Handbook on Securing Cyber-Physical Critical Infrastructure.

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing c...

Full description

Saved in:
Bibliographic Details
Online Access: Full text (MCPHS users only)
Main Author: Das, Sajal K.
Other Authors: Kant, Krishna, Zhang, Nan
Format: Electronic eBook
Language:English
Published: Burlington : Elsevier Science, 2012
Subjects:
Local Note:ProQuest Ebook Central
Table of Contents:
  • Front Cover; Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges; Copyright; Dedication; About the Authors; Table of Contents; Contributors; Foreword; Securing Cyber-Physical Infrastructure: Perspectives and Overview of the Handbook; I-1 Introduction; I-2 Scope of the Handbook; I-3 Overview of the Handbook; I-3.1 Part I: Theoretical Foundations; I-3.2 Part II: Security for Wireless Mobile Networks; I-3.3 Part III: Security for Sensor Networks; I-3.4 Part IV: Platform Security; I-3.5 Part V: Cloud Computing and Data Security.
  • I-3.6 Part VI: Event Monitoring and Situation AwarenessI-3.7 Part VII: Policy Issues in Security Management; I-3.8 Part VIII: Security Issues in Real-World Systems; I-4 How to Use The Handbook; I-4.1 Advanced Undergraduate or Graduate Course; I-4.2 A Training Course; Acknowledgements; I Theoretical Foundations; References; 1 Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-TheoreticApproach; 1.1 Introduction; 1.2 Definitions for Security and Vulnerability of Network Dynamics; 1.2.1 Review: Differential Equation Models for Infrastructure Networks.
  • 1.2.2 Defining Security Measures for the Dynamical Network Example1.2.3 Definitions of Vulnerability for Infrastructure Network Dynamics; A Model for Attacks; Measuring the Impact of Attacks; Defining Vulnerability; 1.2.4 Integrated Analysis: Prevention, Attack, and Mitigation Together; Scenario 1: Attack Design by Adversaries; Scenario 2: Prevention of Large-Impact Attacks; Scenario 3: Attack Detection/Mitigation and Stealth; 1.2.5 An Illustrative Example; 1.3 Network Control Tools for Characterizing and Designing Security and Vulnerability; 1.3.1 Tools for Network Inference.
  • Initial-Condition Estimation on a Laplacian Network SystemSteady-State Probability Estimation for an Ergodic Markov Chain; Spectrum Estimation in a Laplacian Network; 1.3.2 Tools for Modeling Environmental Uncertainties; 1.3.3 Graph-Theoretic Tools for Network Control and Design; 1.3.4 Tools for Control-Theoretic Feature-Based Partitioning; 1.4 Conclusions and Future Work; Exercises; References; 2 Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Models; 2.1 Introduction; 2.1.1 Motivation in Anomaly Detection; 2.1.2 Motivation in Anonymous Communication Systems.
  • 2.1.3 Technical ResultsAnomaly Detection; Anonymous Communication Systems; 2.2 Preliminaries; 2.2.1 Game Theory Basics; Overview; Model of Intent: Utility Function (Payoff); Nash Equilibrium; Taxonomy of Games; Strategic Game; Extensive Game; 2.2.2 Anomaly Detection Basics; 2.2.3 Anonymous Communication Basics; 2.3 Intent-based Adversary Model for Anomaly Detection; 2.3.1 An Intent-Based View of Participating Parties: Smart Insiders, Naïve Attackers, and the Defender; Smart Insiders; Naïve Attackers; Defender; 2.3.2 Formal Game-Theoretic Formulation; Defender's Reputation.