE International Systems Conference (SysCon), Montreal, QC, Canada, 24–27 April 2017; pp. 1–6. [Google Scholar] [CrossRef]
- McCallam, D.H. An Analysis of Cyber Reference Architectures; Technical Report STO-EN-IST-170, NATO Science and Technology Organization. 2019. Available online: https://www.sto.nato.int/publications/STO%20Educational%20Notes/STO-EN-IST-170/EN-IST-170-09.pdf (accessed on 8 November 2024).
- DoD. Department of Defense Cybersecurity Reference Architecture. 2023. Available online: https://dodcio.defense.gov/Portals/0/Documents/Library/CS-Ref-Architecture.pdf (accessed on 8 November 2024).
- Mpekoa, N. An Analysis of Cybersecurity Architectures. Int. Conf. Cyber Warf. Secur. 2024, 19, 200–207. [Google Scholar] [CrossRef]
- Pleshakova, E.; Osipov, A.; Gataullin, S.; Gataullin, T.; Vasilakos, A. Next gen cybersecurity paradigm towards artificial general intelligence: Russian market challenges and future global technological trends. J. Comput. Virol. Hacking Tech. 2024, 20, 429–440. [Google Scholar] [CrossRef]
- Dacorogna, M.; Marie, K. Managing cyber risk, a science in the making. Scand. Actuar. J. 2023, 10, 1000–1021. [Google Scholar] [CrossRef]
- Böhme, R.; Thomas, N. Dependability Metrics: Advanced Lectures; Chapter Economic Security Metrics; Springer: Berlin/Heidelberg, Germany, 2008; pp. 176–187. [Google Scholar]
- Orlando, A. Cyber Risk Quantification: Investigating the Role of Cyber Value at Risk. Risks 2021, 9, 184. [Google Scholar] [CrossRef]
- Thareem, Y.; Azka, A.; Haider, A.; Muhammed, F.A.; Narmeen, S. Framework for calculating return on security investment (ROSI) for security-oriented organizations. Future Gener. Comput. Syst. 2019, 95, 754–763. [Google Scholar] [CrossRef]
- Marotta, A.; Martinelli, F.; Nanni, S.; Orlando, A.; Yautsiukhin, A. Cyber-insurance survey. Comput. Sci. Rev. 2017, 24, 35–61. [Google Scholar] [CrossRef]
- Tsohou, A.; Diamantopoilou, V.; Gritzalis, S.; Lambrinoudakis, C. Cyber insurance: State of the art, trends and future directions. Int. J. Inf. Secur. 2023, 22, 737–748. [Google Scholar] [CrossRef]
- Scarfone, K.; Hofman, P. Guidelines on Firewalls and Firewall Policy; NIST SP 800-41 Rev. 1; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2009. [CrossRef]
- Mohan, R.; Yazidi, A.; Feng, B.; Oommen, B.J. On optimizing firewall performance in dynamic networks by invoking a novel swapping window—Based paradigm. Int. J. Commun. Syst. 2018, 31, e3773. [Google Scholar] [CrossRef]
- Harada, T.; Tanaka, K.; Mikawa, K. A Heuristic Algorithm for Relaxed Optimal Rule Ordering Problem. In Proceedings of the 2nd Cyber Security in Networking Conference (CSNet), Paris, France, 24–26 October 2018; pp. 1–8. [Google Scholar] [CrossRef]
- Jabal, A.A.; Davari, M.; Bertino, E.; Makaya, C.; Calo, S.; Verma, D.; Russo, A.; Williams, C. Methods and Tools for Policy Analysis. ACM Comput. Surv. 2019, 51, 1–35. [Google Scholar] [CrossRef]
- Bodei, C.; Ceragioli, L.; Degano, P.; Focardi, R.; Galletta, L.; Luccio, F.; Tempesta, M.; Veronese, L. FWS: Analyzing, maintaining and transcompiling firewalls. J. Comp. Sec. 2021, 29, 77–134. [Google Scholar] [CrossRef]
- Daly, J.; Liu, A.X.; Torng, E. A Difference Resolution Approach to Compressing Access Control Lists. IEEE/ACM Trans. Netw. 2016, 24, 610–623. [Google Scholar] [CrossRef]
- Hadjadj, T.E.; Tebourbi, R.; Bouhoula, A.; Ksantini, R. Optimization of Parallel Firewalls Filtering Rules. In Proceedings of the International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 19–21 September 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Bagheri, S.; Shameli-Sendi, A. Dynamic Firewall Decomposition and Composition in the Cloud. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3526–3539. [Google Scholar] [CrossRef]
- Durante, L.; Seno, L.; Valenzano, A. A Formal Model and Technique to Redistribute the Packet Filtering Load in Multiple Firewall Networks. IEEE Trans. Inf. Forensics Secur. 2021, 16, 2637–2651. [Google Scholar] [CrossRef]
- Al-Shaer, E.; Hamed, H.; Boutaba, R.; Hasan, M. Conflict Classification and Analysis of Distributed Firewall Policies. IEEE J. Sel. Areas Commun. 2005, 23, 2069–2084. [Google Scholar] [CrossRef]
- The Netfilter Core Team. The netfilter.org “iptables” Project. 1999–2021. Available online: https://www.netfilter.org/projects/iptables/index.html (accessed on 8 November 2024).
- Biener, C.; Eling, M.; Wirfs, J.H. Insurability of cyber risk: An empirical analysis. Geneva Pap. Risk Insur.—Issues Pract. 2015, 40, 131–158. [Google Scholar] [CrossRef]
- OECD. Enhancing the Availability of Data for Cyber Insurance Underwriting, The Role of Public Policy and Regulation; OECD: Paris, France, 2020; Available online: https://web-archive.oecd.org/2020-08-18/546625-Enhancing-the-Availability-of-Data-for-Cyber-Insurance-Underwriting.pdf (accessed on 8 November 2024).
- OECD. Types of Cyber Incidents and Losses; OECD: Paris, France, 2017. [Google Scholar] [CrossRef]
- Böhme, R. Security Metrics and Security Investment Models. In Proceedings of the Advances in Information and Computer Security. IWSEC 2010. Lecture Notes in Computer Science, Kobe, Japan, 22–24 November 2010; Springer: Berlin, Germany, 2010. [Google Scholar]
- Skeoch, H. Expanding the Gordon-Loeb model to cyber-insurance. Comput. Secur. 2022, 112, 102533. [Google Scholar] [CrossRef]
- Sung, M.; Olivier, P.; Lankes, S.; Ravindran, B. Intra-unikernel isolation with Intel memory protection keys. In Proceedings of the 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE ’20, Lausanne, Switzerland, 17 March 2020; pp. 143–156. [Google Scholar] [CrossRef]
- Reed, A.; Dooley, L.S.; Mostefaoui, S.K. A reliable real-time slow DoS detection framework for resource-constrained IoT networks. In Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 7–11 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–6. [Google Scholar]
- Gaggero, M.; Di Paola, D.; Petitti, A.; Caviglione, L. When time matters: Predictive mission planning in cyber-physical scenarios. IEEE Access 2019, 7, 11246–11257. [Google Scholar] [CrossRef]
- Aiello, M.; Papaleo, G.; Cambiaso, E. SlowReq: A weapon for cyberwarfare operations. Characteristics, limits, performance, remediations. In Proceedings of the International Joint Conference SOCO’13-CISIS’13-ICEUTE’13, Salamanca, Spain, 11–13 September 2013; Springer: Berlin/Heidelberg, Germany, 2014; pp. 537–546. [Google Scholar]
- Yu, S.; Zhou, W.; Jia, W.; Guo, S.; Xiang, Y.; Tang, F. Discriminating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Trans. Parallel Distrib. Syst. 2011, 23, 1073–1080. [Google Scholar] [CrossRef]
- Sikora, M.; Gerlich, T.; Malina, L. On detection and mitigation of slow rate denial of service attacks. In Proceedings of the 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Dublin, Ireland, 28–30 October 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–5. [Google Scholar]
- Cambiaso, E.; Papaleo, G.; Aiello, M. Implementation of SlowDroid: Slow DoS Attack Performed by a Smartphone. Int. J. Comput. Digit. Syst. 2015, 4, 165–173. [Google Scholar] [CrossRef] [PubMed]
- Hamed, H.; Al-Shaer, E. Dynamic Rule-Ordering Optimization for High-Speed Firewall Filtering. In Proceedings of the ACM Symp. on Information, Computer and Communications Security (ASIACCS), Taipei, Taiwan, 21–24 March 2006; pp. 332–342. [Google Scholar] [CrossRef]
- Wikipedia. Netfilter—Wikipedia, The Free Encyclopedia. 2024. Available online: http://en.wikipedia.org/w/index.php?title=Netfilter&oldid=1232791514 (accessed on 22 October 2024).
- Costa, G.; Forestiero, A.; Ortale, R. Rule-Based Detection of Anomalous Patterns in Device Behavior for Explainable IoT Security. IEEE Trans. Serv. Comput. 2023, 16, 4514–4525. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Calabrò, A.; Cambiaso, E.; Cheminod, M.; Bertolotti, I.C.; Durante, L.; Forestiero, A.; Lombardi, F.; Manco, G.; Marchetti, E.; Orlando, A.; et al. A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures. Future Internet 2024, 16, 418. https://doi.org/10.3390/fi16110418
Calabrò A, Cambiaso E, Cheminod M, Bertolotti IC, Durante L, Forestiero A, Lombardi F, Manco G, Marchetti E, Orlando A, et al. A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures. Future Internet. 2024; 16(11):418. https://doi.org/10.3390/fi16110418
Chicago/Turabian StyleCalabrò, Antonello, Enrico Cambiaso, Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Agostino Forestiero, Flavio Lombardi, Giuseppe Manco, Eda Marchetti, Albina Orlando, and et al. 2024. "A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures" Future Internet 16, no. 11: 418. https://doi.org/10.3390/fi16110418
APA StyleCalabrò, A., Cambiaso, E., Cheminod, M., Bertolotti, I. C., Durante, L., Forestiero, A., Lombardi, F., Manco, G., Marchetti, E., Orlando, A., & Papuzzo, G. (2024). A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures. Future Internet, 16(11), 418. https://doi.org/10.3390/fi16110418