Reasoning about vulnerabilities in dependent information infrastructures: A cyber range experiment

1Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Malice aside, even the pursuit of legitimate local goals such as cost minimisation, availability, and resilience in subsystems of a critical information infrastructure (CII) can induce subtle dynamic behaviours and dependencies that endanger higher-level goals and security of services. However, in practice, the subsystems of a CII may not be entirely cooperative, potentially having different and perhaps conflicting management goals; and some subsystems may be malicious or untrustworthy. Consequently, vulnerabilities may arise accidentally or deliberately through the dependency on subsystems with conflicting goals, or systems which might contain potentially rogue elements. We have developed an analytical framework for reasoning about vulnerabilities and risks in dependent critical infrastructure. To validate the analytical framework we have carried out a series of experiments on a Cyber Range facility, simulating dependent information infrastructures. This paper presents results obtained from the experiments. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Adetoye, A. O., Creese, S., & Goldsmith, M. H. (2013). Reasoning about vulnerabilities in dependent information infrastructures: A cyber range experiment. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7722 LNCS, pp. 155–167). https://doi.org/10.1007/978-3-642-41485-5_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free