WorldWideScience

Sample records for attacking critical infrastructure

  1. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  2. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  3. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  4. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical

  5. Protecting Critical Assets and Infrastructure from Cyber Attacks

    Directory of Open Access Journals (Sweden)

    Gabi Siboni

    2011-05-01

    Full Text Available The impact of computer and communications systems in recent decades has not bypassed the national security of states in general, and the State of Israel in particular. Most systems in developed societies rely on computer and information infrastructures, and this growing dependence on information and communication technologies means that a blow to computers and information flow processes is liable to disrupt, paralyze, and sometimes even cause substantive physical damage to essential systems. Computer-based capabilities and their near-global ubiquity expose states to harm in cyberspace by various elements, including hostile countries, terrorist organizations, criminal elements, and even individuals driven by personal challenges or anarchist motives. The threat is particularly acute as management, control, and monitoring systems can be disrupted through changes to a computer program, and no physical attack is needed. Thus, it stands to reason that the face of future conflicts will be transformed beyond recognition.

  6. Critical Infrastructures and their Interdependence in a Cyber Attack - The Case of the U.S.

    Directory of Open Access Journals (Sweden)

    Harel Menashri

    2015-03-01

    Full Text Available The growing use of information technology, monitoring, and control through computerized control systems, together with the increasing dependence of the free market on products and services supplied through infrastructure (for example, electric power, have increased interdependency between infrastructures. Consequently, an attack on critical infrastructure is liable to have a decisive effect on the functioning of other infrastructures. The interdependence between infrastructures requires those involved in planning a cyber-attack as well as those involved in defending from such attacks to adjust to this reality and prepare accordingly. The article describes the existing models for analyzing interdependence between infrastructures, proposes an analytical framework for describing the interdependence and examines the possibilities at the United States’ disposal should it decide to engage in a cyber-attack.

  7. Network information attacks on the control systems of power facilities belonging to the critical infrastructure

    Science.gov (United States)

    Loginov, E. L.; Raikov, A. N.

    2015-04-01

    The most large-scale accidents occurred as a consequence of network information attacks on the control systems of power facilities belonging to the United States' critical infrastructure are analyzed in the context of possibilities available in modern decision support systems. Trends in the development of technologies for inflicting damage to smart grids are formulated. A volume matrix of parameters characterizing attacks on facilities is constructed. A model describing the performance of a critical infrastructure's control system after an attack is developed. The recently adopted measures and legislation acts aimed at achieving more efficient protection of critical infrastructure are considered. Approaches to cognitive modeling and networked expertise of intricate situations for supporting the decision-making process, and to setting up a system of indicators for anticipatory monitoring of critical infrastructure are proposed.

  8. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the

  9. Cyber Attacks: Emerging Threats to the 21st Century Critical Information Infrastructures

    OpenAIRE

    Cezar Vasilescu

    2012-01-01

    The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It starts by elaborating a conceptual theoretical framework, observing that when it comes to cyber attacks, cyber war and cyber defense there are no internationally accepted definitions on the subject, mostly because of the relative recency of the terms. The second part analyzes the cyber realities of recent years, emphasizing the most advertised cyber attacks in the international mass media: Estoni...

  10. Recovery of infrastructure networks after localised attacks

    Science.gov (United States)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  11. Critical infrastructure protection

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, F. [Canadian Electricity Association, Toronto, ON (Canada)

    2003-04-01

    The need to protect critical electrical infrastructure from terrorist attacks, or other physical damage, including weather related events, or the potential impact of computer viruses and other attacks on IT resources are discussed. Activities of the North American Electric Reliability Council (NERC) are highlighted which seek to safeguard the North American bulk electric power system principally through the Information Sharing and Analysis Sector (ES-ISAC). ES-ISAC serves the electricity sector by facilitating communication between electric sector participants, federal government and other critical infrastructure industries by disseminating threat indications, analyses and warnings, together with interpretations, to assist the industry in taking infrastructure protection actions. Attention is drawn to the numerous cyber incidents in recent years, which although resulted in no loss of service to electricity customers so far, in at least one instance (the January 25th SOL-Slammer worm incident) resulted in degradation of service in a number of sectors, including financial, transportation and telecommunication services. The increasing frequency of cyber-based attacks, coupled with the industry's growing dependence on e-commerce and electronic controls, are good reasons to believe that critical infrastructure protection (CIP) poses a serious challenge to the industry's risk management practices. The Canadian Electricity Association (CEA) is an active participant in ES-ISAC and works cooperatively with a range of partners, such as the Edison Electric Institute and the American Public Power Association to ensure coordination and effective protection program delivery for the electric power sector. The Early Warning System (EWS) developed by the CIP Working Group is one of the results of this cooperation. EWS uses the Internet, e-mail, web-enabled cell phones and Blackberry hand-held devices to deliver real-time threat information to members on a 24/7 basis. EWS

  12. An Analysis of IT Governance Practices in the Federal Government: Protecting U.S. Critical Infrastructure from Cyber Terrorist Attacks

    Science.gov (United States)

    Johnson, R. LeWayne

    2012-01-01

    Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country's IT infrastructure. Critics contend that the DHS has failed to address planning and…

  13. Durability of critical infrastructures

    Directory of Open Access Journals (Sweden)

    Raluca Pascu

    2011-08-01

    Full Text Available The paper deals with those infrastructures by which world society, under the pressure ofdemographic explosion, self-survives. The main threatening comes not from terrorist attacks, but fromthe great natural catastrophes and global climate change. It’s not for the first time in history when suchmeasures of self-protection are built up. First objective of this paper is to present the background fordurability analysis. Then, with the aid of these mathematical tools the absolute durability of three linearmodels, typical for critical infrastructures, are successively calculated. In order to enhance the durabilityof critical infrastructures the solution based on redundancies is chosen. Five types of connection theredundancies for each of the three models are considered. Three topological schemes for connecting theredundancies are adopted: locally, by twining and globally. Absolute values of durability in all fifteenmodels with redundancies are further calculated. Then, the relative performances of enhanced durabilityin the same fifteen models, compared with the three original models, considered as references, areanalysed. The relative costs of the same fifteen models and in similar topologic conditions are furtheranalysed. By dividing the performance with cost the relative profitableness of each model is obtained.Finally, the three initial models, each reshaped with redundancies in three selective modes, arecompared from the perspective of their relative profitableness. The outcomes of this paper are original.They are of practical interests in planning the maintenance programs and checking the plausibility ofproposed interventions according to the clause 7.4 of ISO 13822:2001

  14. Cyberspace Policy For Critical Infrastructures

    Science.gov (United States)

    Wilkin, Dorsey; Raines, Richard; Williams, Paul; Hopkinson, Kenneth

    The first step in preparing any battlespace is to define the domain for attack and maneuver. The various military service components have directed authority to focus their efforts in specific domains of operations (e.g., naval operations are mainly in the maritime domain). However, cyberspace operations pose challenges because they span multiple operational domains. This paper focuses on U.S. cyberspace policy related to defending and exploiting critical infrastructure assets. Also, it examines the issues involved in delineating responsibility for U.S. defensive and offensive operations related to critical infrastructures.

  15. Cyberspace and Critical Information Infrastructures

    Directory of Open Access Journals (Sweden)

    Dan COLESNIUC

    2013-01-01

    Full Text Available Every economy of an advanced nation relies on information systems and interconnected networks, thus in order to ensure the prosperity of a nation, making cyberspace a secure place becomes as crucial as securing society. Cyber security means ensuring the safety of this cyberspace from threats which can take different forms, such as stealing secret information from national companies and government institutions, attacking infrastructure vital for the functioning of the nation or attacking the privacy of the single citizen. The critical information infrastructure (CII represents the indispensable "nervous system", that allow modern societies to work and live. Besides, without it, there would be no distribution of energy, no services like banking or finance, no air traffic control and so on. But at the same time, in the development process of CII, security was never considered a top priority and for this reason they are subject to a high risk in relation to the organized crime.

  16. C-SAW: Critical Information Infrastructure Protection through Simplification

    OpenAIRE

    Ellefsen, Ian; Solms, Sebastiaan

    2010-01-01

    The importance of Critical Information Infrastructure Protection (CIIP) cannot be overlooked, as many critical systems utilise information infrastructures in order to operate. However, should these information infrastructures be targeted by cyber attacks, it would severely affect the effectiveness of many of these critical systems. Attacks on information infrastructures are not be limited to a single geographic location, all nations suffer from a collective vulnerability through interconnecti...

  17. Modeling Dependencies in Critical Infrastructures

    NARCIS (Netherlands)

    Nieuwenhuijs, A.H.; Luiijf, H.A.M.; Klaver, M.H.A.

    2009-01-01

    This paper describes a model for expressing critical infrastructure dependencies. The model addresses the limitations of existing approaches with respect to clarity of definition, support for quality and the influence of operating states of critical infrastructures and environmental factors.

  18. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  19. Using traps to protect network infrastructure from intruders’ attacks

    Directory of Open Access Journals (Sweden)

    O. Z. Lavrivska

    2013-12-01

    Full Text Available The article deals with the peculiarities of using traps to protect network infrastructure from intruders’ attacks, which concern the risks of unauthorized intrusion to a network: attacks on a network, its unauthorized research, etc. It has been clarified that Honeypot trap is flexible information technology, which can be applied to prevent attacks, their detection and answer to them. As a means of protection Honeypot-traps have ability to work effectively in the infrastructure network, while collecting small amount of data, however they are of considerable importance for the owners of network.

  20. Research Note on the Energy Infrastructure Attack Database (EIAD

    Directory of Open Access Journals (Sweden)

    Jennifer Giroux

    2013-12-01

    Full Text Available The January 2013 attack on the In Amenas natural gas facility drew international attention. However this attack is part of a portrait of energy infrastructure targeting by non-state actors that spans the globe. Data drawn from the Energy Infrastructure Attack Database (EIAD shows that in the last decade there were, on average, nearly 400 annual attacks carried out by armed non-state actors on energy infrastructure worldwide, a figure that was well under 200 prior to 1999. This data reveals a global picture whereby violent non-state actors target energy infrastructures to air grievances, communicate to governments, impact state economic interests, or capture revenue in the form of hijacking, kidnapping ransoms, theft. And, for politically motivated groups, such as those engaged in insurgencies, attacking industry assets garners media coverage serving as a facilitator for international attention. This research note will introduce EIAD and position its utility within various research areas where the targeting of energy infrastructure, or more broadly energy infrastructure vulnerability, has been addressed, either directly or indirectly. We also provide a snapshot of the initial analysis of the data between 1980-2011, noting specific temporal and spatial trends, and then conclude with a brief discussion on the contribution of EIAD, highlighting future research trajectories. 

  1. Critical infrastructure systems of systems assessment methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Sholander, Peter E.; Darby, John L.; Phelan, James M.; Smith, Bryan; Wyss, Gregory Dane; Walter, Andrew; Varnado, G. Bruce; Depoy, Jennifer Mae

    2006-10-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies that separately consider physical security and cyber security. This research has developed a risk assessment methodology that explicitly accounts for both physical and cyber security, while preserving the traditional security paradigm of detect, delay, and respond. This methodology also accounts for the condition that a facility may be able to recover from or mitigate the impact of a successful attack before serious consequences occur. The methodology uses evidence-based techniques (which are a generalization of probability theory) to evaluate the security posture of the cyber protection systems. Cyber threats are compared against cyber security posture using a category-based approach nested within a path-based analysis to determine the most vulnerable cyber attack path. The methodology summarizes the impact of a blended cyber/physical adversary attack in a conditional risk estimate where the consequence term is scaled by a ''willingness to pay'' avoidance approach.

  2. Vulnerability of critical infrastructures : identifying critical nodes.

    Energy Technology Data Exchange (ETDEWEB)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  3. 78 FR 11737 - Improving Critical Infrastructure Cybersecurity

    Science.gov (United States)

    2013-02-19

    ... of a framework to reduce cyber risks to critical infrastructure (the ``Cybersecurity Framework... that align policy, business, and technological approaches to address cyber risks. The Cybersecurity... operators of critical infrastructure identify, assess, and manage cyber risk. The Cybersecurity...

  4. Protecting Critical Infrastructure by Identifying Pathways of Exposure to Risk

    Directory of Open Access Journals (Sweden)

    Philip O’Neill

    2013-08-01

    Full Text Available Increasingly, our critical infrastructure is managed and controlled by computers and the information networks that connect them. Cyber-terrorists and other malicious actors understand the economic and social impact that a successful attack on these systems could have. While it is imperative that we defend against such attacks, it is equally imperative that we realize how best to react to them. This article presents the strongest-path method of analyzing all potential pathways of exposure to risk – no matter how indirect or circuitous they may be – in a network model of infrastructure and operations. The method makes direct use of expert knowledge about entities and dependency relationships without the need for any simulation or any other models. By using path analysis in a directed graph model of critical infrastructure, planners can model and assess the effects of a potential attack and develop resilient responses.

  5. 31 CFR 800.208 - Critical infrastructure.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Critical infrastructure. 800.208..., AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.208 Critical infrastructure. The term critical infrastructure means, in the context of a particular covered transaction, a system or asset, whether physical...

  6. Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities

    OpenAIRE

    Aniello, L.; Bondavalli, A.; Ceccarelli, A; Ciccotelli, C.; Cinque, M.; Frattini, F. (Federico); Guzzo, A; Pecchia, A.; A. Pugliese; Querzoni, L.; Russo, S.

    2014-01-01

    Critical Infrastructures (CIs), such as smart power grids, transport systems, and financial infrastructures, are more and more vulnerable to cyber threats, due to the adoption of commodity computing facilities. Despite the use of several monitoring tools, recent attacks have proven that current defensive mechanisms for CIs are not effective enough against most advanced threats. In this paper we explore the idea of a framework leveraging multiple data sources to improve protection capabilities...

  7. Networks, deregulation, and risk : the politics of critical infrastructure protection

    OpenAIRE

    Ellis, Ryan Nelson

    2011-01-01

    The dissertation, "Networks, Deregulation, and Risk: The Politics of Critical Infrastructure Protection," engages post-9/11 debates over the role of public policy and novel technologies in crafting and maintaining resilient infrastructure networks against the threat of terrorism. In the wake of the terrorist attacks of 9/11, networks of communication, electric power, and transportation (as well as others) became sites of anxiety, debate, and, ultimately, intervention. The dissertation examine...

  8. Emergent Risks In Critical Infrastructures

    Science.gov (United States)

    Dynes, Scott

    Firms cannot function successfully without managing a host of internal and external organizational and process interdependencies. Part of this involves business continuity planning, which directly aects how resilient arm and its business sector are in the face of disruptions. This paper presents the results of eld studies related to information risk management practices in the health care and retail sectors. The studies explore information risk management coordinating signals within and across rms in these sectors as well as the potential eects of cyber disruptions on the rms as stand-alone entities and as part of a critical infrastructure. The health care case study investigates the impact of the Zotob worm on the ability to deliver medical care and treatment. The retail study examines the resilience of certain elements of the food supply chain to cyber disruptions.

  9. Cyber security deterrence and it protection for critical infrastructures

    CERN Document Server

    Martellini, Maurizio

    2013-01-01

    The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to resil

  10. Protecting National Critical Infrastructure against Radiological Threat

    International Nuclear Information System (INIS)

    National Critical Infrastructure (NCI) such as transportation, water, energy etc., are essential elements in a developed country's economy. As learned after the 9/11 attackxx, a terror attack on these complex system may cause thousands of casualties and significant economic damage. The attack can be a conventional one; like the train bombing in Spainxxi or the bus bombing in Londonxxii, or a non-conventional one; like the Sarin attack on the underground train in Tokyo, Japanxxiii. A radiological attack on a NCI is also feasiblexxiv. This type of attack must be taken into consideration due to the vulnerability of ani infrastructure to such an attack, and the severe economic outcome of itxxv. The radioactive materials that might be used by terrorists were recently identified and categorized in one of the IAEA Nuclear Security Series publicationxxvi,xxvii. The most common and therefore reachable radio nuclides are the gamma emitters 60Co, 137Cs and 192Ir, the beta emitter 90Sr and the alpha emitters 241Pu, 238Pu and 241Am. A radiological event can be any of two principle scenarios. In the first scenario, a radiological dispersion device (RDD) or ôdirtyö bomb is used. This device consists of a radiation source which is detonated using conventional or improvised explosivesxxviii. Most of the casualties in this event will be from the explosion blast wave. However, some people might become contaminated with different levels of radiationxxix, some might need to go through some type of medical screening process and the costs of the total actions might be significantxxx. The second scenario involves a silent dispersion of radioactive material in a public site. In this event, there are no immediate known casualties, and the fact that people were exposed to radioactive material will be discovered only in the uncommon event when symptoms of radiation sickness will be identified due to exposure to high radiation dosexxxi, or if the radioactive material is discovered by a first

  11. Security Economics and Critical National Infrastructure

    Science.gov (United States)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  12. Handbook on Securing Cyber-Physical Critical Infrastructure

    CERN Document Server

    Das, Sajal K; Zhang, Nan

    2012-01-01

    The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports a

  13. EEW Implementation into Critical Infrastructures

    Science.gov (United States)

    Zulfikar, Can; Pinar, Ali

    2016-04-01

    In FP7 MARsite project WP9, the integration algorithm of existing strong motion networks with the critical infrastructures strong motion networks have been studied. In Istanbul, the existing Istanbul Earthquake Early Warning (IEEW) strong motion network consists of 15 stations including 10 on land and 5 ocean bottom stations. The system provides continuous online data and earthquake early warning alert depending on the exceedance of the threshold levels in ground motion acceleration in certain number of station within the certain time interval. The data transmission is provided through the fiber optic cable and satellite line alternatively. The early warning alert is transmitted to the critical infrastructures of Istanbul Natural Gas distribution line and Marmaray Tube Tunnel line in order to activate the local strong motion networks for the automatic shut-off mechanism. Istanbul Natural Gas distribution line has 1.800km steel and 15.200km polyethylene in total 18.000km gas pipeline in Istanbul. There are in total 750 district regulators in the city where the gas pressure is reduced from 20bar to 4bar and from there the gas is transmitted with polyethylene lines to service boxes. Currently, Istanbul Natural Gas Distribution Company (IGDAS) has its own strong motion network with 110 strong motion stations installed at the 110 of 750 district regulators. Once the IGDAS strong motion network is activated by the IEEW network, depending on the exceedance of the ground motion parameters threshold levels the gas flow is stopped at the district regulators. Other than the Earthquake Early Warning operation in IGDAS strong motion network, having the calculated ground motion parameters in the network provides damage maps for the buildings and natural gas pipeline network. The Marmaray Tube Tunnel connects the Europe and Asian sides of Istanbul City by a rail line. The tunnel is 1.4km length and consists of 13segments. There is strong motion monitoring network in the tunnel

  14. After the year 2000: Critical infrastructure protection

    International Nuclear Information System (INIS)

    Presentation defines the critical infrastructure which includes: telecommunication, banking, transportation, electric energy, oil and gas supply, water supply, emergency services and government operations. The problem of protecting the critical infrastructure is is exposed in detail concerning physical protection and protection of information systems against cyberthreats

  15. Network Randomization and Dynamic Defense for Critical Infrastructure Systems

    Energy Technology Data Exchange (ETDEWEB)

    Chavez, Adrian R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Mitchell Tyler [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hamlet, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Stout, William M.S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lee, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-04-01

    Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and development to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.

  16. Extensible threat taxonomy for critical infrastructures

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Nieuwenhuijs, A.H.

    2008-01-01

    The European Union-sponsored project Vital Infrastructure Threats and Assurance (VITA) has the objective of exploring and showing new paths in Critical Infrastructure Protection (CIP) R&D. This paper describes one of VITA’s results: the idea and the development of a novel extensible and generic thre

  17. 77 FR 32655 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Science.gov (United States)

    2012-06-01

    ... protection security measures, incident response, recovery, infrastructure resilience; reconstituting critical..., vulnerability, risk mitigation, and infrastructure continuity information. Organizational Structure:...

  18. Decontamination of Anthrax spores in critical infrastructure and critical assets.

    Energy Technology Data Exchange (ETDEWEB)

    Boucher, Raymond M.; Crown, Kevin K.; Tucker, Mark David; Hankins, Matthew Granholm

    2010-05-01

    Decontamination of anthrax spores in critical infrastructure (e.g., subway systems, major airports) and critical assets (e.g., the interior of aircraft) can be challenging because effective decontaminants can damage materials. Current decontamination methods require the use of highly toxic and/or highly corrosive chemical solutions because bacterial spores are very difficult to kill. Bacterial spores such as Bacillus anthracis, the infectious agent of anthrax, are one of the most resistant forms of life and are several orders of magnitude more difficult to kill than their associated vegetative cells. Remediation of facilities and other spaces (e.g., subways, airports, and the interior of aircraft) contaminated with anthrax spores currently requires highly toxic and corrosive chemicals such as chlorine dioxide gas, vapor- phase hydrogen peroxide, or high-strength bleach, typically requiring complex deployment methods. We have developed a non-toxic, non-corrosive decontamination method to kill highly resistant bacterial spores in critical infrastructure and critical assets. A chemical solution that triggers the germination process in bacterial spores and causes those spores to rapidly and completely change to much less-resistant vegetative cells that can be easily killed. Vegetative cells are then exposed to mild chemicals (e.g., low concentrations of hydrogen peroxide, quaternary ammonium compounds, alcohols, aldehydes, etc.) or natural elements (e.g., heat, humidity, ultraviolet light, etc.) for complete and rapid kill. Our process employs a novel germination solution consisting of low-cost, non-toxic and non-corrosive chemicals. We are testing both direct surface application and aerosol delivery of the solutions. A key Homeland Security need is to develop the capability to rapidly recover from an attack utilizing biological warfare agents. This project will provide the capability to rapidly and safely decontaminate critical facilities and assets to return them to

  19. CRITICAL INFRASTRUCTURE PROTECTION WITHIN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Vasile N. POPA

    2013-01-01

    Full Text Available The new dynamics and intensity of the risks and threats posed to societal functioning and citizens’ security have acquired new meanings. Consequently, an integrated approach to the concept of ”critical infrastructure” is necessary. The critical nature of some of the basic characteristics of the critical infrastructures has made them acquire new meanings within the national/transnational strategic planning. Moreover, the complexity and importance of critical infrastructure protection for social stability have generated the correlaton of the strategies developed by states and organizations.

  20. 76 FR 20995 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Science.gov (United States)

    2011-04-14

    ... infrastructure protection security measures, incident response, recovery, infrastructure resilience... sharing threat, vulnerability, risk mitigation, and infrastructure continuity information. Organizational... SECURITY Critical Infrastructure Partnership Advisory Council (CIPAC) AGENCY: National Protection...

  1. 77 FR 64818 - The Critical Infrastructure Partnership Advisory Council

    Science.gov (United States)

    2012-10-23

    ... Infrastructure Partnership Advisory Council (CIPAC) in a Federal Register Notice (71 FR 14930-14933) dated March..., incident response, recovery, and infrastructure resilience; reconstituting critical infrastructure assets..., risk mitigation, and infrastructure continuity information. Organizational Structure: CIPAC members...

  2. 78 FR 16861 - The Critical Infrastructure Partnership Advisory Council

    Science.gov (United States)

    2013-03-19

    ... Infrastructure Partnership Advisory Council (CIPAC) in a Federal Register Notice (71 FR 14930-14933) dated March... response, recovery, and infrastructure resilience; reconstituting critical infrastructure assets and... mitigation, and infrastructure continuity information. Organizational Structure: CIPAC members are...

  3. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Duggan, David Patrick

    2007-09-01

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  4. Spatial risk assessment for critical network infrastructure using sensitivity analysis

    Institute of Scientific and Technical Information of China (English)

    Michael M·derl; Wolfgang Rauch

    2011-01-01

    The presented spatial risk assessment method allows for managing critical network infrastructure in urban areas under abnormal and future conditions caused e.g.,by terrorist attacks,infrastructure deterioration or climate change.For the spatial risk assessment,vulnerability maps for critical network infrastructure are merged with hazard maps for an interfering process.Vulnerability maps are generated using a spatial sensitivity analysis of network transport models to evaluate performance decrease under investigated thread scenarios.Thereby parameters are varied according to the specific impact of a particular threat scenario.Hazard maps are generated with a geographical information system using raster data of the same threat scenario derived from structured interviews and cluster analysis of events in the past.The application of the spatial risk assessment is exemplified by means of a case study for a water supply system,but the principal concept is applicable likewise to other critical network infrastructure.The aim of the approach is to help decision makers in choosing zones for preventive measures.

  5. European risk assessment methodology for critical infrastructures

    NARCIS (Netherlands)

    Klaver, M.H.A.; Luiijf, H.A.M.; Nieuwenhuijs, A.H.; Cavenne, F.; Ulisse, A.; Bridegeman, G.

    2008-01-01

    Most risk assessment methodologies aim at the risk at the level of an individual organization or company. The European Union commissioned a study to define the elements for a uniform and scalable risk assessment methodology which takes into account critical infrastructure dependencies across organiz

  6. A security assessment methodology for critical infrastructures

    NARCIS (Netherlands)

    Caselli, Marco; Kargl, Frank; Hämmerli, Bernhard M.; Lopez, Javier

    2014-01-01

    Interest in security assessment and penetration testing techniques has steadily increased. Likewise, security of industrial control systems (ICS) has become more and more important. Very few methodologies directly target ICS and none of them generalizes the concept of "critical infrastructures pente

  7. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    Science.gov (United States)

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. PMID:25847370

  8. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    Science.gov (United States)

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA. PMID:24457326

  9. 77 FR 32656 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Science.gov (United States)

    2012-06-01

    ... (CIPAC) by notice published in the Federal Register Notice (71 FR 14930-14933) dated March 24, 2006. That..., incident response, recovery, infrastructure resilience, reconstituting critical infrastructure assets and... mitigation, and infrastructure continuity information. Organizational Structure: CIPAC members are...

  10. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  11. OnionBots: Subverting Privacy Infrastructure for Cyber Attacks

    OpenAIRE

    Sanatinia, Amirali; Noubir, Guevara

    2015-01-01

    Over the last decade botnets survived by adopting a sequence of increasingly sophisticated strategies to evade detection and take overs, and to monetize their infrastructure. At the same time, the success of privacy infrastructures such as Tor opened the door to illegal activities, including botnets, ransomware, and a marketplace for drugs and contraband. We contend that the next waves of botnets will extensively subvert privacy infrastructure and cryptographic mechanisms. In this work we pro...

  12. DETERMINANTS OF RISK ASSESSMENT PROCESS IN CRITICAL ENERGY INFRASTRUCTURE

    OpenAIRE

    Przemysław Borkowski

    2016-01-01

    Article deals with the problem of risk assessment in critical energy infrastructure. Firstly the critical infrastructure in energy sector is discussed than risk identification methodology for application to critical infrastructure is proposed. Specific conditions resulting from features of critical infrastructure are addressed in the context of risk assessment procedure. The limits of such a procedure are outlined and critical factors influencing different stages of risk assessment process a...

  13. People at risk - nexus critical infrastructure and society

    Science.gov (United States)

    Heiser, Micha; Thaler, Thomas; Fuchs, Sven

    2016-04-01

    Strategic infrastructure networks include the highly complex and interconnected systems that are so vital to a city or state that any sudden disruption can result in debilitating impacts on human life, the economy and the society as a whole. Recently, various studies have applied complex network-based models to study the performance and vulnerability of infrastructure systems under various types of attacks and hazards - a major part of them is, particularly after the 9/11 incident, related to terrorism attacks. Here, vulnerability is generally defined as the performance drop of an infrastructure system under a given disruptive event. The performance can be measured by different metrics, which correspond to various levels of resilience. In this paper, we will address vulnerability and exposure of critical infrastructure in the Eastern Alps. The Federal State Tyrol is an international transport route and an essential component of the north-south transport connectivity in Europe. Any interruption of the transport flow leads to incommensurable consequences in terms of indirect losses, since the system does not feature redundant elements at comparable economic efficiency. Natural hazard processes such as floods, debris flows, rock falls and avalanches, endanger this infrastructure line, such as large flood events in 2005 or 2012, rock falls 2014, which had strong impacts to the critical infrastructure, such as disruption of the railway lines (in 2005 and 2012), highways and motorways (in 2014). The aim of this paper is to present how critical infrastructures as well as communities and societies are vulnerable and can be resilient against natural hazard risks and the relative cascading effects to different compartments (industrial, infrastructural, societal, institutional, cultural, etc.), which is the dominant by the type of hazard (avalanches, torrential flooding, debris flow, rock falls). Specific themes will be addressed in various case studies to allow cross

  14. RELEVANCE OF INFORMATION WARFARE MODELS TO CRITICAL INFRASTRUCTURE PROTECTION

    OpenAIRE

    Manoj S. Maharaj; Brett van Niekerk

    2011-01-01

    This article illustrates the relevance of information warfare models to critical infrastructure protection. Analogies of information warfare models to those of information security and information systems were used to deconstruct the models into their fundamental components and this will be discussed. The models were applied to critical infrastructures to illustrate the relevance to critical infrastructure protection. By considering the interdependencies of the critical infrastructure sectors...

  15. Critical infrastructure protection research results of the first critical infrastructure protection research project in Hungary

    CERN Document Server

    Padányi, József

    2016-01-01

    This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing the performance of services as well as the level of security. The objectives of the book are based on a project entitled "Critical Infrastructure Protection Researches" (TÁMOP-4.2.1.B-11/2/KMR-2011-0001) which concentrated on innovative UAV solutions, robotics, cybersecurity, surface engineering, and mechatrinics and technologies providing safe operations of essential assets. This report is summarizing the methodologies and efforts taken to fulfill the goals defined. The project has been performed by the consortium of the Óbuda University and the National University of Public Service.

  16. Water infrastructure protection against intentional attacks:An experience in Italy

    Institute of Scientific and Technical Information of China (English)

    Cristiana Di Cristo; Angelo Leopardi; Giovanni de Marinis

    2011-01-01

    In the last years many interesting studies were devoted to the development of technologies and methodologies for the protection of water supply systems against intentional attacks.However the application to real systems is still limited for different economical and technical reasons.The Water Engineering Laboratory (L.I.A.) of University of Cassino (Italy) was involved in two research projects financed by the European Commission in the framework of the European Programme for Critical Infrastructure Protection (E.P.C.I.P.).Both projects,developed in partnership with a large Italian Water Company,have the common objective of providing guidelines for enhancing security in water supply systems respect to the intentional contamination risk.The fmal product is represented by the arrangement of a general procedure for protection systems design of water networks.In the paper the procedure is described through the application to two real water systems,characterized by different size and behavior.

  17. Protecting water and wastewater infrastructure from cyber attacks

    Institute of Scientific and Technical Information of China (English)

    Srinivas Panguluri; William Phillips; John Cusimano

    2011-01-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion:cyber attacks are real and can cause significant damages.This paper presents some recent statistics on cyber attacks and resulting damages.Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks.Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are:1) the increasing interconnection of their business and control system networks,2) large variation of proprietary industrial control equipment utilized,3) multitude of cross-sector cyber-security standards,and 4) the differences in the equipment vendor's approaches to meet these security standards.The utilities can meet these challenges by voluntarily selecting and adopting security standards,conducting a gap analysis,performing vulnerability/risk analysis,and undertaking countermeasures that best meets their security and organizational requirements.Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years.Implementing cyber security does not necessarily have to be expensive,substantial improvements can be accomplished through policy,procedure,training and awareness.Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  18. Volcanic ash impacts on critical infrastructure

    Science.gov (United States)

    Wilson, Thomas M.; Stewart, Carol; Sword-Daniels, Victoria; Leonard, Graham S.; Johnston, David M.; Cole, Jim W.; Wardman, Johnny; Wilson, Grant; Barnard, Scott T.

    2012-01-01

    Volcanic eruptions can produce a wide range of hazards. Although phenomena such as pyroclastic flows and surges, sector collapses, lahars and ballistic blocks are the most destructive and dangerous, volcanic ash is by far the most widely distributed eruption product. Although ash falls rarely endanger human life directly, threats to public health and disruption to critical infrastructure services, aviation and primary production can lead to significant societal impacts. Even relatively small eruptions can cause widespread disruption, damage and economic loss. Volcanic eruptions are, in general, infrequent and somewhat exotic occurrences, and consequently in many parts of the world, the management of critical infrastructure during volcanic crises can be improved with greater knowledge of the likely impacts. This article presents an overview of volcanic ash impacts on critical infrastructure, other than aviation and fuel supply, illustrated by findings from impact assessment reconnaissance trips carried out to a wide range of locations worldwide by our international research group and local collaborators. ‘Critical infrastructure’ includes those assets, frequently taken for granted, which are essential for the functioning of a society and economy. Electricity networks are very vulnerable to disruption from volcanic ash falls. This is particularly the case when fine ash is erupted because it has a greater tendency to adhere to line and substation insulators, where it can cause flashover (unintended electrical discharge) which can in turn cause widespread and disruptive outages. Weather conditions are a major determinant of flashover risk. Dry ash is not conductive, and heavy rain will wash ash from insulators, but light rain/mist will mobilise readily-soluble salts on the surface of the ash grains and lower the ash layer’s resistivity. Wet ash is also heavier than dry ash, increasing the risk of line breakage or tower/pole collapse. Particular issues for water

  19. Prevention of Spoofing Attacks in the Infrastructure Wireless Networks

    Directory of Open Access Journals (Sweden)

    Samraa A. AlAsady

    2012-01-01

    Full Text Available Problem statement: Spoofing Attack is one of the vulnerabilities in the wireless networks, which is a situation in which the intruder successfully masquerades as legal one. Spoofing Attacks will decrease the performance of the network and violate many security issues. In the networks that use MAC address based filtering approach to authenticate the clients, the spoofer just needs to get a valid MAC address that belong to some authorized client in the network in order to gain an illegitimate advantage. Approach: In this article, it has proposed an algorithm that uses an additional authentication process beside MAC address filtering and periodically re-authenticates the client after sending every specific number of Data frames. The proposed additional authentication process is based on two parts. First: Using unique information that belongs to every client in the network such as computer name, CPU ID and the current time as inputs to a hash function (one-way function, then insert the hash value in the slack fields of the header of the frame (Steganography. Second: Make a modification to the access point access control list by adding that unique information belong to each client in addition to its MAC address in the access control list. Thus, when the AP receives an Authentication frame from a client, it will first check the MAC address, if it is legal; the AP will re-compute the Hash value depending on the corresponding identifiers stored in the access control list and the time of creating the frame, then compare the resulted hash value with the received one and decide whether to reject or accept the access. Results: The results has been found is that even the attacker is spoofed the MAC address; he/she cannot communicate with the network because the attacker will fail in computing the hash value that depends on the Computer name and CPU ID. Also the attacker will be prevented even if he/she enters the network after the legal client finished the

  20. Threats to the Critical Information Infrastructure Protection (CIIP) Posed by Modern Terrorism

    OpenAIRE

    Hadji-Janev, Metodi

    2013-01-01

    The emergence of new non-state actors in the post Cold War reality have dramatically changed security environment around the globe. Modern terrorism practiced by Al Qaeda and its associated movement (AQAM) has posed serious threat to critical information infrastructure given the trend of connecting control systems that run these infrastructures to the internet. Although AQAM have not been successful to launch cyber-attack that will cause mass casualties, environment damage or financial effect...

  1. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  2. 3 CFR 8460 - Proclamation 8460 of December 2, 2009. Critical Infrastructure Protection Month, 2009

    Science.gov (United States)

    2010-01-01

    ... national preparedness, timely response, and rapid recovery in the event of an attack, natural disaster, or... all hazards during an event or emergency. During Critical Infrastructure Protection Month, we... have a debilitating effect on security, national economic security, public health or safety. From...

  3. Attacks and their Defenses for Advanced Metering Infrastructure

    DEFF Research Database (Denmark)

    Lighari, Sheeraz Niaz; Hussain, Dil Muhammad Akbar; Bak-Jensen, Birgitte;

    2014-01-01

    The smart grid is the digitized, modernized, updated version of archaic traditional electric grid. Advanced Metering Infrastructure (AMI) is an imperative part of the smart grid. It has replaced legacy metering, as it reports the energy consumption to the utility automatically through communication...... channels. AMI is also featuring to communicate control functions from utility to the smart meters. So, both the consumption data and control data needs to be securely transmitted to their ends. Any leak and tempering may produce the dire effects to both utility and consumers. Hence security of AMI is a...

  4. Risk and Interdependencies in Critical Infrastructures A Guideline for Analysis

    CERN Document Server

    Utne, Ingrid; Vatn, Jørn

    2012-01-01

    Today’s society is completely dependent on critical networks such as  water supply, sewage, electricity, ICT and transportation. Risk and vulnerability analyses are needed to grasp the impact of threats and hazards. However, these become quite complex as there are strong interdependencies both within and between infrastructure systems. Risk and Interdependencies in Critical Infrastructures: A  guideline for analysis provides methods for analyzing risks and interdependencies of critical infrastructures.  A number of analysis approaches are described and are adapted to each of these infrastructures. Various approaches are also revised, and all are supported by several examples and illustrations. Particular emphasis is given to the analysis of various interdependencies that often exist between the infrastructures.  Risk and Interdependencies in Critical Infrastructures: A  guideline for analysis provides a good tool to identify the hazards that are threatening your infrastructures, and will enhance the un...

  5. PolyOrBAC: a security framework for critical infrastructures

    OpenAIRE

    Anas ABOU EL KALAM; Deswarte, Yves; Baïna, Amine; Kaâniche, Mohamed

    2009-01-01

    International audience Due to physical and logical vulnerabilities, a critical infrastructure (CI) can encounter failures of various degrees of severity, and since there are many interdependencies between CIs, simple failures can have dramatic consequences on the users. In this paper, we mainly focus on malicious threats that might affect the information and communication system that controls the Critical Infrastructure, i.e., the Critical Information Infrastructure (CII). To address the s...

  6. Review on modeling and simulation of interdependent critical infrastructure systems

    International Nuclear Information System (INIS)

    Modern societies are becoming increasingly dependent on critical infrastructure systems (CISs) to provide essential services that support economic prosperity, governance, and quality of life. These systems are not alone but interdependent at multiple levels to enhance their overall performance. However, recent worldwide events such as the 9/11 terrorist attack, Gulf Coast hurricanes, the Chile and Japanese earthquakes, and even heat waves have highlighted that interdependencies among CISs increase the potential for cascading failures and amplify the impact of both large and small scale initial failures into events of catastrophic proportions. To better understand CISs to support planning, maintenance and emergency decision making, modeling and simulation of interdependencies across CISs has recently become a key field of study. This paper reviews the studies in the field and broadly groups the existing modeling and simulation approaches into six types: empirical approaches, agent based approaches, system dynamics based approaches, economic theory based approaches, network based approaches, and others. Different studies for each type of the approaches are categorized and reviewed in terms of fundamental principles, such as research focus, modeling rationale, and the analysis method, while different types of approaches are further compared according to several criteria, such as the notion of resilience. Finally, this paper offers future research directions and identifies critical challenges in the field. - Highlights: • Modeling approaches on interdependent critical infrastructure systems are reviewed. • I mainly review empirical, agent-based, system-dynamics, economic, network approaches. • Studies by each approach are sorted out in terms of fundamental principles. • Different approaches are further compared with resilience as the main criterion

  7. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    International Nuclear Information System (INIS)

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre

  8. A fault diagnosis system for interdependent critical infrastructures based on HMMs

    International Nuclear Information System (INIS)

    Modern society depends on the smooth functioning of critical infrastructures which provide services of fundamental importance, e.g. telecommunications and water supply. These infrastructures may suffer from faults/malfunctions coming e.g. from aging effects or they may even comprise targets of terrorist attacks. Prompt detection and accommodation of these situations is of paramount significance. This paper proposes a probabilistic modeling scheme for analyzing malicious events appearing in interdependent critical infrastructures. The proposed scheme is based on modeling the relationship between datastreams coming from two network nodes by means of a hidden Markov model (HMM) trained on the parameters of linear time-invariant dynamic systems which estimate the relationships existing among the specific nodes over consecutive time windows. Our study includes an energy network (IEEE 30 model bus) operated via a telecommunications infrastructure. The relationships among the elements of the network of infrastructures are represented by an HMM and the novel data is categorized according to its distance (computed in the probabilistic space) from the training ones. We considered two types of cyber-attacks (denial of service and integrity/replay) and report encouraging results in terms of false positive rate, false negative rate and detection delay. - Highlights: • An HMM-based scheme is proposed for analyzing malicious events in critical infrastructures. • We use the IEEE 30 model bus operated via an emulated ICT infrastructure. • Novel data is categorized based on its probabilistic distance from the training one. • We considered two types of cyber-attacks and report results of extensive experiments

  9. Reliable Communication Models in Interdependent Critical Infrastructure Networks

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sangkeun (Matt) [ORNL; Chinthavali, Supriya [ORNL; Shankar, Mallikarjun [ORNL

    2016-01-01

    Modern critical infrastructure networks are becoming increasingly interdependent where the failures in one network may cascade to other dependent networks, causing severe widespread national-scale failures. A number of previous efforts have been made to analyze the resiliency and robustness of interdependent networks based on different models. However, communication network, which plays an important role in today's infrastructures to detect and handle failures, has attracted little attention in the interdependency studies, and no previous models have captured enough practical features in the critical infrastructure networks. In this paper, we study the interdependencies between communication network and other kinds of critical infrastructure networks with an aim to identify vulnerable components and design resilient communication networks. We propose several interdependency models that systematically capture various features and dynamics of failures spreading in critical infrastructure networks. We also discuss several research challenges in building reliable communication solutions to handle failures in these models.

  10. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    Science.gov (United States)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  11. Toward Developing Genetic Algorithms to Aid in Critical Infrastructure Modeling

    Energy Technology Data Exchange (ETDEWEB)

    2007-05-01

    Today’s society relies upon an array of complex national and international infrastructure networks such as transportation, telecommunication, financial and energy. Understanding these interdependencies is necessary in order to protect our critical infrastructure. The Critical Infrastructure Modeling System, CIMS©, examines the interrelationships between infrastructure networks. CIMS© development is sponsored by the National Security Division at the Idaho National Laboratory (INL) in its ongoing mission for providing critical infrastructure protection and preparedness. A genetic algorithm (GA) is an optimization technique based on Darwin’s theory of evolution. A GA can be coupled with CIMS© to search for optimum ways to protect infrastructure assets. This includes identifying optimum assets to enforce or protect, testing the addition of or change to infrastructure before implementation, or finding the optimum response to an emergency for response planning. This paper describes the addition of a GA to infrastructure modeling for infrastructure planning. It first introduces the CIMS© infrastructure modeling software used as the modeling engine to support the GA. Next, the GA techniques and parameters are defined. Then a test scenario illustrates the integration with CIMS© and the preliminary results.

  12. Security that matters: critical infrastructure and objects of protection

    OpenAIRE

    Aradau, Claudia

    2010-01-01

    Critical infrastructure protection is prominently concerned with objects that appear indispensable for the functioning of social and political life. However, the analysis of material objects in discussions of critical infrastructure protection has remained largely within the remit of managerial responses, which see matter as simply passive, a blank slate. In security studies, critical approaches have focused on social and cultural values, forms of life, technologies of risk or structures of n...

  13. Critical Infrastructure Modeling: An Approach to Characterizing Interdependencies of Complex Networks & Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Stuart Walsh; Shane Cherry; Lyle Roybal

    2009-05-01

    Critical infrastructure control systems face many challenges entering the 21st century, including natural disasters, cyber attacks, and terrorist attacks. Revolutionary change is required to solve many existing issues, including gaining greater situational awareness and resiliency through embedding modeling and advanced control algorithms in smart sensors and control devices instead of in a central controller. To support design, testing, and component analysis, a flexible simulation and modeling capability is needed. Researchers at Idaho National Laboratory are developing and evaluating such a capability through their CIPRsim modeling and simulation framework.

  14. Integrating Critical Disability Studies into the Historiography of Infrastructures

    DEFF Research Database (Denmark)

    Galis, Vasilis; Tympas, Aristotle; Tzokas, Spyros

    to mobility. What we still lack is an adequate number of studies that link infrastructures to structural immobility, to systematic disabling. As we see it, the history of the co-construction of infrastructures and disability can help us to raise critical questions regarding both infrastructures and disability....... We expect this to be beneficial to both historians of technology (and other historians of infrastructures) and scholars who specialize in critical disability studies. The paper will present ongoing research on a whole range of infrastructures (from ICT to biotechnology) that are embedded in transport...... and Asia came to challenge the rhetoric of globalization. (2) Plans to introduce and operate urban transport infrastructures that produced new versions of disability and/or reconfigured versions of existing disability. We aim to show the gradual defeat and dis/abling of the ‘undesired urban subject...

  15. Critical (information) Infrastructure Protection in The Netherlands

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Burger, H.H.; Klaver, M.H.A.

    2003-01-01

    Some sectors and parts of the Dutch national infrastructure are that essential to the Netherlands that serious disruption or even loss of service could lead to a severe impact to the Dutch society, government and industry as well as to those of neighbouring countries. Early 2002, the Dutch governmen

  16. Economic impacts of rules- versus risk-based cybersecurity regulations for critical infrastructure providers.

    OpenAIRE

    Massacci, F.

    2016-01-01

    What's the optimal way to regulate cybersecurity for the critical infrastructure operators in charge of electricity transmission? Should regulation follow the US style (a mostly rules-based model), the EU approach (which is mostly risk-based), or a balance of both? The authors discuss the economic issues behind making this choice and present a cybersecurity economics model for public policy in the presence of strategic attackers. They calibrated these models in the field with the support of N...

  17. An All-Hazard Approach for the Vulnerability Analysis of Critical Infrastructures

    OpenAIRE

    Zio, Enrico; Piccinelli, Roberta; Sansavini, Giovanni

    2011-01-01

    In this paper, a framework is proposed for the All-HAZard ANalysis (A-HAZAN) of Critical In-frastructures (CIs). Starting from the identification of the task of each component in the infrastructure, we use tabular procedures to organize the information on the susceptibility to attacks, to single and cascading fail-ures. All variables and states are identified that may impact on the component's role as a possible source of vulnerability within the CI and towards interdependent CIs. This is a s...

  18. 76 FR 50487 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Science.gov (United States)

    2011-08-15

    ... SECURITY Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National... Information (PCII) Stakeholder Survey. DHS previously published this ICR in the Federal Register on March 31... oversees a community of stakeholders, including submitters of CII, authorized users of PCII and...

  19. 76 FR 17935 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Science.gov (United States)

    2011-03-31

    ... SECURITY Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National... community of stakeholders, including submitters of CII, authorized users of PCII and accredited Federal... information that will assist in making the PCII Program attractive to its stakeholders will allow the...

  20. A general approach to critical infrastructure accident consequences analysis

    Science.gov (United States)

    Bogalecka, Magda; Kołowrocki, Krzysztof; Soszyńska-Budny, Joanna

    2016-06-01

    The probabilistic general model of critical infrastructure accident consequences including the process of the models of initiating events generated by its accident, the process of environment threats and the process of environment degradation is presented.

  1. Dynamic functional modelling of vulnerability and interoperability of Critical Infrastructures

    International Nuclear Information System (INIS)

    The paper describes a new integrated formalism for the dynamic functional modelling of vulnerability and interoperability of Critical Infrastructures at regional level. The model assesses the propagation of impacts in terms of disservice due to a wide set of threats. The disservice can be propagated within the same infrastructure or to other CIs by means of the interdependence model, which is able to represent physical, cybernetic, geographic as well as logical interdependencies and also the shift of the demand between two infrastructures that can provide the same or fully/partially replaceable service. The model is dynamic, since both the impact of the specific threat on a generic infrastructure node and the inoperability functions are time-dependent. A pilot study has been carried in the metropolitan area of the province of Milan, considering the Critical Infrastructures referred to the transportation system.

  2. Risk Assessment Methodology for Protecting Our Critical Physical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    BIRINGER,BETTY E.; DANNEELS,JEFFREY J.

    2000-12-13

    Critical infrastructures are central to our national defense and our economic well-being, but many are taken for granted. Presidential Decision Directive (PDD) 63 highlights the importance of eight of our critical infrastructures and outlines a plan for action. Greatly enhanced physical security systems will be required to protect these national assets from new and emerging threats. Sandia National Laboratories has been the lead laboratory for the Department of Energy (DOE) in developing and deploying physical security systems for the past twenty-five years. Many of the tools, processes, and systems employed in the protection of high consequence facilities can be adapted to the civilian infrastructure.

  3. Intelligent monitoring, control, and security of critical infrastructure systems

    CERN Document Server

    Polycarpou, Marios

    2015-01-01

    This book describes the challenges that critical infrastructure systems face, and presents state of the art solutions to address them. How can we design intelligent systems or intelligent agents that can make appropriate real-time decisions in the management of such large-scale, complex systems? What are the primary challenges for critical infrastructure systems? The book also provides readers with the relevant information to recognize how important infrastructures are, and their role in connection with a society’s economy, security and prosperity. It goes on to describe state-of-the-art solutions to address these points, including new methodologies and instrumentation tools (e.g. embedded software and intelligent algorithms) for transforming and optimizing target infrastructures. The book is the most comprehensive resource to date for professionals in both the private and public sectors, while also offering an essential guide for students and researchers in the areas of modeling and analysis of critical in...

  4. Critical Infrastructure Interdependency Modeling: A Survey of U.S. and International Research

    Energy Technology Data Exchange (ETDEWEB)

    2006-08-01

    The Nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes, and organizations across which these goods and services move are called "critical infrastructures".1 This statement is as true in the U.S. as in any country in the world. Recent world events such as the 9-11 terrorist attacks, London bombings, and gulf coast hurricanes have highlighted the importance of stable electric, gas and oil, water, transportation, banking and finance, and control and communication infrastructure systems. Be it through direct connectivity, policies and procedures, or geospatial proximity, most critical infrastructure systems interact. These interactions often create complex relationships, dependencies, and interdependencies that cross infrastructure boundaries. The modeling and analysis of interdependencies between critical infrastructure elements is a relatively new and very important field of study. The U.S. Technical Support Working Group (TSWG) has sponsored this survey to identify and describe this current area of research including the current activities in this field being conducted both in the U.S. and internationally. The main objective of this study is to develop a single source reference of critical infrastructure interdependency modeling tools (CIIMT) that could be applied to allow users to objectively assess the capabilities of CIIMT. This information will provide guidance for directing research and development to address the gaps in development. The results will inform researchers of the TSWG Infrastructure Protection Subgroup of research and development efforts and allow a more focused approach to addressing the needs of CIIMT end-user needs. This report first presents the field of infrastructure interdependency analysis, describes the survey methodology, and presents the leading research efforts in both a cumulative table and through individual datasheets. Data was

  5. Analysis of Critical Infrastructure Dependencies and Interdependencies

    Energy Technology Data Exchange (ETDEWEB)

    Petit, Frederic [Argonne National Lab. (ANL), Argonne, IL (United States); Verner, Duane [Argonne National Lab. (ANL), Argonne, IL (United States); Brannegan, David [Argonne National Lab. (ANL), Argonne, IL (United States); Buehring, William [Argonne National Lab. (ANL), Argonne, IL (United States); Dickinson, David [Argonne National Lab. (ANL), Argonne, IL (United States); Guziel, Karen [Argonne National Lab. (ANL), Argonne, IL (United States); Haffenden, Rebecca [Argonne National Lab. (ANL), Argonne, IL (United States); Phillips, Julia [Argonne National Lab. (ANL), Argonne, IL (United States); Peerenboom, James [Argonne National Lab. (ANL), Argonne, IL (United States)

    2015-06-01

    The report begins by defining dependencies and interdependencies and exploring basic concepts of dependencies in order to facilitate a common understanding and consistent analytical approaches. Key concepts covered include; Characteristics of dependencies: upstream dependencies, internal dependencies, and downstream dependencies; Classes of dependencies: physical, cyber, geographic, and logical; and Dimensions of dependencies: operating environment, coupling and response behavior, type of failure, infrastructure characteristics, and state of operations From there, the report proposes a multi-phase roadmap to support dependency and interdependency assessment activities nationwide, identifying a range of data inputs, analysis activities, and potential products for each phase, as well as key steps needed to progress from one phase to the next. The report concludes by outlining a comprehensive, iterative, and scalable framework for analyzing dependencies and interdependencies that stakeholders can integrate into existing risk and resilience assessment efforts.

  6. 76 FR 29775 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Science.gov (United States)

    2011-05-23

    ... (CIPAC) by notice published in the Federal Register Notice (71 FR 14930-14933) dated March 24, 2006. That... resilience, reconstituting critical infrastructure assets and systems for both man-made as well as naturally... information. Organizational Structure: CIPAC members are organized into eighteen (18) critical...

  7. 76 FR 70730 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Science.gov (United States)

    2011-11-15

    ... (CIPAC) by notice published in the Federal Register Notice (71 FR 14930-14933) dated March 24, 2006. That... resilience, reconstituting critical infrastructure assets and systems for both man-made as well as naturally... information. Organizational Structure: CIPAC members are organized into eighteen (18) critical...

  8. Development of the efficient emergency preparedness system for the nuclear critical infrastructure

    International Nuclear Information System (INIS)

    The evaluation of the critical nuclear infrastructure vulnerability to threats like human occurrences, terrorist attacks and natural disasters and the preparation of emergency response plans with the estimation of optimized costs are of the vital importance for the assurance of a safe nuclear facilities operation and the national security. In the past national emergency systems did not include vulnerability assessments of the critical nuclear infrastructure as the important part of the comprehensive preparedness framework. The fundamental aims of the efficient emergency preparedness and response system are to provide a sustained emergency readiness and to prevent an emergency situation and accidents. But when an event happens the mission is to mitigate consequences and to protect the people and environment against the nuclear and radiological damage. The efficient emergency response system, which would be activated in the case of the nuclear and/or radiological emergency and release of the radioactivity to the environment, is an important element of a comprehensive system of the nuclear and radiation safety. In the article the new methodology for the critical nuclear infrastructure vulnerability assessment as a missing part of an efficient emergency preparedness system is presented. It can help the overall national energy sectors to identify and better understand the terrorist threats and vulnerabilities of their critical infrastructure. The presented methodology could also facilitate national agencies to develop and implement a vulnerability awareness and education programs for their critical assets to enhance the security, reliability and safe operation of the whole energy infrastructure. The vulnerability assessment methodology will also assist nuclear power plants to develop, validate, and disseminate the assessment and survey of new efficient countermeasures. The significant benefits of the new vulnerability assessment research are to increase nuclear power

  9. Investigating SCADA Failures in Interdependent Critical Infrastructure Systems

    OpenAIRE

    Ebrahimy, Razgar

    2014-01-01

    This paper is based on the initial ideas of a PhD proposal which will investigate SCADA failures in physical infrastructure systems. The results will be used to develop a new notation to help risk assessment using dependable computing concepts. SCADA systems are widely used within critical infrastructures to perform system controls and deliver services to linked and dependent systems. Failures in SCADA systems will be investigated to help us understand and prevent cascading failures in future.

  10. Enabling software defined networking experiments in networked critical infrastructures

    OpenAIRE

    Béla Genge; Zoltán Gál

    2014-01-01

    Nowadays, the fact that Networked Critical Infrastructures (NCI), e.g., power plants, water plants, oil and gas distribution infrastructures, and electricity grids, are targeted by significant cyber threats is well known. Nevertheless, recent research has shown that specific characteristics of NCI can be exploited in the enabling of more efficient mitigation techniques, while novel techniques from the field of IP networks can bring significant advantages. In this paper we explore the intercon...

  11. A reference model for model-based design of critical infrastructure protection systems

    Science.gov (United States)

    Shin, Young Don; Park, Cheol Young; Lee, Jae-Chon

    2015-05-01

    Today's war field environment is getting versatile as the activities of unconventional wars such as terrorist attacks and cyber-attacks have noticeably increased lately. The damage caused by such unconventional wars has also turned out to be serious particularly if targets are critical infrastructures that are constructed in support of banking and finance, transportation, power, information and communication, government, and so on. The critical infrastructures are usually interconnected to each other and thus are very vulnerable to attack. As such, to ensure the security of critical infrastructures is very important and thus the concept of critical infrastructure protection (CIP) has come. The program to realize the CIP at national level becomes the form of statute in each country. On the other hand, it is also needed to protect each individual critical infrastructure. The objective of this paper is to study on an effort to do so, which can be called the CIP system (CIPS). There could be a variety of ways to design CIPS's. Instead of considering the design of each individual CIPS, a reference model-based approach is taken in this paper. The reference model represents the design of all the CIPS's that have many design elements in common. In addition, the development of the reference model is also carried out using a variety of model diagrams. The modeling language used therein is the systems modeling language (SysML), which was developed and is managed by Object Management Group (OMG) and a de facto standard. Using SysML, the structure and operational concept of the reference model are designed to fulfil the goal of CIPS's, resulting in the block definition and activity diagrams. As a case study, the operational scenario of the nuclear power plant while being attacked by terrorists is studied using the reference model. The effectiveness of the results is also analyzed using multiple analysis models. It is thus expected that the approach taken here has some merits

  12. Risk analysis of critical infrastructures emphasizing electricity supply and interdependencies

    International Nuclear Information System (INIS)

    Failures in critical infrastructures can cause major damage to society. Wide-area interruptions (blackouts) in the electricity supply system have severe impacts on societal critical functions and other critical infrastructures, but there is no agreed-upon framework on how to analyze and predict the reliability of electricity supply. Thus, there is a need for an approach to cross-sector risk analyses, which facilitates risk analysis of outages in the electricity supply system and enables investigation of cascading failures and consequences in other infrastructures. This paper presents such an approach, which includes contingency analysis (power flow) and reliability analysis of power systems, as well as use of a cascade diagram for investigating interdependencies. A case study was carried out together with the Emergency Preparedness Group in the city of Oslo, Norway and the network company Hafslund Nett. The case study results highlight the need for cross-sector analyses by showing that the total estimated societal costs are substantially higher when cascading effects and consequences to other infrastructures are taken into account compared to only considering the costs of electricity interruptions as seen by the network company. The approach is a promising starting point for cross-sector risk analysis of electricity supply interruptions and consequences for dependent infrastructures.

  13. Optimal recovery sequencing for critical infrastructure resilience assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Vugrin, Eric D.; Brown, Nathanael J. K.; Turnquist, Mark Alan (Cornell University, Ithaca, NY)

    2010-09-01

    Critical infrastructure resilience has become a national priority for the U. S. Department of Homeland Security. System resilience has been studied for several decades in many different disciplines, but no standards or unifying methods exist for critical infrastructure resilience analysis. This report documents the results of a late-start Laboratory Directed Research and Development (LDRD) project that investigated the identification of optimal recovery strategies that maximize resilience. To this goal, we formulate a bi-level optimization problem for infrastructure network models. In the 'inner' problem, we solve for network flows, and we use the 'outer' problem to identify the optimal recovery modes and sequences. We draw from the literature of multi-mode project scheduling problems to create an effective solution strategy for the resilience optimization model. We demonstrate the application of this approach to a set of network models, including a national railroad model and a supply chain for Army munitions production.

  14. 78 FR 72755 - Version 5 Critical Infrastructure Protection Reliability Standards

    Science.gov (United States)

    2013-12-03

    ...\\ Version 5 Critical Infrastructure Protection Reliability Standards, 78 FR 24,107 (Apr. 24, 2013), 143 FERC... drives and laptop computers) that fall outside of the BES Cyber Asset definition.\\5\\ While we are... position to define their own internal compliance processes based on the ] particular characteristics...

  15. Geospatial decision support framework for critical infrastructure interdependency assessment

    Science.gov (United States)

    Shih, Chung Yan

    Critical infrastructures, such as telecommunications, energy, banking and finance, transportation, water systems and emergency services are the foundations of modern society. There is a heavy dependence on critical infrastructures at multiple levels within the supply chain of any good or service. Any disruptions in the supply chain may cause profound cascading effect to other critical infrastructures. A 1997 report by the President's Commission on Critical Infrastructure Protection states that a serious interruption in freight rail service would bring the coal mining industry to a halt within approximately two weeks and the availability of electric power could be reduced in a matter of one to two months. Therefore, this research aimed at representing and assessing the interdependencies between coal supply, transportation and energy production. A proposed geospatial decision support framework was established and applied to analyze interdependency related disruption impact. By utilizing the data warehousing approach, geospatial and non-geospatial data were retrieved, integrated and analyzed based on the transportation model and geospatial disruption analysis developed in the research. The results showed that by utilizing this framework, disruption impacts can be estimated at various levels (e.g., power plant, county, state, etc.) for preventative or emergency response efforts. The information derived from the framework can be used for data mining analysis (e.g., assessing transportation mode usages; finding alternative coal suppliers, etc.).

  16. NEW ASPECTS REGARDING THE EVALUATION OF INVESTMENTS IN CRITICAL INFRASTRUCTURE

    Directory of Open Access Journals (Sweden)

    Lupan Mariana

    2009-05-01

    Full Text Available The additional risks associated to the actual global and contagious crisis put a severe pressure on the investments in critical infrastructure and there is a real need for new valuations especially those regarding the synergic financing strategies in crit

  17. CIPedia©: A Critical Infrastructure Protection and Resilience Resource

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Theocharidou, M.; Rome, E.

    2015-01-01

    CIPedia© http://www.cipedia.eu is a Wiki-based body of common knowledge for the wide international community of critical infrastructure (CI) protection and resilience stakeholders such as policy makers, researchers, governmental agencies, emergency management organizations, CI operators, and even th

  18. 78 FR 66603 - Critical Infrastructure Security and Resilience Month, 2013

    Science.gov (United States)

    2013-11-05

    ... United States of America the two hundred and thirty- eighth. (Presidential Sig.) [FR Doc. 2013-26667... November 5, 2013 Part III The President Proclamation 9047--Critical Infrastructure Security and Resilience Month, 2013 Proclamation 9048--Military Family Month, 2013 Proclamation 9049--National Adoption...

  19. Identification of critical locations across multiple infrastructures for terrorist actions

    International Nuclear Information System (INIS)

    This paper presents a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their susceptibility to terrorist acts. We identify these locations by calculating a value for a geographic region that represents the combined values to the decision makers of all the infrastructures crossing through that region. These values, as well as the size of the geographic region, are conditional on an assumed destructive threat of a given size. In our case study, the threat is assumed to be minor, e.g., a bomb that can affect objects within 7 m of it. This approach first requires an assessment of the users of the system. During this assessment, each user is assigned a performance index (PI) based on the disutility of the loss of each infrastructure's resource via multi-attribute utility theory (MAUT). A Monte Carlo network analysis is then performed to develop importance measures (IM) for the elements of each infrastructure for their ability to service each user. We combine the IMs with the user PIs to a value that we call valued worth (VW) for each infrastructure's elements independently. Then we use spatial analysis techniques within a geographic information system (GIS) to combine the VWs of each infrastructure's elements in a geographic area, conditional on the threat, into a total value we call geographic valued worth (GVW). The GVW is displayed graphically in the GIS system in a color scheme that shows the numerical ranking of these geographic areas. The map and rankings are then submitted to the decision makers to better allocate anti-terrorism resources. A case study of this methodology is performed on the Massachusetts Institute of Technology (MIT) campus. The results of the study show how the methodology can bring attention to areas that are important when several infrastructures are considered, but may be ignored when infrastructures

  20. Who does what? Critical energy infrastructure protection in the Canadian government

    Energy Technology Data Exchange (ETDEWEB)

    Hay, J.B. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs

    2006-03-15

    Following the terrorist attacks of September 11, 2001, both the United States and Canada reorganized several federal government departments and agencies with a view to ensuring greater protection against further terrorist action. Cross-border transfers of oil, gas and electricity between the 2 countries have endowed the protection of energy infrastructure with high political importance in both governments. However, federal authority over energy is constrained in Canada, and the energy sector is regulated largely on a provincial basis. The role of the federal government in protecting critical energy infrastructure remains unclear. This paper examined federal government policies and programs designed to address the protection of critical energy infrastructure in Canada, and presented details of their interactions with other departments as well as their engagement with the private industries that own approximately 85 per cent of Canada's energy assets. An overview of energy infrastructure in Canada was presented, and the complexities of sectoral and geographic regions and their resulting organizational structures were reviewed. Issues concerning legislative and regulatory provincial authority were discussed, and a chronology of policy development and organizational changes implemented since 9/11 was presented. 22 refs.

  1. Safeguarding information intensive critical infrastructures against novel types of emerging failures

    International Nuclear Information System (INIS)

    The complexity of information intensive critical infrastructures, like electricity networks, telecommunication networks and public transportation networks is today augmented much more than in the past: such complexity augments the number of possible failures and anomalous working conditions and consequently decreases the survivability of the infrastructures. In this paper, the possibility is investigated to detect early anomalies and failures inside information intensive critical infrastructures by the introduction of anomaly detectors being 'self-aware' about the normal working conditions of the infrastructure itself. This approach has the objective to improve the performance of the most popular signature-based algorithms for intrusion detection, and makes use of different classes of time-oriented algorithms based on artificial intelligence paradigm. It has the advantage to work also in presence of unknown and unexpected types of attacks or failures. The tests, to evaluate the performance of the utilised detectors, are executed inside an emulated supervisory control and data acquisition (SCADA) system of an electrical power transmission grid, and a proposal for the future integration inside real SCADA systems is also reported

  2. Concepts to Analyze the Vulnerability of Critical Infrastructures - Taking into account Cybernetics

    Directory of Open Access Journals (Sweden)

    Frédéric Petit

    2010-02-01

    Full Text Available Critical Infrastructures (CIs are complex systems. For their operations, these infrastructures are increasingly using Supervisory Control And Data Acquisition (SCADA systems. Management practices are therefore highly dependent on the cyber tools, but also on the data needed to make these tools work. Therefore, CIs are greatly vulnerable to degradation of data. In this context, this paper aims at presenting the fundamentals of a method for analyzing the vulnerabilities of CIs towards the use of cyber data. By characterizing cyber vulnerability of CIs, it will be possible to improve the resilience of these networks and to foster a proactive approach to risk management not only by considering cybernetics from a cyber-attack point of view but also by considering the consequences of the use of corrupted data.

  3. 'System-of-systems' approach for interdependent critical infrastructures

    International Nuclear Information System (INIS)

    The study of the interdependencies within critical infrastructures (CI) is a growing field of research as the importance of potential failure propagation among infrastructures may lead to cascades affecting all supply networks. New powerful methods are required to model and describe such 'systems-of-systems' (SoS) as a whole. An overall model is required to provide security and reliability assessment taking into account various kinds of threats and failures. A significant challenge associated with this model may be to create 'what-if' scenarios for the analysis of interdependencies. In this paper the interdependencies between industrial control systems (ICS), in particular SCADA (Supervisory Control and Data Acquisition), and the underlying critical infrastructures to address the vulnerabilities related to the coupling of these systems are analyzed. The modeling alternatives for system-of-systems, integrated versus coupled models, are discussed. An integrated model contains detailed low level models of (sub)systems as well as a high level model, covering all hierarchical levels. On the other hand, a coupled model aggregates different simulated outputs of the low level models as inputs at a higher level. Strengths and weaknesses of both approaches are analyzed and a model architecture for SCADA and the 'system under control' are proposed. Furthermore, the HLA simulation standard is introduced and discussed in this paper as a promising approach to represent interdependencies between infrastructures. To demonstrate the capabilities of the HLA standard for the interdependencies study, an exemplary application and some first results are also briefly presented in this paper.

  4. Increasing impacts of climate extremes on critical infrastructures in Europe

    Science.gov (United States)

    Forzieri, Giovanni; Bianchi, Alessandra; Feyen, Luc; Silva, Filipe Batista e.; Marin, Mario; Lavalle, Carlo; Leblois, Antoine

    2016-04-01

    The projected increases in exposure to multiple climate hazards in many regions of Europe, emphasize the relevance of a multi-hazard risk assessment to comprehensively quantify potential impacts of climate change and develop suitable adaptation strategies. In this context, quantifying the future impacts of climatic extremes on critical infrastructures is crucial due to their key role for human wellbeing and their effects on the overall economy. Critical infrastructures describe the existing assets and systems that are essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact as a result of the failure to maintain those functions. We assess the direct damages of heat and cold waves, river and coastal flooding, droughts, wildfires and windstorms to energy, transport, industry and social infrastructures in Europe along the 21st century. The methodology integrates in a coherent framework climate hazard, exposure and vulnerability components. Overall damage is expected to rise up to 38 billion €/yr, ten time-folds the current climate damage, with drastic variations in risk scenarios. Exemplificative are drought and heat-related damages that could represent 70% of the overall climate damage in 2080s versus the current 12%. Many regions, prominently Southern Europe, will likely suffer multiple stresses and systematic infrastructure failures due to climate extremes if no suitable adaptation measures will be taken.

  5. Ontario-U.S. power outages : impacts on critical infrastructure

    International Nuclear Information System (INIS)

    This paper described the power outage and resulting blackout that occurred on August 14, 2003 and identified how critical infrastructure was directly and interdependently impacted in Canada. The aim of the paper was to assist critical infrastructure protection and emergency management professionals in assessing the potential impacts of large-scale critical infrastructure disruptions. Information for the study was acquired from Canadian and American media reports and cross-sectoral information sharing with provincial and federal governments and the private sector. The blackout impacted most of the sources and means of generating, transmitting and distributing power within the area, which in turn impacted all critical infrastructure sectors. Landline and cellular companies experienced operational difficulties, which meant that emergency responders were impacted. Newspapers and the electronic media struggled to release information to the public. The banking and finance industry experienced an immediate degradation of services. The power outage caused shipping and storage difficulties for commercial retailers and dairy producers. A number of incidents were reported where only partially treated waste water was released into neighbouring waterways. The timing of the blackout coincided with the closures of workplaces and created additional difficulties on transportation networks. Many gas station pumps were inoperable. Police, fire departments and ambulance services experienced a dramatic increase in the volume of calls received, and all branches of the emergency services sector encountered transportation delays and difficulties with communications equipment. Nuclear reactors were also impacted. An estimated 150,000 Government of Canada employees were unable to report to work. Estimates have indicated that the power outage cost Ontario's economy between $1 and $2 billion. The outage negatively impacted 82 per cent of small businesses in Ontario. 170 refs., 3 figs

  6. An approach for protecting a critical transport infrastructure

    OpenAIRE

    Khoudour, L.; El-Koursi, Em; VELASTIN,S; BUCH, N; LIM-THIEBOT, S; Fontaine, F.

    2011-01-01

    Scientific and technological innovations are often sources of new vulnerabilities, hazards and risks impacting equipment, systems, processes, organisation and human behaviours. The issues of safety, security, performance and their management in a holistic approach are quickly becoming essential for every industrial sector. This paper discusses safety and security policy focussed on the protection of critical railway infrastructure. The paper suggests a global approach for risk appraisal and t...

  7. Hierarchical, model-based risk management of critical infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Baiardi, F. [Polo G.Marconi La Spezia, Universita di Pisa, Pisa (Italy); Dipartimento di Informatica, Universita di Pisa, L.go B.Pontecorvo 3 56127, Pisa (Italy)], E-mail: f.baiardi@unipi.it; Telmon, C.; Sgandurra, D. [Dipartimento di Informatica, Universita di Pisa, L.go B.Pontecorvo 3 56127, Pisa (Italy)

    2009-09-15

    Risk management is a process that includes several steps, from vulnerability analysis to the formulation of a risk mitigation plan that selects countermeasures to be adopted. With reference to an information infrastructure, we present a risk management strategy that considers a sequence of hierarchical models, each describing dependencies among infrastructure components. A dependency exists anytime a security-related attribute of a component depends upon the attributes of other components. We discuss how this notion supports the formal definition of risk mitigation plan and the evaluation of the infrastructure robustness. A hierarchical relation exists among models that are analyzed because each model increases the level of details of some components in a previous one. Since components and dependencies are modeled through a hypergraph, to increase the model detail level, some hypergraph nodes are replaced by more and more detailed hypergraphs. We show how critical information for the assessment can be automatically deduced from the hypergraph and define conditions that determine cases where a hierarchical decomposition simplifies the assessment. In these cases, the assessment has to analyze the hypergraph that replaces the component rather than applying again all the analyses to a more detailed, and hence larger, hypergraph. We also show how the proposed framework supports the definition of a risk mitigation plan and discuss some indicators of the overall infrastructure robustness. Lastly, the development of tools to support the assessment is discussed.

  8. Managing Current Complexity: Critical Energy Infrastructure Failures in North America

    Directory of Open Access Journals (Sweden)

    Colin MacDonald

    2012-04-01

    Full Text Available

    This paper applies the competing theories of High Reliability Organizations (HRO and Normal Accidents Theory (NAT, two competing views of risk management in highly-complex and tightly-coupled systems, in analyzing the 1998 Ice Storm and the 2003 Blackout to examine vulnerabilities in North America’s critical energy infrastructure (CEI. Inferences are then made by highlighting the similarities and differences in the two cases, which are then used to draw lessons for public managers regarding the protection of CEIs.

     

    As CEIs are highly-complex and tightly-coupled systems, failures stemming from complex and uncertain risks are inevitable. There is an increasingly low tolerance for failure in energy infrastructure because society’s critical infrastructures have become increasingly interdependent. Public managers must regulate CEIs in order to ensure an emphasis is placed on safety and security while also finding ways to reduce unnecessary complexities. It is through the adoption of such measures that public managers will aid in minimizing the cascading effects of inevitable failures.

     

  9. Protective design of critical infrastructure with high performance concretes

    International Nuclear Information System (INIS)

    Conclusions: High performance concrete constructions will allow innovative design solutions for critical infrastructures. Validation of engineering methods can reside on large and model scale experiments conducted on conventional concrete structures. New consistent impact experiments show extreme protection potential for UHPC. Modern FEM with concrete models and explicit rebar can model HPC and UHPC penetration resistance. SDOF and TDOF approaches are valuable design tools on local and global level. Combination of at least 2 out of 3 design methods FEM – XDOF- EXP allow reliable prediction and efficient innovative designs

  10. Enabling software defined networking experiments in networked critical infrastructures

    Directory of Open Access Journals (Sweden)

    Béla Genge

    2014-05-01

    Full Text Available Nowadays, the fact that Networked Critical Infrastructures (NCI, e.g., power plants, water plants, oil and gas distribution infrastructures, and electricity grids, are targeted by significant cyber threats is well known. Nevertheless, recent research has shown that specific characteristics of NCI can be exploited in the enabling of more efficient mitigation techniques, while novel techniques from the field of IP networks can bring significant advantages. In this paper we explore the interconnection of NCI communication infrastructures with Software Defined Networking (SDN-enabled network topologies. SDN provides the means to create virtual networking services and to implement global networking decisions. It relies on OpenFlow to enable communication with remote devices and has been recently categorized as the “Next Big Technology”, which will revolutionize the way decisions are implemented in switches and routers. Therefore, the paper documents the first steps towards enabling an SDN-NCI and presents the impact of a Denial of Service experiment over traffic resulting from an XBee sensor network which is routed across an emulated SDN network.

  11. Entropy as a metric in critical infrastructure situational awareness

    Science.gov (United States)

    Klemetti, Markus; Puuska, Samir; Vankka, Jouko

    2016-05-01

    In this paper, we expand our previously proposed critical infrastructure (CI) model with time dependent stochastic elements. In the model, CI is presented as a directed graph where each vertex represents a discrete system and directed edges dependency relations between the systems. Each node is associated with a finite state machine (FSM) which represents the operational status of the system in question. In this paper we associate a probability distribution to each FSM, which accounts for the flow of time and previous confirmed sensor reading. As time passes, the uncertainty about the state of the system increases. By relying on statistical probabilities that have been previously observed or known, it is possible to make predictions about the current state of CI. We present a dependency graph modelling a subset of Finnish electric grid and mobile networks. CI components are modelled using FSM structure augmented by probabilistic elements for entropy-based calculations. The proposed model provides an estimate about the state of the critical infrastructure when only limited information is available, while taking into account the increasing uncertainty created by the passage of time.

  12. 75 FR 21011 - Critical Infrastructure Partnership Advisory Council

    Science.gov (United States)

    2010-04-22

    ... protection security measures, incident response, recovery, and infrastructure resilience; reconstituting CIKR..., risk mitigation, and infrastructure continuity information. Organizational Structure: CIPAC members...

  13. The Requirements of the Installation of the Critical Informational Infrastructure and its Management

    Directory of Open Access Journals (Sweden)

    Béla Puskas

    2015-01-01

    Full Text Available The segments of the network can be paralysed by a series of chance events or a well-organized, targeted attack. If we know our system and lead a safety-conscious life we can avoid unpleasant events, system down. The Critical Information Infrastructures has become a complex network. Consequently the items of the system, their mutual effects and links and the map of the network have to be known properly. We have to realize that everything is linked with each other and the physical and logistical networks have mutual effects on each other as well. It is obvious, that the problem of mapping the complexity is very important. One of the most important part of the cognition is the obtainment and sorting of information.

  14. Influence of time-dependent factors in the evaluation of critical infrastructure protection measures.

    Energy Technology Data Exchange (ETDEWEB)

    Buehring, W. A.; Samsa, M. E.; Decision and Information Sciences

    2008-03-28

    The examination of which protective measures are the most appropriate to be implemented in order to prevent, protect against, respond to, and recover from attacks on critical infrastructures and key resources typically involves a comparison of the consequences that could occur when the protective measure is implemented to those that could occur when it is not. This report describes a framework for evaluation that provides some additional capabilities for comparing optional protective measures. It illustrates some potentially important time-dependent factors, such as the implementation rate, that affect the relative pros and cons associated with widespread implementation of protective measures. It presents example results from the use of protective measures, such as detectors and pretrained responders, for an illustrative biological incident. Results show that the choice of an alternative measure can depend on whether or not policy and financial support can be maintained for extended periods of time. Choice of a time horizon greatly influences the comparison of alternatives.

  15. Applications of UAVs for Remote Sensing of Critical Infrastructure

    Science.gov (United States)

    Wegener, Steve; Brass, James; Schoenung, Susan

    2003-01-01

    The surveillance of critical facilities and national infrastructure such as waterways, roadways, pipelines and utilities requires advanced technological tools to provide timely, up to date information on structure status and integrity. Unmanned Aerial Vehicles (UAVs) are uniquely suited for these tasks, having large payload and long duration capabilities. UAVs also have the capability to fly dangerous and dull missions, orbiting for 24 hours over a particular area or facility providing around the clock surveillance with no personnel onboard. New UAV platforms and systems are becoming available for commercial use. High altitude platforms are being tested for use in communications, remote sensing, agriculture, forestry and disaster management. New payloads are being built and demonstrated onboard the UAVs in support of these applications. Smaller, lighter, lower power consumption imaging systems are currently being tested over coffee fields to determine yield and over fires to detect fire fronts and hotspots. Communication systems that relay video, meteorological and chemical data via satellite to users on the ground in real-time have also been demonstrated. Interest in this technology for infrastructure characterization and mapping has increased dramatically in the past year. Many of the UAV technological developments required for resource and disaster monitoring are being used for the infrastructure and facility mapping activity. This paper documents the unique contributions from NASA;s Environmental Research Aircraft and Sensor Technology (ERAST) program to these applications. ERAST is a UAV technology development effort by a consortium of private aeronautical companies and NASA. Details of demonstrations of UAV capabilities currently underway are also presented.

  16. Critical Infrastructure Surveillance Using SecureWireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Michael Niedermeier

    2015-11-01

    Full Text Available In this work, a secure wireless sensor network (WSN for the surveillance, monitoring and protection of critical infrastructures was developed. To guarantee the security of the system, the main focus was the implementation of a unique security concept, which includes both security on the communication level, as well as mechanisms that ensure the functional safety during its operation. While there are many theoretical approaches in various subdomains of WSNs—like network structures, communication protocols and security concepts—the construction, implementation and real-life application of these devices is still rare. This work deals with these aforementioned aspects, including all phases from concept-generation to operation of a secure wireless sensor network. While the key focus of this paper lies on the security and safety features of the WSN, the detection, localization and classification capabilities resulting from the interaction of the nodes’ different sensor types are also described.

  17. Federated Modelling and Simulation for Critical Infrastructure Protection

    Science.gov (United States)

    Rome, Erich; Langeslag, Peter; Usov, Andrij

    Modelling and simulation is an important tool for Critical Infrastructure (CI) dependency analysis, for testing methods for risk reduction, and as well for the evaluation of past failures. Moreover, interaction of such simulations with external threat models, e.g., a river flood model, or economic models enable consequence analysis and thus may assist in what-if decision-making processes. The simulation of complex scenarios involving several different CI sectors requires the usage of heterogeneous federated simulations of CIs. However, common standards for modelling and interoperability of such federated CI simulations are missing. Also, creating the required abstract models from CIs and other data, setting up the individual federate simulators and integrating all subsystems is a time-consuming and complicated task that requires substantial know-how and resources. In this chapter, we outline applications and benefit of federated modelling, simulation and analysis (MS&A) for Critical Infrastructure Protection (CIP). We review the state of the art in federated MS&A for CIP and categorise common approaches and interoperability concepts like central and lateral coupling of simulators. As examples for the latter two concepts, we will present in more detail an interoperability standard from the military domain, HLA, and an approach developed in the DIESIS project. Special emphasis will also be put on describing the problem of synchronising systems with different time models. Also, we will briefly assess the state of transferring MS&A for CIP research results to practical application by comparing the situations in the USA and in Europe.

  18. INFRASTRUCTURE

    CERN Multimedia

    A.Gaddi

    2011-01-01

    Between the end of March to June 2011, there has been no detector downtime during proton fills due to CMS Infrastructures failures. This exceptional performance is a clear sign of the high quality work done by the CMS Infrastructures unit and its supporting teams. Powering infrastructure At the end of March, the EN/EL group observed a problem with the CMS 48 V system. The problem was a lack of isolation between the negative (return) terminal and earth. Although at that moment we were not seeing any loss of functionality, in the long term it would have led to severe disruption to the CMS power system. The 48 V system is critical to the operation of CMS: in addition to feeding the anti-panic lights, essential for the safety of the underground areas, it powers all the PLCs (Twidos) that control AC power to the racks and front-end electronics of CMS. A failure of the 48 V system would bring down the whole detector and lead to evacuation of the cavern. EN/EL technicians have made an accurate search of the fault, ...

  19. 75 FR 48983 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Science.gov (United States)

    2010-08-12

    ... (CIPAC) by notice published in the Federal Register (71 FR 14930-14933) dated March 24, 2006. That notice... protection security measures, incident response, recovery, infrastructure resilience, reconstituting CIKR..., vulnerability, risk mitigation, and infrastructure continuity information. Organizational Structure:...

  20. Economics in Criticality and Restoration of Energy Infrastructures.

    Energy Technology Data Exchange (ETDEWEB)

    Boyd, Gale A.; Flaim, Silvio J.; Folga, Stephen M.; Gotham, Douglas J.; McLamore, Michael R.; Novak, Mary H.; Roop, Joe M.; Rossmann, Charles G.; Shamsuddin, Shabbir A.; Zeichner, Lee M.; Stamber, Kevin L.

    2005-03-01

    Economists, systems analysts, engineers, regulatory specialists, and other experts were assembled from academia, the national laboratories, and the energy industry to discuss present restoration practices (many have already been defined to the level of operational protocols) in the sectors of the energy infrastructure as well as other infrastructures, to identify whether economics, a discipline concerned with the allocation of scarce resources, is explicitly or implicitly a part of restoration strategies, and if there are novel economic techniques and solution methods that could be used help encourage the restoration of energy services more quickly than present practices or to restore service more efficiently from an economic perspective. AcknowledgementsDevelopment of this work into a coherent product with a useful message has occurred thanks to the thoughtful support of several individuals:Kenneth Friedman, Department of Energy, Office of Energy Assurance, provided the impetus for the work, as well as several suggestions and reminders of direction along the way. Funding from DOE/OEA was critical to the completion of this effort.Arnold Baker, Chief Economist, Sandia National Laboratories, and James Peerenboom, Director, Infrastructure Assurance Center, Argonne National Laboratory, provided valuable contacts that helped to populate the authoring team with the proper mix of economists, engineers, and systems and regulatory specialists to meet the objectives of the work.Several individuals provided valuable review of the document at various stages of completion, and provided suggestions that were valuable to the editing process. This list of reviewers includes Jeffrey Roark, Economist, Tennessee Valley Authority; James R. Dalrymple, Manager of Transmission System Services and Transmission/Power Supply, Tennessee Valley Authority; William Mampre, Vice President, EN Engineering; Kevin Degenstein, EN Engineering; and Patrick Wilgang, Department of Energy, Office of

  1. Agent-Based Modeling and Simulation of Network Infrastructure Cyber-Attacks and Cooperative Defense Mechanisms

    OpenAIRE

    Kotenko, Igor

    2010-01-01

    This paper considered the approach to investigation of distributed cooperative cyberdefence mechanisms against network attacks. The approach is based on the simulation of network cyber-attacks (Distributed Denial of Service, network worms, botnets, etc.) and cyber-protection mechanisms which combines discrete-event simulation, multi-agent approach and packet-level simulation of network protocols. The environment developed is written in C++ and OMNeT++. It allows imitating a wide spectrum of r...

  2. Risk assessment methodologies for Critical Infrastructure Protection. Part I: A state of the art

    OpenAIRE

    Giannopoulos, Georgios; FILIPPINI ROBERTO; SCHIMMER Muriel

    2012-01-01

    Effective risk assessment methodologies are the cornerstone of a successful Critical Infrastructure Protection program. The extensive number of risk assessment methodologies for critical infrastructures clearly supports this argument. Risk assessment is indispensable in order to identify threats, assess vulnerabilities and evaluate the impact on assets, infrastructures or systems taking into account the probability of the occurrence of these threats. This is a critical element that differenti...

  3. Critical Infrastructure Protection II, The International Federation for Information Processing, Volume 290.

    Science.gov (United States)

    Papa, Mauricio; Shenoi, Sujeet

    The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

  4. Methodologies and applications for critical infrastructure protection: State-of-the-art

    International Nuclear Information System (INIS)

    This work provides an update of the state-of-the-art on energy security relating to critical infrastructure protection. For this purpose, this survey is based upon the conceptual view of OECD countries, and specifically in accordance with EU Directive 114/08/EC on the identification and designation of European critical infrastructures, and on the 2009 US National Infrastructure Protection Plan. The review discusses the different definitions of energy security, critical infrastructure and key resources, and shows some of the experie'nces in countries considered as international reference on the subject, including some information-sharing issues. In addition, the paper carries out a complete review of current methodologies, software applications and modelling techniques around critical infrastructure protection in accordance with their functionality in a risk management framework. The study of threats and vulnerabilities in critical infrastructure systems shows two important trends in methodologies and modelling. A first trend relates to the identification of methods, techniques, tools and diagrams to describe the current state of infrastructure. The other trend accomplishes a dynamic behaviour of the infrastructure systems by means of simulation techniques including systems dynamics, Monte Carlo simulation, multi-agent systems, etc. - Highlights: → We examine critical infrastructure protection experiences, systems and applications. → Some international experiences are reviewed, including EU EPCIP Plan and the US NIPP programme. → We discuss current methodologies and applications on critical infrastructure protection, with emphasis in electric networks.

  5. Safety issues in cultural heritage management and critical infrastructures management

    Science.gov (United States)

    Soldovieri, Francesco; Masini, Nicola; Alvarez de Buergo, Monica; Dumoulin, Jean

    2013-12-01

    This special issue is the fourth of its kind in Journal of Geophysics and Engineering , containing studies and applications of geophysical methodologies and sensing technologies for the knowledge, conservation and security of products of human activity ranging from civil infrastructures to built and cultural heritage. The first discussed the application of novel instrumentation, surface and airborne remote sensing techniques, as well as data processing oriented to both detection and characterization of archaeological buried remains and conservation of cultural heritage (Eppelbaum et al 2010). The second stressed the importance of an integrated and multiscale approach for the study and conservation of architectural, archaeological and artistic heritage, from SAR to GPR to imaging based diagnostic techniques (Masini and Soldovieri 2011). The third enlarged the field of analysis to civil engineering structures and infrastructures, providing an overview of the effectiveness and the limitations of single diagnostic techniques, which can be overcome through the integration of different methods and technologies and/or the use of robust and novel data processing techniques (Masini et al 2012). As a whole, the special issue put in evidence the factors that affect the choice of diagnostic strategy, such as the material, the spatial characteristics of the objects or sites, the value of the objects to be investigated (cultural or not), the aim of the investigation (knowledge, conservation, restoration) and the issues to be addressed (monitoring, decay assessment). In order to complete the overview of the application fields of sensing technologies this issue has been dedicated to monitoring of cultural heritage and critical infrastructures to address safety and security issues. Particular attention has been paid to the data processing methods of different sensing techniques, from infrared thermography through GPR to SAR. Cascini et al (2013) present the effectiveness of a

  6. Onsite and Electric Backup Capabilities at Critical Infrastructure Facilities in the United States

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Julia A. [Argonne National Lab. (ANL), Argonne, IL (United States); Wallace, Kelly E. [Argonne National Lab. (ANL), Argonne, IL (United States); Kudo, Terence Y. [Argonne National Lab. (ANL), Argonne, IL (United States); Eto, Joseph H. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-04-01

    The following analysis, conducted by Argonne National Laboratory’s (Argonne’s) Risk and Infrastructure Science Center (RISC), details an analysis of electric power backup of national critical infrastructure as captured through the Department of Homeland Security’s (DHS’s) Enhanced Critical Infrastructure Program (ECIP) Initiative. Between January 1, 2011, and September 2014, 3,174 ECIP facility surveys have been conducted. This study focused first on backup capabilities by infrastructure type and then expanded to infrastructure type by census region.

  7. The Economic Value regarding the Protection Activities of Critical Infrastructures

    Directory of Open Access Journals (Sweden)

    Valentin-Bogdan DĂNILĂ

    2011-11-01

    Full Text Available In the past two years, a number of European countries, members of EU, Australia and Canada have initiated substantive actions in PIC area, establishing bodies responsible, defining procedures and methodologies, allocating significant resources to protect critical infrastructure considered essential or vital. The security concept, and implicit, the economical and energetic ones have different use and defining in relation to the history and organizational culture of every nation. A decisive contribution in the process of defining those concepts is identifying the set of values and national interests, elements that usually are the result of the public opinion perception. The increased share of non-military risks and threats has determined the national security management reconsideration, becoming more obvious the necessity of “public-private partnership” approach. Anew concept is becoming more and more present and gains maximum generality significations. This kind of process reconfigures the position and the role of social state actors: the political class, thebusiness and scientific environment, civil society and citizens.

  8. Optimal Workflow Scheduling in Critical Infrastructure Systems with Neural Networks

    Directory of Open Access Journals (Sweden)

    S. Vukmirović

    2012-04-01

    Full Text Available Critical infrastructure systems (CISs, such as power grids, transportation systems, communication networks and water systems are the backbone of a country’s national security and industrial prosperity. These CISs execute large numbers of workflows with very high resource requirements that can span through different systems and last for a long time. The proper functioning and synchronization of these workflows is essential since humanity’s well-being is connected to it. Because of this, the challenge of ensuring availability and reliability of these services in the face of a broad range of operating conditions is very complicated. This paper proposes an architecture which dynamically executes a scheduling algorithm using feedback about the current status of CIS nodes. Different artificial neural networks (ANNs were created in order to solve the scheduling problem. Their performances were compared and as the main result of this paper, an optimal ANN architecture for workflow scheduling in CISs is proposed. A case study is shown for a meter data management system with measurements from a power distribution management system in Serbia. Performance tests show that significant improvement of the overall execution time can be achieved by ANNs.

  9. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi

    2012-01-01

    The CMS Infrastructures teams are constantly ensuring the smooth operation of the different services during this critical period when the detector is taking data at full speed. A single failure would spoil hours of high luminosity beam and everything is put in place to avoid such an eventuality. In the meantime however, the fast approaching LS1 requires that we take a look at the various activities to take place from the end of the year onwards. The list of infrastructures consolidation and upgrade tasks is already long and will touch all the services (cooling, gas, inertion, powering, etc.). The definitive list will be available just before the LS1 start. One activity performed by the CMS cooling team that is worth mentioning is the maintenance of the cooling circuits at the CMS Electronics Integration Centre (EIC) at building 904. The old chiller has been replaced by a three-units cooling plant that also serves the HVAC system for the new CSC and RPC factories. The commissioning of this new plant has tak...

  10. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Science.gov (United States)

    2010-01-01

    ... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical... requirements will be in conformance with the information technology security requirements in the...

  11. Data Leak, Critical Information Infrastructure and the Legal Options: What does Wikileaks teach us?

    Directory of Open Access Journals (Sweden)

    Ida Madieha Abdul Ghani Azmi

    2015-05-01

    Full Text Available The massive data leaks by Wikileaks suggest how fragile a national security is from the perspective of information system and network sustainability. What Wikileaks have done and achieved raises some causes of concern. How do we view such leaks? Are they an act of whistle-blowing or disclosure of government misconduct in the interest of the public? Are they the champion of free press? Or are they a form of data breach or information security attack? What if it involves the critical information infrastructure (CII? Could they be classified as ‘cyber-terrorist’? The objective this paper is to outline the problems and challenges that Malaysia should anticipate and address in maintaining its national CII. The paper first looks at Wikileaks as it is the ‘icon’ of data leaks. Then it examines the causes of data breach before proceeding to foray into the concept of ‘critical information infrastructure’ in the US and Malaysia. Finally, the paper explores legal options that Malaysia can adopt in preparing herself to possible data breaches onslaught. It is the contention of the paper that the existing traditional legal framework should be reformed in line with the advances of the information and communications technologies, especially in light of the onslaught of data leaks by the new media typically represented by Wikileaks.

  12. The World Trade Center Attack: Helping the helpers: the role of critical incident stress management

    OpenAIRE

    Hammond, Jeffrey; Brooks, Jill

    2001-01-01

    Healthcare and prehospital workers involved in disaster response are susceptible to a variety of stress-related psychological and physical sequelae. Critical incident stress management, of which critical incident stress debriefing is a component, can mitigate the response to these stressors. Critical incident stress debriefing is a peer-driven, therapist-guided, structured, group intervention designed to accelerate the recovery of personnel. The attack on the World Trade Center, and the impac...

  13. Dynamic Analysis of Levee Infrastructure Failure Risk: A Framework for Enhanced Critical Infrastructure Management

    OpenAIRE

    Lam, Juan Carlos

    2012-01-01

    Current models that assess infrastructure failure risk are â linear,â and therefore, only consider the direct influence attributed to each factor that defines risk. These models do not consider the undeniable relationships that exist among these parameters. In reality, factors that define risk are interdependent and influence each other in a â non-linearâ fashion through feedback effects. Current infrastructure failure risk assessment models are also static, and do not allow infrastruct...

  14. Safety issues in cultural heritage management and critical infrastructures management

    Science.gov (United States)

    Soldovieri, Francesco; Masini, Nicola; Alvarez de Buergo, Monica; Dumoulin, Jean

    2013-12-01

    This special issue is the fourth of its kind in Journal of Geophysics and Engineering , containing studies and applications of geophysical methodologies and sensing technologies for the knowledge, conservation and security of products of human activity ranging from civil infrastructures to built and cultural heritage. The first discussed the application of novel instrumentation, surface and airborne remote sensing techniques, as well as data processing oriented to both detection and characterization of archaeological buried remains and conservation of cultural heritage (Eppelbaum et al 2010). The second stressed the importance of an integrated and multiscale approach for the study and conservation of architectural, archaeological and artistic heritage, from SAR to GPR to imaging based diagnostic techniques (Masini and Soldovieri 2011). The third enlarged the field of analysis to civil engineering structures and infrastructures, providing an overview of the effectiveness and the limitations of single diagnostic techniques, which can be overcome through the integration of different methods and technologies and/or the use of robust and novel data processing techniques (Masini et al 2012). As a whole, the special issue put in evidence the factors that affect the choice of diagnostic strategy, such as the material, the spatial characteristics of the objects or sites, the value of the objects to be investigated (cultural or not), the aim of the investigation (knowledge, conservation, restoration) and the issues to be addressed (monitoring, decay assessment). In order to complete the overview of the application fields of sensing technologies this issue has been dedicated to monitoring of cultural heritage and critical infrastructures to address safety and security issues. Particular attention has been paid to the data processing methods of different sensing techniques, from infrared thermography through GPR to SAR. Cascini et al (2013) present the effectiveness of a

  15. Collaborative financial infrastructure protection

    CERN Document Server

    Baldoni, Roberto

    2012-01-01

    The Critical Infrastructure Protection Survey recently released by Symantec found that 53% of interviewed IT security experts from international companies experienced at least ten cyber attacks in the last five years, and financial institutions were often subject to some of the most sophisticated and large-scale cyber attacks and frauds. The book by Baldoni and Chockler analyzes the structure of software infrastructures found in the financial domain, their vulnerabilities to cyber attacks and the existing protection mechanisms. It then shows the advantages of sharing information among financia

  16. Critical infrastructure protection in the Netherlands: a quick-scan

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Burger, H.H.; Klaver, M.H.A.

    2003-01-01

    Some sectors and parts of the Dutch national infrastructure are that essential to the Netherlands that serious disruption or even loss of service could lead to a severe impact to the Dutch society, government and industry as well as to neighbouring countries. Early 2002, the Dutch government started

  17. Practical Application Of A Model For Assessing The Criticality Of Railway Infrastructure Elements

    Directory of Open Access Journals (Sweden)

    Petr Novotný

    2016-01-01

    Full Text Available Rail transport is an important sub-sector of transport infrastructure. Disruption of its operation due to emergencies can result in a reduction in functional parameters of provided services with consequent impacts on society. Identification of critical elements of this system enables its timely and effective protection. On that ground, the article presents a draft model for assessing the criticality of railway infrastructure elements. This model uses a systems approach and multicriteria semi-quantitative analysis with weighted criteria for calculating the criticality of individual elements of the railway infrastructure. In the conclusion, it presents a practical application of the proposed model including the discussion of results

  18. The impact of natural hazard on critical infrastructure systems: definition of an ontology

    Science.gov (United States)

    Dimauro, Carmelo; Bouchon, Sara; Frattini, Paolo; Giusto, Claudia

    2013-04-01

    According to the Council of the European Union Directive (2008), 'critical infrastructure' means an asset, system or part thereof which is essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact as a result of the failure to maintain those functions. Critical infrastructure networks are exposed to natural events, such as floods, storms, landslides, earthquakes, etc. Recent natural disasters show that socio-economic consequences can be very much aggravated by the impact on these infrastructures. Though, there is still a lack of a recognized approach or methodology to assess the vulnerability of critical infrastructure assets against natural threats. The difficulty to define such an approach is increased by the need to consider a very high number of natural events, which differ in nature, magnitude and probability, as well as the need to assess the vulnerability of a high variety of infrastructure assets (e.g. bridges, roads, tunnels, pipelines, etc.) To meet this challenge, the objective of the THREVI2 EU-CIPS project is to create a database linking the relationships between natural hazards and critical infrastructure assets. The query of the database will allow the end-users (critical infrastructure protection authorities and operators) to identify the relevant scenarios according to the own priorities and criteria. The database builds on an ontology optimized for the assessment of the impact of threats on critical infrastructures. The ontology aims at capturing the existing knowledge on natural hazards, critical infrastructures assets and their related vulnerabilities. Natural phenomena that can threaten critical infrastructures are classified as "events", and organized in a genetic-oriented hierarchy. The main attributes associated to each event are the probability, the magnitude and the "modus". The modus refers to the

  19. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    Energy Technology Data Exchange (ETDEWEB)

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  20. Critical Infrastructure for Ocean Research and Societal Needs in 2030

    Energy Technology Data Exchange (ETDEWEB)

    National Research Council

    2011-04-22

    The United States has jurisdiction over 3.4 million square miles of ocean expanse greater than the land area of all fifty states combined. This vast marine area offers researchers opportunities to investigate the ocean's role in an integrated Earth system, but also presents challenges to society, including damaging tsunamis and hurricanes, industrial accidents, and outbreaks of waterborne diseases. The 2010 Gulf of Mexico Deepwater Horizon oil spill and 2011 Japanese earthquake and tsunami are vivid reminders that a broad range of infrastructure is needed to advance our still-incomplete understanding of the ocean. The National Research Council (NRC)'s Ocean Studies Board was asked by the National Science and Technology Council's Subcommittee on Ocean Science and Technology, comprised of 25 U.S. government agencies, to examine infrastructure needs for ocean research in the year 2030. This request reflects concern, among a myriad of marine issues, over the present state of aging and obsolete infrastructure, insufficient capacity, growing technological gaps, and declining national leadership in marine technological development; issues brought to the nation's attention in 2004 by the U.S. Commission on Ocean Policy. A 15-member committee of experts identified four themes that encompass 32 future ocean research questions enabling stewardship of the environment, protecting life and property, promoting economic vitality, and increasing fundamental scientific understanding. Many of the questions in the report (e.g., sea level rise, sustainable fisheries, the global water cycle) reflect challenging, multidisciplinary science questions that are clearly relevant today, and are likely to take decades of effort to solve. As such, U.S. ocean research will require a growing suite of ocean infrastructure for a range of activities, such as high quality, sustained time series observations or autonomous monitoring at a broad range of spatial and temporal scales

  1. Risk Assessment of Critical Communication Infrastructure in Railways in Norway

    OpenAIRE

    Johnsen, Stig O.; Veen, Mona

    2013-01-01

    This paper discusses the significant findings of a risk assessment of infrastructure used in emergency communication by railways in Norway. The initial risk assessment was performed in 2008 and we have reviewed the results in 2010, documenting mitigating actions and their effect. The development of safety and security culture has also been evaluated. The risk assessment was based on a socio-technical approach, which considers technical, organizational and human factors. Action research was us...

  2. Critical supply network protection against intentional attacks: A game-theoretical model

    International Nuclear Information System (INIS)

    A crucial issue in today's critical supply chains is how to protect facilities against intentional attacks, since it has become unacceptable to ignore the high impact of low probability disruptions caused by these attacks. This article develops a game-theoretical model to deal with the protection of facilities, in the context of the uncapacitated fixed-charge location problem. Given a set of investment alternatives for protecting the facilities against identified threats, the objective is to select the optimal defence strategy. The attacker is considered as a player who tries to maximise the expected damage while weighing against the attacks expenditures. The conflict on facilities vulnerability is modelled using the concept of contest. The vulnerability of a facility is defined by its destruction probability. Contest success functions determine the vulnerability of each facility dependent on the relative investments of the defender and the attacker on each facility, and on the characteristics of the contest. A method is developed to evaluate the utilities of the players (i.e., the defender and the attacker). This method evaluates many expected costs, including the cost needed to restore disabled facilities, the backorder cost, and the cost incurred because of the increase in transportation costs after attacks. In fact, when one or several facilities are unavailable, transportation costs will increase since reassigned customers may receive shipments from facilities which are farther away. The model considers a non-cooperative two-period game between the players, and an algorithm is presented to determine the equilibrium solution and the optimal defence strategy. An illustrative example is presented. The approach is compared to other suggested strategies, and some managerial insights are provided in the context of facility location

  3. Approaches for assessment of vulnerability of critical infrastructures to weather-related hazards

    Science.gov (United States)

    Eidsvig, Unni; Uzielli, Marco; Vidar Vangelsten, Bjørn

    2016-04-01

    Critical infrastructures are essential components for the modern society to maintain its function, and malfunctioning of one of the critical infrastructure systems may have far-reaching consequences. Climate changes may lead to increase in frequency and intensity of weather-related hazards, creating challenges for the infrastructures. This paper outlines approaches to assess vulnerability posed by weather-related hazards to infrastructures. The approaches assess factors that affect the probability of a malfunctioning of the infrastructure should a weather-related threat occur, as well factors that affect the societal consequences of the infrastructure malfunctioning. Even if vulnerability factors are normally very infrastructure specific and hazard dependent, generic factors could be defined and analyzed. For the vulnerability and resilience of the infrastructure, such factors include e.g. robustness, buffer capacity, protection, quality, age, adaptability and transparency. For the vulnerability of the society in relation to the infrastructure, such factors include e.g. redundancy, substitutes and cascading effects. A semi-quantitative, indicator-based approach is proposed, providing schemes for ranking of the most important vulnerability indicators relevant for weather-related hazards on a relative scale. The application of the indicators in a semi-quantitative risk assessment is also demonstrated. In addition, a quantitative vulnerability model is proposed in terms of vulnerability (representing degree of loss) as a function of intensity, which is adaptable to different types of degree of loss (e.g. fraction of infrastructure users that lose their service, fraction of repair costs to full reconstruction costs). The vulnerability model can be calibrated with empirical data using deterministic calibration or a variety of probabilistic calibration approaches to account for the uncertainties within the model. The research leading to these results has received funding

  4. Evaluation of Critical Infrastructure in the Event of Earthquake: A Case Study of Delhi

    Science.gov (United States)

    prasad, Suraj

    2016-04-01

    With changing paradigms of disaster preparedness, the safety and security of critical infrastructure in the event of a geo-hazard has become increasingly important. In a developing and densely populated country like India, which is vulnerable to many different geo-hazards, a lack of clear policy directive regarding safety of such infrastructure could be especially damaging both in terms of life and property. The problem is most acute in India's mega cities, where inefficient infrastructure means that facilities like transportation, communication, and electricity generation are obsolete and vulnerable to sudden disruptions. The present study takes the case of the National Capital Territory of Delhi and attempts to examine the critical infrastructures of the city in the event of an earthquake. Delhi lies in a very active seismic zone with various faults in and around the city. The Government of India has classified Delhi in Zone 4 (High Risk Zone) based on past and expected seismic activities in the Indo-Gangetic Plains. With a population of over 20 Million in the Urban Agglomeration of Delhi, any major earthquake in an already overstretched infrastructure could have a devastating impact. This study will test the critical infrastructures of the city in terms of their disaster preparedness and suggest ways and measures to increase the same. Keywords: Geo-hazards, Critical Infrastructure, vulnerable, Earthquakes, Delhi

  5. Toward an ontology framework supporting the integration of geographic information with modeling and simulation for critical infrastructure protection

    Energy Technology Data Exchange (ETDEWEB)

    Ambrosiano, John J [Los Alamos National Laboratory; Bent, Russell W [Los Alamos National Laboratory; Linger, Steve P [Los Alamos National Laboratory

    2009-01-01

    Protecting the nation's infrastructure from natural disasters, inadvertent failures, or intentional attacks is a major national security concern. Gauging the fragility of infrastructure assets, and understanding how interdependencies across critical infrastructures affect their behavior, is essential to predicting and mitigating cascading failures, as well as to planning for response and recovery. Modeling and simulation (M&S) is an indispensable part of characterizing this complex system of systems and anticipating its response to disruptions. Bringing together the necessary components to perform such analyses produces a wide-ranging and coarse-grained computational workflow that must be integrated with other analysis workflow elements. There are many points in both types of work flows in which geographic information (GI) services are required. The GIS community recognizes the essential contribution of GI in this problem domain as evidenced by past OGC initiatives. Typically such initiatives focus on the broader aspects of GI analysis workflows, leaving concepts crucial to integrating simulations within analysis workflows to that community. Our experience with large-scale modeling of interdependent critical infrastructures, and our recent participation in a DRS initiative concerning interoperability for this M&S domain, has led to high-level ontological concepts that we have begun to assemble into an architecture that spans both computational and 'world' views of the problem, and further recognizes the special requirements of simulations that go beyond common workflow ontologies. In this paper we present these ideas, and offer a high-level ontological framework that includes key geospatial concepts as special cases of a broader view.

  6. Fragility: The Next Wave in Critical Infrastructure Protection

    Directory of Open Access Journals (Sweden)

    Allan McDougall

    2009-01-01

    Full Text Available In North America today, we are about to embark on a significant effort to repair, or even upgrade, many aspects of our infrastructure. Many of these efforts are linked to economic recovery packages. Others are based on sheer need. The challenge for decision makers and planners involves ensuring that scarce economic resources are put to their best use. Understanding the concept of fragility plays a pivotal part in reaching that understanding.Fragility, like many other systems—particularly Information Technology (IT systems—works on the concept of subjects and objects. Subjects are those entities that seek to exploit the services (or capacity offered by the object. Objects, on the other hand, are those entities that deliver some good or service to the overall system. Of course, something may act as the object in one pairing and the subject in another pairing—they are not exclusive in nature.

  7. On the Effectiveness of Security Countermeasures for Critical Infrastructures.

    Science.gov (United States)

    Hausken, Kjell; He, Fei

    2016-04-01

    A game-theoretic model is developed where an infrastructure of N targets is protected against terrorism threats. An original threat score is determined by the terrorist's threat against each target and the government's inherent protection level and original protection. The final threat score is impacted by the government's additional protection. We investigate and verify the effectiveness of countermeasures using empirical data and two methods. The first is to estimate the model's parameter values to minimize the sum of the squared differences between the government's additional resource investment predicted by the model and the empirical data. The second is to develop a multivariate regression model where the final threat score varies approximately linearly relative to the original threat score, sectors, and threat scenarios, and depends nonlinearly on the additional resource investment. The model and method are offered as tools, and as a way of thinking, to determine optimal resource investments across vulnerable targets subject to terrorism threats. PMID:25490927

  8. Resilience? Insights into the role of Critical Infrastructures Disaster Mitigation Strategies

    Directory of Open Access Journals (Sweden)

    Sara Bouchon

    2012-11-01

    Full Text Available Critical infrastructures (CI systems provide essential services “for the maintenance of critical societal functions, including the supply chain, health, safety, security and economic or social well-being of the people” (European Commission, 2008. These systems are exposed to a great number of hazards and threats, which may result in severe consequences for the population, the socio-economic system, and the environment. The issue is particularly relevant at urban level, where the disruption of one CI system can propagate to the other systems and paralyze the entire area. It is therefore necessary, not only to protect CIs through Critical Infrastructure Protection (CIP strategies, but also to enhance the resilience of these areas. This article aims thus at providing some insights related to the evolution of the critical infrastructures disaster mitigation strategies from the sole protection towards resilience: what kind of strategies based on resilience can be developed to address CIs disruption at local or regional level? To what extent do these strategies contribute to increase the resilience level of the entire urban or metropolitan area? The first section focuses on the urban critical infrastructures systems as well as on the way their disruption can impact urban areas. The second section provides with some examples of key measures to operationalize resilience in the field of critical infrastructure disaster mitigation strategies. The last section highlights how the key measures developed to enhance the resilience against CI disruptions can benefit also to broader urban resilience. 

  9. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  10. 75 FR 75611 - Critical Infrastructure Protection Month, 2010

    Science.gov (United States)

    2010-12-03

    ... the United States of America the two hundred and thirty-fifth. (Presidential Sig.) [FR Doc. 2010-30581..., 2010 Proclamation 8609--World AIDS Day, 2010 #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal... By the President of the United States of America A Proclamation During Critical...

  11. Interconnectedness and interdependencies of critical infrastructures in the US economy: Implications for resilience

    Science.gov (United States)

    Chopra, Shauhrat S.; Khanna, Vikas

    2015-10-01

    Natural disasters in 2011 yielded close to 55 billion in economic damages alone in the United States (US), which highlights the need to reduce impacts of such disasters or other deliberate attacks. The US Department of Homeland Security (DHS) identifies a list of 16 Critical Infrastructure Sectors (CIS) whose incapacity due to disruptions would have a debilitating impact on the nation's economy. The goal of this work is to understand the implications of interdependencies among CIS on the resilience of the US economic system as a whole. We develop a framework that combines the empirical economic input-output (EIO) model with graph theory based techniques for understanding interdependencies, interconnectedness and resilience in the US economic system. By representing the US economy as a network, we are able to analyze its topology by separately looking at its unweighted and weighted forms. Topological analysis of the US EIO network suggests that it exhibits small world properties for the unweighted case, and in the weighted case, the throughput of industry sectors follows a power-law with an exponential cutoff. Implications of these topological properties are discussed in the paper. We also simulate hypothetical disruptions on CIS in order to identify industrial sectors that experience the largest economic impacts, and to quantify systemic vulnerability in economic terms. In addition, insights from community detection and hypothetical disruption scenarios help assess vulnerability of individual industrial communities to disruptions on individual CIS. These methodologies also provide insights regarding the extent of coupling between each CIS in the US EIO network. Based on our analysis, we observe that excessive interconnectedness and interdependencies of CIS results in high systemic vulnerability. This information can guide policymakers to design policies that improve resilience of economic networks, and evaluate policies that might indirectly increase coupling

  12. Insurance and critical infrastructure protection : is there a connection in an environment of terrorism?

    International Nuclear Information System (INIS)

    This paper investigated the potential role of the insurance industry in enhancing the protection of critical energy infrastructure (CEI). This analysis was conducted in the context of increased concerns about deliberate acts of sabotage related to terrorist activities. A theoretical insurance market analysis was applied to a CEI scenario in order to examine the effects that insurance might have on the vulnerability of the system and subsequent remediation activities. Classical insurance market structures were examined, and problems associated with adverse selection, moral hazards and the role of government were identified. Issues concerning incentive effects induced by insurance were reviewed, as well as issues concerning the interdependence between different operators of the CEI system. An updated literature review was also provided. Results of the study suggested that corporate losses to CEI owners may be far less than the social cost of energy disruption, which in turn provides a reasonable rationale for government as opposed to private intervention. In terms of remediation, the immediate impact of a crippled CEI would overwhelm any private organization, and response would need to be coordinated through public structures. Terrorism insurance, while available, provides relatively large deductibles, as insurance companies are unwilling to accept the risks of moderate damage that may arise. There does not appear to be any evidence that private insurers will be able to provide significant relief from terrorist attacks, and it is unlikely that a private insurance market for terrorism will emerge. An absence of information regarding terrorist activities constrains both insurance purchasers from choosing the best mix of risk management tools, as well as insurance companies seeking to establish the appropriate pricing and conditions for different contracts. It was concluded that governments should support CEI firms in their own efforts to understand the threats; aid in

  13. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi and P. Tropea

    2012-01-01

    The CMS Infrastructures teams are preparing for the LS1 activities. A long list of maintenance, consolidation and upgrade projects for CMS Infrastructures is on the table and is being discussed among Technical Coordination and sub-detector representatives. Apart from the activities concerning the cooling infrastructures (see below), two main projects have started: the refurbishment of the SX5 building, from storage area to RP storage and Muon stations laboratory; and the procurement of a new dry-gas (nitrogen and dry air) plant for inner detector flushing. We briefly present here the work done on the first item, leaving the second one for the next CMS Bulletin issue. The SX5 building is entering its third era, from main assembly building for CMS from 2000 to 2007, to storage building from 2008 to 2012, to RP storage and Muon laboratory during LS1 and beyond. A wall of concrete blocks has been erected to limit the RP zone, while the rest of the surface has been split between the ME1/1 and the CSC/DT laborat...

  14. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi and P. Tropea

    2011-01-01

    Most of the work relating to Infrastructure has been concentrated in the new CSC and RPC manufactory at building 904, on the Prevessin site. Brand new gas distribution, powering and HVAC infrastructures are being deployed and the production of the first CSC chambers has started. Other activities at the CMS site concern the installation of a new small crane bridge in the Cooling technical room in USC55, in order to facilitate the intervention of the maintenance team in case of major failures of the chilled water pumping units. The laser barrack in USC55 has been also the object of a study, requested by the ECAL community, for the new laser system that shall be delivered in few months. In addition, ordinary maintenance works have been performed during the short machine stops on all the main infrastructures at Point 5 and in preparation to the Year-End Technical Stop (YETS), when most of the systems will be carefully inspected in order to ensure a smooth running through the crucial year 2012. After the incide...

  15. Assessing the dynamic material criticality of infrastructure transitions: A case of low carbon electricity

    International Nuclear Information System (INIS)

    Highlights: • We present a method to analyse material criticality of infrastructure transitions. • Criticality is defined as the potential for, and exposure to, supply disruption. • Our method is dynamic reducing the probability of lock-in to at-risk technologies. • We show that supply disruption potential is reducing but exposure is increasing. - Abstract: Decarbonisation of existing infrastructure systems requires a dynamic roll-out of technology at an unprecedented scale. The potential disruption in supply of critical materials could endanger such a transition to low-carbon infrastructure and, by extension, compromise energy security more broadly because low carbon technologies are reliant on these materials in a way that fossil-fuelled energy infrastructure is not. Criticality is currently defined as the combination of the potential for supply disruption and the exposure of a system of interest to that disruption. We build on this definition and develop a dynamic approach to quantifying criticality, which monitors the change in criticality during the transition towards a low-carbon infrastructure goal. This allows us to assess the relative risk of different technology pathways to reach a particular goal and reduce the probability of being ‘locked in’ to currently attractive but potentially future-critical technologies. To demonstrate, we apply our method to criticality of the proposed UK electricity system transition, with a focus on neodymium. We anticipate that the supply disruption potential of neodymium will decrease by almost 30% by 2050; however, our results show the criticality of low carbon electricity production increases ninefold over this period, as a result of increasing exposure to neodymium-reliant technologies

  16. INFRASTRUCTURE

    CERN Multimedia

    Andrea Gaddi

    2010-01-01

    In addition to the intense campaign of replacement of the leaky bushing on the Endcap circuits, other important activities have also been completed, with the aim of enhancing the overall reliability of the cooling infrastructures at CMS. Remaining with the Endcap circuit, the regulating valve that supplies cold water to the primary side of the circuit heat-exchanger, is not well adapted in flow capability and a new part has been ordered, to be installed during a stop of LHC. The instrumentation monitoring of the refilling rate of the circuits has been enhanced and we can now detect leaks as small as 0.5 cc/sec, on circuits that have nominal flow rates of some 20 litres/sec. Another activity starting now that the technical stop is over is the collection of spare parts that are difficult to find on the market. These will be stored at P5 with the aim of reducing down-time in case of component failure. Concerning the ventilation infrastructures, it has been noticed that in winter time the relative humidity leve...

  17. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    Energy Technology Data Exchange (ETDEWEB)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  18. Failure of adaptive self-organized criticality during epileptic seizure attacks.

    Science.gov (United States)

    Meisel, Christian; Storch, Alexander; Hallmeyer-Elgner, Susanne; Bullmore, Ed; Gross, Thilo

    2012-01-01

    Critical dynamics are assumed to be an attractive mode for normal brain functioning as information processing and computational capabilities are found to be optimal in the critical state. Recent experimental observations of neuronal activity patterns following power-law distributions, a hallmark of systems at a critical state, have led to the hypothesis that human brain dynamics could be poised at a phase transition between ordered and disordered activity. A so far unresolved question concerns the medical significance of critical brain activity and how it relates to pathological conditions. Using data from invasive electroencephalogram recordings from humans we show that during epileptic seizure attacks neuronal activity patterns deviate from the normally observed power-law distribution characterizing critical dynamics. The comparison of these observations to results from a computational model exhibiting self-organized criticality (SOC) based on adaptive networks allows further insights into the underlying dynamics. Together these results suggest that brain dynamics deviates from criticality during seizures caused by the failure of adaptive SOC. PMID:22241971

  19. Failure of adaptive self-organized criticality during epileptic seizure attacks.

    Directory of Open Access Journals (Sweden)

    Christian Meisel

    2012-01-01

    Full Text Available Critical dynamics are assumed to be an attractive mode for normal brain functioning as information processing and computational capabilities are found to be optimal in the critical state. Recent experimental observations of neuronal activity patterns following power-law distributions, a hallmark of systems at a critical state, have led to the hypothesis that human brain dynamics could be poised at a phase transition between ordered and disordered activity. A so far unresolved question concerns the medical significance of critical brain activity and how it relates to pathological conditions. Using data from invasive electroencephalogram recordings from humans we show that during epileptic seizure attacks neuronal activity patterns deviate from the normally observed power-law distribution characterizing critical dynamics. The comparison of these observations to results from a computational model exhibiting self-organized criticality (SOC based on adaptive networks allows further insights into the underlying dynamics. Together these results suggest that brain dynamics deviates from criticality during seizures caused by the failure of adaptive SOC.

  20. Comparison of ICM with TPF-LEP to Prevent MAC Spoof DoS Attack in Wireless Local Area Infrastructure Network

    OpenAIRE

    Durairaj, M; A. Persia

    2014-01-01

    A Comparison of Integrated Central Manager (ICM) and Traffic Pattern Filtering with Letter Envelop Protocol (TPF-LEP) is done. Denial of Service (DoS) attack is a biggest peril in wireless local area infrastructure network. It makes the resources unavailable for intended users which transpired through spoofing legitimate Client/AP's Medium Access Control (MAC) address. MAC address are easily caricatured by the adversary clients, subsequently they are not encrypted. Since, the adversary sends ...

  1. Alberta's current market structure and future vision : transmission, critical infrastructure

    International Nuclear Information System (INIS)

    Alberta's ongoing economic growth depends on reliable electricity, particularly as the province becomes the supplier of energy for North America. This paper addressed issues regarding Alberta's need for a robust power transmission system to ensure a quality electricity supply and to facilitate competitive market and investment in new supply. The Alberta Electric System Operator (AESO) facilitates a fair and open competitive and sustainable market for electricity and provides for the economic operation of the Alberta Interconnected Electric System. The AESO suggested that more than $3 billion may be needed in new transmission in the next 10 to 15 years. A first 500 kV line from Edmonton to Calgary is critical for ongoing reliability and to connect new supply in the Wabamun Lake area. The importance of strengthening interties with neighbouring jurisdictions was also discussed. A review of Alberta's electricity load and supply revealed that more than 3,000 MW of new generation have been added since 2001. A 10-year outlook (2007 to 2016) revealed an expected 3 per cent average annual growth rate in energy and peak demand, with a need for 3,800 MW of new generation by 2016. Since Alberta depends on a competitive market to provide a sufficient supply of electricity, confidence in market structure and operation is crucial. The AESO is working on developing and implementing a set of market and regulatory stability objectives in consultation with stakeholders in order to guide the evolution of the electricity market. The AESO has plans to interface Alberta's framework with the Electric Reliability Organization and to implement mandatory reliability standards. It also has plans to harmonize the AESO's tariff, market rules, and participant contracts to ensure consistency. tabs., figs

  2. Cyber and physical infrastructure interdependencies.

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

    2008-09-01

    The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

  3. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    Energy Technology Data Exchange (ETDEWEB)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  4. Comparison of ICM with TPF-LEP to Prevent MAC Spoof DoS Attack in Wireless Local Area Infrastructure Network

    Directory of Open Access Journals (Sweden)

    M. Durairaj

    2014-05-01

    Full Text Available A Comparison of Integrated Central Manager (ICM and Traffic Pattern Filtering with Letter Envelop Protocol (TPF-LEP is done. Denial of Service (DoS attack is a biggest peril in wireless local area infrastructure network. It makes the resources unavailable for intended users which transpired through spoofing legitimate Client/AP's Medium Access Control (MAC address. MAC address are easily caricatured by the adversary clients, subsequently they are not encrypted. Since, the adversary sends the management frame, which is unencrypted, to the victim using spoofed MAC address. This study compares the performance of Integrated Central Manager (ICM and Traffic Pattern Filtering with Letter Envelop Protocol (TPF-LEP and evaluated the result using NS2. The attack scenario is simulated and effectiveness of the solutions is validated after the instigation of solutions in the attack consequences. Throughput, Packet Delivery Ratio and Packet Loss are measured and taken to endorse the performance of ICM and TPF-LEP.

  5. Volcanic hazards at distant critical infrastructure: A method for bespoke, multi-disciplinary assessment

    Science.gov (United States)

    Odbert, H. M.; Aspinall, W.; Phillips, J.; Jenkins, S.; Wilson, T. M.; Scourse, E.; Sheldrake, T.; Tucker, P.; Nakeshree, K.; Bernardara, P.; Fish, K.

    2015-12-01

    Societies rely on critical services such as power, water, transport networks and manufacturing. Infrastructure may be sited to minimise exposure to natural hazards but not all can be avoided. The probability of long-range transport of a volcanic plume to a site is comparable to other external hazards that must be considered to satisfy safety assessments. Recent advances in numerical models of plume dispersion and stochastic modelling provide a formalized and transparent approach to probabilistic assessment of hazard distribution. To understand the risks to critical infrastructure far from volcanic sources, it is necessary to quantify their vulnerability to different hazard stressors. However, infrastructure assets (e.g. power plantsand operational facilities) are typically complex systems in themselves, with interdependent components that may differ in susceptibility to hazard impact. Usually, such complexity means that risk either cannot be estimated formally or that unsatisfactory simplifying assumptions are prerequisite to building a tractable risk model. We present a new approach to quantifying risk by bridging expertise of physical hazard modellers and infrastructure engineers. We use a joint expert judgment approach to determine hazard model inputs and constrain associated uncertainties. Model outputs are chosen on the basis of engineering or operational concerns. The procedure facilitates an interface between physical scientists, with expertise in volcanic hazards, and infrastructure engineers, with insight into vulnerability to hazards. The result is a joined-up approach to estimating risk from low-probability hazards to critical infrastructure. We describe our methodology and show preliminary results for vulnerability to volcanic hazards at a typical UK industrial facility. We discuss our findings in the context of developing bespoke assessment of hazards from distant sources in collaboration with key infrastructure stakeholders.

  6. Counter terrorism functions to enhance critical infrastructure resilience against CBRNe terrorism

    NARCIS (Netherlands)

    Bonsen, I.M.; Gaasbeek, R.C.

    2009-01-01

    Current approaches in critical infrastructure protection use long lists of items that fail to give its user a structured answer to the state of protection of its object. The functionality approach uses different terrorist functions to structure the threat (which are to have intent, to scout, to tran

  7. 77 FR 68795 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Science.gov (United States)

    2012-11-16

    ... SECURITY Protected Critical Infrastructure Information (PCII) Office Self- Assessment Questionnaire AGENCY.... See 6 CFR 29.4(d). This questionnaire is designed to gather information from PCII Officers that will... Information (PCII) Office Self-Assessment Questionnaire. OMB Number: 1670-NEW. Frequency: Annually....

  8. 78 FR 29375 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Science.gov (United States)

    2013-05-20

    ... SECURITY Protected Critical Infrastructure Information (PCII) Office Self- Assessment Questionnaire AGENCY... Officer Questionnaire. DHS previously published this ICR in the Federal Register on November 26, 2012, for...). This questionnaire is designed to gather information from PCII Officers that can be used to...

  9. 78 FR 39712 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-07-02

    ... International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi... Renewable Energy and Energy Efficiency Executive Business Development Mission, 78 FR 6807, January 31, 2013..., until the maximum of 20 participants is selected, all interested U.S. IT and cyber-security firms...

  10. R&D activities in Europe on critical information infrastructure protection

    NARCIS (Netherlands)

    Bologna, S.; Luiijf, H.A.M.; Setola, R.

    2008-01-01

    In the last few years, there has been an increasing worry about Critical Information Infrastructures, their reliability, security and protection. Due to the huge complexity and novelty of the topic and the new challenge that it poses, world-wide large investment in R&D are planned for the future. Ou

  11. Interdependency control : compensation strategies for the inherent vulnerability of critical infrastructure networks

    International Nuclear Information System (INIS)

    Today's increasingly interacting national critical infrastructures (NCIs) can tolerate most stochastic local disturbances. However, they are extremely fragile under global disturbances, as the latter may either push the whole system into a critical state or reveal many unexpected hidden interdependencies, inducing or triggering cascading failures among all possible layers. This robust yet fragile duality is an inherent vulnerability of modern infrastructures. It is therefore expected that weather-related disasters will be more frequent under a changing climate. This paper proposed an interdependency control strategy (ICS) that would maintain the survival of the most critical services, and compensate for this inherent vulnerability during emergency states. The paper also proposed a generalized adjacency matrix (GAM) to represent the physical interdependencies intra/inter of various infrastructure networks. The vulnerable section in the network can be identified, based on computed results of GAM, number of islands in the network, and influence domain(s) of each component. These features render ICS more effective and convincing. Last, the paper proposed a survivability index for isolated sub-networks and described relevant measures for improving this index during the four phases of emergency management. It was concluded that the proposed strategy is an effective means to reduce the inherent vulnerability and increase the resiliency of these critical infrastructures networks. 20 refs., 5 figs

  12. Resilience? Insights into the role of Critical Infrastructures Disaster Mitigation Strategies

    OpenAIRE

    Sara Bouchon; Carmelo Di Mauro

    2012-01-01

    Critical infrastructures (CI) systems provide essential services “for the maintenance of critical societal functions, including the supply chain, health, safety, security and economic or social well-being of the people” (European Commission, 2008). These systems are exposed to a great number of hazards and threats, which may result in severe consequences for the population, the socio-economic system, and the environment. The issue is particularly relevant at urban level, where the...

  13. INFRASTRUCTURE

    CERN Multimedia

    Andrea Gaddi

    2010-01-01

    During the last six months, the main activity on the cooling circuit has essentially been preventive maintenance. At each short machine technical stop, a water sample is extracted out of every cooling circuit to measure the induced radioactivity. Soon after, a visual check of the whole detector cooling network is done, looking for water leaks in sensitive locations. Depending on sub-system availability, the main water filters are replaced; the old ones are inspected and sent to the CERN metallurgical lab in case of suspicious sediments. For the coming winter technical stop, a number of corrective maintenance activities and infrastructure consolidation work-packages are foreseen. A few faulty valves, found on the muon system cooling circuit, will be replaced; the cooling gauges for TOTEM and CASTOR, in the CMS Forward region, will be either changed or shielded against the magnetic stray field. The demineralizer cartridges will be replaced as well. New instrumentation will also be installed in the SCX5 PC farm ...

  14. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi and P. Tropea

    2013-01-01

      Most of the CMS infrastructures at P5 will go through a heavy consolidation-work period during LS1. All systems, from the cryogenic plant of the superconducting magnet to the rack powering in the USC55 counting rooms, from the cooling circuits to the gas distribution, will undergo consolidation work. As announced in the last issue of the CMS Bulletin, we present here one of the consolidation projects of LS1: the installation of a new dry-gas plant for inner detectors inertion. So far the oxygen and humidity suppression inside the CMS Tracker and Pixel volumes were assured by flushing dry nitrogen gas evaporated from a large liquid nitrogen tank. For technical reasons, the maximum flow is limited to less than 100 m3/h and the cost of refilling the tank every two weeks with liquid nitrogen is quite substantial. The new dry-gas plant will supply up to 400 m3/h of dry nitrogen (or the same flow of dry air, during shut-downs) with a comparatively minimal operation cost. It has been evaluated that the...

  15. INFRASTRUCTURE

    CERN Multimedia

    Andrea Gaddi

    With all the technical services running, the attention has moved toward the next shutdown that will be spent to perform those modifications needed to enhance the reliability of CMS Infrastructures. Just to give an example for the cooling circuit, a set of re-circulating bypasses will be installed into the TS/CV area to limit the pressure surge when a circuit is partially shut-off. This problem has affected especially the Endcap Muon cooling circuit in the past. Also the ventilation of the UXC55 has to be revisited, allowing the automatic switching to full extraction in case of magnet quench. (Normally 90% of the cavern air is re-circulated by the ventilation system.) Minor modifications will concern the gas distribution, while the DSS action-matrix has to be refined according to the experience gained with operating the detector for a while. On the powering side, some LV power lines have been doubled and the final schematics of the UPS coverage for the counting rooms have been released. The most relevant inte...

  16. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi

    The long winter shut-down allows for modifications that will improve the reliability of the detector infrastructures at P5. The annual maintenance of detector services is taking place as well. This means a full stop of water-cooling circuits from November 24th with a gradual restart from mid January 09. The annual maintenance service includes the cleaning of the two SF5 cooling towers, service of the chiller plants on the surface, and the cryogenic plant serving the CMS Magnet. In addition, the overall site power is reduced from 8MW to 2MW, compatible with the switchover to the Swiss power network in winter. Full power will be available again from end of January. Among the modification works planned, the Low Voltage cabinets are being refurbished; doubling the cable sections and replacing the 40A circuit breakers with 60A types. This will reduce the overheating that has been experienced. Moreover, two new LV transformers will be bought and pre-cabled in order to assure a quick swap in case of failure of any...

  17. INFRASTRUCTURE

    CERN Multimedia

    Andrea Gaddi.

    The various water-cooling circuits ran smoothly over the summer. The overall performance of the cooling system is satisfactory, even if some improvements are possible, concerning the endcap water-cooling and the C6F14 circuits. In particular for the endcap cooling circuit, we aim to lower the water temperature, to provide more margin for RPC detectors. An expert-on-call piquet has been established during the summer global run, assuring the continuous supervision of the installations. An effort has been made to collect and harmonize the existing documentation on the cooling infrastructures at P5. The last six months have seen minor modifications to the electrical power network at P5. Among these, the racks in USC55 for the Tracker and Sniffer systems, which are backed up by the diesel generator in case of power outage, have been equipped with new control boxes to allow a remote restart. Other interventions have concerned the supply of assured power to those installations that are essential for CMS to run eff...

  18. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi

    2011-01-01

    During the last winter technical stop, a number of corrective maintenance activities and infrastructure consolidation work-packages were completed. On the surface, the site cooling facility has passed the annual maintenance process that includes the cleaning of the two evaporative cooling towers, the maintenance of the chiller units and the safety checks on the software controls. In parallel, CMS teams, reinforced by PH-DT group personnel, have worked to shield the cooling gauges for TOTEM and CASTOR against the magnetic stray field in the CMS Forward region, to add labels to almost all the valves underground and to clean all the filters in UXC55, USC55 and SCX5. Following the insertion of TOTEM T1 detector, the cooling circuit has been branched off and commissioned. The demineraliser cartridges have been replaced as well, as they were shown to be almost saturated. New instrumentation has been installed in the SCX5 PC farm cooling and ventilation network, in order to monitor the performance of the HVAC system...

  19. Public Health Emergency Operations Center - A critical component of mass gatherings management infrastructure.

    Science.gov (United States)

    Elachola, Habidah; Al-Tawfiq, Jaffar A; Turkestani, Abdulhafiz; Memish, Ziad A

    2016-01-01

    Mass gatherings (MG) are characterized by the influx of large numbers of people with the need to have infrastructural changes to support these gatherings. Thus, Public Health Emergency Operations Center (PHEOC) is critical management infrastructure for both the delivery of public health functions and for mounting adequate response during emergencies. The recognition of the importance of PHEOC at the leadership and political level is foundational for the success of any public health intervention during MG. The ability of the PHEOC to effectively function depends on appropriate design and infrastructure, staffing and command structure, and plans and procedures developed prior to the event. Multi-ministerial or jurisdictional coordination will be required and PHEOC should be positioned with such authorities. This paper outlines the essential concepts, elements, design, and operational aspects of PHEOC during MG. PMID:27580322

  20. Multi-Model Framework for Investigating Potential Climate Change Impacts on Interdependent Critical Infrastructure

    Science.gov (United States)

    Sylvester, L.; Allen, M. R.; Wilbanks, T. J.

    2015-12-01

    Built infrastructure consists of a series of interconnected networks with many coupled interdependencies. Traditionally, risk and vulnerability assessments are conducted one infrastructure at a time, considering only direct impacts on built and planned assets. However, extreme events caused by climate change affect local communities in different respects and stress vital interconnected infrastructures in complex ways that cannot be captured with traditional risk assessment methodologies. We employ a combination of high-performance computing, geographical information science, and imaging methods to examine the impacts of climate change on infrastructure for cities in two different climate regions: Chicago, Illinois in the Midwest and Portland, Maine (and Casco Bay area) in the Northeast. In Illinois, we evaluate effects of changes in regional temperature and precipitation, informed by an extreme climate change projection, population growth and migration, water supply, and technological development, on electricity generation and consumption. In Maine, we determine the aggregate effects of sea level rise, changing precipitation patterns, and population shifts on the depth of the freshwater-saltwater interface in coastal aquifers and the implications of these changes for water supply in general. The purpose of these efforts is to develop a multi-model framework for investigating potential climate change impacts on interdependent critical infrastructure assessing both vulnerabilities and alternative adaptive measures.

  1. Organizational Strategies for Critical Transportation Infrastructure: Characteristics of Urban Resilience. The Case of Montreal.

    Science.gov (United States)

    Beauregard, Stéphane; Therrien, Marie-Christine; Normandin, Julie-Maude

    2010-05-01

    Organizational Strategies for Critical Transportation Infrastructure: Characteristics of Urban Resilience. The Case of Montreal. Stéphane Beauregard M.Sc. Candidate École nationale d'administration publique Julie-Maude Normandin Ph.D. Candidate École nationale d'administration publique Marie-Christine Therrien Professor École nationale d'administration publique The proposed paper presents preliminary results on the resilience of organizations managing critical infrastructure in the Metropolitan Montreal area (Canada). A resilient city is characterized by a network of infrastructures and individuals capable of maintaining their activities in spite of a disturbance (Godschalk, 2002). Critical infrastructures provide essential services for the functioning of society. In a crisis situation, the interruption or a decrease in performance of critical infrastructures could have important impacts on the population. They are also vulnerable to accidents and cascading effects because on their complexity and tight interdependence (Perrow, 1984). For these reasons, protection and security of the essential assets and networks are one of the objectives of organizations and governments. But prevention and recovery are two endpoints of a continuum which include also intermediate concerns: ensuring organizational robustness or failing with elegance rather than catastrophically. This continuum also includes organizational resilience (or system), or the ability to recover quickly after an interruption has occurred. Wildavsky (1988) proposes that anticipation strategies work better against known problems while resilience strategies focus on unknown problems. Anticipation policies can unnecessarily immobilize investments against risks, while resilience strategies include the potential for a certain sacrifice in the interests of a more long-term survival and adaptation to changing threats. In addition, a too large confidence in anticipation strategies can bring loss of capacity of an

  2. U.S. national cyberstrategy and critical infrastructure: the protection mandate and its execution

    OpenAIRE

    Roper, Scott T.

    2013-01-01

    Approved for public release; distribution is unlimited The U.S has experienced numerous strategy assessments, with respect to cybersecurity of the national critical infrastructure and key resources (CI/KR). This is primarily due to the recurring realization of, but failure to address, root issues creating a clear disparity between the strategic national requirements and DHS execution of its mandate regarding the reactionary protection of CI/KR. This thesis compiles: (1) the current and pas...

  3. Adding value to critical infrastructure research and disaster risk management: the resilience concept

    OpenAIRE

    Bach, Claudia; BOUCHON Sara; Fekete, Alexander; Birkmann, Jörn; Serre, Damien

    2014-01-01

    In recent years, resilience has become a key term in disaster risk management (DRM). Its potential has been mainly discussed with respect to social-ecological systems as well as communities. With respect to Critical Infrastructures (CIs) however, resilience and vulnerability are often used without clear definition and reference to the DRM context. This paper aims to conceptualize vulnerability and resilience for the CI context. Building on socio-ecological approaches, the paper will outline t...

  4. Development of a structural health monitoring system for the life assessment of critical transportation infrastructure.

    Energy Technology Data Exchange (ETDEWEB)

    Roach, Dennis Patrick; Jauregui, David Villegas (New Mexico State University, Las Cruces, NM); Daumueller, Andrew Nicholas (New Mexico State University, Las Cruces, NM)

    2012-02-01

    Recent structural failures such as the I-35W Mississippi River Bridge in Minnesota have underscored the urgent need for improved methods and procedures for evaluating our aging transportation infrastructure. This research seeks to develop a basis for a Structural Health Monitoring (SHM) system to provide quantitative information related to the structural integrity of metallic structures to make appropriate management decisions and ensuring public safety. This research employs advanced structural analysis and nondestructive testing (NDT) methods for an accurate fatigue analysis. Metal railroad bridges in New Mexico will be the focus since many of these structures are over 100 years old and classified as fracture-critical. The term fracture-critical indicates that failure of a single component may result in complete collapse of the structure such as the one experienced by the I-35W Bridge. Failure may originate from sources such as loss of section due to corrosion or cracking caused by fatigue loading. Because standard inspection practice is primarily visual, these types of defects can go undetected due to oversight, lack of access to critical areas, or, in riveted members, hidden defects that are beneath fasteners or connection angles. Another issue is that it is difficult to determine the fatigue damage that a structure has experienced and the rate at which damage is accumulating due to uncertain history and load distribution in supporting members. A SHM system has several advantages that can overcome these limitations. SHM allows critical areas of the structure to be monitored more quantitatively under actual loading. The research needed to apply SHM to metallic structures was performed and a case study was carried out to show the potential of SHM-driven fatigue evaluation to assess the condition of critical transportation infrastructure and to guide inspectors to potential problem areas. This project combines the expertise in transportation infrastructure at New

  5. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  6. PROTECTING CRITICAL DATABASES – TOWARDS A RISK-BASED ASSESSMENT OF CRITICAL INFORMATION INFRASTRUCTURES (CIIS IN SOUTH AFRICA

    Directory of Open Access Journals (Sweden)

    Mzukisi N Njotini

    2013-04-01

    Full Text Available South Africa has made great strides towards protecting critical information infrastructures (CIIs. For example, South Africa recognises the significance of safeguarding places or areas that are essential to the national security of South Africa or the economic and social well-being of South African citizens. For this reason South Africa has established mechanisms to assist in preserving the integrity and security of CIIs. The measures provide inter alia for the identification of CIIs; the registration of the full names, address and contact details of the CII administrators (the persons who manage CIIs; the identification of the location(s of CIIs or their component parts; and the outlining of the general descriptions of information or data stored in CIIs.It is argued that the measures to protect CIIs in South Africa are inadequate. In particular, the measures rely on a one-size-fits-all approach to identify and classify CIIs. For this reason the South African measures are likely to lead to the adoption of a paradigm that considers every infrastructure, data or database, regardless of its significance or importance, to be key or critical.

  7. The ISTIMES project: a new integrated system for monitoring critical transport infrastructures interested by natural hazards

    Science.gov (United States)

    Proto, Monica; Massimo, Bavusi; Francesco, Soldovieri

    2010-05-01

    The research project "Integrated System for Transport Infrastructure surveillance and Monitoring by Electromagnetic Sensing" (ISTIMES), was approved in the 7th Framework Programme, in the Joint Call ICT and Security and started on 1st July 2009. The purpose of ISTIMES project is to design, assess and promote an ICT-based system, exploiting distributed and local sensors, for non-destructive electromagnetic monitoring in order to achieve the critical transport infrastructures more reliable and safe. The transportation sector's components are susceptible to the consequences of natural disasters and can also be attractive as terrorist targets. The sector's size, its physically dispersed and decentralized nature, the many public and private entities involved in its operations, the critical importance of cost considerations, and the inherent requirement of convenient accessibility to its services by all users - make the transportation particularly vulnerable to security and safety threats. As well known, the surface transportation system consists of interconnected infrastructures including highways, transit systems, railroads, airports, waterways, pipelines and ports, and the vehicles, aircraft, and vessels that operate along these networks. Thus, interdependencies exist between transportation and nearly every other sector of the economy and the effective operation of this system is essential to the European economic productivity; therefore, transportation sector protection is of paramount importance since threats to it may impact other industries that rely on it. The system exploits an open network architecture that can accommodate a wide range of sensors, static and mobile, and can be easily scaled up to allow the integration of additional sensors and interfacing with other networks. It relies on heterogeneous state-of-the-art electromagnetic sensors, enabling a self-organizing, self-healing, ad-hoc networking of terrestrial sensors, supported by specific satellite

  8. The ISTIMES project: a new integrated system for monitoring critical transport infrastructures interested by natural hazards

    Science.gov (United States)

    Proto, Monica; Massimo, Bavusi; Francesco, Soldovieri

    2010-05-01

    The research project "Integrated System for Transport Infrastructure surveillance and Monitoring by Electromagnetic Sensing" (ISTIMES), was approved in the 7th Framework Programme, in the Joint Call ICT and Security and started on 1st July 2009. The purpose of ISTIMES project is to design, assess and promote an ICT-based system, exploiting distributed and local sensors, for non-destructive electromagnetic monitoring in order to achieve the critical transport infrastructures more reliable and safe. The transportation sector's components are susceptible to the consequences of natural disasters and can also be attractive as terrorist targets. The sector's size, its physically dispersed and decentralized nature, the many public and private entities involved in its operations, the critical importance of cost considerations, and the inherent requirement of convenient accessibility to its services by all users - make the transportation particularly vulnerable to security and safety threats. As well known, the surface transportation system consists of interconnected infrastructures including highways, transit systems, railroads, airports, waterways, pipelines and ports, and the vehicles, aircraft, and vessels that operate along these networks. Thus, interdependencies exist between transportation and nearly every other sector of the economy and the effective operation of this system is essential to the European economic productivity; therefore, transportation sector protection is of paramount importance since threats to it may impact other industries that rely on it. The system exploits an open network architecture that can accommodate a wide range of sensors, static and mobile, and can be easily scaled up to allow the integration of additional sensors and interfacing with other networks. It relies on heterogeneous state-of-the-art electromagnetic sensors, enabling a self-organizing, self-healing, ad-hoc networking of terrestrial sensors, supported by specific satellite

  9. Reliability and vulnerability analyses of critical infrastructures: Comparing two approaches in the context of power systems

    International Nuclear Information System (INIS)

    Society depends on services provided by critical infrastructures, and hence it is important that they are reliable and robust. Two main approaches for gaining knowledge required for designing and improving critical infrastructures are reliability analysis and vulnerability analysis. The former analyses the ability of the system to perform its intended function; the latter analyses its inability to withstand strains and the effects of the consequent failures. The two approaches have similarities but also some differences with respect to what type of information they generate about the system. In this view, the main purpose of this paper is to discuss and contrast these approaches. To strengthen the discussion and exemplify its findings, a Monte Carlo-based reliability analysis and a vulnerability analysis are considered in their application to a relatively simple, but representative, system the IEEE RTS96 electric power test system. The exemplification reveals that reliability analysis provides a good picture of the system likely behaviour, but fails to capture a large portion of the high consequence scenarios, which are instead captured in the vulnerability analysis. Although these scenarios might be estimated to have small probabilities of occurrence, they should be identified, considered and treated cautiously, as probabilistic analyses should not be the only input to decision-making for the design and protection of critical infrastructures. The general conclusion that can be drawn from the findings of the example is that vulnerability analysis should be used to complement reliability studies, as well as other forms of probabilistic risk analysis. Measures should be sought for reducing both the vulnerability, i.e. improving the system ability to withstand strains and stresses, and the reliability, i.e. improving the likely behaviour

  10. The concept of resilience and protection of critical infrastructure against natural and man-made disasters in Republic of Macedonia

    OpenAIRE

    Hadji-Janev, Metodi; Jovanovski, Vlatko

    2013-01-01

    The paper argues that if Macedonia is about to enhance resilience to natural and man made disasters it must consider effective critical infrastructure protection. Identifying critical infrastructures that need to be protected, among others, will enable Macedonian society to withstand, absorb, adapt to the new situation and to bounce back effectively. During the research we have identified two problems. First there is no national consensus of what resilience means. Second there is no identifie...

  11. Complex Dynamics of the Power Transmission Grid (and other Critical Infrastructures)

    Science.gov (United States)

    Newman, David

    2015-03-01

    Our modern societies depend crucially on a web of complex critical infrastructures such as power transmission networks, communication systems, transportation networks and many others. These infrastructure systems display a great number of the characteristic properties of complex systems. Important among these characteristics, they exhibit infrequent large cascading failures that often obey a power law distribution in their probability versus size. This power law behavior suggests that conventional risk analysis does not apply to these systems. It is thought that much of this behavior comes from the dynamical evolution of the system as it ages, is repaired, upgraded, and as the operational rules evolve with human decision making playing an important role in the dynamics. In this talk, infrastructure systems as complex dynamical systems will be introduced and some of their properties explored. The majority of the talk will then be focused on the electric power transmission grid though many of the results can be easily applied to other infrastructures. General properties of the grid will be discussed and results from a dynamical complex systems power transmission model will be compared with real world data. Then we will look at a variety of uses of this type of model. As examples, we will discuss the impact of size and network homogeneity on the grid robustness, the change in risk of failure as generation mix (more distributed vs centralized for example) changes, as well as the effect of operational changes such as the changing the operational risk aversion or grid upgrade strategies. One of the important outcomes from this work is the realization that ``improvements'' in the system components and operational efficiency do not always improve the system robustness, and can in fact greatly increase the risk, when measured as a risk of large failure.

  12. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.

    Science.gov (United States)

    Wang, Maocai; Dai, Guangming; Choo, Kim-Kwang Raymond; Jayaraman, Prem Prakash; Ranjan, Rajiv

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al. PMID:27564373

  13. Resilience framework for critical infrastructures: An empirical study in a nuclear plant

    International Nuclear Information System (INIS)

    The safety and proper functioning of Critical Infrastructures (CIs) are essential for ensuring the welfare of society, which puts the issue of improving their resilience level at the forefront of the field of crisis management. Most of the resilience-building principles defined in the literature do not cover all the dimensions that make up resilience and most of them only focus within the boundaries of the CI, neglecting the role of the external agents that also have an influence on enhancing resilience. Furthermore, most of the principles that are present in the literature are theoretical and difficult to implement in practice. In light of this situation, the aim of this research is to present a holistic resilience framework for critical infrastructures in order to improve their resilience level by taking into account internal and external agents and covering all the resilience dimensions. Furthermore, this framework has been defined in close collaboration with the general management of CIs to facilitate its implementation in practice. Finally, in order to illustrate the value added of this framework it was implemented in a nuclear plant. - Highlights: • Resilience protects against foreseen and unpredicted events. • There are two types of resilience: internal resilience and external resilience. • Sixteen policies and thirty sub-policies assist on building resilience. • Power nuclear plant focused on risk management approach rather than resilience. • The plant’s event driven risk management was enhanced with an all hazard approach

  14. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  15. Research to protect water infrastructure: EPA's water security research program

    Science.gov (United States)

    Herrmann, Jonathan G.

    2005-05-01

    As the federal lead for water infrastructure security, EPA draws upon its long history of environmental protection to develop new tools and technologies that address potential attacks on drinking water and wastewater systems. The critical research described is improving awareness, preparedness, prevention, response, and recovery from threats or attacks against water systems.

  16. Will climate change increase the risk for critical infrastructure failures in Europe due to extreme precipitation?

    Science.gov (United States)

    Nissen, Katrin; Ulbrich, Uwe

    2016-04-01

    An event based detection algorithm for extreme precipitation is applied to a multi-model ensemble of regional climate model simulations. The algorithm determines extent, location, duration and severity of extreme precipitation events. We assume that precipitation in excess of the local present-day 10-year return value will potentially exceed the capacity of the drainage systems that protect critical infrastructure elements. This assumption is based on legislation for the design of drainage systems which is in place in many European countries. Thus, events exceeding the local 10-year return value are detected. In this study we distinguish between sub-daily events (3 hourly) with high precipitation intensities and long-duration events (1-3 days) with high precipitation amounts. The climate change simulations investigated here were conducted within the EURO-CORDEX framework and exhibit a horizontal resolution of approximately 12.5 km. The period between 1971-2100 forced with observed and scenario (RCP 8.5 and RCP 4.5) greenhouse gas concentrations was analysed. Examined are changes in event frequency, event duration and size. The simulations show an increase in the number of extreme precipitation events for the future climate period over most of the area, which is strongest in Northern Europe. Strength and statistical significance of the signal increase with increasing greenhouse gas concentrations. This work has been conducted within the EU project RAIN (Risk Analysis of Infrastructure Networks in response to extreme weather).

  17. Integration of resilience capabilities for Critical Infrastructures into the Emergency Management set-up

    DEFF Research Database (Denmark)

    Kozine, Igor; Andersen, Henning Boje

    2015-01-01

    We suggest an approach for maintaining and enhancing resilience that integrates the resilience capabilities of Critical Infrastructures (CIs) into the emergency management cycle (prevention, preparedness, response, and recovery). This allows emergency services to explicitly address resilience...... improvement measures while planning to cope with CI disruptions. To operationalise this approach we have developed a hierarchical taxonomy that classifies system resilience capabilities into intra- and interorganisational categories. Capabilities are defined as a combination of assets, resources and processes...... resilience capability building cycle completes the framework, enabling a systematic implementation of relevant capabilities and making gap analysis with regard to resilience deficits. The planning of training exercises to enhance CI resilience can also benefit from the approach....

  18. Building Critical Infrastructure resilience capacities into the Emergency Management set-up: a reference framework

    DEFF Research Database (Denmark)

    Trucco, P.; Petrenj, B.; Kozine, Igor;

    Improving the resilience capacities required to manage Critical Infrastructure (CI) disruptions includes also enhancement of current Emergency Management practices. Our approach aims to integrate CI-specific issues into the EM setup (prevention, mitigation, response, and recovery). This paper...... proposes a comprehensive framework to identify, build and enhance specific capabilities, both intra- and inter-organisational, needed to manage (prepare, cope and recover from) CI disruptions. This allows emergency services to assess and explicitly address resilience improvement measures while planning to...... cope with CI disruptions. To operationalise this approach we have developed a hierarchical taxonomy that classifies system resilience capabilities at both technological and organisational level in each single organisation (CI operator or responder). Capabilities are defined as a combination of assets...

  19. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    Energy Technology Data Exchange (ETDEWEB)

    Jaeger, Calvin D.; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  20. Monitoring and Control of Urban Critical Infrastructures: A Novel Approach to System Design and Data Fusion

    Directory of Open Access Journals (Sweden)

    Mario La Manna

    2015-02-01

    Full Text Available The monitoring and control of urban critical infrastructures consists of the protection of assets such as houses, offices, government and private buildings, with low cost, high quality and high dependability. In order to satisfy all these requirements at the same time, the control of a number of assets has to be performed by means of automated systems based on networks of heterogeneous sensors. This new concept idea is based on the use of unmanned operations at each of the many remote assets (each asset is monitored through a network of sensors and a man-in-the-loop automated control in a central site (Operational Center, which performs alarm detection and system management.

  1. 75 FR 9607 - National Protection and Programs Directorate; Critical Infrastructure Partnership Advisory...

    Science.gov (United States)

    2010-03-03

    ... Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register (71 FR 14930... response, recovery, infrastructure resilience, reconstituting CIKR assets and systems for both man-made as... infrastructure continuity information and best practices. Organizational Structure: CIPAC members are...

  2. Building safeguards infrastructure

    International Nuclear Information System (INIS)

    Much has been written in recent years about the nuclear renaissance - the rebirth of nuclear power as a clean and safe source of electricity around the world. Those who question the nuclear renaissance often cite the risk of proliferation, accidents or an attack on a facility as concerns, all of which merit serious consideration. The integration of three areas - sometimes referred to as 3S, for safety, security and safeguards - is essential to supporting the clean and safe growth of nuclear power, and the infrastructure that supports these three areas should be robust. The focus of this paper will be on the development of the infrastructure necessary to support safeguards, and the integration of safeguards infrastructure with other elements critical to ensuring nuclear energy security

  3. Risk prediction of Critical Infrastructures against extreme natural hazards: local and regional scale analysis

    Science.gov (United States)

    Rosato, Vittorio; Hounjet, Micheline; Burzel, Andreas; Di Pietro, Antonio; Tofani, Alberto; Pollino, Maurizio; Giovinazzi, Sonia

    2016-04-01

    Natural hazard events can induce severe impacts on the built environment; they can hit wide and densely populated areas, where there is a large number of (inter)dependent technological systems whose damages could cause the failure or malfunctioning of further different services, spreading the impacts on wider geographical areas. The EU project CIPRNet (Critical Infrastructures Preparedness and Resilience Research Network) is realizing an unprecedented Decision Support System (DSS) which enables to operationally perform risk prediction on Critical Infrastructures (CI) by predicting the occurrence of natural events (from long term weather to short nowcast predictions, correlating intrinsic vulnerabilities of CI elements with the different events' manifestation strengths, and analysing the resulting Damage Scenario. The Damage Scenario is then transformed into an Impact Scenario, where punctual CI element damages are transformed into micro (local area) or meso (regional) scale Services Outages. At the smaller scale, the DSS simulates detailed city models (where CI dependencies are explicitly accounted for) that are of important input for crisis management organizations whereas, at the regional scale by using approximate System-of-Systems model describing systemic interactions, the focus is on raising awareness. The DSS has allowed to develop a novel simulation framework for predicting earthquakes shake maps originating from a given seismic event, considering the shock wave propagation in inhomogeneous media and the subsequent produced damages by estimating building vulnerabilities on the basis of a phenomenological model [1, 2]. Moreover, in presence of areas containing river basins, when abundant precipitations are expected, the DSS solves the hydrodynamic 1D/2D models of the river basins for predicting the flux runoff and the corresponding flood dynamics. This calculation allows the estimation of the Damage Scenario and triggers the evaluation of the Impact Scenario

  4. Damages caused by floods and flash-floods upon critical infrastructures. Case study: Maramureş county (Romania

    Directory of Open Access Journals (Sweden)

    Eugen Nour

    2011-08-01

    Full Text Available Critical infrastructure is defined as a network including telecommunications, informationservices, energy transport (electrical lines, natural gas and oil pipes, water supply, goods and personstransportation, financial, banking and emergency response services. All these are so significant that adisequilibrium or interruption of their operation would have a disturbing effect upon the daily life.Estimating the damage done by natural hazards to certain critical infrastructure sectors is considered animportant interest topic. The main purpose of this research is the estimation of the damages generatedby floods and flash-floods on the critical infrastructure in Maramureş County during 2005-2010. Thedamages analysis is based mainly on observations and quantitative data, obtained after a thoroughanalysis of literature and reports from the Ministry of Environment and Forests and the Inspectorate forEmergency Situation of Maramureş County. The results of the study were alarming. The damages causedby floods during the period subjected to study reach approximately 32 million dollars, highlighting theneed for an integrated management system for critical infrastructure protection.

  5. Constructing a resilience index for the Enhanced Critical Infrastructure Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    Fisher, R. E.; Bassett, G. W.; Buehring, W. A.; Collins, M. J.; Dickinson, D. C.; Eaton, L. K.; Haffenden, R. A.; Hussar, N. E.; Klett, M. S.; Lawlor, M. A.; Millier, D. J.; Petit, F. D.; Peyton, S. M.; Wallace, K. E.; Whitfield, R. G.; Peerenboom, J P

    2010-10-14

    Following recommendations made in Homeland Security Presidential Directive 7, which established a national policy for the identification and increased protection of critical infrastructure and key resources (CIKR) by Federal departments and agencies, the U.S. Department of Homeland Security (DHS) in 2006 developed the Enhanced Critical Infrastructure Protection (ECIP) program. The ECIP program aimed to provide a closer partnership with state, regional, territorial, local, and tribal authorities in fulfilling the national objective to improve CIKR protection. The program was specifically designed to identify protective measures currently in place in CIKR and to inform facility owners/operators of the benefits of new protective measures. The ECIP program also sought to enhance existing relationships between DHS and owners/operators of CIKR and to build relationships where none existed (DHS 2008; DHS 2009). In 2009, DHS and its protective security advisors (PSAs) began assessing CIKR assets using the ECIP program and ultimately produced individual protective measure and vulnerability values through the protective measure and vulnerability indices (PMI/VI). The PMI/VI assess the protective measures posture of individual facilities at their 'weakest link,' allowing for a detailed analysis of the most vulnerable aspects of the facilities (Schneier 2003), while maintaining the ability to produce an overall protective measures picture. The PMI has six main components (physical security, security management, security force, information sharing, protective measures assessments, and dependencies) and focuses on actions taken by a facility to prevent or deter the occurrence of an incident (Argonne National Laboratory 2009). As CIKR continue to be assessed using the PMI/VI and owners/operators better understand how they can prevent or deter incidents, academic research, practitioner emphasis, and public policy formation have increasingly focused on resilience as a

  6. Constructing vulnerabilty and protective measures indices for the enhanced critical infrastructure protection program.

    Energy Technology Data Exchange (ETDEWEB)

    Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.; Bassett, G. W.; Dickinson, D. C.; Haffenden, R. A.; Klett, M. S.; Lawlor, M. A.; Decision and Information Sciences; LANL

    2009-10-14

    The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators of the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The

  7. Real-time threat assessment for critical infrastructure protection: data incest and conflict in evidential reasoning

    Science.gov (United States)

    Brandon, R.; Page, S.; Varndell, J.

    2012-06-01

    This paper presents a novel application of Evidential Reasoning to Threat Assessment for critical infrastructure protection. A fusion algorithm based on the PCR5 Dezert-Smarandache fusion rule is proposed which fuses alerts generated by a vision-based behaviour analysis algorithm and a-priori watch-list intelligence data. The fusion algorithm produces a prioritised event list according to a user-defined set of event-type severity or priority weightings. Results generated from application of the algorithm to real data and Behaviour Analysis alerts captured at London's Heathrow Airport under the EU FP7 SAMURAI programme are presented. A web-based demonstrator system is also described which implements the fusion process in real-time. It is shown that this system significantly reduces the data deluge problem, and directs the user's attention to the most pertinent alerts, enhancing their Situational Awareness (SA). The end-user is also able to alter the perceived importance of different event types in real-time, allowing the system to adapt rapidly to changes in priorities as the situation evolves. One of the key challenges associated with fusing information deriving from intelligence data is the issue of Data Incest. Techniques for handling Data Incest within Evidential Reasoning frameworks are proposed, and comparisons are drawn with respect to Data Incest management techniques that are commonly employed within Bayesian fusion frameworks (e.g. Covariance Intersection). The challenges associated with simultaneously dealing with conflicting information and Data Incest in Evidential Reasoning frameworks are also discussed.

  8. Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor

    Energy Technology Data Exchange (ETDEWEB)

    Ondrej Linda; Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-08-01

    Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.

  9. Natural disaster risk analysis for critical infrastructure systems: An approach based on statistical learning theory

    International Nuclear Information System (INIS)

    Probabilistic risk analysis has historically been developed for situations in which measured data about the overall reliability of a system are limited and expert knowledge is the best source of information available. There continue to be a number of important problem areas characterized by a lack of hard data. However, in other important problem areas the emergence of information technology has transformed the situation from one characterized by little data to one characterized by data overabundance. Natural disaster risk assessments for events impacting large-scale, critical infrastructure systems such as electric power distribution systems, transportation systems, water supply systems, and natural gas supply systems are important examples of problems characterized by data overabundance. There are often substantial amounts of information collected and archived about the behavior of these systems over time. Yet it can be difficult to effectively utilize these large data sets for risk assessment. Using this information for estimating the probability or consequences of system failure requires a different approach and analysis paradigm than risk analysis for data-poor systems does. Statistical learning theory, a diverse set of methods designed to draw inferences from large, complex data sets, can provide a basis for risk analysis for data-rich systems. This paper provides an overview of statistical learning theory methods and discusses their potential for greater use in risk analysis

  10. Attenuation of Storm Surge Flooding By Wetlands in the Chesapeake Bay: An Integrated Geospatial Framework Evaluating Impacts to Critical Infrastructure

    Science.gov (United States)

    Khalid, A.; Haddad, J.; Lawler, S.; Ferreira, C.

    2014-12-01

    Areas along the Chesapeake Bay and its tributaries are extremely vulnerable to hurricane flooding, as evidenced by the costly effects and severe impacts of recent storms along the Virginia coast, such as Hurricane Isabel in 2003 and Hurricane Sandy in 2012. Coastal wetlands, in addition to their ecological importance, are expected to mitigate the impact of storm surge by acting as a natural protection against hurricane flooding. Quantifying such interactions helps to provide a sound scientific basis to support planning and decision making. Using storm surge flooding from various historical hurricanes, simulated using a coupled hydrodynamic wave model (ADCIRC-SWAN), we propose an integrated framework yielding a geospatial identification of the capacity of Chesapeake Bay wetlands to protect critical infrastructure. Spatial identification of Chesapeake Bay wetlands is derived from the National Wetlands Inventory (NWI), National Land Cover Database (NLCD), and the Coastal Change Analysis Program (C-CAP). Inventories of population and critical infrastructure are extracted from US Census block data and FEMA's HAZUS-Multi Hazard geodatabase. Geospatial and statistical analyses are carried out to develop a relationship between wetland land cover, hurricane flooding, population and infrastructure vulnerability. These analyses result in the identification and quantification of populations and infrastructure in flooded areas that lie within a reasonable buffer surrounding the identified wetlands. Our analysis thus produces a spatial perspective on the potential for wetlands to attenuate hurricane flood impacts in critical areas. Statistical analysis will support hypothesis testing to evaluate the benefits of wetlands from a flooding and storm-surge attenuation perspective. Results from geospatial analysis are used to identify where interactions with critical infrastructure are relevant in the Chesapeake Bay.

  11. Failure of Adaptive Self-Organized Criticality during Epileptic Seizure Attacks

    OpenAIRE

    Meisel, Christian; Storch, Alexander; Hallmeyer-Elgner, Susanne; Bullmore, Ed; Gross, Thilo

    2012-01-01

    Author Summary Over the recent years it has become apparent that the concept of phase transitions is not only applicable to the systems classically considered in physics. It applies to a much wider class of complex systems exhibiting phases, characterized by qualitatively different types of long-term behavior. In the critical states, which are located directly at the transition, small changes can have a large effect on the system. This and other properties of critical states prove to be advan...

  12. Demonstrating Cyber-attacks impact on Cyber-Physical simulated environment

    OpenAIRE

    SOUPIONIS IOANNIS; Benoist, Thierry

    2014-01-01

    Critical Infrastructures (CIs), such as a smart grid, relay extensively on Information and Communications Technology (ICT) nowadays. In this demonstration, we exhibit a real-time simulation of a smart grid infrastructure and the impact of specific cyber-attacks on it.

  13. Cybersecurity investment and information sharing:an analysis of the economic incentives of private critical infrastructure providers

    OpenAIRE

    Juuso, A.-M. (Anna-Maija)

    2015-01-01

    Economic agents make rational cybersecurity investment decisions considering the costs and the benefits of their choice. Problems arise when the private costs and benefits do not align with social costs and benefits. The presence of externalities commonly leads to underinvestment and the situation is aggravated by the presence of informational challenges that are typical for cyberspace. In cases of critical infrastructure interdependence, firms are often unaware that their underinvestment imp...

  14. One-sided muon tomography - A portable method for imaging critical infrastructure with a single muon detector

    OpenAIRE

    Boniface, K.; Anghel, V. N. P.; Erlandson, A.; Jonkmans, G.; Thompson, M; Livingstone, S.

    2016-01-01

    High-energy muons generated from cosmic-ray particle showers have been shown to exhibit properties ideal for imaging the interior of large structures. This paper explores the possibility of using a single portable muon detector in conjunction with image reconstruction methods used in nuclear medicine to reconstruct a 3D image of the interior of critical infrastructure such as the Zero Energy Deuterium (ZED-2) research reactor at Canadian Nuclear Laboratories' Chalk River site. The ZED-2 react...

  15. Remote Sensing of Arctic Environmental Conditions and Critical Infrastructure using Infra-Red (IR) Cameras and Unmanned Air Vehicles (UAVs)

    Science.gov (United States)

    Hatfield, M. C.; Webley, P.; Saiet, E., II

    2014-12-01

    Remote Sensing of Arctic Environmental Conditions and Critical Infrastructure using Infra-Red (IR) Cameras and Unmanned Air Vehicles (UAVs) Numerous scientific and logistical applications exist in Alaska and other arctic regions requiring analysis of expansive, remote areas in the near infrared (NIR) and thermal infrared (TIR) bands. These include characterization of wild land fire plumes and volcanic ejecta, detailed mapping of lava flows, and inspection of lengthy segments of critical infrastructure, such as the Alaska pipeline and railroad system. Obtaining timely, repeatable, calibrated measurements of these extensive features and infrastructure networks requires localized, taskable assets such as UAVs. The Alaska Center for Unmanned Aircraft Systems Integration (ACUASI) provides practical solutions to these problem sets by pairing various IR sensors with a combination of fixed-wing and multi-rotor air vehicles. Fixed-wing assets, such as the Insitu ScanEagle, offer long reach and extended duration capabilities to quickly access remote locations and provide enduring surveillance of the target of interest. Rotary-wing assets, such as the Aeryon Scout or the ACUASI-built Ptarmigan hexcopter, provide a precision capability for detailed horizontal mapping or vertical stratification of atmospheric phenomena. When included with other ground capabilities, we will show how they can assist in decision support and hazard assessment as well as giving those in emergency management a new ability to increase knowledge of the event at hand while reducing the risk to all involved. Here, in this presentation, we illustrate how UAV's can provide the ideal tool to map and analyze the hazardous events and critical infrastructure under extreme environmental conditions.

  16. Modelling interdependencies between the electricity and information infrastructures

    CERN Document Server

    Laprie, Jean-Claude; Kaaniche, Mohamed

    2008-01-01

    The aim of this paper is to provide qualitative models characterizing interdependencies related failures of two critical infrastructures: the electricity infrastructure and the associated information infrastructure. The interdependen-cies of these two infrastructures are increasing due to a growing connection of the power grid networks to the global information infrastructure, as a conse-quence of market deregulation and opening. These interdependencies increase the risk of failures. We focus on cascading, escalating and common-cause fail-ures, which correspond to the main causes of failures due to interdependencies. We address failures in the electricity infrastructure, in combination with acci-dental failures in the information infrastructure, then we show briefly how ma-licious attacks in the information infrastructure can be addressed.

  17. myTrustedCloud: Trusted cloud infrastructure for security-critical computation and data managment

    OpenAIRE

    Wallom, David C. H.; Turilli, Matteo; Taylor, Gareth; Hargreaves, Nigel; Martin, Andrew; Raun, Anbang; McMoran, Alan

    2011-01-01

    Cloud Computing provides an optimal infrastructure to utilise and share both computational and data resources whilst allowing a pay-per-use model, useful to cost-effectively manage hardware investment or to maximise its utilisation. Cloud Computing also offers transitory access to scalable amounts of computational resources, something that is particularly important due to the time and financial constraints of many user communities. The growing number of communities that are adopting large pub...

  18. Surety of the nation`s critical infrastructures: The challenge restructuring poses to the telecommunications sector

    Energy Technology Data Exchange (ETDEWEB)

    Cox, R.; Drennen, T.E.; Gilliom, L.; Harris, D.L.; Kunsman, D.M.; Skroch, M.J.

    1998-04-01

    The telecommunications sector plays a pivotal role in the system of increasingly connected and interdependent networks that make up national infrastructure. An assessment of the probable structure and function of the bit-moving industry in the twenty-first century must include issues associated with the surety of telecommunications. The term surety, as used here, means confidence in the acceptable behavior of a system in both intended and unintended circumstances. This paper outlines various engineering approaches to surety in systems, generally, and in the telecommunications infrastructure, specifically. It uses the experience and expectations of the telecommunications system of the US as an example of the global challenges. The paper examines the principal factors underlying the change to more distributed systems in this sector, assesses surety issues associated with these changes, and suggests several possible strategies for mitigation. It also studies the ramifications of what could happen if this sector became a target for those seeking to compromise a nation`s security and economic well being. Experts in this area generally agree that the U. S. telecommunications sector will eventually respond in a way that meets market demands for surety. Questions remain open, however, about confidence in the telecommunications sector and the nation`s infrastructure during unintended circumstances--such as those posed by information warfare or by cascading software failures. Resolution of these questions is complicated by the lack of clear accountability of the private and the public sectors for the surety of telecommunications.

  19. Cyber-Security and Critical Infrastructure Protection: The Case of Iceland

    OpenAIRE

    Jón Kristinn Ragnarsson

    2010-01-01

    Most modern countries depend on computers to a certain degree. With higher dependence the risk involved increases, as a single system failure could make a serious dent in a state's infrastructure. Cyber-threats have become one of the best-known threats of the modern world, and can be divided into several categories ranging from those affecting the security of the individual to serious matters of state. They come in turn from state, private-sector and individual sources and have already led to...

  20. Policies to Avoid Cost Overruns in Infrastructure Projects: Critical Evaluation and Recommendations

    Directory of Open Access Journals (Sweden)

    Hans Lind

    2014-09-01

    Full Text Available Many infrastructure projects have cost overruns and there has been a lot of research both on why these cost overruns occur and what can be done to reduce hem. Bent Flyvbjerg is the leading researcher in the area and in this article his proposals are used as the starting point. Besides a literature review, a questionnaire was sent out to experienced Swedish project managers to find out what they thought could reduce cost overruns. The literature review and the questionnaire were the foundation for the proposals formulated in this article. Proposals concerned three areas: (1. Organisational macro-structure, e.g. using more PPP projects but also decentralisation of budgets where cost overruns in one project in a region lead to less alternative projects in the specific region. (2. Organisational quality: It should be easy to see when and where cost overruns occur and who was responsible. There should be a well-developed knowledge management system in the organisation and an organisation culture of openness with a focus on improvements. (3. Organisational processes, e.g. a systematic use of external reviewers in different stages of a project.   Keywords: Cost overruns, Infrastructure projects, Policy measures

  1. Landfills as critical infrastructures: synergy between non-invasive monitoring technologies

    Science.gov (United States)

    Scozzari, Andrea; Raco, Brunella; Battaglini, Raffaele

    2014-05-01

    This work deals with a methodology for estimating the behaviour of a landfill system by means of the integration between two different non-invasive technologies. In fact, there is a widespread agreement on the fact that these infrastructures produce about 23% of the total anthropogenic methane released to the atmosphere. Despite that, there's still no internationally accepted protocol to quantify the leakage of biogas from a landfill with a common standard approach. This work proposes an assessment of the performance of a landfill system in terms of biogas release to the atmosphere. Such evaluation is performed by means of a direct measurement of gas flux with the accumulation chamber method, combined with the detection of thermal anomalies by infrared radiometry. In order to derive flux maps from a set of punctual measurements and calculate an overall quantity of emitted gas, a geostatistical technique is necessarily applied and briefly illustrated. A case study regarding an infrastructure located in Tuscany (Italy) is shown, where a discussion about the evolution of the landfill site through successive campaigns is also suggested. The role played by infrared thermography and its synergy with direct flux measurements is clearly perceivable in this context. The main benefit of the presented approach is a significant increase of the energy recovered from the landfill sites by optimising the collection of biogas, which implies a reduction of the total anthropogenic methane originated from the disposal of wastes released to the atmosphere.

  2. 6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.

    Science.gov (United States)

    2010-01-01

    ... authorized by the Secretary, Under Secretary for Preparedness, Assistant Secretary for Cyber Security and... approval of the Secretary, the Under Secretary for Preparedness, Assistant Secretary for Cyber Security and... 6 Domestic Security 1 2010-01-01 2010-01-01 false Disclosure of Protected Critical...

  3. Network Infrastructure Security

    CERN Document Server

    Wong, Angus

    2009-01-01

    Attacks to network infrastructure affect large portions of the Internet at a time and create large amounts of service disruption, due to breaches such as IP spoofing, routing table poisoning and routing loops. This book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions

  4. The Integrated Safety-Critical Advanced Avionics Communication and Control (ISAACC) System Concept: Infrastructure for ISHM

    Science.gov (United States)

    Gwaltney, David A.; Briscoe, Jeri M.

    2005-01-01

    Integrated System Health Management (ISHM) architectures for spacecraft will include hard real-time, critical subsystems and soft real-time monitoring subsystems. Interaction between these subsystems will be necessary and an architecture supporting multiple criticality levels will be required. Demonstration hardware for the Integrated Safety-Critical Advanced Avionics Communication & Control (ISAACC) system has been developed at NASA Marshall Space Flight Center. It is a modular system using a commercially available time-triggered protocol, ?Tp/C, that supports hard real-time distributed control systems independent of the data transmission medium. The protocol is implemented in hardware and provides guaranteed low-latency messaging with inherent fault-tolerance and fault-containment. Interoperability between modules and systems of modules using the TTP/C is guaranteed through definition of messages and the precise message schedule implemented by the master-less Time Division Multiple Access (TDMA) communications protocol. "Plug-and-play" capability for sensors and actuators provides automatically configurable modules supporting sensor recalibration and control algorithm re-tuning without software modification. Modular components of controlled physical system(s) critical to control algorithm tuning, such as pumps or valve components in an engine, can be replaced or upgraded as "plug and play" components without modification to the ISAACC module hardware or software. ISAACC modules can communicate with other vehicle subsystems through time-triggered protocols or other communications protocols implemented over Ethernet, MIL-STD- 1553 and RS-485/422. Other communication bus physical layers and protocols can be included as required. In this way, the ISAACC modules can be part of a system-of-systems in a vehicle with multi-tier subsystems of varying criticality. The goal of the ISAACC architecture development is control and monitoring of safety critical systems of a

  5. Evaluation of range parameters of the cameras for security system protecting the selected critical infrastructure of seaport

    Science.gov (United States)

    Kastek, Mariusz; Barela, Jaroslaw; Zyczkowski, Marek; Dulski, Rafal; Trzaskawka, Piotr; Firmanty, Krzysztof; Kucharz, Juliusz

    2012-10-01

    There are many separated infrastructural objects within a harbor area that may be considered "critical", such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons and explosives) as well as underwater ones (manned or unmanned submarines, scuba divers). The cameras used in security systems operate in several different spectral ranges in order to improve the probability of detection of incoming objects (potential threats). The cameras should then have adequate range parameters for detection, recognition and identification and those parameters, both measured and obtained through numerical simulations, will be presented in the paper. The range parameters of thermal cameras were calculated using NVTherm software package. Parameters of four observation thermal cameras were also measured on a specialized test stand at Institute of Optoelectronics, MUT. This test stand makes it also possible to test visual cameras. The parameters of five observation cameras working in the visual range were measured and on the basis of those data the detection, recognition and identification ranges were determined. The measurement results and simulation data will be compared. The evaluation of range parameters obtained for the tested camera types will define their usability in the real security system for the protection of selected critical infrastructure of a seaport.small surface objects (such as RIB boats) by a camera system and real test results in various weather conditions will also be presented.

  6. Unraveling the complexities of disaster management: a framework for critical social infrastructure to promote population health and resilience.

    Science.gov (United States)

    O'Sullivan, Tracey L; Kuziemsky, Craig E; Toal-Sullivan, Darene; Corneil, Wayne

    2013-09-01

    Complexity is a useful frame of reference for disaster management and understanding population health. An important means to unraveling the complexities of disaster management is to recognize the interdependencies between health care and broader social systems and how they intersect to promote health and resilience before, during and after a crisis. While recent literature has expanded our understanding of the complexity of disasters at the macro level, few studies have examined empirically how dynamic elements of critical social infrastructure at the micro level influence community capacity. The purpose of this study was to explore empirically the complexity of disasters, to determine levers for action where interventions can be used to facilitate collaborative action and promote health among high risk populations. A second purpose was to build a framework for critical social infrastructure and develop a model to identify potential points of intervention to promote population health and resilience. A community-based participatory research design was used in nine focus group consultations (n = 143) held in five communities in Canada, between October 2010 and March 2011, using the Structured Interview Matrix facilitation technique. The findings underscore the importance of interconnectedness of hard and soft systems at the micro level, with culture providing the backdrop for the social fabric of each community. Open coding drawing upon the tenets of complexity theory was used to develop four core themes that provide structure for the framework that evolved; they relate to dynamic context, situational awareness and connectedness, flexible planning, and collaboration, which are needed to foster adaptive responses to disasters. Seven action recommendations are presented, to promote community resilience and population health. PMID:22898721

  7. Panic Attack or Heart Attack?

    Science.gov (United States)

    Panic Attack or Heart Attack? Diagnosing heart disease in women A Healthy Hearts Guide ® Heart disease in women is often mistaken for panic attack with shortness of breath, anxiety, palpitations and indigestion. ...

  8. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  9. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  10. Post-disaster supply chain interdependent critical infrastructure system restoration: A review of data necessary and available for modeling

    Science.gov (United States)

    Ramachandran, Varun; Long, Suzanna K.; Shoberg, Thomas G.; Corns, Steven; Carlo, Hector J.

    2016-01-01

    The majority of restoration strategies in the wake of large-scale disasters have focused on short-term emergency response solutions. Few consider medium- to long-term restoration strategies to reconnect urban areas to national supply chain interdependent critical infrastructure systems (SCICI). These SCICI promote the effective flow of goods, services, and information vital to the economic vitality of an urban environment. To re-establish the connectivity that has been broken during a disaster between the different SCICI, relationships between these systems must be identified, formulated, and added to a common framework to form a system-level restoration plan. To accomplish this goal, a considerable collection of SCICI data is necessary. The aim of this paper is to review what data are required for model construction, the accessibility of these data, and their integration with each other. While a review of publically available data reveals a dearth of real-time data to assist modeling long-term recovery following an extreme event, a significant amount of static data does exist and these data can be used to model the complex interdependencies needed. For the sake of illustration, a particular SCICI (transportation) is used to highlight the challenges of determining the interdependencies and creating models capable of describing the complexity of an urban environment with the data publically available. Integration of such data as is derived from public domain sources is readily achieved in a geospatial environment, after all geospatial infrastructure data are the most abundant data source and while significant quantities of data can be acquired through public sources, a significant effort is still required to gather, develop, and integrate these data from multiple sources to build a complete model. Therefore, while continued availability of high quality, public information is essential for modeling efforts in academic as well as government communities, a more

  11. Modeling and Managing Risk in Billing Infrastructures

    Science.gov (United States)

    Baiardi, Fabrizio; Telmon, Claudio; Sgandurra, Daniele

    This paper discusses risk modeling and risk management in information and communications technology (ICT) systems for which the attack impact distribution is heavy tailed (e.g., power law distribution) and the average risk is unbounded. Systems with these properties include billing infrastructures used to charge customers for services they access. Attacks against billing infrastructures can be classified as peripheral attacks and backbone attacks. The goal of a peripheral attack is to tamper with user bills; a backbone attack seeks to seize control of the billing infrastructure. The probability distribution of the overall impact of an attack on a billing infrastructure also has a heavy-tailed curve. This implies that the probability of a massive impact cannot be ignored and that the average impact may be unbounded - thus, even the most expensive countermeasures would be cost effective. Consequently, the only strategy for managing risk is to increase the resilience of the infrastructure by employing redundant components.

  12. Critical infrastructure protection decision support system decision model : overview and quick-start user's guide.

    Energy Technology Data Exchange (ETDEWEB)

    Samsa, M.; Van Kuiken, J.; Jusko, M.; Decision and Information Sciences

    2008-12-01

    The Critical Infrastructure Protection Decision Support System Decision Model (CIPDSS-DM) is a useful tool for comparing the effectiveness of alternative risk-mitigation strategies on the basis of CIPDSS consequence scenarios. The model is designed to assist analysts and policy makers in evaluating and selecting the most effective risk-mitigation strategies, as affected by the importance assigned to various impact measures and the likelihood of an incident. A typical CIPDSS-DM decision map plots the relative preference of alternative risk-mitigation options versus the annual probability of an undesired incident occurring once during the protective life of the investment, assumed to be 20 years. The model also enables other types of comparisons, including a decision map that isolates a selected impact variable and displays the relative preference for the options of interest--parameterized on the basis of the contribution of the isolated variable to total impact, as well as the likelihood of the incident. Satisfaction/regret analysis further assists the analyst or policy maker in evaluating the confidence with which one option can be selected over another.

  13. One-sided muon tomography - A portable method for imaging critical infrastructure with a single muon detector

    CERN Document Server

    Boniface, K; Erlandson, A; Jonkmans, G; Thompson, M; Livingstone, S

    2016-01-01

    High-energy muons generated from cosmic-ray particle showers have been shown to exhibit properties ideal for imaging the interior of large structures. This paper explores the possibility of using a single portable muon detector in conjunction with image reconstruction methods used in nuclear medicine to reconstruct a 3D image of the interior of critical infrastructure such as the Zero Energy Deuterium (ZED-2) research reactor at Canadian Nuclear Laboratories' Chalk River site. The ZED-2 reactor core and muon detector arrangement are modeled in GEANT4 and Monte Carlo measurements of the resultant muon throughput and angular distribution at several angles of rotation around the reactor are generated. Statistical analysis is then performed on these measurements based on the well-defined flux and angular distribution of muons expected near the surface of the earth. The results of this analysis are shown to produce reconstructed images of the spatial distribution of nuclear fuel within the core for multiple fuel c...

  14. Critical Data Source; Tool or Even Infrastructure? Challenges of Geographic Information Systems and Remote Sensing for Disaster Risk Governance

    Directory of Open Access Journals (Sweden)

    Alexander Fekete

    2015-09-01

    Full Text Available Disaster risk information is spatial in nature and Geographic Information Systems (GIS and Remote Sensing (RS play an important key role by the services they provide to society. In this context, to risk management and governance, in general, and to civil protection, specifically (termed differently in many countries, and includes, for instance: civil contingencies in the UK, homeland security in the USA, disaster risk reduction at the UN level. The main impetus of this article is to summarize key contributions and challenges in utilizing and accepting GIS and RS methods and data for disaster risk governance, which includes public bodies, but also risk managers in industry and practitioners in search and rescue organizations. The article analyzes certain method developments, such as vulnerability indicators, crowdsourcing, and emerging concepts, such as Volunteered Geographic Information, but also investigates the potential of the topic Critical Infrastructure as it could be applied on spatial assets and GIS and RS itself. Intended to stimulate research on new and emerging fields, this article’s main contribution is to move spatial research toward a more reflective stance where opportunities and challenges are equally and transparently addressed in order to gain more scientific quality. As a conclusion, GIS and RS can play a pivotal role not just in delivering data but also in connecting and analyzing data in a more integrative, holistic way.

  15. Handling Worldwide LHC Computing Grid Critical Service Incidents : The infrastructure and experience behind nearly 5 years of GGUS ALARMs

    CERN Multimedia

    Dimou, M; Dulov, O; Grein, G

    2013-01-01

    In the Wordwide LHC Computing Grid (WLCG) project the Tier centres are of paramount importance for storing and accessing experiment data and for running the batch jobs necessary for experiment production activities. Although Tier2 sites provide a significant fraction of the resources a non-availability of resources at the Tier0 or the Tier1s can seriously harm not only WLCG Operations but also the experiments' workflow and the storage of LHC data which are very expensive to reproduce. This is why availability requirements for these sites are high and committed in the WLCG Memorandum of Understanding (MoU). In this talk we describe the workflow of GGUS ALARMs, the only 24/7 mechanism available to LHC experiment experts for reporting to the Tier0 or the Tier1s problems with their Critical Services. Conclusions and experience gained from the detailed drills performed in each such ALARM for the last 4 years are explained and the shift with time of Type of Problems met. The physical infrastructure put in place to ...

  16. Mathematical modelling of tsunami impacts on critical infrastructures: exposure and severity associated with debris transport at Sines port, Portugal.

    Science.gov (United States)

    Conde, Daniel; Baptista, Maria Ana; Sousa Oliveira, Carlos; Ferreira, Rui M. L.

    2015-04-01

    a flux-splitting technique with a reviewed Roe-Riemann solver and appropriate source-term formulations to ensure full conservativeness. Additionally, STAV-2D features Lagrangian-Eulerian coupling enabling solid transport simulation under both continuum and discrete approaches, and has been validated with both laboratory data and paleo-tsunami evidence (Conde, 2013a; Conde, 2013b). The interactions between the inundating flow and coal stockpiles or natural mobile bed reaches were simulated using a continuum debris-flow approach, featuring fractional solid transport, while the containers at the new terminal were advected with an explicit Lagrangian method. The meshwork employed at the port models the existing geometry and structures in great detail, enabling explicitly resolved interactions between the current infrastructure and the overland propagating tsunami. The obtained preliminary results suggest that several structures, some of them critical in a nationwide context, are exposed to tsunami actions. The coal deposition pattern and the final location of monitored containers were determined for two magnitude scenarios (8.5 Mw and 9.5 Mw) in the case of a tsunami generated at the Horseshoe fault and one magnitude scenario (9.5 Mw) for a tsunami generated at the Gorringe bank. The inland washing of the coal stockpiles may impose great loss of both economical and environmental value, while the impact of large mobile debris, such as the containers in the terminal area, significantly increases the severity of infrastructural damage. Acknowledgements This work was partially funded by FEDER, program COMPETE, and by national funds through the Portuguese Foundation for Science and Technology (FCT) with project RECI/ECM-HID/0371/2012. References Baptista M.A. & Miranda, J.M. (2009), Revision of the Portuguese catalog of tsunamis. Nat. Hazards Earth Syst. Sci., 9, 25-42. Canelas, R.; Murillo, J. & Ferreira, R.M.L. (2013), Two-dimensional depth-averaged modelling of dam

  17. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  18. Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

    Directory of Open Access Journals (Sweden)

    Laszlo B Kish

    Full Text Available Recently, Bennett and Riedel (BR (http://arxiv.org/abs/1303.7435v1 argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional security of the KLJN method has not been successfully challenged.

  19. Reliable protection of infrastructures and headquarters. Risk management; Infrastrukturen und Leitstellen zuverlaessig schuetzen. Risikomanagement

    Energy Technology Data Exchange (ETDEWEB)

    Schaell, Markus [TUeV Sued Industrie Service GmbH, Muenchen (Germany)

    2011-07-01

    Changing threats increasingly influence the risk management for critical infrastructures. Operators of electricity grids, heating and gas grids have to identify and evaluate potential risks such as attacks or natural disasters more structured in the future. But even innovations such as the first new EU regulation for emergency and service centers have consequences for risk management.

  20. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    OpenAIRE

    Patel, A K; Jaypalsinh. A. Gohil; D.T. Meva

    2010-01-01

    Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between commun...

  1. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion of at...... attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  2. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  3. Increasing the resilience and security of the United States' power infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Happenny, Sean F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-08-01

    The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-world conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.

  4. Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet

    Directory of Open Access Journals (Sweden)

    N. Rajesh kumar

    2014-06-01

    Full Text Available Industrial Control Systems (ICS are open to security attacks when they are integrated with IT systems and wireless technologies for enhanced processing and remote control. These Critical Infrastructures (CIs are highly important as they provide service for an entire nation and causes serious danger even when interrupted for a while. Some of the common SCADA (Supervisory Control and Data Acquisition systems involve energy and water distribution systems. In this paper, the energy distribution SCADA system comprising several substations is considered. A secure framework is proposed that combines the energy control system with Wireless Sensor Networks (WSNs, Mobile Ad hoc Networks (MANETs, and the Internet, providing anomaly prevention and status management. SCADA attacks occur at the state estimators of the power systems which are used to route power flows and detect faulty devices. These estimators are located in the SCADA control center which is a sensitive area and measurements must be transmitted over a secure communication channel. The attack-resistance of the SCADA system is enhanced by increasing the hardness and complexity of the attack problem. The Attack-Resistant and Secure (ARS SCADA system is evaluated against existing techniques like NAMDIA (Network-Aware Mitigation of Data Integrity Attacks, Retrofit IDS (Intrusion Detection System, and CSBF (Critical State-Based Filtering for enhancing the attack-resistance and security of SCADA systems. It is found that the performance of ARS SCADA system is good compared to the existing methods in terms of maximum normalized attack impact and latency.

  5. Heart Attack

    Science.gov (United States)

    ... having another heart attack. These medicines include: aspirin, beta blockers, statins, ACE inhibitors and fish oil. Your doctor ... have had a stent placed in your heart. Beta blockers are a group of drugs that lower the ...

  6. Panic Attack

    OpenAIRE

    Scantamburlo, Gabrielle; Ansseau, Marc

    2004-01-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. Peer reviewed

  7. Monitoring Infrastructure Affordances

    OpenAIRE

    Björn, Ståhl

    2013-01-01

    Computing has made its way into most of our lives as a key processor of vast quantities of information. This has happened directly in terms of gadgets and devices that assists us in everyday life, but also indirectly, through the critical infrastructures that enables these devices to function. A key issue with critical infrastructures such as transportation, communication, power-grids and finance, is increasingly circular interdependencies. Because of this issue, a disruption in either one ca...

  8. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    Science.gov (United States)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  9. New York Solar Smart DG Hub-Resilient Solar Project: Economic and Resiliency Impact of PV and Storage on New York Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Kate [National Renewable Energy Lab. (NREL), Golden, CO (United States); Burman, Kari [National Renewable Energy Lab. (NREL), Golden, CO (United States); Simpkins, Travis [National Renewable Energy Lab. (NREL), Golden, CO (United States); Helson, Erica [City Univ. (CUNY), NY (United States); Lisell, Lars [City Univ. (CUNY), NY (United States)

    2016-06-01

    Resilient PV, which is solar paired with storage ('solar-plus-storage'), provides value both during normal grid operation and power outages as opposed to traditional solar PV, which functions only when the electric grid is operating. During normal grid operations, resilient PV systems help host sites generate revenue and/or reduce electricity bill charges. During grid outages, resilient PV provides critical emergency power that can help people in need and ease demand on emergency fuel supplies. The combination of grid interruptions during recent storms, the proliferation of solar PV, and the growing deployment of battery storage technologies has generated significant interest in using these assets for both economic and resiliency benefits. This report analyzes the technical and economic viability for resilient PV on three critical infrastructure sites in New York City (NYC): a school that is part of a coastal storm shelter system, a fire station, and a NYCHA senior center that serves as a cooling center during heat emergencies. This analysis differs from previous solar-plus-storage studies by placing a monetary value on resiliency and thus, in essence, modeling a new revenue stream for the avoided cost of a power outage. Analysis results show that resilient PV is economically viable for NYC's critical infrastructure and that it may be similarly beneficial to other commercial buildings across the city. This report will help city building owners, managers, and policymakers better understand the economic and resiliency benefits of resilient PV. As NYC fortifies its building stock against future storms of increasing severity, resilient PV can play an important role in disaster response and recovery while also supporting city greenhouse gas emission reduction targets and relieving stress to the electric grid from growing power demands.

  10. Making green infrastructure healthier infrastructure

    Directory of Open Access Journals (Sweden)

    Mare Lõhmus

    2015-11-01

    Full Text Available Increasing urban green and blue structure is often pointed out to be critical for sustainable development and climate change adaptation, which has led to the rapid expansion of greening activities in cities throughout the world. This process is likely to have a direct impact on the citizens’ quality of life and public health. However, alongside numerous benefits, green and blue infrastructure also has the potential to create unexpected, undesirable, side-effects for health. This paper considers several potential harmful public health effects that might result from increased urban biodiversity, urban bodies of water, and urban tree cover projects. It does so with the intent of improving awareness and motivating preventive measures when designing and initiating such projects. Although biodiversity has been found to be associated with physiological benefits for humans in several studies, efforts to increase the biodiversity of urban environments may also promote the introduction and survival of vector or host organisms for infectious pathogens with resulting spread of a variety of diseases. In addition, more green connectivity in urban areas may potentiate the role of rats and ticks in the spread of infectious diseases. Bodies of water and wetlands play a crucial role in the urban climate adaptation and mitigation process. However, they also provide habitats for mosquitoes and toxic algal blooms. Finally, increasing urban green space may also adversely affect citizens allergic to pollen. Increased awareness of the potential hazards of urban green and blue infrastructure should not be a reason to stop or scale back projects. Instead, incorporating public health awareness and interventions into urban planning at the earliest stages can help insure that green and blue infrastructure achieves full potential for health promotion.

  11. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    Directory of Open Access Journals (Sweden)

    A.K. Patel

    2010-05-01

    Full Text Available Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between communicating Access Points to prevent Rouge Access Points from masquerading as false neighbours. Our defense greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.

  12. VoIP Malware: Attack Tool & Attack Scenarios

    OpenAIRE

    Nassar, Mohamed; State, Radu; Festor, Olivier

    2009-01-01

    With the appearance of new Internet services like Voice over IP and IP television, malwares are in the way to update and extend their targets. In this paper, we discuss the emergence of a new generation of malwares attacking VoIP infrastructures and services. Such malwares constitute a real threat to the currently deployed VoIP architectures without strong security measures in place. We present one implemented environment that can be used to evaluate such attacks. Our ``VoIP bots'' support a ...

  13. Scenario-based resilience assessment framework for critical infrastructure systems: Case study for seismic resilience of seaports

    International Nuclear Information System (INIS)

    A number of metrics in the past have been proposed and numerically implemented to assess the overall performance of large systems during natural disasters and their recovery in the aftermath of the events. Among such performance measures, resilience is a reliable metric. This paper proposes a probabilistic framework for scenario-based resilience assessment of infrastructure systems. The method accounts for uncertainties in the process including the correlation of the earthquake intensity measures, fragility assessment of structural components, estimation of repair requirements, the repair process, and finally the service demands. The proposed method is applied to a hypothetical seaport terminal and the system level performance of the seaport is assessed using various performance metrics. Results of this analysis have shown that medium to large seismic events may significantly disrupt the operation of seaports right after the event and the recovery process may take months. The proposed framework will enable port stakeholders to systematically assess the most-likely performance of the system during expected future earthquake events. - Highlights: • A scenario-based framework for seismic resilience assessment of systems is presented. • Seismic resilience of a hypothetical seaport with realistic settings is studied. • Berth availability is found to govern seaport functionality following earthquakes

  14. Testbeds for Assessing Critical Scenarios in Power Control Systems

    Science.gov (United States)

    Dondossola, Giovanna; Deconinck, Geert; Garrone, Fabrizio; Beitollahi, Hakem

    The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility InfrastructurAL Resilience. The selected scenarios refer to power control systems encompassing information and communication security of SCADA systems for grid teleoperation, impact of attacks on inter-operator communications in power emergency conditions, impact of intentional faults on the secondary and tertiary control in power grids with distributed generators. Two testbeds have been developed for assessing the effect of the attacks and prototyping resilient architectures.

  15. Chicago metropolitan area critical infrastructure protection program electric power disruption emergency preparedness drill March 5, 2002 summary and lessons learned.; TOPICAL

    International Nuclear Information System (INIS)

    Since January 2000, the Metropolitan Mayors Caucus, the Chicago Department of Environment, and the U.S. Department of Energy Office of Critical Infrastructure Protection (now part of the Office of Energy Assurance) have been collaborating on the development and implementation of guidelines that municipal governments can use in preparing for electric power disruptions. On March 5, 2002 Commonwealth Edison (ComEd), the electric company serving the Chicago metropolitan area, held a drill to test its emergency preparedness procedures. ComEd invited three communities in the metropolitan area-Buffalo Grove, Oak Brook, Riverside-to participate in the drill as part of their own emergency planning efforts to respond to electric power disruptions. Although ComEd had held joint exercises with the City of Chicago, this was the first time that a cooperative exercise with the suburban communities was conducted. The Infrastructure Assurance Center of Argonne National Laboratory, under the sponsorship of the U.S. Department of Energy's Office of Energy Assurance helped facilitate the drill in the communities. A series of meetings involving ComEd, community controllers (who helped organize the drill but did not participate directly), and Argonne personnel was held to lay out the ground rules for the drill and determine how it would operate. Attachment 1 gives some of the guidance that was developed

  16. A Novel Attack against Android Phones

    CERN Document Server

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  17. Bike Infrastructures

    DEFF Research Database (Denmark)

    Silva, Victor; Harder, Henrik; Jensen, Ole B.; Madsen, Jens Chr. Overgaard

    Bike Infrastructures aims to identify bicycle infrastructure typologies and design elements that can help promote cycling significantly. It is structured as a case study based research where three cycling infrastructures with distinct typologies were analyzed and compared. The three cases are Ves......, the findings of this research project can also support bike friendly design and planning, and cyclist advocacy....

  18. Heart Attack Risk Assessment

    Science.gov (United States)

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  19. The robustness of multiplex networks under layer node-based attack

    Science.gov (United States)

    Zhao, Da-Wei; Wang, Lian-Hai; Zhi, Yong-Feng; Zhang, Jun; Wang, Zhen

    2016-04-01

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology.

  20. Robustness of network of networks under targeted attack

    Science.gov (United States)

    Dong, Gaogao; Gao, Jianxi; Du, Ruijin; Tian, Lixin; Stanley, H. Eugene; Havlin, Shlomo

    2013-05-01

    The robustness of a network of networks (NON) under random attack has been studied recently [Gao , Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.107.195701 107, 195701 (2011)]. Understanding how robust a NON is to targeted attacks is a major challenge when designing resilient infrastructures. We address here the question how the robustness of a NON is affected by targeted attack on high- or low-degree nodes. We introduce a targeted attack probability function that is dependent upon node degree and study the robustness of two types of NON under targeted attack: (i) a tree of n fully interdependent Erdős-Rényi or scale-free networks and (ii) a starlike network of n partially interdependent Erdős-Rényi networks. For any tree of n fully interdependent Erdős-Rényi networks and scale-free networks under targeted attack, we find that the network becomes significantly more vulnerable when nodes of higher degree have higher probability to fail. When the probability that a node will fail is proportional to its degree, for a NON composed of Erdős-Rényi networks we find analytical solutions for the mutual giant component P∞ as a function of p, where 1-p is the initial fraction of failed nodes in each network. We also find analytical solutions for the critical fraction pc, which causes the fragmentation of the n interdependent networks, and for the minimum average degree k¯min below which the NON will collapse even if only a single node fails. For a starlike NON of n partially interdependent Erdős-Rényi networks under targeted attack, we find the critical coupling strength qc for different n. When q>qc, the attacked system undergoes an abrupt first order type transition. When q≤qc, the system displays a smooth second order percolation transition. We also evaluate how the central network becomes more vulnerable as the number of networks with the same coupling strength q increases. The limit of q=0 represents no dependency, and the results are consistent with

  1. Infrastructure sensing.

    Science.gov (United States)

    Soga, Kenichi; Schooling, Jennifer

    2016-08-01

    Design, construction, maintenance and upgrading of civil engineering infrastructure requires fresh thinking to minimize use of materials, energy and labour. This can only be achieved by understanding the performance of the infrastructure, both during its construction and throughout its design life, through innovative monitoring. Advances in sensor systems offer intriguing possibilities to radically alter methods of condition assessment and monitoring of infrastructure. In this paper, it is hypothesized that the future of infrastructure relies on smarter information; the rich information obtained from embedded sensors within infrastructure will act as a catalyst for new design, construction, operation and maintenance processes for integrated infrastructure systems linked directly with user behaviour patterns. Some examples of emerging sensor technologies for infrastructure sensing are given. They include distributed fibre-optics sensors, computer vision, wireless sensor networks, low-power micro-electromechanical systems, energy harvesting and citizens as sensors. PMID:27499845

  2. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  3. Attack warning

    Energy Technology Data Exchange (ETDEWEB)

    1988-12-01

    The North American Aerospace Defense Command, located at Cheyenne Mountain Air Force Station, is responsible for warning the United States and Canadian leaders that North America is under air, missile, or space attack. The Air Force has been developing a replacement for NORAD's communications computer system, and it expects to spend about $281 million on this program-about $72 million for block I and $209 million for block II. Block I of the replacement system has experienced significant schedule and performance problems, such as the inability to meet the requirement for the unit to restore full mission capability within 267 minutes after a total loss of power, and the incompatibility of the unit with other computer equipment due to the wiring standard. These problems have pushed the planned installation data from 1986 to 1999. The Air Force intends to have the contractor correct the deficiencies during block II development. This report discusses how the replacement program should be reassessed.

  4. Attacking Embedded Systems through Power Analysis

    Directory of Open Access Journals (Sweden)

    Dr. Sastry JKR

    2011-03-01

    Full Text Available Embedded Systems are being used for the development and implementation of Safety and Mission Critical Systems. Malfunctions of such type of embedded systems will lead to disasters at times. The embedded systems must be fully secured from outside intervention in order to have effective functioning as well as to provide protective environment to these mission critical systems. There are several attacking systems discussed in the literature each requiring a kind of counter attacking system. Power Analysis and variations of power analysis are the significant attacking mechanisms discussed in the literature. Crypto servers are the main areas of attacking as they deal with securing the data that flow in-between several components of the embedded systems. Most of the attacking systems suggested in the litterer suffer from lack of experimental models to emulate the attacking system. An attacking system could be amply proved when several samples of data are used for attacking and the samples of data provides for knowledge base. In this paper an experimental setup is proposed which is an embedded system itself for creation of a Knowledgebase which shall form the basis for attacking. The experimental setup required for undertaking the actual attacking with the usage of the knowledgebase is also presented. Further the proposed attacking system is applied for mission critical system and the experimental results obtained through the simulation are also presented.

  5. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  6. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Hartman, Steven M [ORNL

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  7. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    International Nuclear Information System (INIS)

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  8. Public-Private Partnerships for the Provision of Port Infrastructure: An Explorative Multi-Actor Perspective on Critical Success Factors1

    Directory of Open Access Journals (Sweden)

    Geoffrey Aerts

    2014-12-01

    Full Text Available Public-private cooperation on the level of project finance, and provision of large-scale infrastructure projects, is increasing on the global level. This paper uses a multi-actor analysis, in order to explore the critical success factors (CSFs for sound implementation of public-private partnerships (PPPs in the port context, and to determine the diverging opinions of stakeholders with regard to the importance of these CSFs. The results indicate that eight CSFs are of superior importance in port PPPs: the concreteness and preciseness of the concession agreement, the ability to appropriately allocate and share risk, the technical feasibility of the project, the commitment made by partners, the attractiveness of the financial package, a clear definition of responsibilities, the presence of a strong private consortium and a realistic cost/benefit assessment. The reason for their importance is their deal-breaking character, which can lead to a total failure of PPP projects during the early stages of project conception.

  9. Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Bhavana Butani

    2014-10-01

    Full Text Available Wireless sensor networks (WSNs are novel large-scale wireless networks that consist of distributed, self organizing, low-power, low-cost, tiny sensor devices to cooperatively collect information through infrastructure less wireless networks. These networks are envisioned to play a crucial role in variety of applications like critical military surveillance applications, forest fire monitoring, commercial applications such as building security monitoring, traffic surveillance, habitat monitoring and smart homes and many more scenarios. Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals cryptographic key or other confidential information like node’s id etc from a captured node to compromise entire network. So, Security of wireless sensor network is an important issue for maintaining confidentiality and integrity of wireless links. Now-a-days, researchers are paying attention towards developing security schemes against Node capture attack. Our survey provides deep insights of existing techniques that enhance the attacking efficiency of the node capture attack in wireless sensor network. It also analyzes various detection and key pre-distribution schemes for inventing a new scheme to improve resilience against node capture attack.

  10. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  11. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  12. MFC Communications Infrastructure Study

    Energy Technology Data Exchange (ETDEWEB)

    Michael Cannon; Terry Barney; Gary Cook; George Danklefsen, Jr.; Paul Fairbourn; Susan Gihring; Lisa Stearns

    2012-01-01

    Unprecedented growth of required telecommunications services and telecommunications applications change the way the INL does business today. High speed connectivity compiled with a high demand for telephony and network services requires a robust communications infrastructure.   The current state of the MFC communication infrastructure limits growth opportunities of current and future communication infrastructure services. This limitation is largely due to equipment capacity issues, aging cabling infrastructure (external/internal fiber and copper cable) and inadequate space for telecommunication equipment. While some communication infrastructure improvements have been implemented over time projects, it has been completed without a clear overall plan and technology standard.   This document identifies critical deficiencies with the current state of the communication infrastructure in operation at the MFC facilities and provides an analysis to identify needs and deficiencies to be addressed in order to achieve target architectural standards as defined in STD-170. The intent of STD-170 is to provide a robust, flexible, long-term solution to make communications capabilities align with the INL mission and fit the various programmatic growth and expansion needs.

  13. Toward More Resilient Cyber Infrastructure: A Practical Approach

    OpenAIRE

    Tanceska, Biljana; Bogdanoski, Mitko; Risteski, Aleksandar

    2015-01-01

    In this chapter, an analysis of security attacks on network elements along with the appropriate countermeasures is presented. The main goal of this chapter is to present the practical execution of various security attacks and their mitigation techniques due to more resilient cyber infrastructure. The network topology that has been attacked is designed in GNS3 software tool installed on Windows operating system, while the attacks are performed in Kali Linux operating system. Three groups of se...

  14. Efficient Detection of Sybil Attack Based on Cryptography in Vanet

    CERN Document Server

    Rahbari, Mina

    2011-01-01

    Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.

  15. Detecting relay attacks on RFID communication systems using quantum bits

    Science.gov (United States)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-08-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  16. Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses

    Directory of Open Access Journals (Sweden)

    Stephen Herzog

    2011-01-01

    Full Text Available In April 2007, the Estonian Government moved a memorial commemorating the Soviet liberation of the country from the Nazis to a less prominent and visible location in Tallinn. This decision triggered rioting among Russian-speaking minorities and cyber terrorism targeting Estonia's critical economic and political infrastructure. Drawing upon the Estonian cyber attacks, this article argues that globalization and the Internet have enabled transnational groups—such as the Russian diaspora—to avenge their grievances by threatening the sovereignty of nation-states in cyberspace. Sophisticated and virtually untraceable political "hacktivists" may now possess the ability to disrupt or destroy government operations, banking transactions, city power grids, and even military weapon systems. Fortunately, western countries banded together to effectively combat the Estonian cyber attacks and minimize their effects. However, this article concludes that in the age of globalization, interdependence, and digital interconnectedness, nation-states must engage in increased cooperative cyber-defense activities to counter and prevent devastating Internet attacks and their implications.

  17. Active Linkability Attacks

    OpenAIRE

    Schnoor, Henning; Woizekowski, Oliver

    2013-01-01

    We study linking attacks on communication protocols. We show that an active attacker is strictly more powerful in this setting than previously-considered passive attackers. We introduce a formal model to reason about active linkability attacks, formally define security against these attacks and give very general conditions for both security and insecurity of protocols. In addition, we introduce a composition-like technique that allows to obtain security proofs by only studying small component...

  18. Vulnerabilities and Attacks Targeting Social Networks and Industrial Control Systems

    OpenAIRE

    Singh, Dharmendra; Sinha, Rakhi; Songara, Pawan; Rathi, Dr. Rakesh

    2014-01-01

    Vulnerability is a weakness, shortcoming or flaw in the system or network infrastructure which can be used by an attacker to harm the system, disrupt its normal operation and use it for his financial, competitive or other motives or just for cyber escapades. In this paper, we re-examined the various types of attacks on industrial control systems as well as on social networking users. We have listed which all vulnerabilities were exploited for executing these attacks and their effects on these...

  19. Railway infrastructure security

    CERN Document Server

    Sforza, Antonio; Vittorini, Valeria; Pragliola, Concetta

    2015-01-01

    This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers, and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological, and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructur...

  20. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  1. INTRUSION DETECTION IN MOBILE AD HOC NETWORK USING SECURE ROUTING FOR ATTACKER IDENTIFICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    S. Gopalakrishnan

    2014-01-01

    Full Text Available In past few decades, the migration of communication takes place from wired networks to wireless networks because of its mobility and scalability and Mobile Ad hoc Network (MANET is a unique and significant application in recent years which does not necessitates any pre-existing network infrastructure. Each node can act as both transmitters as well as receivers that are communicating with each other when they are in same communication/transmission range. Otherwise, these nodes depend on neighbor nodes to transmit their packets and they possess self-configuring ability which makes MANETs popular in various critical mission applications such as military and other emergency applications. In general, MANETs are open medium network and their nodes are widely distributed which makes the network more vulnerable to various attackers. Some times, the transmitted packets are viewed or modified or corrupted by the attackers through the way to reach destination and the destination could not find such type of packets. So, the receiver can deliver modified packets with wrong information. Thus, it is essential to present an efficient secure routing protocol to preserve MANET from several attacks. In this study, we are going to propose and implement a novel routing protocol named Secure Routing for Attacker Identification (SRAI protocol that executes at receiver/destination side to discover the modified packets in delivered nodes and generate misbehaviour report to the source. Compared to modern approaches, SRAI protocol establishes higher attacker identification rates in certain considerations.

  2. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  3. Impact modeling and prediction of attacks on cyber targets

    Science.gov (United States)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  4. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  5. Water Supply Infrastructure System Surety

    Energy Technology Data Exchange (ETDEWEB)

    EKMAN,MARK E.; ISBELL,DARYL

    2000-01-06

    The executive branch of the United States government has acknowledged and identified threats to the water supply infrastructure of the United States. These threats include contamination of the water supply, aging infrastructure components, and malicious attack. Government recognition of the importance of providing safe, secure, and reliable water supplies has a historical precedence in the water works of the ancient Romans, who recognized the same basic threats to their water supply infrastructure the United States acknowledges today. System surety is the philosophy of ''designing for threats, planning for failure, and managing for success'' in system design and implementation. System surety is an alternative to traditional compliance-based approaches to safety, security, and reliability. Four types of surety are recognized: reactive surety; proactive surety, preventative surety; and fundamental, inherent surety. The five steps of the system surety approach can be used to establish the type of surety needed for the water infrastructure and the methods used to realize a sure water infrastructure. The benefit to the water industry of using the system surety approach to infrastructure design and assessment is a proactive approach to safety, security, and reliability for water transmission, treatment, distribution, and wastewater collection and treatment.

  6. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle becomes ...

  7. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  8. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  9. Industrial infrastructure

    International Nuclear Information System (INIS)

    A substantial prerequisite for an increase of the domestic participation is the existence of an ''industrial infrastructure''. As long as a structure such as that described in this paper does not exist, domestic industry participation will continue to be confined to the assembly of components, while most of the supplies (materials, accessory parts) would have to be imported. The scope and set-up of the ''industrial infrastructure'' will be determined by a study of the required capacity and organization, which has to be prepared at a very early stage (second phase of an envisaged transfer of technology), and which will be included within the scope of a nuclear programme. Experience has shown that the different state institutes, the universities, private industry and the State companies work independently without any co-ordination of their activities. By the assignment of tasks, after taking into account existing conditions, an infrastructure can be built up which can be developed more intensively in the different fields co-operating with the institutes of the partner country. In the past good co-ordination of the different activities by an experienced partner has turned out to be absolutely necessary. This, too, presents the opportunity of co-operation with the main contractor who has extensive experience in constructing nuclear power plants. In the course of time, this co-ordination function can be transferred to a specially qualified domestic institute or company, which will undertake further development and co-ordination. (author)

  10. Security of the Accounting Information System Infrastructure

    OpenAIRE

    Mihalache D. Arsenie-Samoil

    2011-01-01

    The accounting information system infrastructure is crucial to the carry out successfully most of bookkeeping operations in a modern enterprise. Consequently, the security of the system should be an important issue on the enterprise agenda. A series of factories can be construed as having increased the risk of electronic attack at the accounting information system infrastructure such as unavoidable difficulties of securing such system; the increased globalization; insufficient awareness and t...

  11. Vulnerabilities of the security of nuclear material due to cyber attacks

    International Nuclear Information System (INIS)

    Full text: The spread of new communication and computer technologies is now the potential for a dedicated, sophisticated adversary to conduct coordinated strikes against the computers, communications systems, and databases of nuclear material security systems. All weapons of cyber war, like viruses, Trojans, access to computer systems are potential risks for the security of nuclear material. New forms of destruction of electronic devices, e.g. Transient Electromagnetic Devices (TED), that could, in the hands of enemies, criminals, or terrorist pose a significant threat to nuclear safety infrastructure components that are based on micro-circuits and computer or micro-processor control. These examples shows the necessity to clearly identify possible risks as: information and communication based disorders and other disruptions and attacks; partial or complete failure of systems causing the risk of unexpected reaction or unmanageable situations; cracking of access codes and elimination of alarm equipment could give easy access to nuclear material; computer manipulation or complete computer and system takeover due to brute force attacks, viruses, Trojans and worms could lead to malfunctions, disruptions and nuclear disasters; computer spying and brute force attacks could give detailed information about technical, organizational and organizational data; combined actions of physical, electronic and computer attacks. The paper gives an overview of potential computer and communication safety gaps and points out strategic implications as the identification of the critical infrastructure, surveillance of computer systems, data access and communication paths. The basic necessity of the development of computer and communication breakdown backup systems as well as measures of precaution against cyber attacks is shown in the paper. (author)

  12. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  13. Detecting man-in-the-middle attacks by precise timing

    OpenAIRE

    Aziz, Benjamin; Hamilton, G.

    2009-01-01

    Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a s...

  14. Infrastructure Development

    DEFF Research Database (Denmark)

    Williams, Idongesit

    2012-01-01

    It is the quest of every government to achieve universal Access and service of telecommunication services and ICTs. Unfortunately due to the high cost of deploying infrastructure in rural areas of developing countries due to non-significant or no economic activity, this dream of achieving Universal...... access and service of telecommunications/ICTs have been stalled. This paper throws light on a possible Public Private Partnership framework as a development path that will enable affordable network technologies to be deployed in rural areas at a cost that will translate to what the rural dweller...... in a developing country in Africa can afford. The paper is a conceptual paper...

  15. What Is a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  16. What Causes a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Causes a Heart Attack? Coronary Heart Disease A heart attack happens if ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  17. Life After a Heart Attack

    Science.gov (United States)

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  18. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  19. Destination based group Gray hole attack detection in MANET through AODV

    OpenAIRE

    Avenash Kumar; Meenu Chawla

    2012-01-01

    MANET is vulnerable easily because of dynamic topology, infrastructure less and also due to lack of centralized administration. One of attack, gray hole attack which drop some selective data makes vulnerable to mobile ad hoc network. It is challenge to keep the no data loss free form this attack. This paper present the detection of group gray hole attack through destination based scheme when more than one malicious node are in a Mobile ad hoc network.

  20. Efficient Detection of Sybil attack Based on Cryptography in Vanet

    Directory of Open Access Journals (Sweden)

    Mina Rahbari

    2011-12-01

    Full Text Available Vehicular communications play a substantial role in providing safety transportation by means of safetymessage exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed keyinfrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular adhoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.

  1. Performance Analysis of Manet Before and After Black Hole Attack

    Directory of Open Access Journals (Sweden)

    Ms.Heena Bhalla

    2012-01-01

    Full Text Available A Mobile ad-hoc network is a temporary network set up by wireless mobile computers (or nodes moving arbitrary in the places that have no network infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of the prominent attacks is the Black Hole Attack which absorbs all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper we simulated MANETs with and without Black Hole to study the effects of Black hole attack on network performance. Because of Black Hole Attack the average packet drop increased form 0.25% to 90.69% . The throughput of the network decreased 93.56% due to Black Hole effect.

  2. Nocturnal panic attacks

    OpenAIRE

    Lopes Fabiana L; Nardi Antonio E; Nascimento Isabella; Valença Alexandre M.; Zin Walter A.

    2002-01-01

    The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sle...

  3. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers

    Directory of Open Access Journals (Sweden)

    Roberto Alonso

    2016-08-01

    Full Text Available The Domain Name System (DNS is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS. The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers.

  4. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.

    Science.gov (United States)

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A

    2016-01-01

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers. PMID:27548169

  5. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  6. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  7. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  8. Securing the United States' power infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Happenny, Sean F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-08-01

    The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.

  9. Towards risk-based management of critical infrastructures : enabling insights and analysis methodologies from a focused study of the bulk power grid.

    Energy Technology Data Exchange (ETDEWEB)

    Richardson, Bryan T.; LaViolette, Randall A.; Cook, Benjamin Koger

    2008-02-01

    This report summarizes research on a holistic analysis framework to assess and manage risks in complex infrastructures, with a specific focus on the bulk electric power grid (grid). A comprehensive model of the grid is described that can approximate the coupled dynamics of its physical, control, and market components. New realism is achieved in a power simulator extended to include relevant control features such as relays. The simulator was applied to understand failure mechanisms in the grid. Results suggest that the implementation of simple controls might significantly alter the distribution of cascade failures in power systems. The absence of cascade failures in our results raises questions about the underlying failure mechanisms responsible for widespread outages, and specifically whether these outages are due to a system effect or large-scale component degradation. Finally, a new agent-based market model for bilateral trades in the short-term bulk power market is presented and compared against industry observations.

  10. Scenario Planning to Address Critical Uncertainties for Robust and Resilient Water–Wastewater Infrastructures under Conditions of Water Scarcity and Rapid Development

    Directory of Open Access Journals (Sweden)

    Kerri Jean Ormerod

    2012-11-01

    Full Text Available Ensuring water availability for multiple needs represents a sustainable development challenge globally. Rigid planning for fixed water supply and reuse targets with estimated demand growth and static assumptions of water availability can prove inflexible in responding to changing conditions. Formal methods to adaptively respond to these challenges are needed, particularly in regions with limited natural resources and/or where multiple uncertain forces can influence water-resource availability and supply reliability. This paper assesses the application of Scenario Planning in one such region—Tucson, Arizona, USA—over the coming 40 years, and highlights broader lessons for addressing complex interrelationships of water management, infrastructure development, and population growth. Planners from multiple jurisdictions and researchers identified ten key forces and prioritized three with the greatest uncertainty and the greatest impact for water and development planning: (1 changing demands based on potential future density, layout, and per capita water use/reuse; (2 adequacy of current water supplies to meet future demands; and (3 evolving public perceptions of water reuse including potential options to supplement potable water supplies. Detailed scenario modeling using GIS and infrastructure cost optimization is under development and is now beginning to produce results, to be discussed in future publications. The process has clearly demonstrated the value of Scenario Planning as a tool for bringing stakeholders into agreement over highly complex and historically divisive problems, and for prioritizing amongst diverse uncertainties. The paper concludes by characterizing possible outcomes for this case and draws lessons for other water scarce regions experiencing rapid development.

  11. Infrastructural fractals

    DEFF Research Database (Denmark)

    Bruun Jensen, Casper

    2007-01-01

    theorist in analyzing such relations. I find empirical illustration in the case of the development of electronic patient records in Danish health care. The role of the social theorist is explored through a comparison of the political and normative stance enabled, respectively, by a critical social theory...

  12. Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ibrahim S. I. Abuhaiba

    2012-11-01

    Full Text Available The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect. We present a new attack, Swarm Flooding Attack, against Directed Diffusion based WSNs, which targets the consumption of sensors computational resources, such as bandwidth, disk space, or processor time. Two variants of swarm attack have been introduced: Bee and Ant. Both approaches are inspired from the natural swarming difference between bees and ants. In all cases, the strategy used to mount an attack is the same. An attack consists of a set of malicious user queries represented by interests that are inserted into the network. However, the two forms of attack vary in the synchronization aspects among attackers. These types of attacks are hard to defend against as illustrated. For each of the proposed attack models, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

  13. Security solution against denial of service attacks in BESIP system

    Science.gov (United States)

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  14. Detecting and Localizing Wireless Network Attacks Techniques

    Directory of Open Access Journals (Sweden)

    Iyad Aldasouqi

    2010-03-01

    Full Text Available In order to increase employee productivity within a feasible budget, we have to track newtechnologies, investigate and choose the best plan and implementation of these technologies.WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequencyspectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize andidentify wireless network attacks, which present a unique set of challenges to IT and securityprofessionals. All efforts were focusing on the ability to identity based attacks in which amalicious device uses forged MAC addresses to masquerade as a specific client or to createmultiple illegitimate identities. Also, to be sure that the network is able to robustly identify eachtransmitter independently of packet contents, allowing detection of a large class of identity-basedattacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators,amplifiers, directional antennas, software radios, but he cannot be at the location of user or at thelocation of access points. However, we have to choose the best design, implementation, andevaluation techniques in order to secure our network from attackers, where our choice willdepend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

  15. Secluding Efficient Geographic Multicast Protocol against Multicast Attacks

    Directory of Open Access Journals (Sweden)

    A. Amuthan

    2013-09-01

    Full Text Available A Mobile Ad-hoc Network (MANETs is composed of Mobile Nodes without any infrastructure. The network nodes in MANETs, not only act as ordinary network nodes but also as the routers for other peer devices. The dynamic topology, lack of a fixed infrastructure and the wireless nature make MANETs susceptible to the security attacks. To add to that, due to the inherent, severe constraints in power, storage and computational resources in the MANET nodes, incorporating sound defense mechanisms against such attacks is also non-trivial. Therefore, interest in research of Mobile Ad-hoc NETworks has been growing since last few years. Security is a big issue in MANETs as they are infrastructure-less and autonomous. The main objective of this paper is to address some basic security concerns in EGMP protocol which is a multicast protocol found to be more vulnerable towards attacks like blackhole, wormhole and flooding attacks. The proposed technique uses the concepts of certificate to prevent these attacks and to find the malicious node. These attacks are simulated using NS2.28 version and the proposed proactive technique is implemented. The following metrics like packet delivery ratio, control overhead, total overhead and End to End delay are used to prove that the proposed solution is secure and robust.

  16. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  17. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  18. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  19. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  20. Central Region Green Infrastructure

    Data.gov (United States)

    Minnesota Department of Natural Resources — This Green Infrastructure data is comprised of 3 similar ecological corridor data layers ? Metro Conservation Corridors, green infrastructure analysis in counties...

  1. Signs of a Heart Attack

    Science.gov (United States)

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  2. Self repair of impacts, higher energy impacts, and earthquake damage in critical targets such as infrastructure components made of polymers and concrete

    Science.gov (United States)

    Dry, Carolyn

    2007-04-01

    The goal of our research has been to develop self-repairing matrices with unique toughness and strength for infrastructure and vehicles. Our revolutionary approach involves the autonomous release of repair chemicals from within the matrix itself. The repair agents are contained in hollow, structural fibers or beads that are embedded within the matrix. Under stress, the matrix senses external environmental factors and reacts by releasing the repair agents from within the hollow vessels. This autonomous response occurs wherever and whenever cracking, debonding or other matrix damage transpires. Superior performance over the life of the matrix is achieved through this self-repairing mechanism. The advantages are safely executed trips, fewer repairs and eventually lighter bridges and vehicles. Research to assess and clarify the impact of the various factors involved in self-repair of matrix materials has been the focus of our work for several years. Our research has addressed the issues by correlating the impact of the various factors, such as 1) delivery vessel, shape/size, coating, chemicals released, release trigger and efficacy and impact on matrix properties 2) influence of end use such as the importance of speed and force of release (airplane skin repair) 3) impact of processing methods that involve heat and pressure on the repair vessels. Our self repairing system can: be processed at temperatures of 350F, repairs in less than 30 seconds, and does not damage the matrix by repair fiber insertion. Unique toughness and strength is developed at damaged areas and material interfaces. Findings are based on testing in compression after impact, compression, fatigue, flexural toughness and flexure modes. The presentation will focus on highlighting the issues that were resolved in creating autonomous, self-repairing structures and vehicles.

  3. Analysis of Possible Attack on AODV Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Nitesh Funde

    2014-05-01

    Full Text Available Mobile Ad Hoc Networks (MANETs consist of wireless mobile nodes which coordinate with each other to form temporary network without its pre-existing infrastructure. AODV is popular Ad-hoc distance vector routing reactive protocol which is used to find correct & shortest route to destination. Due to openness, dynamic, infrastructure-less nature, MANET are vulnerable to various attacks. One of these possible attacks is a Black Hole Attack in which a mobile node falsely replies to the source node that it is having a shortest path to the destination without checking its routing table. Therefore source node send all of its data to the black hole node and it deprives all the traffic of the source node. In this paper, We are proposing a technique to detect and prevent the multiple black hole nodes from MANET so that source to destination communication can be made easily. We also analysed the performance of the network in terms of number of packets sent, received, throughput, energy of network before attack and after detection & prevention of Attack. From these analysis, we can conclude that performance decreased due to attack can be improved after detection & prevention black hole attack in MANET.

  4. Expected losses, insurability, and benefits from reducing vulnerability to attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Nozick, Linda Karen (Cornell University, Ithaca, NY); Carlson, Rolf Erik; Turnquist, Mark Alan (Cornell University, Ithaca, NY)

    2004-03-01

    A model of malicious attacks against an infrastructure system is developed that uses a network representation of the system structure together with a Hidden Markov Model of an attack at a node of that system and a Markov Decision Process model of attacker strategy across the system as a whole. We use information systems as an illustration, but the analytic structure developed can also apply to attacks against physical facilities or other systems that provide services to customers. This structure provides an explicit mechanism to evaluate expected losses from malicious attacks, and to evaluate changes in those losses that would result from system hardening. Thus, we provide a basis for evaluating the benefits of system hardening. The model also allows investigation of the potential for the purchase of an insurance contract to cover the potential losses when safeguards are breached and the system fails.

  5. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  6. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  7. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for...

  8. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  9. A Survey on Detecting Wormhole Attack in Manet

    Directory of Open Access Journals (Sweden)

    Bipin N. Patel

    2014-03-01

    Full Text Available A Mobile Ad Hoc Network (MANET is a self organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Ad hoc networks are by nature very open to anyone. Anyone with the proper hardware and knowledge of the network topology and protocols can connect to the network. This allows potential attackers to infiltrate the network and carry out attacks on its participants with the purpose of stealing or altering information. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. It does not require any cryptographic primitives. This attack targets specifically routing control packets, the nodes that are close to the attackers are shielded from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. The entire routing system in MANET can even be brought down using the wormhole attack. We have presented several existing techniques to detect wormhole attack in mobile ad hoc networks.

  10. Defending Wormhole Attack in Wireless Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nisha S.Raote

    2011-09-01

    Full Text Available The ad-hoc networks are the temporarily established wireless networks which does not require fixedinfrastructure it is also called as infrastructure less network. Because of some flaws of adhoc networksuch as shared wireless medium and lack of any central coordination makes them more prone to attacksin comparison with the wired network. Among all the attacks wormhole attack is the most severe attack.In this attack an attacker capture the packets at one location in the network and send it two anotherattacker at a distant location through tunnels which is established through different ways like packetencapsulation, using high power transmission or by using direct antennas. This tunnel between twocolluding attackers is virtual and it is called as a wormhole. The wormhole attack is possible even if theattacker has not comprised any hosts, and all communication provides authenticity and confidentiality.By using the various approaches for finding the solution over wormhole attack, the dynamic informationof the packets could still be modified. So in order to give more robust protection in some special scenariolike battlefields, which requires highly secured information, there is need of developing some securedmechanism for wormhole detection and prevention. Taking into consideration this problem the proposedscheme is developed. This paper discusses proposed works on wormhole attack along with its availablecounter measures in ad-hoc wireless network.

  11. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    CERN Document Server

    Teixeira, André; Sandberg, Henrik; Johansson, Karl H

    2010-01-01

    The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication channels. Therefore cyber security for state estimators becomes an important issue. In this paper we analyze the cyber security of state estimators in supervisory control and data acquisition (SCADA) for energy management systems (EMS) operating the power network. Current EMS state estimation algorithms have bad data detection (BDD) schemes to detect outliers in the measurement data. Such schemes are based on high measurement redundancy. Although these methods may detect a set of basic cyber attacks, they may fail in the presence of an intelligent attacker. We explore the latter by considering scenarios where stealthy de...

  12. ICS logging solution for network-based attacks using Gumistix technology

    Science.gov (United States)

    Otis, Jeremy R.; Berman, Dustin; Butts, Jonathan; Lopez, Juan

    2013-05-01

    Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that many exposed ICS devices are being discovered using readily available applications (e.g., ShodanHQ search engine and Google-esque queries). Due to the lack of security and logging capabilities for ICS, most knowledge about attacks are derived from real world incidents after an attack has already been carried out and the damage has been done. This research provides a method for introducing sensors into the ICS environment that collect information about network-based attacks. The sensors are developed using an inexpensive Gumstix platform that can be deployed and incorporated with production systems. Data obtained from the sensors provide insight into attack tactics (e.g., port scans, Nessus scans, Metasploit modules, and zero-day exploits) and characteristics (e.g., attack origin, frequency, and level of persistence). Findings enable security professionals to draw an accurate, real-time awareness of the threats against ICS devices and help shift the security posture from reactionary to preventative.

  13. Maintaining Functional Safety under an Intentional Electromagnetic Interference (IEMI) Attack

    OpenAIRE

    Ängskog, Per; Oakes, Ben

    2013-01-01

    The importance of protection against IEMI effects in civilian applications is growing rapidly as more and more societal infrastructure is equipped with electronic devices. This paper discusses methods to help maintaining functional safety in the event of an IEMI attack. QC 20160104

  14. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    OpenAIRE

    Yi-Hsun Wang; Ching-Hao Mao; Hahn-Ming Lee

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of...

  15. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  16. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  17. Infrastructural Map for Information Security

    Directory of Open Access Journals (Sweden)

    Sabah Al-Fedaghi,

    2011-02-01

    Full Text Available The threat modeling process starts with the phases of identifying critical assets, creating an architecture overview, and decomposing to identify possible points of attack. Data flow diagrams and sequence diagrams are used in this process. This paper proposes an alternative flow-based methodology for building an architectural map for the system. It provides a high-level methodology for creating a blueprint of the organization to guide security planning in the network.

  18. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  19. Performance evaluation of DSR Protocol under DoS attack

    Directory of Open Access Journals (Sweden)

    Ms. Trupti Patel

    2012-03-01

    Full Text Available A mobile ad-hoc network (MANET consists of mobile hosts equipped with wireless communication devices. A Mobile Ad hoc Network is a self-organizing, infrastructure less, multi-hop network. The transmission of a mobile host is received by all hosts within its transmission range due to the broadcast nature of wireless communication and unidirectional antenna. If two wireless hosts are out of their transmission ranges in the ad hoc networks, other mobile hosts located between them can forward their message, which effectively builds connected networks among the mobile hosts in the deployed area. One main challenge in design of these networks is their vulnerable nature to security attack. These attacks can be deployed by insider or outsider attacker. Sometime, the node from network can be attacker. This is happen because of mobility of nodes and changing network topology. There are different kind of attacks available in literature and can be implemented on MANET. One of these attacks is Grey Hole attack that has dangerous effect on Mobile Ad-Hoc Network. In this paper, we study the effect of Grey Hole attack on Dynamic Source Routing (DSR protocol in Mobile Ad-Hoc Network.

  20. WORMHOLE ATTACK MITIGATION IN MANET: A CLUSTER BASED AVOIDANCE TECHNIQUE

    Directory of Open Access Journals (Sweden)

    Subhashis Banerjee

    2014-01-01

    Full Text Available A Mobile Ad-Hoc Network (MANET is a self configuring, infrastructure less network of mobile devices connected by wireless links. Loopholes like wireless medium, lack of a fixed infrastructure, dynamic topology, rapid deployment practices, and the hostile environments in which they may be deployed, make MANET vulnerable to a wide range of security attacks and Wormhole attack is one of them. During this attack a malicious node captures packets from one location in the network, and tunnels them to another colluding malicious node at a distant point, which replays them locally. This paper presents a cluster based Wormhole attack avoidance technique. The concept of hierarchical clustering with a novel hierarchical 32- bit node addressing scheme is used for avoiding the attacking path during the route discovery phase of the DSR protocol, which is considered as the under lying routing protocol. Pinpointing the location of the wormhole nodes in the case of exposed attack is also given by using this method.

  1. IMPROVED MCBDS FOR DEFENDING AGAINST GRAY HOLE AND BLACK HOLE ATTACKS IN MANETS

    OpenAIRE

    Ahmad Haghighi; Kiarash Mizanian; Ghasem Mirjalily

    2016-01-01

    Mobile Ad-hoc Networks (MANETs) are widely used nowadays. Because of their characteristics as open media, dynamic topology, being infrastructure-less and lack of centralized monitoring, MANET is vulnerable to a wide range of attacks like blackhole and grayhole. Blackhole and grayhole attacks refer to the attacks that breach the security by performing packet forwarding and routing misbehavior and cause denial of service in MANETs. In this paper we improved our previous work on MCBDS, we reduce...

  2. Tool-based Risk Assessment of Cloud Infrastructures as Socio-Technical Systems

    OpenAIRE

    Nidd, Michael; Ivanova, Marieta Georgieva; Christian W. Probst; Tanner, Axel

    2015-01-01

    Assessing risk in cloud infrastructures is difficult. Typical cloud infrastructures contain potentially thousands of nodes that are highly interconnected and dynamic. Another important component is the set of human actors who get access to data and computing infrastructure. The cloud infrastructure therefore constitutes a socio-technical system. Attacks on socio-technical systems are still mostly identified through expert brainstorming. However, formal risk assessment for systems including hu...

  3. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. PMID:24237838

  4. E-Canada and the Emerging Cyber Attack Exigency

    Directory of Open Access Journals (Sweden)

    Craig MacEachern

    2011-10-01

    Full Text Available

    This paper examines the growing concern surrounding cyber-attacks, and warns about the possible impacts of a cyber-attack upon Canadian e-government, economy, and infrastructure. This paper covers historical examples of cyber-attacks on a global scale, then focuses on Canadian e-government vulnerabilities, and suggests some ways in which Canadian government must adapt its domestic security and internet policies to confront the future inevitability of cyber-attacks.  

  5. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  6. Cell Counting Attack and Browser Attack against TOR Network

    OpenAIRE

    Swati

    2014-01-01

    The onion router (TOR) allows to hide your identity various software under this categories are available that allows online anonymity network, supporting TCP applications over the Internet. It doesn't allow network surveillance or traffic analysis to get tracked but most of these software used equal size of cells (512B). In this paper we are comparing cell-counting attacks and browser attacks against TOR. Different from cell-counting attacks, these attacks can confirm anonymou...

  7. Infrastructure Concessions in Chile

    OpenAIRE

    Gómez-Lobo, Andrés; Hinojosa, Sergio

    2000-01-01

    To increase investment in infrastructure, in the early 1990s Chiles government introduced private capital into the transport infrastructure sector, covering roads and highways, bridges, tunnels, and airports. The chosen mechanism: a concession scheme through which private firms would finance and build a given project and then operate the infrastructure for a set of number of years, recover...

  8. Blocking of Brute Force Attack

    Directory of Open Access Journals (Sweden)

    M.Venkata Krishna Reddy

    2012-08-01

    Full Text Available A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it could take years to find it. Depending on the password's length and complexity, there could be trillions of possible combinations. To speed things up a bit, a brute-force attack could start with dictionary words or slightly modified dictionary words because most people will use those rather than a completely random password. These attacks are called dictionary attacks or hybrid brute-force attacks. Brute-force attacks put user accounts at risk and flood your site with unnecessary traffic. Hackers launch brute-force attacks using widely available tools that utilize wordlists and smart rule set to intelligently and automatically guess user passwords. Although such attacks are easy to detect, they are not so easy to prevent

  9. ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

    Directory of Open Access Journals (Sweden)

    A.MADHURI,

    2010-09-01

    Full Text Available In this paper, we discuss the methods for detecting and preventing the DDoS Attacks and Replay Attacks, which have been posing the problems for the Internet. We explained a scheme AMFDR (AttackPatterns for Marking Filtering DoS and Replay attacks that identifies the attack packets from the packets that are sent by legitimate users and filters the attack packets. A Denial of service attack is generally launched to make a service unavailable even to an unauthorized user. If this attack uses many computers across the world, it is called Distributed Denial of service attack. Replay attack is retransmission of a data transmission which used to gain authentication in a fraudulent manner. These replayed packets or attack packets are identified. This scheme is less expensive and the implementation of this scheme needs minimal interaction with routers. The scheme is like firewall system, so that the occurrence of an attack is recognized quickly and a punitive action is taken without any loss genuine packets.

  10. Simultaneous Attacks by Terrorist Organisations

    Directory of Open Access Journals (Sweden)

    Kathleen Deloughery

    2013-12-01

    Full Text Available While terror attacks that are a part of a coordinated effort receive attention in the popular media, they have not received much attention in the academic literature. The decision to carry out simultaneous attacks should be examined as one of the choices a terrorist organisation makes about the method of attack. Determining the impact of simultaneous attacks vis-à-vis a single attack can explain why groups would use this method. Up to one quarter of all attacks coded in two major databases, GTD and ITERATE, may be part of a simultaneous campaign. Empirical analysis shows simultaneous attacks are more likely to be successful and cause more fatalities, though not in a one-to-one fashion. These results underline the importance of considering simultaneous attacks in empirical analysis.

  11. A Critical Survey Of Privacy Infrastructures

    OpenAIRE

    Priyanka, B H; Prakash, Ravi

    2015-01-01

    Over the last two decades, the scale and complexity of the Internet and its associated technologies built on the World Wide Web has grown exponentially with access to Internet as a facility occupying a prime place with other amenities of modern lives. In years to come, usage of Internet may unravel more pleasant surprises for us as far as novelty in its usage is concerned. As a democratic function of Internet, and relying on the open model on which it has been built, there has been concerted ...

  12. SECURING CRITICAL UTILITY SYSTEMS & NETWORK INFRASTRUCTURES

    OpenAIRE

    Garrancho, Bruno Miguel Inácio

    2009-01-01

    As infra-estruturas críticas de TI para serviços públicos são apoiadas por inúmeros sistemas complexos. Estes sistemas permitem a gestão e recolha de informação em tempo-real, constituindo a base para a gestão eficiente das operações. A utilização, cada vez mais frequente, de software e hardware (Commercial Off-The-Shelf, COTS) em sistemas SCADA permitiu grandes beneficios financeiros na aquisição e desenvolvimento de soluções técnicas que suportam os serviços públicos. O uso d...

  13. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  14. LITERATURE SURVEY ON WORMHOLE ATTACK

    OpenAIRE

    Avinash S. Bundela

    2015-01-01

    Security plays an important role in Mobile Ad Hoc Network when data transmission is performed within un - trusted wireless scenario. Various attacks like Black hole, Wormhole, Gray hole and many more have been identified & corresponding solutions have been proposed. These attacks are caused by the malicious node hence ad hoc wireless network is unprotected from the attacks of the malicious node. Between all these attacks the wormhole att ...

  15. Infrastructural urbanism that learns from place

    DEFF Research Database (Denmark)

    Carruth, Susan

    2015-01-01

    The development of renewable energy infrastructures in response to climatic change, calls of ‘peak oil’, environmental degradation, and geopolitical instabilities is a global challenge, and innumerable organisations and disciplines are working towards a transition to zero-carbon energy systems...... relationships, proposing that landscape itself is infrastructural with the capacity to simultaneously host and connect ecological, economical, and environmental processes. Concurrently, cultural anthropology has critically revised understandings of infrastructure to encompass semantic and sociocultural....... Conventionally, energy ‘infrastructure’ denotes a physical system of pipes, cables, generators, plants, transformers, sockets, and pylons, however recent architectural research emerging within the loosely defined movement of Infrastructural Urbanism has reframed infrastructure as a symbiotic system of flows and...

  16. Parallel digital forensics infrastructure.

    Energy Technology Data Exchange (ETDEWEB)

    Liebrock, Lorie M. (New Mexico Tech, Socorro, NM); Duggan, David Patrick

    2009-10-01

    This report documents the architecture and implementation of a Parallel Digital Forensics infrastructure. This infrastructure is necessary for supporting the design, implementation, and testing of new classes of parallel digital forensics tools. Digital Forensics has become extremely difficult with data sets of one terabyte and larger. The only way to overcome the processing time of these large sets is to identify and develop new parallel algorithms for performing the analysis. To support algorithm research, a flexible base infrastructure is required. A candidate architecture for this base infrastructure was designed, instantiated, and tested by this project, in collaboration with New Mexico Tech. Previous infrastructures were not designed and built specifically for the development and testing of parallel algorithms. With the size of forensics data sets only expected to increase significantly, this type of infrastructure support is necessary for continued research in parallel digital forensics. This report documents the implementation of the parallel digital forensics (PDF) infrastructure architecture and implementation.

  17. Risk analysis for critical asset protection.

    Science.gov (United States)

    McGill, William L; Ayyub, Bilal M; Kaminskiy, Mark

    2007-10-01

    This article proposes a quantitative risk assessment and management framework that supports strategic asset-level resource allocation decision making for critical infrastructure and key resource protection. The proposed framework consists of five phases: scenario identification, consequence and criticality assessment, security vulnerability assessment, threat likelihood assessment, and benefit-cost analysis. Key innovations in this methodology include its initial focus on fundamental asset characteristics to generate an exhaustive set of plausible threat scenarios based on a target susceptibility matrix (which we refer to as asset-driven analysis) and an approach to threat likelihood assessment that captures adversary tendencies to shift their preferences in response to security investments based on the expected utilities of alternative attack profiles assessed from the adversary perspective. A notional example is provided to demonstrate an application of the proposed framework. Extensions of this model to support strategic portfolio-level analysis and tactical risk analysis are suggested. PMID:18076495

  18. Improving the Resilience of Major Ports and Critical Supply Chains to Extreme Coastal Flooding: a Combined Artificial Neural Network and Hydrodynamic Simulation Approach to Predicting Tidal Surge Inundation of Port Infrastructure and Impact on Operations.

    Science.gov (United States)

    French, J.

    2015-12-01

    Ports are vital to the global economy, but assessments of global exposure to flood risk have generally focused on major concentrations of population or asset values. Few studies have examined the impact of extreme inundation events on port operation and critical supply chains. Extreme water levels and recurrence intervals have conventionally been estimated via analysis of historic water level maxima, and these vary widely depending on the statistical assumptions made. This information is supplemented by near-term forecasts from operational surge-tide models, which give continuous water levels but at considerable computational cost. As part of a NERC Infrastructure and Risk project, we have investigated the impact of North Sea tidal surges on the Port of Immingham, eastern, UK. This handles the largest volume of bulk cargo in the UK and flows of coal and biomass that are critically important for national energy security. The port was partly flooded during a major tidal surge in 2013. This event highlighted the need for improved local forecasts of surge timing in relation to high water, with a better indication of flood depth and duration. We address this problem using a combination of data-driven and numerical hydrodynamic models. An Artificial Neural Network (ANN) is first used to predict the surge component of water level from meteorological data. The input vector comprises time-series of local wind (easterly and northerly wind stress) and pressure, as well as regional pressure and pressure gradients from stations between the Shetland Islands and the Humber estuary. The ANN achieves rms errors of around 0.1 m and can generate short-range (~ 3 to 12 hour) forecasts given real-time input data feeds. It can also synthesize water level events for a wider range of tidal and meteorological forcing combinations than contained in the observational records. These are used to force Telemac2D numerical floodplain simulations using a LiDAR digital elevation model of the port

  19. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  20. Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator

    CERN Document Server

    Esmaili, H A; gharaee, Hossein

    2011-01-01

    Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the black hole. In this attack, a malicious node advertises itself as having freshest or shortest path to specific node to absorb packets to itself. The effect of black hole attack on ad hoc network using AODV as a routing protocol will be examined in this research. Furthermore, we investigate solution for increasing security in these networks. Simulation results using OPNET simulator depict that packet delivery ratio in the presence of malicious nodes, reduces notably.

  1. Infrastructure: A technology battlefield in the 21st century

    Energy Technology Data Exchange (ETDEWEB)

    Drucker, H.

    1997-12-31

    A major part of technological advancement has involved the development of complex infrastructure systems, including electric power generation, transmission, and distribution networks; oil and gas pipeline systems; highway and rail networks; and telecommunication networks. Dependence on these infrastructure systems renders them attractive targets for conflict in the twenty-first century. Hostile governments, domestic and international terrorists, criminals, and mentally distressed individuals will inevitably find some part of the infrastructure an easy target for theft, for making political statements, for disruption of strategic activities, or for making a nuisance. The current situation regarding the vulnerability of the infrastructure can be summarized in three major points: (1) our dependence on technology has made our infrastructure more important and vital to our everyday lives, this in turn, makes us much more vulnerable to disruption in any infrastructure system; (2) technologies available for attacking infrastructure systems have changed substantially and have become much easier to obtain and use, easy accessibility to information on how to disrupt or destroy various infrastructure components means that almost anyone can be involved in this destructive process; (3) technologies for defending infrastructure systems and preventing damage have not kept pace with the capability for destroying such systems. A brief review of these points will illustrate the significance of infrastructure and the growing dangers to its various elements.

  2. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  3. Optimizing And Analysing The Effectiveness Of Security Hardening Measures Using Various Optimization Techniques As Well As Network Management Models Giving Special Emphasis To Attack Tree Model

    Directory of Open Access Journals (Sweden)

    Prabhat Kumar Vishwakarma

    2011-08-01

    Full Text Available To cope up the network security measures with the financial restrictions in the corporate world is still a challenge. At global scenario the tradeoff between the protection of IT infrastructure and the financial boundation for any organization using IT as valuable resource is quite essential. Every organization has different security needs and different budgets for coping with that therefore whether it has to look as single objective or as multiple objectives with fault tolerant feature is a critical issue. In the present paper an attempt has been taken to optimize and analyze the effectiveness of security hardening measures considering attack tree model as base. In short we can say that the main attention in the paper is-to rectify, to describe the notations of the attack tree model and to suggest a model which may be able to quantitatively specify the possible threats as well as cost of the security control while implementing the security hardening measures.

  4. MOEMS industrial infrastructure

    Science.gov (United States)

    van Heeren, Henne; Paschalidou, Lia

    2004-08-01

    numbers they want (several millions per year). The crossover point where building a dedicated facility becomes a realistic option, can differ very much depending on technology complexity, numbers and market value. Also history plays a role, companies with past experience in the production of a product and the necessary facilities and equipment will tend to achieve captive production. Companies not having a microtechnology history will tend to outsource, offering business opportunities for foundries. The number of foundries shows a steady growth over the years. The total availability of foundries, however, and their flexibility will, undoubtedly, rely on market potential and its size. Unlike design houses, foundries need to realise a substantial return on the "large" investments they make in terms of capital and infrastructure. These returns will be maximised through mass-produced products aimed at "killer" applications (accelerometers are only one example). The existence of professional suppliers of MOEMS packaging and assembly is an essential element in the supply chain and critical for the manufacturing and commercialisation of MOEMS products. In addition, the incorporation of packaging and assembly techniques at the front-end of the engineering cycle will pay back in terms of financial savings and shorter timescales to market. Packaging and assembly for MOEMS are, in general, more costly than their equivalents for standard integrated circuits. This is, primarily, due to the diversity of the interconnections (which are multi-functional and may incorporate: electrical, optical, fluidic etc). In addition, the high levels of accuracy and the potential sensitivity of the devices to mechanical and external influences play a major role in the cost aspects of the final MNT product. This article will give an overview of the package/assembly providers and foundry business models and analyse their contribution to the MOEMS supply chain illustrated with some typical examples. As

  5. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  6. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  7. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are...... caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  8. A Study of Direct and Indirect Costs Resulting from a Radiological Attack by Terrorists

    International Nuclear Information System (INIS)

    An uncontrolled release of radioactivity caused by a terrorist attack is expected to result in an - incident of national significance - and have the potential consequence of a significant economic impact. The magnitude of the economic impact and the range of impacted entities are somewhat controversial. This paper will discuss the elements and methodology that comprise the buildup of an estimate for a specific critical infrastructure. The radiological attack event was studied by the Department of Homeland Security (DHS) to estimate the health and economic impacts of a radionuclide attack. The cost estimate was based on response actions outlined in the DHS National Response Plan and the Environmental Protection Agency (EPA) Response Protocol Toolbox: Planning for and Responding to Drinking Water Contamination Threats and Incidents. A response plan was developed to support the options for the estimate. Several response and cleanup options were evaluated to determine a range of potential costs. It is the breakdown of the cost elements and their relative size that is discussed in this paper. The first step in the estimating process was the development of the terrorist attack characteristics that were to be estimated. Example response timelines were developed to determine what immediate operational response actions are possible to mitigate the attack consequences. Based on the attack assumptions, costs were estimated for a number of response and remediation options that may be employed. Finally, each parameter was evaluated to account for the range of values possible and its effect on the total cost. Cost estimates were based on data from standard references, internet searches on specific subjects, and information from recent terrorist activities. These costs were broken down into Micro-economic Level Costs (primarily associated with Medical Treatment, Remediation, and Business Interruption) and Macroeconomic Level Costs (primarily associated with the value of life lost

  9. Infrastructure and trade

    OpenAIRE

    Nordås, Hildegunn Kyvik; Piermartini, Roberta

    2004-01-01

    This paper explores the role that quality of infrastructure has on a country's trade performance, estimating a gravity model that incorporates bilateral tariffs and a number of indicators for the quality of infrastructure. The paper looks at the impact of the quality of infrastructure (road, airport, port and telecommunication, and the time required for customs clearance) on total bilateral trade and on trade in the automotive, clothing and textile sectors. In order to obtain unbiased estimat...

  10. Trends in infrastructure

    OpenAIRE

    Greg Coombs; Chris Roberts

    2007-01-01

    The adequacy of Australia’s infrastructure has been a long-standing topic of debate. This article provides some insight into the question of infrastructure adequacy by examining trends in investment across OECD countries, and discusses some of the fundamental factors influencing Australia’s investment relative to other OECD countries. The article also looks at the question of the changing composition of public and private infrastructure spending in Australia over recent decades.

  11. Company infrastructure management system

    OpenAIRE

    Rykunich Anastasiya Yu.; Shvydanenko Genefa A.

    2013-01-01

    The article studies the content, structure and methods of organisational influence upon the company infrastructure. It offers definition of the company infrastructure from the point of view of a complex approach and also functional structure of the infrastructural complex, which allowed allocation of component elements and analysis of their role in servicing main production. The article analyses advantages and risks under conditions of attraction of outsourcing companies into company infrastr...

  12. Global information infrastructure.

    Science.gov (United States)

    Lindberg, D A

    1994-01-01

    The High Performance Computing and Communications Program (HPCC) is a multiagency federal initiative under the leadership of the White House Office of Science and Technology Policy, established by the High Performance Computing Act of 1991. It has been assigned a critical role in supporting the international collaboration essential to science and to health care. Goals of the HPCC are to extend USA leadership in high performance computing and networking technologies; to improve technology transfer for economic competitiveness, education, and national security; and to provide a key part of the foundation for the National Information Infrastructure. The first component of the National Institutes of Health to participate in the HPCC, the National Library of Medicine (NLM), recently issued a solicitation for proposals to address a range of issues, from privacy to 'testbed' networks, 'virtual reality,' and more. These efforts will build upon the NLM's extensive outreach program and other initiatives, including the Unified Medical Language System (UMLS), MEDLARS, and Grateful Med. New Internet search tools are emerging, such as Gopher and 'Knowbots'. Medicine will succeed in developing future intelligent agents to assist in utilizing computer networks. Our ability to serve patients is so often restricted by lack of information and knowledge at the time and place of medical decision-making. The new technologies, properly employed, will also greatly enhance our ability to serve the patient. PMID:8125625

  13. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  14. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  15. Geospatial Information Infrastructure

    Data.gov (United States)

    Department of Homeland Security — The Geospatial Information Infrastructure (GII) system is the Departments common solution architecture for the enterprise geospatial segment administered by the DHS...

  16. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  17. Robustness of correlated networks against propagating attacks

    CERN Document Server

    Hasegawa, Takehisa; Nemoto, Koji

    2012-01-01

    We investigate robustness of correlated networks against propagating attacks modeled by a susceptible-infected-removed model. By Monte-Carlo simulations, we numerically determine the first critical infection rate, above which a global outbreak of disease occurs, and the second critical infection rate, above which disease disintegrates the network. Our result shows that correlated networks are robust compared to the uncorrelated ones, regardless of whether they are assortative or disassortative. This behavior is related to the layered network structure inevitably generated by a rewiring procedure we adopt to realize correlated networks.

  18. A Survey On New Approach For Detecting Blackhole Attack

    Directory of Open Access Journals (Sweden)

    Ankush D. Patil

    2013-05-01

    Full Text Available Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. A MANET is aself-organizing system of mobile nodes that communicate with each other via wireless links with no .fixed infrastructure or centralized administration such as base stations or access points. Due to unique characteristics of MANETS, it creates a number of consequential challenges to its security design. To overcome the challenges, there is a need to build a security solution that achieves both broad protection and desirable network performance. MANETs are vulnerable to various attacks, such as blackhole attack, jellyfish attack, rushing attack, wormhole attack. Black hole is a type of routing attack where a malicious node advertise itself as having the shortest path to all nodes in the environment by sending fake route reply.By doing this, the malicious node can deprive the traffic from the source node. Although in this paper we only focus on the routing protocols and security issues in MANET. In this paper, we proposed an AODV and DPRAODV (Detection, Prevention and Reactive AODV to prevent security threats of blackhole by notifying other nodes in the network of the incident.

  19. Modified localized attack on complex network

    Science.gov (United States)

    Dong, Gaogao; Du, Ruijin; Hao, Huifang; Tian, Lixin

    2016-01-01

    Since a shell structure contains a wealth of information, it is not only very important for understanding the transport properties of the network, but also essential to identify influential spreaders in complex networks. Nodes within each shell can be classified into two categories: protected nodes and unprotected nodes. In this paper, we propose a generalization of the localized attack, modified localized attack, which means that when a randomly chosen node (root node) is under attack, protected nodes will not be removed, but unprotected nodes in the nearest shells will fail. We numerically and analytically study the system robustness under this attack by taking an Erdös-Rényi (ER) network, a regular random (RR) network and a scale-free (SF) network as examples. Moreover, a fraction of nodes belonging to giant component S and a critical threshold q c , where S approaches to zero, are given. The result implies that increasing connection density has been found to be useful to significantly improve network robustness.

  20. Classification of Artificial Intelligence IDS for Smurf Attack

    OpenAIRE

    N.Ugtakhbayar; D.Battulga; Sh.Sodbileg

    2012-01-01

    Many methods have been developed to secure the network infrastructure and communication over the Internet. Intrusion detection is a relatively new addition to such techniques. Intrusion detection systems (IDS) are used to find out if someone has intrusion into or is trying to get it the network. One big problem is amount of Intrusion which is increasing day by day. We need to know about network attack information using IDS, then analysing the effect. Due to the nature of IDSs whic...

  1. Tool-based Risk Assessment of Cloud Infrastructures as Socio-Technical Systems

    DEFF Research Database (Denmark)

    Nidd, Michael; Ivanova, Marieta Georgieva; Probst, Christian W.;

    2015-01-01

    Assessing risk in cloud infrastructures is difficult. Typical cloud infrastructures contain potentially thousands of nodes that are highly interconnected and dynamic. Another important component is the set of human actors who get access to data and computing infrastructure. The cloud infrastructure...... therefore constitutes a socio-technical system. Attacks on socio-technical systems are still mostly identified through expert brainstorming. However, formal risk assessment for systems including human actors requires modeling human behavior, which is difficult at best. In this chapter, we present a modeling...... exercise for cloud infrastructures using the socio-technical model developed in the TRESPASS project; after showing how to model typical components of a cloud infrastructure, we show how attacks are identified on this model and discuss their connection to risk assessment. The technical part of the model is...

  2. Settlement characteristics of major infrastructures in Shanghai

    Science.gov (United States)

    Jiao, X.; Yan, X. X.; Wang, H. M.

    2015-11-01

    Critical infrastructures in Shanghai have undergone uneven settlement since their operation, which plays an important role in affecting the security of Shanghai. This paper, taking rail transportation as example, investigates settlement characteristics and influencing factors of this linear engineering, based on long-term settlement monitoring data. Results show that rail settlement is related to geological conditions, regional ground subsidence, surrounding construction activities and structural differences in the rail systems. In order to effectively decrease the impact of regional ground subsidence, a monitoring and early-warning mechanism for critical infrastructure is established by the administrative department and engineering operators, including monitoring network construction, settlement monitoring, information sharing, settlement warning, and so on.

  3. Grid attacks avian flu

    CERN Multimedia

    2006-01-01

    During April, a collaboration of Asian and European laboratories analysed 300,000 possible drug components against the avian flu virus H5N1 using the EGEE Grid infrastructure. Schematic presentation of the avian flu virus.The distribution of the EGEE sites in the world on which the avian flu scan was performed. The goal was to find potential compounds that can inhibit the activities of an enzyme on the surface of the influenza virus, the so-called neuraminidase, subtype N1. Using the Grid to identify the most promising leads for biological tests could speed up the development process for drugs against the influenza virus. Co-ordinated by CERN and funded by the European Commission, the EGEE project (Enabling Grids for E-sciencE) aims to set up a worldwide grid infrastructure for science. The challenge of the in silico drug discovery application is to identify those molecules which can dock on the active sites of the virus in order to inhibit its action. To study the impact of small scale mutations on drug r...

  4. Impact of Rushing attack on Multicast in Mobile Ad Hoc Network

    CERN Document Server

    Palanisamy, V

    2009-01-01

    A mobile ad hoc network (MANETs) is a self-organizing system of mobile nodes that communicate with each other via wireless links with no fixed infrastructure or centralized administration such as base station or access points. Nodes in a MANETs operate both as host as well as routers to forward packets for each other in a multihop fashion. For many applications in wireless networks, multicasting is an important and frequent communication service. By multicasting, since a single message can be delivered to multiple receivers simultaneously. It greatly reduces the transmission cost when sending the same packet to multiple recipients. The security issue of MANETs in group communications is even more challenging because of involvement of multiple senders and multiple receivers. At that time of multicasting, mobile ad hoc network are unprotected by the attacks of malicious nodes because of vulnerabilities of routing protocols. Some of the attacks are Rushing attack, Blackhole attack, Sybil attack, Neighbor attack ...

  5. Multicast Security Attacks and Its Counter Measures for Puma Protocol

    Directory of Open Access Journals (Sweden)

    A. Amuthan

    2011-05-01

    Full Text Available A Mobile Ad hoc NETwork (MANETs is a continuously changing wireless network that can be created without any pre-existing infrastructure in which each node can operate as a router. MANETs has no clear line of control, so it is accessible to both legitimate network users and malicious attackers. The main challenge in MANETs is to design a secure solution which can protect the MANET from various kinds of security attacks.In this paper, we put a first step towards securing multicast routing protocol for ad hoc network. Specifically we examine the vulnerabilities of PUMA (Protocol for Unified Multicasting through Announcements which is a representative of mesh based routing protocol. In this proposed work, we have presented a trust based approach where in which the secure route is selected for the receivers not only based on current trust values of its neighbor nodes but also its past experience is considered for blackhole and wormhole attack

  6. Telecom infrastructure leasing

    International Nuclear Information System (INIS)

    Slides to accompany a discussion about leasing telecommunications infrastructure, including radio/microwave tower space, radio control buildings, paging systems and communications circuits, were presented. The structure of Alberta Power Limited was described within the ATCO group of companies. Corporate goals and management practices and priorities were summarized. Lessons and experiences in the infrastructure leasing business were reviewed

  7. Supporting clinicians in infrastructuring

    DEFF Research Database (Denmark)

    Simonsen, Jesper; Hertzum, Morten; Karasti, Helena

    2015-01-01

    notion of infrastructuring, we carry out an infrastructural analysis of eWBs and approach our joint efforts as unfolding and continuing the con-figuration of participatory design activities. We identify a need for local support and novel competences among the clinicians in order for them to engage in...

  8. Infrastructure Survey 2011

    Science.gov (United States)

    Group of Eight (NJ1), 2012

    2012-01-01

    In 2011, the Group of Eight (Go8) conducted a survey on the state of its buildings and infrastructure. The survey is the third Go8 Infrastructure survey, with previous surveys being conducted in 2007 and 2009. The current survey updated some of the information collected in the previous surveys. It also collated data related to aspects of the…

  9. Clustering of Infrastructure

    NARCIS (Netherlands)

    Willems, J.K.C.A.S.

    2001-01-01

    Bundling or converging infrastructure has been the leading principle for locating infrastructure since the mid seventies. It is assumed to offer certain advantages, such as a restriction of severance, consumption of free space and environmental hindrance. However, the concept of converging infrastru

  10. FLOODING ATTACK AWARE SECURE AODV

    OpenAIRE

    Madhavi, S; K. Duraiswamy

    2013-01-01

    Providing security in a Mobile Ad hoc Network (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the ...

  11. Sulfate attack expansion mechanisms

    Energy Technology Data Exchange (ETDEWEB)

    Müllauer, Wolfram, E-mail: wolf_m@gmx.at; Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  12. Asessing ethical severity of e-learning systems security attacks

    OpenAIRE

    LEVY, Y.; Ramim, MM; Hackney, RA

    2013-01-01

    Security and ethical issues with information systems (IS) are important concerns for most organizations. However, limited attention has been given to unethical behaviors and severity of cyber-security attacks, while these instances appear to be critically important. Although managers have been embracing e-learning systems for training and virtual-team collaborations, little is known about motivations for cyber-security attacks on such systems

  13. Information Sharing in a Nuclear Security Event - Consultation of Member States on the Report “Remote Expert Support of Field Teams; Reachback Services For Nuclear Security” ERNCIP Thematic Group Radiological and Nuclear Threats to Critical Infrastructure - Task 3B Deliverable 2

    OpenAIRE

    Toivonen, H; REPPENHAGEN GRIM P.; SCHOECH Hubert; KEIGHTLEY John; Tengblad, Olof; Schneider, Frank; FORSBERG HANS CARL-JOHAN; Peräjärvi, K

    2015-01-01

    The ERNCIP thematic group for Radiological and Nuclear Threats to Critical Infrastructure (RN thematic group) produced in its working programme 2014 a report on radiological and nuclear information sharing between the EU Member States in case of a nuclear security event. As part of its working programme in 2015 the group collected views from the EU Member States regarding this report as a key step in the work towards future European format and protocol standardisation to be implemented for th...

  14. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  15. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  16. VoIP attacks detection engine based on neural network

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  17. Energy Theft in the Advanced Metering Infrastructure

    Science.gov (United States)

    McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick

    Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.

  18. Infrastructure of electronic information management

    Science.gov (United States)

    Twitchell, G.D.

    2004-01-01

    The information technology infrastructure of an organization, whether it is a private, non-profit, federal, or academic institution, is key to delivering timely and high-quality products and services to its customers and stakeholders. With the evolution of the Internet and the World Wide Web, resources that were once "centralized" in nature are now distributed across the organization in various locations and often remote regions of the country. This presents tremendous challenges to the information technology managers, users, and CEOs of large world-wide corporations who wish to exchange information or get access to resources in today's global marketplace. Several tools and technologies have been developed over recent years that play critical roles in ensuring that the proper information infrastructure exists within the organization to facilitate this global information marketplace Such tools and technologies as JAVA, Proxy Servers, Virtual Private Networks (VPN), multi-platform database management solutions, high-speed telecommunication technologies (ATM, ISDN, etc.), mass storage devices, and firewall technologies most often determine the organization's success through effective and efficient information infrastructure practices. This session will address several of these technologies and provide options related to those that may exist and can be readily applied within Eastern Europe. ?? 2004 - IOS Press and the authors. All rights reserved.

  19. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    Energy Technology Data Exchange (ETDEWEB)

    Marco Carvalho; Richard Ford

    2012-05-14

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

  20. Effectively protecting cyber infrastructure and assessing security needs

    Energy Technology Data Exchange (ETDEWEB)

    Robbins, J.; Starman, R. [EWA Canada Ltd., Edmonton, AB (Canada)

    2002-07-01

    This presentation addressed some of the requirements for effectively protecting cyber infrastructure and assessing security needs. The paper discussed the hype regarding cyber attacks, and presented the Canadian reality (as viewed by CanCERT). An assessment of security concerns was also presented. Recent cyber attacks on computer networks have raised fears of unsafe energy networks. Some experts claim the attacks are linked to terrorism, others blame industrial spying and mischief. Others dismiss the notion that somebody could bring down a power grid with a laptop as being far-fetched. It was noted that the cyber security threat is real, and that attacks are becoming more sophisticated as we live in a target rich environment. The issue of assessing vulnerabilities was discussed along with the selection of safeguards such as improving SCADA systems and the latest encryption methods to prevent hackers from bringing down computer networks. 3 tabs., 23 figs.

  1. Nuclear safety infrastructure

    International Nuclear Information System (INIS)

    The introduction of nuclear power in any country requires the early establishment of a long term nuclear safety infrastructure. This is necessary to ensure that the siting, design, construction, commissioning, operation and dismantling of the nuclear power plant and any other related installations, as well as the long term management of radioactive waste and spent fuel, are conducted in a safe and secure manner. The decision to undertake a nuclear power program is a major commitment requiring strict attention to nuclear safety. This commitment is a responsibility to not only the citizens of the country developing such a program, but also a responsibility to the international community. Nobody can take on this responsibility or make the critical decisions except the host country. It is important to make sure that the decision making process and the development activities are done in as open a manner as possible allowing interested stakeholders the opportunity to review and comment on the actions and plans. It cannot be overemphasized that everyone involved in a program to develop nuclear power carries a responsibility for ensuring safety. While it is clear that the key decisions and activities are the responsibility of the host country, it is also very important to recognize that help is available. The IAEA, OECD-NEA, WANO and other international organizations along with countries with established nuclear power programs are available to provide information and assistance. In particular, the IAEA and OECD-NEA have published several documents regarding the development of a nuclear power program and they have been and continue to support many meetings and seminars regarding the development of nuclear power programs

  2. Information infrastructure(s) boundaries, ecologies, multiplicity

    CERN Document Server

    Mongili, Alessandro

    2014-01-01

    This book marks an important contribution to the fascinating debate on the role that information infrastructures and boundary objects play in contemporary life, bringing to the fore the concern of how cooperation across different groups is enabled, but also constrained, by the material and immaterial objects connecting them. As such, the book itself is situated at the crossroads of various paths and genealogies, all focusing on the problem of the intersection between different levels of scale...

  3. Chef infrastructure automation cookbook

    CERN Document Server

    Marschall, Matthias

    2013-01-01

    Chef Infrastructure Automation Cookbook contains practical recipes on everything you will need to automate your infrastructure using Chef. The book is packed with illustrated code examples to automate your server and cloud infrastructure.The book first shows you the simplest way to achieve a certain task. Then it explains every step in detail, so that you can build your knowledge about how things work. Eventually, the book shows you additional things to consider for each approach. That way, you can learn step-by-step and build profound knowledge on how to go about your configuration management

  4. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  5. Securing Infrastructure from High Explosive Threats

    Energy Technology Data Exchange (ETDEWEB)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  6. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security of...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  7. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  8. Sustainability Considerations for Health Research and Analytic Data Infrastructures

    OpenAIRE

    Wilcox, Adam; Randhawa, Gurvaneet; Embi, Peter; Cao, Hui; Kuperman, Gilad J.

    2014-01-01

    Introduction: The United States has made recent large investments in creating data infrastructures to support the important goals of patient-centered outcomes research (PCOR) and comparative effectiveness research (CER), with still more investment planned. These initial investments, while critical to the creation of the infrastructures, are not expected to sustain them much beyond the initial development. To provide the maximum benefit, the infrastructures need to be sustained through innovat...

  9. Financing Infrastructures in Europe: Experiences of Value Capture

    OpenAIRE

    Chiara Sumiraschi

    2010-01-01

    In recent years the issue of financing of infrastructure has become a critical issue and is widely discussed and in-depth reflection on policies, programs and development projects. The paper has the objective to describe one of the most interesting innovative methods of funding transport infrastructures: the mechanism of value capture, ie that capture (part) of economic benefits after the opening of the new infrastructure. The second part presents two case studies: the Quadrilatero Project an...

  10. IPHE Infrastructure Workshop Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    None

    2010-02-01

    This proceedings contains information from the IPHE Infrastructure Workshop, a two-day interactive workshop held on February 25-26, 2010, to explore the market implementation needs for hydrogen fueling station development.

  11. CERN printing infrastructure

    CERN Document Server

    Otto, R

    2008-01-01

    For many years CERN had a very sophisticated print server infrastructure [13] which supported several different protocols (AppleTalk, IPX and TCP/IP) and many different printing standards. Today's situation differs a lot: we have a much more homogenous network infrastructure, where TCP/IP is used everywhere and we have less printer models, which almost all work using current standards (i.e. they all provide PostScript drivers). This change gave us the possibility to review the printing architecture aiming at simplifying the infrastructure in order to achieve full automation of the service. The new infrastructure offers both: LPD service exposing print queues to Linux and Mac OS X computers and native printing for Windows based clients. The printer driver distribution is automatic and native on Windows and automated by custom mechanisms on Linux, where the appropriate Foomatic drivers are configured. Also the process of printer registration and queue creation is completely automated following the printer regis...

  12. 美国关键基础设施信息安全监测预警机制演进与启示%Analysis and Enlightenment of the Evolution of the US Critical Infrastructure Information Security Monitoring and Warning Mechanism

    Institute of Scientific and Technical Information of China (English)

    王玥; 方婷; 马民虎

    2016-01-01

    Purpose/Significance] The informationization of critical infrastructure is developing rapidly. With the evolution of informa-tion technology and deepening of understanding on information security, how to establish and improve critical infrastructure information se-curity monitoring and warning mechanism has become a worldwide hotspot problem. [ Method/Process] The US, as the first country es-tablishing critical infrastructure information security protection regulation, experienced three stages:information system security stage, anti-terrorism and homeland security stage and cyberspace security stage, and has developed a set of critical infrastructure information security monitoring and warning mechanism. [ Result/Conclusion] This article explores the US critical infrastructure information security monito-ring and warning from its organization, information collection and analysis mechanism and information sharing mechanism, thus provides useful reference for the establishment and improvement of China's critical infrastructure information security monitoring and warning mech-anism. It conchldes that a monitoring and warning mechanism oriented critical infrastructure information sealrity protect regulation should established in China.%[目的/意义]当今社会关键基础设施的信息化程度越来越高,随着技术的发展和对信息安全认识的不断加深,如何发展和完善关键基础设施信息安全监测预警制度成为世界各国普遍重视的焦点问题,而我国目前相关研究尚显不足。美国是关键基础设施信息安全保护制度建设开展最早且信息化程度高却从未发生大规模信息安全事件的国家,对其进行系统研究对我国的关键基础设施信息安全制度建设具有重要借鉴意义。[方法/过程]通过对美国关键基础设施信息安全监测预警机制演进的探究,将其归纳为信息系统安全、反恐和国土安全以及网络空间安全三

  13. REAL-TIME INTELLIGENT MULTILAYER ATTACK CLASSIFICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    T. Subbhulakshmi

    2014-01-01

    Full Text Available Intrusion Detection Systems (IDS takes the lion’s share of the current security infrastructure. Detection of intrusions is vital for initiating the defensive procedures. Intrusion detection was done by statistical and distance based methods. A threshold value is used in these methods to indicate the level of normalcy. When the network traffic crosses the level of normalcy then above which it is flagged as anomalous. When there are occurrences of new intrusion events which are increasingly a key part of system security, the statistical techniques cannot detect them. To overcome this issue, learning techniques are used which helps in identifying new intrusion activities in a computer system. The objective of the proposed system designed in this paper is to classify the intrusions using an Intelligent Multi Layered Attack Classification System (IMLACS which helps in detecting and classifying the intrusions with improved classification accuracy. The intelligent multi layered approach contains three intelligent layers. The first layer involves Binary Support Vector Machine classification for detecting the normal and attack. The second layer involves neural network classification to classify the attacks into classes of attacks. The third layer involves fuzzy inference system to classify the attacks into various subclasses. The proposed IMLACS can be able to detect an intrusion behavior of the networks since the system contains a three intelligent layer classification and better set of rules. Feature selection is also used to improve the time of detection. The experimental results show that the IMLACS achieves the Classification Rate of 97.31%.

  14. Monitoring Infrastructure Capacity

    OpenAIRE

    David Levinson

    2000-01-01

    This paper examines the issues around monitoring of the capacity of public sector infrastructure to absorb land development.This paper first introduces Montgomery County¹s growth management system. It then offers two theories to justify monitoring infrastructure utilization for the purposes of establishing development capacity. The first, drawn from ecology is based on the notion of environmental carrying capacity. The second, from economics, employs the notion of externalities. However, neit...

  15. e-Infrastructures Austria

    OpenAIRE

    Sánchez Solís, Barbara

    2014-01-01

    In January 2014, the three-year partner project entitled e-Infrastructures Austria was initiated. The overall objective of this project is the coordinated establishment and development of repository infrastructures for digital resources in research throughout Austria. The initial situation at the 25 participating scientific institutions is very heterogeneous. Through networking and pooling of expertise and resources, a network of knowledge and professional competence is created, which f...

  16. Overview of the Main Infrastructure Issues for Enterprise, May 2012

    OpenAIRE

    2012-01-01

    The availability of a competitively priced world class infrastructure and related services is critical to support enterprise development, competitiveness and job creation. This report, which draws on more in-depth research carried out by Forfás, provides a summary of the key infrastructure issues and priorities of importance to enterprise across broadband, energy transport, waste and water.

  17. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  18. Toxicological issues after depleted uranium weapons attacked

    International Nuclear Information System (INIS)

    Depleted Uranium (DU) is a byproduct of the uranium enrichment for producing nuclear reactor or nuclear weapon. DU is used in the military as an armor-piercing projectile due to its hardness, strength, and density. A lot of DU weapons were fired in the Gulf War, and bring about critical environmental and internal contamination. Therefore, DU becomes suddenly a hot issue. Some toxicological problems after DU weapons attacked have been reviewed, which include features of internal DU contamination. Hazard of wound contamination and inhalation with insoluble uranium, and other urgent toxicological issues. The healthy effects of implanted with depleted uranium pellets were illustrated in particular

  19. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the...... security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  20. Suicide Attacks on the Rise

    OpenAIRE

    CCS Research Staff

    2008-01-01

    This article was published in Culture and Conflict Review (March 2008), v.2 no.2 "The last six weeks has brought some of the worst violence in Afghanistan since 2001. In 2007, there were more than 230 Improvised Explosive Device (IED) attacks and 145 suicide attacks. Casualty rates were at least 25 percent higher in 2007 than the previous year. In the past 18 months, IED attacks have targeted numerous police and army busses, a group of legislators outside a factory at Baghlan, a five-star ...

  1. New infrastructures, new landscapes

    Directory of Open Access Journals (Sweden)

    Chiara Nifosì

    2014-06-01

    Full Text Available New infrastructures, new landscapes AbstractThe paper will discuss one recent Italian project that share a common background: the relevance of the existing maritime landscape as a non negotiable value. The studies will be discussed in details a feasibility study for the new port in Monfalcone. National infrastructural policies emphasize competitiveness and connection as a central issue incultural, economic and political development of communities . Based on networks and system development along passageways that make up the European infrastructural armor; the two are considered at the meantime as cause and effect of "territorialisation”. These two views are obviously mutually dependent. It's hard to think about a strong attractiveness out of the network, and to be part of the latter encourages competitiveness. Nonetheless this has proved to be conflictual when landscape values and the related attractiveness are considered.The presented case study project, is pursuing the ambition to promote a new approach in realizing large infrastructures; its double role is to improve connectivity and to generate lasting and positive impact on the local regions. It deal with issues of inter-modality and the construction of nodes and lines which connects Europe, and its markets.Reverting the usual approach which consider landscape project as as a way to mitigate or to compensate for the infrastructure, the goal is to succeed in realizing large infrastructural works by conceiving them as an occasion to reinterpret a region or, as extraordinary opportunities, to build new landscapes.The strategy proposed consists in achieving structural images based on the reinforcement of the environmental and historical-landscape systems. Starting from the reinterpretation of local maritime context and resources it is possible not just to preserve the attractiveness of a specific landscape but also to conceive infrastructure in a more efficient way. 

  2. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  3. Final Report on National NGV Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    GM Sverdrup; JG DeSteese; ND Malcosky

    1999-01-07

    This report summarizes work fimded jointly by the U.S. Department of Energy (DOE) and by the Gas Research Institute (GRI) to (1) identi& barriers to establishing sustainable natural gas vehicle (NGV) infrastructure and (2) develop planning information that can help to promote a NGV infrastructure with self-sustaining critical maw. The need for this work is driven by the realization that demand for NGVS has not yet developed to a level that provides sufficient incentives for investment by the commercial sector in all necessary elements of a supportive infrastructure. The two major objectives of this project were: (1) to identifi and prioritize the technical barriers that may be impeding growth of a national NGV infrastructure and (2) to develop input that can assist industry in overcoming these barriers. The approach used in this project incorporated and built upon the accumulated insights of the NGV industry. The project was conducted in three basic phases: (1) review of the current situation, (2) prioritization of technical infrastructure btiiers, and (3) development of plans to overcome key barriers. An extensive and diverse list of barriers was obtained from direct meetings and telephone conferences with sixteen industry NGV leaders and seven Clean Cities/Clean Corridors coordinators. This information is filly documented in the appendix. A distillation of insights gained in the interview process suggests that persistent barriers to developing an NGV market and supporting infrastructure can be grouped into four major categories: 1. Fuel station economics 2. Value of NGVs from the owner/operator perspective 3. Cooperation necessary for critical mass 4. Commitment by investors. A principal conclusion is that an efficient and effective approach for overcoming technical barriers to developing an NGV infrastructure can be provided by building upon and consolidating the relevant efforts of the NGV industry and government. The major recommendation of this project is the

  4. A Review of Current Routing Attacks in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Rashid Hafeez Khokhar

    2008-11-01

    Full Text Available A mobile ad hoc network (MANET is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using various cryptographic techniques to countermeasure the routing attacks against MANET. However, these mechanisms are not suitable for MANET resource constraints, i.e., limited bandwidth and battery power, because they introduce heavy traffic load to exchange and verifying keys. In this paper, the current security issues in MANET are investigated. Particularly, we have examined different routing attacks, such as flooding, blackhole, link spoofing, wormhole, and colluding misrelay attacks, as well as existing solutions to protect MANET protocols.

  5. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  6. Sustainability of Urban Infrastructures

    Directory of Open Access Journals (Sweden)

    Mine Tanac Zeren

    2010-09-01

    Full Text Available The scope of the paper is to overview the different approaches for evaluation of urban infrastructure sustainability. In this context, urban infrastructure covers transportation, energy, water, sewage and information networks as well as waste management and blue-green infrastructure, in terms of both the supply and demand side. A common effort of partners in the European project “C8—Best Practice in Sustainable Urban Infrastructure”, developed under the Cooperation in Science and Technology program (COST, in brief COST C8, was focused on defining the methods, indicators and criteria for evaluation of sustainability, and resulted in a guidebook for decision-makers in local authorities. Here, the COST C8 matrix for simple sustainability assessment of urban infrastructure is applied to The Path (POT case—a circular memorial and recreational park around the city of Ljubljana, Slovenia. The applicability and acceptance of the matrix in 43 other cases of sustainable urban infrastructure, collected in the COST C8 project, is presented and discussed.

  7. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  8. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  9. Acute ischemic cerebral attack

    Directory of Open Access Journals (Sweden)

    Franco-Garcia Samir

    2010-12-01

    Full Text Available The decrease of the cerebral blood flow below the threshold of autoregulation led to changes of cerebral ischemia and necrosis that traduce in signs and symtoms of focal neurologic dysfunction called acute cerebrovascular symdrome (ACS or stroke. Two big groups according to its etiology are included in this category the hemorragic that constitue a 20% and the ischemic a 80% of cases. Great interest has wom the ischemic ACS because of its high social burden, being the third cause of no violent death in the world and the first of disability. Many risk factors favor the presentation of these events and some of them are susceptible of modification and therfore are objetives of primary prevention just as the control of diabetes, hypertension and the practice of healthy habits of life. The advances in the knowledge of the physiopatology, had taken to sustantial change in the nomenclature and management of ischemic ACS. Within these changes it was substituted the term cerebrovascular accident fo acute stroke, making emphasis in the key rol of a timely management with goals of time similiar to the acute coronary syndrome. It was redefined the time of acute ischemic attack to a one hour. Once stablished the cerebrovascular attack the semiology of symtoms with frecuency will led us make a topographic diagnosis of the in injury that joined to the cerebral TAC will allow us to exclude an hemorragic event and to start the treatment. In the management of these patients its essential the coordination of the differents teams of work, from the early recognition of symtoms on the part of patients andthe family, the rapid activation and response of emergency systems and the gearing of health care institutions. Are pillars of treatment: the abcde of reanimatiion, to avoid the hiperpirexis, the seizures, the hipoglicemy, the hiperglicemy, to achieve the thrombolysis in the first three hours of the begining of symtoms, to use antiplatelets, antithrombotic profilaxis

  10. Panic Attacks and Panic Disorders

    OpenAIRE

    Fontaine, Rejean; Beaudry, Paul

    1984-01-01

    The diagnosis and treatment of panic attacks and panic disorders have progressed markedly during the last decade. Unlike phobic disorders, the key feature of panic disorders is the many panic attacks that are mostly spontaneous or not caused by a particular situation. Recent studies linking its pathogenesis with lactate infusion tests are reviewed. For treatment, psychotherapy combined with in vivo exposure and pharmacotherapy is more efficacious than either treatment alone. In most cases, ps...

  11. Impersonation Attack on EKE Protocol

    OpenAIRE

    Shirisha Tallapally

    2010-01-01

    The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, hence the protocol should resist all types of password guessing attacks. Recently ECC-3PEKE protocol has been proposed by Chang and Chang. They claimed the protocol is secure, efficient and practical. Unless their claims Yoon and Yoo presented an Undetectable online password guessing attack on the above protocol. A key r...

  12. Migraine attacks the Basal Ganglia

    OpenAIRE

    Bigal Marcelo; Brawn Jennifer; Pendse Gautam; Nutile Lauren; Becerra Lino; Maleki Nasim; Burstein Rami; Borsook David

    2011-01-01

    Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unr...

  13. Genetic Algorithms for Agent-Based Infrastructure Interdependency Modeling and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    May Permann

    2007-03-01

    Today’s society relies greatly upon an array of complex national and international infrastructure networks such as transportation, electric power, telecommunication, and financial networks. This paper describes initial research combining agent-based infrastructure modeling software and genetic algorithms (GAs) to help optimize infrastructure protection and restoration decisions. This research proposes to apply GAs to the problem of infrastructure modeling and analysis in order to determine the optimum assets to restore or protect from attack or other disaster. This research is just commencing and therefore the focus of this paper is the integration of a GA optimization method with a simulation through the simulation’s agents.

  14. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  15. The ATLAS Simulation Infrastructure

    CERN Document Server

    Aad, Georges; Abdallah, Jalal; Abdelalim, Ahmed Ali; Abdesselam, Abdelouahab; Abdinov, Ovsat; Abi, Babak; Abolins, Maris; Abramowicz, Halina; Abreu, Henso; Acharya, Bobby Samir; Adams, David; Addy, Tetteh; Adelman, Jahred; Adorisio, Cristina; Adragna, Paolo; Adye, Tim; Aefsky, Scott; Aguilar-Saavedra, Juan Antonio; Aharrouche, Mohamed; Ahlen, Steven; Ahles, Florian; Ahmad, Ashfaq; Ahmed, Hossain; Ahsan, Mahsana; Aielli, Giulio; Akdogan, Taylan; Åkesson, Torsten Paul Ake; Akimoto, Ginga; Akimov , Andrei; Aktas, Adil; Alam, Mohammad; Alam, Muhammad Aftab; Albrand, Solveig; Aleksa, Martin; Aleksandrov, Igor; Alexa, Calin; Alexander, Gideon; Alexandre, Gauthier; Alexopoulos, Theodoros; Alhroob, Muhammad; Aliev, Malik; Alimonti, Gianluca; Alison, John; Aliyev, Magsud; Allport, Phillip; Allwood-Spiers, Sarah; Almond, John; Aloisio, Alberto; Alon, Raz; Alonso, Alejandro; Alviggi, Mariagrazia; Amako, Katsuya; Amelung, Christoph; Amorim, Antonio; Amorós, Gabriel; Amram, Nir; Anastopoulos, Christos; Andeen, Timothy; Anders, Christoph Falk; Anderson, Kelby; Andreazza, Attilio; Andrei, George Victor; Anduaga, Xabier; Angerami, Aaron; Anghinolfi, Francis; Anjos, Nuno; Annovi, Alberto; Antonaki, Ariadni; Antonelli, Mario; Antonelli, Stefano; Antos, Jaroslav; Antunovic, Bijana; Anulli, Fabio; Aoun, Sahar; Arabidze, Giorgi; Aracena, Ignacio; Arai, Yasuo; Arce, Ayana; Archambault, John-Paul; Arfaoui, Samir; Arguin, Jean-Francois; Argyropoulos, Theodoros; Arik, Metin; Armbruster, Aaron James; Arnaez, Olivier; Arnault, Christian; Artamonov, Andrei; Arutinov, David; Asai, Makoto; Asai, Shoji; Silva, José; Asfandiyarov, Ruslan; Ask, Stefan; Åsman, Barbro; Asner, David; Asquith, Lily; Assamagan, Ketevi; Astbury, Alan; Astvatsatourov, Anatoli; Atoian, Grigor; Auerbach, Benjamin; Augsten, Kamil; Aurousseau, Mathieu; Austin, Nicholas; Avolio, Giuseppe; Avramidou, Rachel Maria; Axen, David; Ay, Cano; Azuelos, Georges; Azuma, Yuya; Baak, Max; Bach, Andre; Bachacou, Henri; Bachas, Konstantinos; Backes, Moritz; Badescu, Elisabeta; Bagnaia, Paolo; Bai, Yu; Bain, Travis; Baines, John; Baker, Mark; Baker, Oliver Keith; Baker, Sarah; Baltasar Dos Santos Pedrosa, Fernando; Banas, Elzbieta; Banerjee, Piyali; Banerjee, Swagato; Banfi, Danilo; Bangert, Andrea Michelle; Bansal, Vikas; Baranov, Sergey; Baranov, Sergei; Barashkou, Andrei; Barber, Tom; Barberio, Elisabetta Luigia; Barberis, Dario; Barbero, Marlon; Bardin, Dmitri; Barillari, Teresa; Barisonzi, Marcello; Barklow, Timothy; Barlow, Nick; Barnett, Bruce; Barnett, Michael; Baroncelli, Antonio; Barr, Alan; Barreiro, Fernando; Barreiro Guimarães da Costa, João; Barrillon, Pierre; Bartoldus, Rainer; Bartsch, Detlef; Bates, Richard; Batkova, Lucia; Batley, Richard; Battaglia, Andreas; Battistin, Michele; Bauer, Florian; Bawa, Harinder Singh; Bazalova, Magdalena; Beare, Brian; Beau, Tristan; Beauchemin, Pierre-Hugues; Beccherle, Roberto; Becerici, Neslihan; Bechtle, Philip; Beck, Graham; Beck, Hans Peter; Beckingham, Matthew; Becks, Karl-Heinz; Beddall, Ayda; Beddall, Andrew; Bednyakov, Vadim; Bee, Christopher; Begel, Michael; Behar Harpaz, Silvia; Behera, Prafulla; Beimforde, Michael; Belanger-Champagne, Camille; Bell, Paul; Bell, William; Bella, Gideon; Bellagamba, Lorenzo; Bellina, Francesco; Bellomo, Massimiliano; Belloni, Alberto; Belotskiy, Konstantin; Beltramello, Olga; Ben Ami, Sagi; Benary, Odette; Benchekroun, Driss; Bendel, Markus; Benedict, Brian Hugues; Benekos, Nektarios; Benhammou, Yan; Benincasa, Gianpaolo; Benjamin, Douglas; Benoit, Mathieu; Bensinger, James; Benslama, Kamal; Bentvelsen, Stan; Beretta, Matteo; Berge, David; Bergeaas Kuutmann, Elin; Berger, Nicolas; Berghaus, Frank; Berglund, Elina; Beringer, Jürg; Bernat, Pauline; Bernhard, Ralf; Bernius, Catrin; Berry, Tracey; Bertin, Antonio; Besana, Maria Ilaria; Besson, Nathalie; Bethke, Siegfried; Bianchi, Riccardo-Maria; Bianco, Michele; Biebel, Otmar; Biesiada, Jed; Biglietti, Michela; Bilokon, Halina; Bindi, Marcello; Binet, Sebastien; Bingul, Ahmet; Bini, Cesare; Biscarat, Catherine; Bitenc, Urban; Black, Kevin; Blair, Robert; Blanchard, Jean-Baptiste; Blanchot, Georges; Blocker, Craig; Blondel, Alain; Blum, Walter; Blumenschein, Ulrike; Bobbink, Gerjan; Bocci, Andrea; Boehler, Michael; Boek, Jennifer; Boelaert, Nele; Böser, Sebastian; Bogaerts, Joannes Andreas; Bogouch, Andrei; Bohm, Christian; Bohm, Jan; Boisvert, Veronique; Bold, Tomasz; Boldea, Venera; Bondarenko, Valery; Bondioli, Mario; Boonekamp, Maarten; Bordoni, Stefania; Borer, Claudia; Borisov, Anatoly; Borissov, Guennadi; Borjanovic, Iris; Borroni, Sara; Bos, Kors; Boscherini, Davide; Bosman, Martine; Boterenbrood, Hendrik; Bouchami, Jihene; Boudreau, Joseph; Bouhova-Thacker, Evelina Vassileva; Boulahouache, Chaouki; Bourdarios, Claire; Boveia, Antonio; Boyd, James; Boyko, Igor; Bozovic-Jelisavcic, Ivanka; Bracinik, Juraj; Braem, André; Branchini, Paolo; Brandenburg, George; Brandt, Andrew; Brandt, Gerhard; Brandt, Oleg; Bratzler, Uwe; Brau, Benjamin; Brau, James; Braun, Helmut; Brelier, Bertrand; Bremer, Johan; Brenner, Richard; Bressler, Shikma; Britton, Dave; Brochu, Frederic; Brock, Ian; Brock, Raymond; Brodet, Eyal; Bromberg, Carl; Brooijmans, Gustaaf; Brooks, William; Brown, Gareth; Bruckman de Renstrom, Pawel; Bruncko, Dusan; Bruneliere, Renaud; Brunet, Sylvie; Bruni, Alessia; Bruni, Graziano; Bruschi, Marco; Bucci, Francesca; Buchanan, James; Buchholz, Peter; Buckley, Andrew; Budagov, Ioulian; Budick, Burton; Büscher, Volker; Bugge, Lars; Bulekov, Oleg; Bunse, Moritz; Buran, Torleiv; Burckhart, Helfried; Burdin, Sergey; Burgess, Thomas; Burke, Stephen; Busato, Emmanuel; Bussey, Peter; Buszello, Claus-Peter; Butin, Françcois; Butler, Bart; Butler, John; Buttar, Craig; Butterworth, Jonathan; Byatt, Tom; Caballero, Jose; Cabrera Urbán, Susana; Caforio, Davide; Cakir, Orhan; Calafiura, Paolo; Calderini, Giovanni; Calfayan, Philippe; Calkins, Robert; Caloba, Luiz; Calvet, David; Camarri, Paolo; Cameron, David; Campana, Simone; Campanelli, Mario; Canale, Vincenzo; Canelli, Florencia; Canepa, Anadi; Cantero, Josu; Capasso, Luciano; Capeans Garrido, Maria Del Mar; Caprini, Irinel; Caprini, Mihai; Capua, Marcella; Caputo, Regina; Caramarcu, Costin; Cardarelli, Roberto; Carli, Tancredi; Carlino, Gianpaolo; Carminati, Leonardo; Caron, Bryan; Caron, Sascha; Carrillo Montoya, German D.; Carron Montero, Sebastian; Carter, Antony; Carter, Janet; Carvalho, João; Casadei, Diego; Casado, Maria Pilar; Cascella, Michele; Castaneda Hernandez, Alfredo Martin; Castaneda-Miranda, Elizabeth; Castillo Gimenez, Victoria; Castro, Nuno Filipe; Cataldi, Gabriella; Catinaccio, Andrea; Catmore, James; Cattai, Ariella; Cattani, Giordano; Caughron, Seth; Cauz, Diego; Cavalleri, Pietro; Cavalli, Donatella; Cavalli-Sforza, Matteo; Cavasinni, Vincenzo; Ceradini, Filippo; Cerqueira, Augusto Santiago; Cerri, Alessandro; Cerrito, Lucio; Cerutti, Fabio; Cetin, Serkant Ali; Chafaq, Aziz; Chakraborty, Dhiman; Chan, Kevin; Chapman, John Derek; Chapman, John Wehrley; Chareyre, Eve; Charlton, Dave; Chavda, Vikash; Cheatham, Susan; Chekanov, Sergei; Chekulaev, Sergey; Chelkov, Gueorgui; Chen, Hucheng; Chen, Shenjian; Chen, Xin; Cheplakov, Alexander; Chepurnov, Vladimir; Cherkaoui El Moursli, Rajaa; Tcherniatine, Valeri; Chesneanu, Daniela; Cheu, Elliott; Cheung, Sing-Leung; Chevalier, Laurent; Chevallier, Florent; Chiarella, Vitaliano; Chiefari, Giovanni; Chikovani, Leila; Childers, John Taylor; Chilingarov, Alexandre; Chiodini, Gabriele; Chizhov, Mihail; Choudalakis, Georgios; Chouridou, Sofia; Christidi, Illectra-Athanasia; Christov, Asen; Chromek-Burckhart, Doris; Chu, Ming-Lee; Chudoba, Jiri; Ciapetti, Guido; Ciftci, Abbas Kenan; Ciftci, Rena; Cinca, Diane; Cindro, Vladimir; Ciobotaru, Matei Dan; Ciocca, Claudia; Ciocio, Alessandra; Cirilli, Manuela; Citterio, Mauro; Clark, Allan G.; Clark, Philip James; Cleland, Bill; Clemens, Jean-Claude; Clement, Benoit; Clement, Christophe; Coadou, Yann; Cobal, Marina; Coccaro, Andrea; Cochran, James H.; Coggeshall, James; Cogneras, Eric; Colijn, Auke-Pieter; Collard, Caroline; Collins, Neil; Collins-Tooth, Christopher; Collot, Johann; Colon, German; Conde Muiño, Patricia; Coniavitis, Elias; Consonni, Michele; Constantinescu, Serban; Conta, Claudio; Conventi, Francesco; Cooke, Mark; Cooper, Ben; Cooper-Sarkar, Amanda; Cooper-Smith, Neil; Copic, Katherine; Cornelissen, Thijs; Corradi, Massimo; Corriveau, Francois; Corso-Radu, Alina; Cortes-Gonzalez, Arely; Cortiana, Giorgio; Costa, Giuseppe; Costa, María José; Costanzo, Davide; Costin, Tudor; Côté, David; Coura Torres, Rodrigo; Courneyea, Lorraine; Cowan, Glen; Cowden, Christopher; Cox, Brian; Cranmer, Kyle; Cranshaw, Jack; Cristinziani, Markus; Crosetti, Giovanni; Crupi, Roberto; Crépé-Renaudin, Sabine; Cuenca Almenar, Cristóbal; Cuhadar Donszelmann, Tulay; Curatolo, Maria; Curtis, Chris; Cwetanski, Peter; Czyczula, Zofia; D'Auria, Saverio; D'Onofrio, Monica; D'Orazio, Alessia; Da Via, Cinzia; Dabrowski, Wladyslaw; Dai, Tiesheng; Dallapiccola, Carlo; Dallison, Steve; Daly, Colin; Dam, Mogens; Danielsson, Hans Olof; Dannheim, Dominik; Dao, Valerio; Darbo, Giovanni; Darlea, Georgiana Lavinia; Davey, Will; Davidek, Tomas; Davidson, Nadia; Davidson, Ruth; Davies, Merlin; Davison, Adam; Dawson, Ian; Daya, Rozmin; De, Kaushik; de Asmundis, Riccardo; De Castro, Stefano; De Castro Faria Salgado, Pedro; De Cecco, Sandro; de Graat, Julien; De Groot, Nicolo; de Jong, Paul; De Mora, Lee; De Oliveira Branco, Miguel; De Pedis, Daniele; De Salvo, Alessandro; De Sanctis, Umberto; De Santo, Antonella; De Vivie De Regie, Jean-Baptiste; De Zorzi, Guido; Dean, Simon; Dedovich, Dmitri; Degenhardt, James; Dehchar, Mohamed; Del Papa, Carlo; Del Peso, Jose; Del Prete, Tarcisio; Dell'Acqua, Andrea; Dell'Asta, Lidia; Della Pietra, Massimo; della Volpe, Domenico; Delmastro, Marco; Delsart, Pierre-Antoine; Deluca, Carolina; Demers, Sarah; Demichev, Mikhail; Demirkoz, Bilge; Deng, Jianrong; Deng, Wensheng; Denisov, Sergey; Derkaoui, Jamal Eddine; Derue, Frederic; Dervan, Paul; Desch, Klaus Kurt; Deviveiros, Pier-Olivier; Dewhurst, Alastair; DeWilde, Burton; Dhaliwal, Saminder; Dhullipudi, Ramasudhakar; Di Ciaccio, Anna; Di Ciaccio, Lucia; Di Domenico, Antonio; Di Girolamo, Alessandro; Di Girolamo, Beniamino; Di Luise, Silvestro; Di Mattia, Alessandro; Di Nardo, Roberto; Di Simone, Andrea; Di Sipio, Riccardo; Diaz, Marco Aurelio; Diblen, Faruk; Diehl, Edward; Dietrich, Janet; Dietzsch, Thorsten; Diglio, Sara; Dindar Yagci, Kamile; Dingfelder, Jochen; Dionisi, Carlo; Dita, Petre; Dita, Sanda; Dittus, Fridolin; Djama, Fares; Djilkibaev, Rashid; Djobava, Tamar; do Vale, Maria Aline Barros; Do Valle Wemans, André; Doan, Thi Kieu Oanh; Dobos, Daniel; Dobson, Ellie; Dobson, Marc; Doglioni, Caterina; Doherty, Tom; Dolejsi, Jiri; Dolenc, Irena; Dolezal, Zdenek; Dolgoshein, Boris; Dohmae, Takeshi; Donega, Mauro; Donini, Julien; Dopke, Jens; Doria, Alessandra; Dos Anjos, Andre; Dotti, Andrea; Dova, Maria-Teresa; Doxiadis, Alexander; Doyle, Tony; Drasal, Zbynek; Dris, Manolis; Dubbert, Jörg; Duchovni, Ehud; Duckeck, Guenter; Dudarev, Alexey; Dudziak, Fanny; Dührssen , Michael; Duflot, Laurent; Dufour, Marc-Andre; Dunford, Monica; Duran Yildiz, Hatice; Dushkin, Andrei; Duxfield, Robert; Dwuznik, Michal; Düren, Michael; Ebenstein, William; Ebke, Johannes; Eckweiler, Sebastian; Edmonds, Keith; Edwards, Clive; Egorov, Kirill; Ehrenfeld, Wolfgang; Ehrich, Thies; Eifert, Till; Eigen, Gerald; Einsweiler, Kevin; Eisenhandler, Eric; Ekelof, Tord; El Kacimi, Mohamed; Ellert, Mattias; Elles, Sabine; Ellinghaus, Frank; Ellis, Katherine; Ellis, Nicolas; Elmsheuser, Johannes; Elsing, Markus; Emeliyanov, Dmitry; Engelmann, Roderich; Engl, Albert; Epp, Brigitte; Eppig, Andrew; Erdmann, Johannes; Ereditato, Antonio; Eriksson, Daniel; Ermoline, Iouri; Ernst, Jesse; Ernst, Michael; Ernwein, Jean; Errede, Deborah; Errede, Steven; Ertel, Eugen; Escalier, Marc; Escobar, Carlos; Espinal Curull, Xavier; Esposito, Bellisario; Etienvre, Anne-Isabelle; Etzion, Erez; Evans, Hal; Fabbri, Laura; Fabre, Caroline; Facius, Katrine; Fakhrutdinov, Rinat; Falciano, Speranza; Fang, Yaquan; Fanti, Marcello; Farbin, Amir; Farilla, Addolorata; Farley, Jason; Farooque, Trisha; Farrington, Sinead; Farthouat, Philippe; Fassnacht, Patrick; Fassouliotis, Dimitrios; Fatholahzadeh, Baharak; Fayard, Louis; Fayette, Florent; Febbraro, Renato; Federic, Pavol; Fedin, Oleg; Fedorko, Woiciech; Feligioni, Lorenzo; Felzmann, Ulrich; Feng, Cunfeng; Feng, Eric; Fenyuk, Alexander; Ferencei, Jozef; Ferland, Jonathan; Fernandes, Bruno; Fernando, Waruna; Ferrag, Samir; Ferrando, James; Ferrara, Valentina; Ferrari, Arnaud; Ferrari, Pamela; Ferrari, Roberto; Ferrer, Antonio; Ferrer, Maria Lorenza; Ferrere, Didier; Ferretti, Claudio; Fiascaris, Maria; Fiedler, Frank; Filipčič, Andrej; Filippas, Anastasios; Filthaut, Frank; Fincke-Keeler, Margret; Fiolhais, Miguel; Fiorini, Luca; Firan, Ana; Fischer, Gordon; Fisher, Matthew; Flechl, Martin; Fleck, Ivor; Fleckner, Johanna; Fleischmann, Philipp; Fleischmann, Sebastian; Flick, Tobias; Flores Castillo, Luis; Flowerdew, Michael; Fonseca Martin, Teresa; Formica, Andrea; Forti, Alessandra; Fortin, Dominique; Fournier, Daniel; Fowler, Andrew; Fowler, Ken; Fox, Harald; Francavilla, Paolo; Franchino, Silvia; Francis, David; Franklin, Melissa; Franz, Sebastien; Fraternali, Marco; Fratina, Sasa; Freestone, Julian; French, Sky; Froeschl, Robert; Froidevaux, Daniel; Frost, James; Fukunaga, Chikara; Fullana Torregrosa, Esteban; Fuster, Juan; Gabaldon, Carolina; Gabizon, Ofir; Gadfort, Thomas; Gadomski, Szymon; Gagliardi, Guido; Gagnon, Pauline; Galea, Cristina; Gallas, Elizabeth; Gallas, Manuel; Gallo, Valentina Santina; Gallop, Bruce; Gallus, Petr; Galyaev, Eugene; Gan, K K; Gao, Yongsheng; Gaponenko, Andrei; Garcia-Sciveres, Maurice; García, Carmen; García Navarro, José Enrique; Gardner, Robert; Garelli, Nicoletta; Garitaonandia, Hegoi; Garonne, Vincent; Gatti, Claudio; Gaudio, Gabriella; Gautard, Valerie; Gauzzi, Paolo; Gavrilenko, Igor; Gay, Colin; Gaycken, Goetz; Gazis, Evangelos; Ge, Peng; Gee, Norman; Geich-Gimbel, Christoph; Gellerstedt, Karl; Gemme, Claudia; Genest, Marie-Hélène; Gentile, Simonetta; Georgatos, Fotios; George, Simon; Gershon, Avi; Ghazlane, Hamid; Ghodbane, Nabil; Giacobbe, Benedetto; Giagu, Stefano; Giakoumopoulou, Victoria; Giangiobbe, Vincent; Gianotti, Fabiola; Gibbard, Bruce; Gibson, Adam; Gibson, Stephen; Gilbert, Laura; Gilchriese, Murdock; Gilewsky, Valentin; Gingrich, Douglas; Ginzburg, Jonatan; Giokaris, Nikos; Giordani, MarioPaolo; Giordano, Raffaele; Giorgi, Francesco Michelangelo; Giovannini, Paola; Giraud, Pierre-Francois; Girtler, Peter; Giugni, Danilo; Giusti, Paolo; Gjelsten, Børge Kile; Gladilin, Leonid; Glasman, Claudia; Glazov, Alexandre; Glitza, Karl-Walter; Glonti, George; Godfrey, Jennifer; Godlewski, Jan; Goebel, Martin; Göpfert, Thomas; Goeringer, Christian; Gössling, Claus; Göttfert, Tobias; Goggi, Virginio; Goldfarb, Steven; Goldin, Daniel; Golling, Tobias; Gomes, Agostinho; Gomez Fajardo, Luz Stella; Gonçcalo, Ricardo; Gonella, Laura; Gong, Chenwei; González de la Hoz, Santiago; Gonzalez Silva, Laura; Gonzalez-Sevilla, Sergio; Goodson, Jeremiah Jet; Goossens, Luc; Gordon, Howard; Gorelov, Igor; Gorfine, Grant; Gorini, Benedetto; Gorini, Edoardo; Gorišek, Andrej; Gornicki, Edward; Gosdzik, Bjoern; Gosselink, Martijn; Gostkin, Mikhail Ivanovitch; Gough Eschrich, Ivo; Gouighri, Mohamed; Goujdami, Driss; Goulette, Marc Phillippe; Goussiou, Anna; Goy, Corinne; Grabowska-Bold, Iwona; Grafström, Per; Grahn, Karl-Johan; Grancagnolo, Sergio; Grassi, Valerio; Gratchev, Vadim; Grau, Nathan; Gray, Heather; Gray, Julia Ann; Graziani, Enrico; Green, Barry; Greenshaw, Timothy; Greenwood, Zeno Dixon; Gregor, Ingrid-Maria; Grenier, Philippe; Griesmayer, Erich; Griffiths, Justin; Grigalashvili, Nugzar; Grillo, Alexander; Grimm, Kathryn; Grinstein, Sebastian; Grishkevich, Yaroslav; Groh, Manfred; Groll, Marius; Gross, Eilam; Grosse-Knetter, Joern; Groth-Jensen, Jacob; Grybel, Kai; Guicheney, Christophe; Guida, Angelo; Guillemin, Thibault; Guler, Hulya; Gunther, Jaroslav; Guo, Bin; Gupta, Ambreesh; Gusakov, Yury; Gutierrez, Andrea; Gutierrez, Phillip; Guttman, Nir; Gutzwiller, Olivier; Guyot, Claude; Gwenlan, Claire; Gwilliam, Carl; Haas, Andy; Haas, Stefan; Haber, Carl; Hadavand, Haleh Khani; Hadley, David; Haefner, Petra; Härtel, Roland; Hajduk, Zbigniew; Hakobyan, Hrachya; Haller, Johannes; Hamacher, Klaus; Hamilton, Andrew; Hamilton, Samuel; Han, Liang; Hanagaki, Kazunori; Hance, Michael; Handel, Carsten; Hanke, Paul; Hansen, Jørgen Beck; Hansen, Jorn Dines; Hansen, John Renner; Hansen, Peter Henrik; Hansl-Kozanecka, Traudl; Hansson, Per; Hara, Kazuhiko; Hare, Gabriel; Harenberg, Torsten; Harrington, Robert; Harris, Orin; Harrison, Karl; Hartert, Jochen; Hartjes, Fred; Harvey, Alex; Hasegawa, Satoshi; Hasegawa, Yoji; Hashemi, Kevan; Hassani, Samira; Haug, Sigve; Hauschild, Michael; Hauser, Reiner; Havranek, Miroslav; Hawkes, Christopher; Hawkings, Richard John; Hayakawa, Takashi; Hayward, Helen; Haywood, Stephen; Head, Simon; Hedberg, Vincent; Heelan, Louise; Heim, Sarah; Heinemann, Beate; Heisterkamp, Simon; Helary, Louis; Heller, Mathieu; Hellman, Sten; Helsens, Clement; Hemperek, Tomasz; Henderson, Robert; Henke, Michael; Henrichs, Anna; Henriques Correia, Ana Maria; Henrot-Versille, Sophie; Hensel, Carsten; Henß, Tobias; Hernández Jiménez, Yesenia; Hershenhorn, Alon David; Herten, Gregor; Hertenberger, Ralf; Hervas, Luis; Hessey, Nigel; Higón-Rodriguez, Emilio; Hill, John; Hiller, Karl Heinz; Hillert, Sonja; Hillier, Stephen; Hinchliffe, Ian; Hines, Elizabeth; Hirose, Minoru; Hirsch, Florian; Hirschbuehl, Dominic; Hobbs, John; Hod, Noam; Hodgkinson, Mark; Hodgson, Paul; Hoecker, Andreas; Hoeferkamp, Martin; Hoffman, Julia; Hoffmann, Dirk; Hohlfeld, Marc; Holy, Tomas; Holzbauer, Jenny; Homma, Yasuhiro; Horazdovsky, Tomas; Hori, Takuya; Horn, Claus; Horner, Stephan; Hostachy, Jean-Yves; Hou, Suen; Hoummada, Abdeslam; Howe, Travis; Hrivnac, Julius; Hryn'ova, Tetiana; Hsu, Pai-hsien Jennifer; Hsu, Shih-Chieh; Huang, Guang Shun; Hubacek, Zdenek; Hubaut, Fabrice; Huegging, Fabian; Hughes, Emlyn; Hughes, Gareth; Hurwitz, Martina; Husemann, Ulrich; Huseynov, Nazim; Huston, Joey; Huth, John; Iacobucci, Giuseppe; Iakovidis, Georgios; Ibragimov, Iskander; Iconomidou-Fayard, Lydia; Idarraga, John; Iengo, Paolo; Igonkina, Olga; Ikegami, Yoichi; Ikeno, Masahiro; Ilchenko, Yuri; Iliadis, Dimitrios; Ince, Tayfun; Ioannou, Pavlos; Iodice, Mauro; Irles Quiles, Adrian; Ishikawa, Akimasa; Ishino, Masaya; Ishmukhametov, Renat; Isobe, Tadaaki; Issakov, Vladimir; Issever, Cigdem; Istin, Serhat; Itoh, Yuki; Ivashin, Anton; Iwanski, Wieslaw; Iwasaki, Hiroyuki; Izen, Joseph; Izzo, Vincenzo; Jackson, Brett; Jackson, John; Jackson, Paul; Jaekel, Martin; Jain, Vivek; Jakobs, Karl; Jakobsen, Sune; Jakubek, Jan; Jana, Dilip; Jansen, Eric; Jantsch, Andreas; Janus, Michel; Jared, Richard; Jarlskog, Göran; Jeanty, Laura; Jen-La Plante, Imai; Jenni, Peter; Jež, Pavel; Jézéquel, Stéphane; Ji, Weina; Jia, Jiangyong; Jiang, Yi; Jimenez Belenguer, Marcos; Jin, Shan; Jinnouchi, Osamu; Joffe, David; Johansen, Marianne; Johansson, Erik; Johansson, Per; Johnert, Sebastian; Johns, Kenneth; Jon-And, Kerstin; Jones, Graham; Jones, Roger; Jones, Tim; Jorge, Pedro; Joseph, John; Juranek, Vojtech; Jussel, Patrick; Kabachenko, Vasily; Kaci, Mohammed; Kaczmarska, Anna; Kado, Marumi; Kagan, Harris; Kagan, Michael; Kaiser, Steffen; Kajomovitz, Enrique; Kalinin, Sergey; Kalinovskaya, Lidia; Kalinowski, Artur; Kama, Sami; Kanaya, Naoko; Kaneda, Michiru; Kantserov, Vadim; Kanzaki, Junichi; Kaplan, Benjamin; Kapliy, Anton; Kaplon, Jan; Kar, Deepak; Karagounis, Michael; Karagoz, Muge; Kartvelishvili, Vakhtang; Karyukhin, Andrey; Kashif, Lashkar; Kasmi, Azzedine; Kass, Richard; Kastanas, Alex; Kastoryano, Michael; Kataoka, Mayuko; Kataoka, Yousuke; Katsoufis, Elias; Katzy, Judith; Kaushik, Venkatesh; Kawagoe, Kiyotomo; Kawamoto, Tatsuo; Kawamura, Gen; Kayl, Manuel; Kayumov, Fred; Kazanin, Vassili; Kazarinov, Makhail; Keates, James Robert; Keeler, Richard; Keener, Paul; Kehoe, Robert; Keil, Markus; Kekelidze, George; Kelly, Marc; Kenyon, Mike; Kepka, Oldrich; Kerschen, Nicolas; Kerševan, Borut Paul; Kersten, Susanne; Kessoku, Kohei; Khakzad, Mohsen; Khalil-zada, Farkhad; Khandanyan, Hovhannes; Khanov, Alexander; Kharchenko, Dmitri; Khodinov, Alexander; Khomich, Andrei; Khoriauli, Gia; Khovanskiy, Nikolai; Khovanskiy, Valery; Khramov, Evgeniy; Khubua, Jemal; Kim, Hyeon Jin; Kim, Min Suk; Kim, Peter; Kim, Shinhong; Kind, Oliver; Kind, Peter; King, Barry; Kirk, Julie; Kirsch, Guillaume; Kirsch, Lawrence; Kiryunin, Andrey; Kisielewska, Danuta; Kittelmann, Thomas; Kiyamura, Hironori; Kladiva, Eduard; Klein, Max; Klein, Uta; Kleinknecht, Konrad; Klemetti, Miika; Klier, Amit; Klimentov, Alexei; Klingenberg, Reiner; Klinkby, Esben; Klioutchnikova, Tatiana; Klok, Peter; Klous, Sander; Kluge, Eike-Erik; Kluge, Thomas; Kluit, Peter; Klute, Markus; Kluth, Stefan; Knecht, Neil; Kneringer, Emmerich; Ko, Byeong Rok; Kobayashi, Tomio; Kobel, Michael; Koblitz, Birger; Kocian, Martin; Kocnar, Antonin; Kodys, Peter; Köneke, Karsten; König, Adriaan; Koenig, Sebastian; Köpke, Lutz; Koetsveld, Folkert; Koevesarki, Peter; Koffas, Thomas; Koffeman, Els; Kohn, Fabian; Kohout, Zdenek; Kohriki, Takashi; Kolanoski, Hermann; Kolesnikov, Vladimir; Koletsou, Iro; Koll, James; Kollar, Daniel; Kolos, Serguei; Kolya, Scott; Komar, Aston; Komaragiri, Jyothsna Rani; Kondo, Takahiko; Kono, Takanori; Konoplich, Rostislav; Konovalov, Serguei; Konstantinidis, Nikolaos; Koperny, Stefan; Korcyl, Krzysztof; Kordas, Kostantinos; Korn, Andreas; Korolkov, Ilya; Korolkova, Elena; Korotkov, Vladislav; Kortner, Oliver; Kortner, Sandra; Kostka, Peter; Kostyukhin, Vadim; Kotov, Serguei; Kotov, Vladislav; Kotov, Konstantin; Kourkoumelis, Christine; Koutsman, Alex; Kowalewski, Robert Victor; Kowalski, Henri; Kowalski, Tadeusz; Kozanecki, Witold; Kozhin, Anatoly; Kral, Vlastimil; Kramarenko, Viktor; Kramberger, Gregor; Krasny, Mieczyslaw Witold; Krasznahorkay, Attila; Kreisel, Arik; Krejci, Frantisek; Kretzschmar, Jan; Krieger, Nina; Krieger, Peter; Kroeninger, Kevin; Kroha, Hubert; Kroll, Joe; Kroseberg, Juergen; Krstic, Jelena; Kruchonak, Uladzimir; Krüger, Hans; Krumshteyn, Zinovii; Kubota, Takashi; Kuehn, Susanne; Kugel, Andreas; Kuhl, Thorsten; Kuhn, Dietmar; Kukhtin, Victor; Kulchitsky, Yuri; Kuleshov, Sergey; Kummer, Christian; Kuna, Marine; Kunkle, Joshua; Kupco, Alexander; Kurashige, Hisaya; Kurata, Masakazu; Kurchaninov, Leonid; Kurochkin, Yurii; Kus, Vlastimil; Kwee, Regina; La Rotonda, Laura; Labbe, Julien; Lacasta, Carlos; Lacava, Francesco; Lacker, Heiko; Lacour, Didier; Lacuesta, Vicente Ramón; Ladygin, Evgueni; Lafaye, Rémi; Laforge, Bertrand; Lagouri, Theodota; Lai, Stanley; Lamanna, Massimo; Lampen, Caleb; Lampl, Walter; Lancon, Eric; Landgraf, Ulrich; Landon, Murrough; Lane, Jenna; Lankford, Andrew; Lanni, Francesco; Lantzsch, Kerstin; Lanza, Agostino; Laplace, Sandrine; Lapoire, Cecile; Laporte, Jean-Francois; Lari, Tommaso; Larner, Aimee; Lassnig, Mario; Laurelli, Paolo; Lavrijsen, Wim; Laycock, Paul; Lazarev, Alexandre; Lazzaro, Alfio; Le Dortz, Olivier; Le Guirriec, Emmanuel; Le Menedeu, Eve; Le Vine, Micheal; Lebedev, Alexander; Lebel, Céline; LeCompte, Thomas; Ledroit-Guillon, Fabienne Agnes Marie; Lee, Hurng-Chun; Lee, Jason; Lee, Shih-Chang; Lefebvre, Michel; Legendre, Marie; LeGeyt, Benjamin; Legger, Federica; Leggett, Charles; Lehmacher, Marc; Lehmann Miotto, Giovanna; Lei, Xiaowen; Leitner, Rupert; Lellouch, Daniel; Lellouch, Jeremie; Lendermann, Victor; Leney, Katharine; Lenz, Tatiana; Lenzen, Georg; Lenzi, Bruno; Leonhardt, Kathrin; Leroy, Claude; Lessard, Jean-Raphael; Lester, Christopher; Leung Fook Cheong, Annabelle; Levêque, Jessica; Levin, Daniel; Levinson, Lorne; Leyton, Michael; Li, Haifeng; Li, Shumin; Li, Xuefei; Liang, Zhihua; Liang, Zhijun; Liberti, Barbara; Lichard, Peter; Lichtnecker, Markus; Lie, Ki; Liebig, Wolfgang; Lilley, Joseph; Lim, Heuijin; Limosani, Antonio; Limper, Maaike; Lin, Simon; Linnemann, James; Lipeles, Elliot; Lipinsky, Lukas; Lipniacka, Anna; Liss, Tony; Lissauer, David; Lister, Alison; Litke, Alan; Liu, Chuanlei; Liu, Dong; Liu, Hao; Liu, Jianbei; Liu, Minghui; Liu, Tiankuan; Liu, Yanwen; Livan, Michele; Lleres, Annick; Lloyd, Stephen; Lobodzinska, Ewelina; Loch, Peter; Lockman, William; Lockwitz, Sarah; Loddenkoetter, Thomas; Loebinger, Fred; Loginov, Andrey; Loh, Chang Wei; Lohse, Thomas; Lohwasser, Kristin; Lokajicek, Milos; Long, Robin Eamonn; Lopes, Lourenco; Lopez Mateos, David; Losada, Marta; Loscutoff, Peter; Lou, Xinchou; Lounis, Abdenour; Loureiro, Karina; Lovas, Lubomir; Love, Jeremy; Love, Peter; Lowe, Andrew; Lu, Feng; Lubatti, Henry; Luci, Claudio; Lucotte, Arnaud; Ludwig, Andreas; Ludwig, Dörthe; Ludwig, Inga; Luehring, Frederick; Luisa, Luca; Lumb, Debra; Luminari, Lamberto; Lund, Esben; Lund-Jensen, Bengt; Lundberg, Björn; Lundberg, Johan; Lundquist, Johan; Lynn, David; Lys, Jeremy; Lytken, Else; Ma, Hong; Ma, Lian Liang; Macana Goia, Jorge Andres; Maccarrone, Giovanni; Macchiolo, Anna; Maček, Boštjan; Machado Miguens, Joana; Mackeprang, Rasmus; Madaras, Ronald; Mader, Wolfgang; Maenner, Reinhard; Maeno, Tadashi; Mättig, Peter; Mättig, Stefan; Magalhaes Martins, Paulo Jorge; Magradze, Erekle; Mahalalel, Yair; Mahboubi, Kambiz; Mahmood, A.; Maiani, Camilla; Maidantchik, Carmen; Maio, Amélia; Majewski, Stephanie; Makida, Yasuhiro; Makouski, Mikhail; Makovec, Nikola; Malecki, Piotr; Malecki, Pawel; Maleev, Victor; Malek, Fairouz; Mallik, Usha; Malon, David; Maltezos, Stavros; Malyshev, Vladimir; Malyukov, Sergei; Mambelli, Marco; Mameghani, Raphael; Mamuzic, Judita; Mandelli, Luciano; Mandić, Igor; Mandrysch, Rocco; Maneira, José; Mangeard, Pierre-Simon; Manjavidze, Ioseb; Manning, Peter; Manousakis-Katsikakis, Arkadios; Mansoulie, Bruno; Mapelli, Alessandro; Mapelli, Livio; March , Luis; Marchand, Jean-Francois; Marchese, Fabrizio; Marchiori, Giovanni; Marcisovsky, Michal; Marino, Christopher; Marroquim, Fernando; Marshall, Zach; Marti-Garcia, Salvador; Martin, Alex; Martin, Andrew; Martin, Brian; Martin, Brian; Martin, Franck Francois; Martin, Jean-Pierre; Martin, Tim; Martin dit Latour, Bertrand; Martinez, Mario; Martinez Outschoorn, Verena; Martini, Agnese; Martyniuk, Alex; Marzano, Francesco; Marzin, Antoine; Masetti, Lucia; Mashimo, Tetsuro; Mashinistov, Ruslan; Masik, Jiri; Maslennikov, Alexey; Massa, Ignazio; Massol, Nicolas; Mastroberardino, Anna; Masubuchi, Tatsuya; Matricon, Pierre; Matsunaga, Hiroyuki; Matsushita, Takashi; Mattravers, Carly; Maxfield, Stephen; Mayne, Anna; Mazini, Rachid; Mazur, Michael; Mazzanti, Marcello; Mc Donald, Jeffrey; Mc Kee, Shawn Patrick; McCarn, Allison; McCarthy, Robert; McCubbin, Norman; McFarlane, Kenneth; McGlone, Helen; Mchedlidze, Gvantsa; McMahon, Steve; McPherson, Robert; Meade, Andrew; Mechnich, Joerg; Mechtel, Markus; Medinnis, Mike; Meera-Lebbai, Razzak; Meguro, Tatsuma; Mehlhase, Sascha; Mehta, Andrew; Meier, Karlheinz; Meirose, Bernhard; Melachrinos, Constantinos; Mellado Garcia, Bruce Rafael; Mendoza Navas, Luis; Meng, Zhaoxia; Menke, Sven; Meoni, Evelin; Mermod, Philippe; Merola, Leonardo; Meroni, Chiara; Merritt, Frank; Messina, Andrea; Metcalfe, Jessica; Mete, Alaettin Serhan; Meyer, Jean-Pierre; Meyer, Jochen; Meyer, Joerg; Meyer, Thomas Christian; Meyer, W. Thomas; Miao, Jiayuan; Michal, Sebastien; Micu, Liliana; Middleton, Robin; Migas, Sylwia; Mijović, Liza; Mikenberg, Giora; Mikestikova, Marcela; Mikuž, Marko; Miller, David; Mills, Corrinne; Mills, Bill; Milov, Alexander; Milstead, David; Milstein, Dmitry; Minaenko, Andrey; Miñano, Mercedes; Minashvili, Irakli; Mincer, Allen; Mindur, Bartosz; Mineev, Mikhail; Ming, Yao; Mir, Lluisa-Maria; Mirabelli, Giovanni; Misawa, Shigeki; Miscetti, Stefano; Misiejuk, Andrzej; Mitrevski, Jovan; Mitsou, Vasiliki A.; Miyagawa, Paul; Mjörnmark, Jan-Ulf; Mladenov, Dimitar; Moa, Torbjoern; Moed, Shulamit; Moeller, Victoria; Mönig, Klaus; Möser, Nicolas; Mohr, Wolfgang; Mohrdieck-Möck, Susanne; Moles-Valls, Regina; Molina-Perez, Jorge; Monk, James; Monnier, Emmanuel; Montesano, Simone; Monticelli, Fernando; Moore, Roger; Mora Herrera, Clemencia; Moraes, Arthur; Morais, Antonio; Morel, Julien; Morello, Gianfranco; Moreno, Deywis; Moreno Llácer, María; Morettini, Paolo; Morii, Masahiro; Morley, Anthony Keith; Mornacchi, Giuseppe; Morozov, Sergey; Morris, John; Moser, Hans-Guenther; Mosidze, Maia; Moss, Josh; Mount, Richard; Mountricha, Eleni; Mouraviev, Sergei; Moyse, Edward; Mudrinic, Mihajlo; Mueller, Felix; Mueller, James; Mueller, Klemens; Müller, Thomas; Muenstermann, Daniel; Muir, Alex; Munwes, Yonathan; Murillo Garcia, Raul; Murray, Bill; Mussche, Ido; Musto, Elisa; Myagkov, Alexey; Myska, Miroslav; Nadal, Jordi; Nagai, Koichi; Nagano, Kunihiro; Nagasaka, Yasushi; Nairz, Armin Michael; Nakamura, Koji; Nakano, Itsuo; Nakatsuka, Hiroki; Nanava, Gizo; Napier, Austin; Nash, Michael; Nation, Nigel; Nattermann, Till; Naumann, Thomas; Navarro, Gabriela; Nderitu, Simon Kirichu; Neal, Homer; Nebot, Eduardo; Nechaeva, Polina; Negri, Andrea; Negri, Guido; Nelson, Andrew; Nelson, Timothy Knight; Nemecek, Stanislav; Nemethy, Peter; Nepomuceno, Andre Asevedo; Nessi, Marzio; Neubauer, Mark; Neusiedl, Andrea; Neves, Ricardo; Nevski, Pavel; Newcomer, Mitchel; Nickerson, Richard; Nicolaidou, Rosy; Nicolas, Ludovic; Nicoletti, Giovanni; Nicquevert, Bertrand; Niedercorn, Francois; Nielsen, Jason; Nikiforov, Andriy; Nikolaev, Kirill; Nikolic-Audit, Irena; Nikolopoulos, Konstantinos; Nilsen, Henrik; Nilsson, Paul; Nisati, Aleandro; Nishiyama, Tomonori; Nisius, Richard; Nodulman, Lawrence; Nomachi, Masaharu; Nomidis, Ioannis; Nordberg, Markus; Nordkvist, Bjoern; Notz, Dieter; Novakova, Jana; Nozaki, Mitsuaki; Nožička, Miroslav; Nugent, Ian Michael; Nuncio-Quiroz, Adriana-Elizabeth; Nunes Hanninger, Guilherme; Nunnemann, Thomas; Nurse, Emily; O'Neil, Dugan; O'Shea, Val; Oakham, Gerald; Oberlack, Horst; Ochi, Atsuhiko; Oda, Susumu; Odaka, Shigeru; Odier, Jerome; Ogren, Harold; Oh, Alexander; Oh, Seog; Ohm, Christian; Ohshima, Takayoshi; Ohshita, Hidetoshi; Ohsugi, Takashi; Okada, Shogo; Okawa, Hideki; Okumura, Yasuyuki; Okuyama, Toyonobu; Olchevski, Alexander; Oliveira, Miguel Alfonso; Oliveira Damazio, Denis; Oliver, John; Oliver Garcia, Elena; Olivito, Dominick; Olszewski, Andrzej; Olszowska, Jolanta; Omachi, Chihiro; Onofre, António; Onyisi, Peter; Oram, Christopher; Oreglia, Mark; Oren, Yona; Orestano, Domizia; Orlov, Iliya; Oropeza Barrera, Cristina; Orr, Robert; Ortega, Eduardo; Osculati, Bianca; Ospanov, Rustem; Osuna, Carlos; Ottersbach, John; Ould-Saada, Farid; Ouraou, Ahmimed; Ouyang, Qun; Owen, Mark; Owen, Simon; Oyarzun, Alejandro; Ozcan, Veysi Erkcan; Ozone, Kenji; Ozturk, Nurcan; Pacheco Pages, Andres; Padilla Aranda, Cristobal; Paganis, Efstathios; Pahl, Christoph; Paige, Frank; Pajchel, Katarina; Palestini, Sandro; Pallin, Dominique; Palma, Alberto; Palmer, Jody; Pan, Yibin; Panagiotopoulou, Evgenia; Panes, Boris; Panikashvili, Natalia; Panitkin, Sergey; Pantea, Dan; Panuskova, Monika; Paolone, Vittorio; Papadopoulou, Theodora; Park, Su-Jung; Park, Woochun; Parker, Andy; Parker, Sherwood; Parodi, Fabrizio; Parsons, John; Parzefall, Ulrich; Pasqualucci, Enrico; Passeri, Antonio; Pastore, Fernanda; Pastore, Francesca; Pásztor , Gabriella; Pataraia, Sophio; Pater, Joleen; Patricelli, Sergio; Patwa, Abid; Pauly, Thilo; Peak, Lawrence; Pecsy, Martin; Pedraza Morales, Maria Isabel; Peleganchuk, Sergey; Peng, Haiping; Penson, Alexander; Penwell, John; Perantoni, Marcelo; Perez, Kerstin; Perez Codina, Estel; Pérez García-Estañ, María Teresa; Perez Reale, Valeria; Perini, Laura; Pernegger, Heinz; Perrino, Roberto; Persembe, Seda; Perus, Antoine; Peshekhonov, Vladimir; Petersen, Brian; Petersen, Troels; Petit, Elisabeth; Petridou, Chariclia; Petrolo, Emilio; Petrucci, Fabrizio; Petschull, Dennis; Petteni, Michele; Pezoa, Raquel; Phan, Anna; Phillips, Alan; Piacquadio, Giacinto; Piccinini, Maurizio; Piegaia, Ricardo; Pilcher, James; Pilkington, Andrew; Pina, João Antonio; Pinamonti, Michele; Pinfold, James; Pinto, Belmiro; Pizio, Caterina; Placakyte, Ringaile; Plamondon, Mathieu; Pleier, Marc-Andre; Poblaguev, Andrei; Poddar, Sahill; Podlyski, Fabrice; Poffenberger, Paul; Poggioli, Luc; Pohl, Martin; Polci, Francesco; Polesello, Giacomo; Policicchio, Antonio; Polini, Alessandro; Poll, James; Polychronakos, Venetios; Pomeroy, Daniel; Pommès, Kathy; Ponsot, Patrick; Pontecorvo, Ludovico; Pope, Bernard; Popeneciu, Gabriel Alexandru; Popovic, Dragan; Poppleton, Alan; Popule, Jiri; Portell Bueso, Xavier; Porter, Robert; Pospelov, Guennady; Pospisil, Stanislav; Potekhin, Maxim; Potrap, Igor; Potter, Christina; Potter, Christopher; Potter, Keith; Poulard, Gilbert; Poveda, Joaquin; Prabhu, Robindra; Pralavorio, Pascal; Prasad, Srivas; Pravahan, Rishiraj; Pribyl, Lukas; Price, Darren; Price, Lawrence; Prichard, Paul; Prieur, Damien; Primavera, Margherita; Prokofiev, Kirill; Prokoshin, Fedor; Protopopescu, Serban; Proudfoot, James; Prudent, Xavier; Przysiezniak, Helenka; Psoroulas, Serena; Ptacek, Elizabeth; Puigdengoles, Carles; Purdham, John; Purohit, Milind; Puzo, Patrick; Pylypchenko, Yuriy; Qi, Ming; Qian, Jianming; Qian, Weiming; Qin, Zhonghua; Quadt, Arnulf; Quarrie, David; Quayle, William; Quinonez, Fernando; Raas, Marcel; Radeka, Veljko; Radescu, Voica; Radics, Balint; Rador, Tonguc; Ragusa, Francesco; Rahal, Ghita; Rahimi, Amir; Rajagopalan, Srinivasan; Rammensee, Michael; Rammes, Marcus; Rauscher, Felix; Rauter, Emanuel; Raymond, Michel; Read, Alexander Lincoln; Rebuzzi, Daniela; Redelbach, Andreas; Redlinger, George; Reece, Ryan; Reeves, Kendall; Reinherz-Aronis, Erez; Reinsch, Andreas; Reisinger, Ingo; Reljic, Dusan; Rembser, Christoph; Ren, Zhongliang; Renkel, Peter; Rescia, Sergio; Rescigno, Marco; Resconi, Silvia; Resende, Bernardo; Reznicek, Pavel; Rezvani, Reyhaneh; Richards, Alexander; Richards, Ronald; Richter, Robert; Richter-Was, Elzbieta; Ridel, Melissa; Rijpstra, Manouk; Rijssenbeek, Michael; Rimoldi, Adele; Rinaldi, Lorenzo; Rios, Ryan Randy; Riu, Imma; Rizatdinova, Flera; Rizvi, Eram; Roa Romero, Diego Alejandro; Robertson, Steven; Robichaud-Veronneau, Andree; Robinson, Dave; Robinson, James; Robinson, Mary; Robson, Aidan; Rocha de Lima, Jose Guilherme; Roda, Chiara; Roda Dos Santos, Denis; Rodriguez, Diego; Rodriguez Garcia, Yohany; Roe, Shaun; Røhne, Ole; Rojo, Victoria; Rolli, Simona; Romaniouk, Anatoli; Romanov, Victor; Romeo, Gaston; Romero Maltrana, Diego; Roos, Lydia; Ros, Eduardo; Rosati, Stefano; Rosenbaum, Gabriel; Rosselet, Laurent; Rossetti, Valerio; Rossi, Leonardo Paolo; Rotaru, Marina; Rothberg, Joseph; Rousseau, David; Royon, Christophe; Rozanov, Alexander; Rozen, Yoram; Ruan, Xifeng; Ruckert, Benjamin; Ruckstuhl, Nicole; Rud, Viacheslav; Rudolph, Gerald; Rühr, Frederik; Ruggieri, Federico; Ruiz-Martinez, Aranzazu; Rumyantsev, Leonid; Rurikova, Zuzana; Rusakovich, Nikolai; Rutherfoord, John; Ruwiedel, Christoph; Ruzicka, Pavel; Ryabov, Yury; Ryan, Patrick; Rybkin, Grigori; Rzaeva, Sevda; Saavedra, Aldo; Sadrozinski, Hartmut; Sadykov, Renat; Sakamoto, Hiroshi; Salamanna, Giuseppe; Salamon, Andrea; Saleem, Muhammad; Salihagic, Denis; Salnikov, Andrei; Salt, José; Salvachua Ferrando, Belén; Salvatore, Daniela; Salvatore, Pasquale Fabrizio; Salvucci, Antonio; Salzburger, Andreas; Sampsonidis, Dimitrios; Samset, Björn Hallvard; Sandaker, Heidi; Sander, Heinz Georg; Sanders, Michiel; Sandhoff, Marisa; Sandhu, Pawan; Sandstroem, Rikard; Sandvoss, Stephan; Sankey, Dave; Sanny, Bernd; Sansoni, Andrea; Santamarina Rios, Cibran; Santoni, Claudio; Santonico, Rinaldo; Saraiva, João; Sarangi, Tapas; Sarkisyan-Grinbaum, Edward; Sarri, Francesca; Sasaki, Osamu; Sasao, Noboru; Satsounkevitch, Igor; Sauvage, Gilles; Savard, Pierre; Savine, Alexandre; Savinov, Vladimir; Sawyer, Lee; Saxon, David; Says, Louis-Pierre; Sbarra, Carla; Sbrizzi, Antonio; Scannicchio, Diana; Schaarschmidt, Jana; Schacht, Peter; Schäfer, Uli; Schaetzel, Sebastian; Schaffer, Arthur; Schaile, Dorothee; Schamberger, R.~Dean; Schamov, Andrey; Schegelsky, Valery; Scheirich, Daniel; Schernau, Michael; Scherzer, Max; Schiavi, Carlo; Schieck, Jochen; Schioppa, Marco; Schlenker, Stefan; Schmidt, Evelyn; Schmieden, Kristof; Schmitt, Christian; Schmitz, Martin; Schott, Matthias; Schouten, Doug; Schovancova, Jaroslava; Schram, Malachi; Schreiner, Alexander; Schroeder, Christian; Schroer, Nicolai; Schroers, Marcel; Schultes, Joachim; Schultz-Coulon, Hans-Christian; Schumacher, Jan; Schumacher, Markus; Schumm, Bruce; Schune, Philippe; Schwanenberger, Christian; Schwartzman, Ariel; Schwemling, Philippe; Schwienhorst, Reinhard; Schwierz, Rainer; Schwindling, Jerome; Scott, Bill; Searcy, Jacob; Sedykh, Evgeny; Segura, Ester; Seidel, Sally; Seiden, Abraham; Seifert, Frank; Seixas, José; Sekhniaidze, Givi; Seliverstov, Dmitry; Sellden, Bjoern; Semprini-Cesari, Nicola; Serfon, Cedric; Serin, Laurent; Seuster, Rolf; Severini, Horst; Sevior, Martin; Sfyrla, Anna; Shabalina, Elizaveta; Shamim, Mansoora; Shan, Lianyou; Shank, James; Shao, Qi Tao; Shapiro, Marjorie; Shatalov, Pavel; Shaw, Kate; Sherman, Daniel; Sherwood, Peter; Shibata, Akira; Shimojima, Makoto; Shin, Taeksu; Shmeleva, Alevtina; Shochet, Mel; Shupe, Michael; Sicho, Petr; Sidoti, Antonio; Siegert, Frank; Siegrist, James; Sijacki, Djordje; Silbert, Ohad; Silver, Yiftah; Silverstein, Daniel; Silverstein, Samuel; Simak, Vladislav; Simic, Ljiljana; Simion, Stefan; Simmons, Brinick; Simonyan, Margar; Sinervo, Pekka; Sinev, Nikolai; Sipica, Valentin; Siragusa, Giovanni; Sisakyan, Alexei; Sivoklokov, Serguei; Sjölin, Jörgen; Sjursen, Therese; Skovpen, Kirill; Skubic, Patrick; Slater, Mark; Slavicek, Tomas; Sliwa, Krzysztof; Sloper, John erik; Sluka, Tomas; Smakhtin, Vladimir; Smirnov, Sergei; Smirnov, Yuri; Smirnova, Lidia; Smirnova, Oxana; Smith, Ben Campbell; Smith, Douglas; Smith, Kenway; Smizanska, Maria; Smolek, Karel; Snesarev, Andrei; Snow, Steve; Snow, Joel; Snuverink, Jochem; Snyder, Scott; Soares, Mara; Sobie, Randall; Sodomka, Jaromir; Soffer, Abner; Solans, Carlos; Solar, Michael; Solc, Jaroslav; Solfaroli Camillocci, Elena; Solodkov, Alexander; Solovyanov, Oleg; Soluk, Richard; Sondericker, John; Sopko, Vit; Sopko, Bruno; Sosebee, Mark; Soukharev, Andrey; Spagnolo, Stefania; Spanò, Francesco; Spencer, Edwin; Spighi, Roberto; Spigo, Giancarlo; Spila, Federico; Spiwoks, Ralf; Spousta, Martin; Spreitzer, Teresa; Spurlock, Barry; St. Denis, Richard Dante; Stahl, Thorsten; Stahlman, Jonathan; Stamen, Rainer; Stancu, Stefan Nicolae; Stanecka, Ewa; Stanek, Robert; Stanescu, Cristian; Stapnes, Steinar; Starchenko, Evgeny; Stark, Jan; Staroba, Pavel; Starovoitov, Pavel; Stastny, Jan; Stavina, Pavel; Stavropoulos, Georgios; Steele, Genevieve; Steinbach, Peter; Steinberg, Peter; Stekl, Ivan; Stelzer, Bernd; Stelzer, Harald Joerg; Stelzer-Chilton, Oliver; Stenzel, Hasko; Stevenson, Kyle; Stewart, Graeme; Stockton, Mark; Stoerig, Kathrin; Stoicea, Gabriel; Stonjek, Stefan; Strachota, Pavel; Stradling, Alden; Straessner, Arno; Strandberg, Jonas; Strandberg, Sara; Strandlie, Are; Strauss, Michael; Strizenec, Pavol; Ströhmer, Raimund; Strom, David; Stroynowski, Ryszard; Strube, Jan; Stugu, Bjarne; Su, Dong; Soh, Dart-yin; Sugaya, Yorihito; Sugimoto, Takuya; Suhr, Chad; Suk, Michal; Sulin, Vladimir; Sultansoy, Saleh; Sumida, Toshi; Sun, Xiaohu; Sundermann, Jan Erik; Suruliz, Kerim; Sushkov, Serge; Susinno, Giancarlo; Sutton, Mark; Suzuki, Takuya; Suzuki, Yu; Sykora, Ivan; Sykora, Tomas; Szymocha, Tadeusz; Sánchez, Javier; Ta, Duc; Tackmann, Kerstin; Taffard, Anyes; Tafirout, Reda; Taga, Adrian; Takahashi, Yuta; Takai, Helio; Takashima, Ryuichi; Takeda, Hiroshi; Takeshita, Tohru; Talby, Mossadek; Talyshev, Alexey; Tamsett, Matthew; Tanaka, Junichi; Tanaka, Reisaburo; Tanaka, Satoshi; Tanaka, Shuji; Tapprogge, Stefan; Tardif, Dominique; Tarem, Shlomit; Tarrade, Fabien; Tartarelli, Giuseppe Francesco; Tas, Petr; Tasevsky, Marek; Tassi, Enrico; Tatarkhanov, Mous; Taylor, Christopher; Taylor, Frank; Taylor, Geoffrey; Taylor, Ryan P.; Taylor, Wendy; Teixeira-Dias, Pedro; Ten Kate, Herman; Teng, Ping-Kun; Tennenbaum-Katan, Yaniv-David; Terada, Susumu; Terashi, Koji; Terron, Juan; Terwort, Mark; Testa, Marianna; Teuscher, Richard; Thioye, Moustapha; Thoma, Sascha; Thomas, Juergen; Thompson, Stan; Thompson, Emily; Thompson, Peter; Thompson, Paul; Thompson, Ray; Thomson, Evelyn; Thun, Rudolf; Tic, Tomas; Tikhomirov, Vladimir; Tikhonov, Yury; Tipton, Paul; Tique Aires Viegas, Florbela De Jes; Tisserant, Sylvain; Toczek, Barbara; Todorov, Theodore; Todorova-Nova, Sharka; Toggerson, Brokk; Tojo, Junji; Tokár, Stanislav; Tokushuku, Katsuo; Tollefson, Kirsten; Tomasek, Lukas; Tomasek, Michal; Tomoto, Makoto; Tompkins, Lauren; Toms, Konstantin; Tonoyan, Arshak; Topfel, Cyril; Topilin, Nikolai; Torrence, Eric; Torró Pastor, Emma; Toth, Jozsef; Touchard, Francois; Tovey, Daniel; Trefzger, Thomas; Tremblet, Louis; Tricoli, Alesandro; Trigger, Isabel Marian; Trincaz-Duvoid, Sophie; Trinh, Thi Nguyet; Tripiana, Martin; Triplett, Nathan; Trischuk, William; Trivedi, Arjun; Trocmé, Benjamin; Troncon, Clara; Trzupek, Adam; Tsarouchas, Charilaos; Tseng, Jeffrey; Tsiakiris, Menelaos; Tsiareshka, Pavel; Tsionou, Dimitra; Tsipolitis, Georgios; Tsiskaridze, Vakhtang; Tskhadadze, Edisher; Tsukerman, Ilya; Tsulaia, Vakhtang; Tsung, Jieh-Wen; Tsuno, Soshi; Tsybychev, Dmitri; Tuggle, Joseph; Turecek, Daniel; Turk Cakir, Ilkay; Turlay, Emmanuel; Tuts, Michael; Twomey, Matthew Shaun; Tylmad, Maja; Tyndel, Mike; Uchida, Kirika; Ueda, Ikuo; Ugland, Maren; Uhlenbrock, Mathias; Uhrmacher, Michael; Ukegawa, Fumihiko; Unal, Guillaume; Undrus, Alexander; Unel, Gokhan; Unno, Yoshinobu; Urbaniec, Dustin; Urkovsky, Evgeny; Urquijo, Phillip; Urrejola, Pedro; Usai, Giulio; Uslenghi, Massimiliano; Vacavant, Laurent; Vacek, Vaclav; Vachon, Brigitte; Vahsen, Sven; Valente, Paolo; Valentinetti, Sara; Valkar, Stefan; Valladolid Gallego, Eva; Vallecorsa, Sofia; Valls Ferrer, Juan Antonio; Van Berg, Richard; van der Graaf, Harry; van der Kraaij, Erik; van der Poel, Egge; van der Ster, Daniel; van Eldik, Niels; van Gemmeren, Peter; van Kesteren, Zdenko; van Vulpen, Ivo; Vandelli, Wainer; Vaniachine, Alexandre; Vankov, Peter; Vannucci, Francois; Vari, Riccardo; Varnes, Erich; Varouchas, Dimitris; Vartapetian, Armen; Varvell, Kevin; Vasilyeva, Lidia; Vassilakopoulos, Vassilios; Vazeille, Francois; Vellidis, Constantine; Veloso, Filipe; Veneziano, Stefano; Ventura, Andrea; Ventura, Daniel; Venturi, Manuela; Venturi, Nicola; Vercesi, Valerio; Verducci, Monica; Verkerke, Wouter; Vermeulen, Jos; Vetterli, Michel; Vichou, Irene; Vickey, Trevor; Viehhauser, Georg; Villa, Mauro; Villani, Giulio; Villaplana Perez, Miguel; Vilucchi, Elisabetta; Vincter, Manuella; Vinek, Elisabeth; Vinogradov, Vladimir; Viret, Sébastien; Virzi, Joseph; Vitale , Antonio; Vitells, Ofer; Vivarelli, Iacopo; Vives Vaque, Francesc; Vlachos, Sotirios; Vlasak, Michal; Vlasov, Nikolai; Vogel, Adrian; Vokac, Petr; Volpi, Matteo; von der Schmitt, Hans; von Loeben, Joerg; von Radziewski, Holger; von Toerne, Eckhard; Vorobel, Vit; Vorwerk, Volker; Vos, Marcel; Voss, Rudiger; Voss, Thorsten Tobias; Vossebeld, Joost; Vranjes, Nenad; Vranjes Milosavljevic, Marija; Vrba, Vaclav; Vreeswijk, Marcel; Vu Anh, Tuan; Vudragovic, Dusan; Vuillermet, Raphael; Vukotic, Ilija; Wagner, Peter; Walbersloh, Jorg; Walder, James; Walker, Rodney; Walkowiak, Wolfgang; Wall, Richard; Wang, Chiho; Wang, Haichen; Wang, Jin; Wang, Song-Ming; Warburton, Andreas; Ward, Patricia; Warsinsky, Markus; Wastie, Roy; Watkins, Peter; Watson, Alan; Watson, Miriam; Watts, Gordon; Watts, Stephen; Waugh, Anthony; Waugh, Ben; Weber, Marc; Weber, Manuel; Weber, Michele; Weber, Pavel; Weidberg, Anthony; Weingarten, Jens; Weiser, Christian; Wellenstein, Hermann; Wells, Phillippa; Wen, Mei; Wenaus, Torre; Wendler, Shanti; Wengler, Thorsten; Wenig, Siegfried; Wermes, Norbert; Werner, Matthias; Werner, Per; Werth, Michael; Werthenbach, Ulrich; Wessels, Martin; Whalen, Kathleen; White, Andrew; White, Martin; White, Sebastian; Whitehead, Samuel Robert; Whiteson, Daniel; Whittington, Denver; Wicek, Francois; Wicke, Daniel; Wickens, Fred; Wiedenmann, Werner; Wielers, Monika; Wienemann, Peter; Wiglesworth, Craig; Wiik, Liv Antje Mari; Wildauer, Andreas; Wildt, Martin Andre; Wilkens, Henric George; Williams, Eric; Williams, Hugh; Willocq, Stephane; Wilson, John; Wilson, Michael Galante; Wilson, Alan; Wingerter-Seez, Isabelle; Winklmeier, Frank; Wittgen, Matthias; Wolter, Marcin Wladyslaw; Wolters, Helmut; Wosiek, Barbara; Wotschack, Jorg; Woudstra, Martin; Wraight, Kenneth; Wright, Catherine; Wright, Dennis; Wrona, Bozydar; Wu, Sau Lan; Wu, Xin; Wulf, Evan; Wynne, Benjamin; Xaplanteris, Leonidas; Xella, Stefania; Xie, Song; Xu, Da; Xu, Neng; Yamada, Miho; Yamamoto, Akira; Yamamoto, Kyoko; Yamamoto, Shimpei; Yamamura, Taiki; Yamaoka, Jared; Yamazaki, Takayuki; Yamazaki, Yuji; Yan, Zhen; Yang, Haijun; Yang, Un-Ki; Yang, Zhaoyu; Yao, Weiming; Yao, Yushu; Yasu, Yoshiji; Ye, Jingbo; Ye, Shuwei; Yilmaz, Metin; Yoosoofmiya, Reza; Yorita, Kohei; Yoshida, Riktura; Young, Charles; Youssef, Saul; Yu, Dantong; Yu, Jaehoon; Yuan, Li; Yurkewicz, Adam; Zaidan, Remi; Zaitsev, Alexander; Zajacova, Zuzana; Zambrano, Valentina; Zanello, Lucia; Zaytsev, Alexander; Zeitnitz, Christian; Zeller, Michael; Zemla, Andrzej; Zendler, Carolin; Zenin, Oleg; Ženiš, Tibor; Zenonos, Zenonas; Zenz, Seth; Zerwas, Dirk; Zevi della Porta, Giovanni; Zhan, Zhichao; Zhang, Huaqiao; Zhang, Jinlong; Zhang, Qizhi; Zhang, Xueyao; Zhao, Long; Zhao, Tianchi; Zhao, Zhengguo; Zhemchugov, Alexey; Zhong, Jiahang; Zhou, Bing; Zhou, Ning; Zhou, Yue; Zhu, Cheng Guang; Zhu, Hongbo; Zhu, Yingchun; Zhuang, Xuai; Zhuravlov, Vadym; Zimmermann, Robert; Zimmermann, Simone; Zimmermann, Stephanie; Ziolkowski, Michael; Živković, Lidija; Zobernig, Georg; Zoccoli, Antonio; zur Nedden, Martin; Zutshi, Vishnu

    2010-01-01

    The simulation software for the ATLAS Experiment at the Large Hadron Collider is being used for large-scale production of events on the LHC Computing Grid. This simulation requires many components, from the generators that simulate particle collisions, through packages simulating the response of the various detectors and triggers. All of these components come together under the ATLAS simulation infrastructure. In this paper, that infrastructure is discussed, including that supporting the detector description, interfacing the event generation, and combining the GEANT4 simulation of the response of the individual detectors. Also described are the tools allowing the software validation, performance testing, and the validation of the simulated output against known physics processes.

  16. Transformation of technical infrastructure

    DEFF Research Database (Denmark)

    Nielsen, Susanne Balslev

    , the evolution of large technological systems and theories about organisational and technological transformationprocesses. The empirical work consist of three analysis at three different levels: socio-technical descriptions of each sector, an envestigation of one municipality and envestigations of one......The scope of the project is to investigate the possibillities of - and the barriers for a transformation of technical infrastructure conserning energy, water and waste. It focus on urban ecology as a transformation strategy. The theoretical background of the project is theories about infrastructure...

  17. Indonesian infrastructure development

    International Nuclear Information System (INIS)

    It is with the achievement of a competitive advantage as a motivating factor that the Indonesian coal industry is engaged in infrastructure development including both small regionally trade-based terminals and high capacity capesize bulk terminals to support large scale coal exports. The unique characteristics of Indonesian coal quality, low production costs and the optimization of transport economics in accordance with vessel size provides great incentives for the European and U.S. market. This paper reports on the infrastructure development, Indonesian coal resources, and coal exports

  18. Governing Critical ICT: Elements that Require Attention

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Klaver, M.H.A.

    2015-01-01

    With respect to critical information and communication technologies (ICT), nations most often declare their national critical infrastructure to include telecommunication services and in some cases critical services offered by key Internet Service Providers (ISP). This paper debates whether nations,

  19. Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: Comparing renewable electricity imports to gas imports

    International Nuclear Information System (INIS)

    The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low

  20. Engineering economics and finance for transportation infrastructure

    CERN Document Server

    Prassas, Elena S

    2013-01-01

    Transportation infrastructure is often referred to as society’s bloodstream.  It allows for the movement of people and goods to provide the ability to optimize the production and distribution of goods in an effective and efficient manner, and to provide personal opportunities for employment, recreation, education, health care, and other vital activities.   At the same time, the costs to provide, maintain, and operate this complex infrastructure are enormous.  Because so much of the economic resources to be invested come from public funds, it is critical that expenditures are made in a manner that provides society with the best possible return on the investment.  Further, it is important that sufficient investment is made available, and the costs of the investment are equitably borne by taxpayers.   This textbook provides a fundamental overview of the application of engineering economic principles to transportation infrastructure investments.  Basic theory is presented and illustrated with examples spe...

  1. A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer

    Directory of Open Access Journals (Sweden)

    Maria Sebastian

    2013-06-01

    Full Text Available Nowadays, the computing and communication services are accessed while on the move. Setting up of fixed access points and backbone infrastructure is not always viable. So in order to provide communication where there is lack of infrastructure or inconvenience in using the existing infrastructure, Mobile Adhoc Networks (MANETs are used. This inherent flexibility allows MANETs to be used for a wide range of applications such as rescue operations, military applications, vehicular communication, and business meetings. As there is no apriori trust relationship between the nodes of an ad hoc network and basic network functions like packet forwarding and routing are performed by the available nodes, security is an essential component in MANETs. Various attacks in MANETs are blackhole attack, byzantine attack, resource consumption attack, rushing attack, and wormhole attack. Wormhole attack is a severe threat among the other threats in MANET. Existing solutions to detect wormhole attacks include Packet Leashes, SECTOR, DelPHI, RTT-TC, TTM, etc. These solutions require special hardware or strict synchronized clocks or cause message overhead. Some solutions do not locate the wormhole, and some other may generate false alarms or does not consider network congestion into account. In this paper, wormhole attack detection is proposed based on RTT between successive nodes and congestion detection mechanism. If the RTT between two successive nodes is higher than the threshold value, a wormhole attack is suspected. If a wormhole is suspected, node's transitory buffer is probed to determine whether the long delay between the nodes is due to wormhole or not, as delays can be caused due to congestion or by queuing delays. The proposed method prevents both the hidden and the exposed attack. Advantage of our proposed solution is that it does not require any specialized hardware or synchronized clocks.

  2. Nanotechnology and MEMS-based systems for civil infrastructure safety and security: Opportunities and challenges

    Science.gov (United States)

    Robinson, Nidia; Saafi, Mohamed

    2006-03-01

    Critical civil infrastructure systems such as bridges, high rises, dams, nuclear power plants and pipelines present a major investment and the health of the United States' economy and the lifestyle of its citizens both depend on their safety and security. The challenge for engineers is to maintain the safety and security of these large structures in the face of terrorism threats, natural disasters and long-term deterioration, as well as to meet the demands of emergency response times. With the significant negative impact that these threats can have on the structural environment, health monitoring of civil infrastructure holds promise as a way to provide information for near real-time condition assessment of the structure's safety and security. This information can be used to assess the integrity of the structure for post-earthquake and terrorist attacks rescue and recovery, and to safely and rapidly remove the debris and to temporary shore specific structural elements. This information can also be used for identification of incipient damage in structures experiencing long-term deterioration. However, one of the major obstacles preventing sensor-based monitoring is the lack of reliable, easy-to-install, cost-effective and harsh environment resistant sensors that can be densely embedded into large-scale civil infrastructure systems. Nanotechnology and MEMS-based systems which have matured in recent years represent an innovative solution to current damage detection systems, leading to wireless, inexpensive, durable, compact, and high-density information collection. In this paper, ongoing research activities at Alabama A&M University (AAMU) Center for Transportation Infrastructure Safety and Security on the application of nanotechnology and MEMS to Civil Infrastructure for health monitoring will presented. To date, research showed that nanotechnology and MEMS-based systems can be used to wirelessly detect and monitor different damage mechanisms in concrete structures

  3. Supporting Clinicians in Infrastructuring

    DEFF Research Database (Denmark)

    Simonsen, Jesper; Hertzum, Morten; Karasti, Helena

    the notion of infrastructuring, we carry out an in- frastructural analysis of eWBs and approach our joint efforts as unfolding and continuing the configuration of participatory design activities. We identify a need for local support and novel competences among the clinicians in order for them to...

  4. Infrastructuring for Quality

    DEFF Research Database (Denmark)

    Bossen, Claus; Danholt, Peter; Ubbesen, Morten Bonde

    2015-01-01

    indicators for quality in treatment to guide and govern their performance, in order to investigate whether this may generate a new performance measurement infrastructure that will improve quality of healthcare. The project is entitled: “New governance in the patient’s perspective”....

  5. Documentation of Infrastructure

    DEFF Research Database (Denmark)

    Workspace

    2003-01-01

    This report describes the software infrastructure developed within the WorkSPACE  project, both from a software architectural point of view and from a user point of  view. We first give an overview of the system architecture, then go on to present the  more prominent features of the 3D graphical ...

  6. CERN Printing Infrastructure

    CERN Document Server

    Otto, R

    2007-01-01

    For many years CERN had a very sophisticated print server infrastructure [13] which supported several different protocols (AppleTalk, IPX and TCP/IP) and many different printing standards. Today’s situation differs a lot: we have a much more homogenous network infrastructure, where TCP/IP is used everywhere and we have less printer models, which almost all work using current standards (i.e. they all provide PostScript drivers). This change gave us the possibility to review the printing architecture aiming at simplifying the infrastructure in order to achieve full automation of the service. The new infrastructure offers both: LPD service exposing print queues to Linux and Mac OS X computers and native printing for Windows based clients. The printer driver distribution is automatic and native on Windows and automated by custom mechanisms on Linux, where the appropriate Foomatic drivers are configured. Also the process of printer registration and queue creation is completely automated following the printer ...

  7. CERN printing infrastructure

    International Nuclear Information System (INIS)

    For many years CERN had a very sophisticated print server infrastructure [13] which supported several different protocols (AppleTalk, IPX and TCP/IP) and many different printing standards. Today's situation differs a lot: we have a much more homogenous network infrastructure, where TCP/IP is used everywhere and we have less printer models, which almost all work using current standards (i.e. they all provide PostScript drivers). This change gave us the possibility to review the printing architecture aiming at simplifying the infrastructure in order to achieve full automation of the service. The new infrastructure offers both: LPD service exposing print queues to Linux and Mac OS X computers and native printing for Windows based clients. The printer driver distribution is automatic and native on Windows and automated by custom mechanisms on Linux, where the appropriate Foomatic drivers are configured. Also the process of printer registration and queue creation is completely automated following the printer registration in the network database. At the end of 2006 we have moved all (∼1200) CERN printers and all users' connections at CERN to the new service. This paper will describe the new architecture and summarize the process of migration

  8. Hercules finances research infrastructure

    OpenAIRE

    Vanden Berghe, Jeroen

    2009-01-01

    In 2007 the Flemish government created a structural funding channel to support investment in research infrastructure: Hercules. On 15 October 2008 the Hercules Foundation approved a first list of investment proposals. In this article specific features of this first call are examined.

  9. Infrastructure network vulnerability

    OpenAIRE

    Kamissoko, Daouda; Pérès, François; ZARATÉ, Pascale

    2011-01-01

    The work presented in this paper aims to propose a methodology of analyzing infrastructure network vulnerability in the field of prevention or reduction of the natural disaster consequences. After a state of the art on vulnerability models in the academic literature, the various vulnerability factors are classified and discussed. Eventually, a general model of vulnerability analysis including societal parameters is presented.

  10. Understanding public confidence in government to prevent terrorist attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  11. A Study of Black Hole Attack on MANET Performance

    Directory of Open Access Journals (Sweden)

    C. K. Nagpal

    2012-08-01

    Full Text Available Mobile Ad hoc Network (MANET is a self-organized wireless network, consisting of nodes (mobile devices responsible for its creation, operation and maintenance. The communication in the MANET is of multihop in nature due to absence of any fixed infrastructure. An attacker may intrude easily into MANET by posing as legitimate intermediate node and present various types of security attacks on data exchanges taking place between source and destination. In this paper we study the impact of presence of black hole node on MANET performance on the basis of reachability, hop count, neighbor node density and path optimality. We observe that as the percentage of black hole nodes increases, the MANET performance degrades significantly.

  12. Classification of artificial intelligence ids for smurf attack

    CERN Document Server

    Ugtakhbayar, N; Sodbileg, Sh

    2012-01-01

    Many methods have been developed to secure the network infrastructure and communication over the Internet. Intrusion detection is a relatively new addition to such techniques. Intrusion detection systems (IDS) are used to find out if someone has intrusion into or is trying to get it the network. One big problem is amount of Intrusion which is increasing day by day. We need to know about network attack information using IDS, then analysing the effect. Due to the nature of IDSs which are solely signature based, every new intrusion cannot be detected; so it is important to introduce artificial intelligence (AI) methods / techniques in IDS. Introduction of AI necessitates the importance of normalization in intrusions. This work is focused on classification of AI based IDS techniques which will help better design intrusion detection systems in the future. We have also proposed a support vector machine for IDS to detect Smurf attack with much reliable accuracy.

  13. Performance analyses of wormhole attack in Cognitive Radio Network (CRN

    Directory of Open Access Journals (Sweden)

    Prabhjot

    2015-06-01

    Full Text Available Mobile wirelesses networks are generally open to various attacks like information and physical security attacks than fixed wired networks. Securing wireless ad hoc networks is particularly more difficult for many of the reasons for example vulnerability of channels and nodes, absence of infrastructure, dynamically changing topology etc. After that we initialize the number of nodes. Then implement protocol for the communication of nodes. Due to these protocols communication start. And this will be then implemented in CRNs which stand for cognitive radio network in which channel sensing is done. By the use of CRN security will be improved and performance will be enhanced. Find the malicious nodes occur in the network. One malicious node uses routing protocol to claim itself of being shortest path to last node but drops routing packets and doesn’t send packets to its neighbors. In last evaluate the parameters.

  14. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  15. Mission Critical Networking

    Energy Technology Data Exchange (ETDEWEB)

    Eltoweissy, Mohamed Y.; Du, David H.C.; Gerla, Mario; Giordano, Silvia; Gouda, Mohamed; Schulzrinne, Henning; Youssef, Moustafa

    2010-06-01

    Mission-Critical Networking (MCN) refers to networking for application domains where life or livelihood may be at risk. Typical application domains for MCN include critical infrastructure protection and operation, emergency and crisis intervention, healthcare services, and military operations. Such networking is essential for safety, security and economic vitality in our complex world characterized by uncertainty, heterogeneity, emergent behaviors, and the need for reliable and timely response. MCN comprise networking technology, infrastructures and services that may alleviate the risk and directly enable and enhance connectivity for mission-critical information exchange among diverse, widely dispersed, mobile users.

  16. The resilience of interdependent transportation networks under targeted attack

    CERN Document Server

    Zhang, Peng; Zhao, Zhuang; Li, Daqing; Lu, Guangquan; Wang, Yunpeng; Xiao, Jinghua

    2013-01-01

    Modern world builds on the resilience of interdependent infrastructures characterized as complex networks. Recently, a framework for analysis of interdependent networks has been developed to explain the mechanism of resilience in interdependent networks. Here we extend this interdependent network model by considering flows in the networks and study the system's resilience under different attack strategies. In our model, nodes may fail due to either overload or loss of interdependency. Under the interaction between these two failure mechanisms, it is shown that interdependent scale-free networks show extreme vulnerability. The resilience of interdependent SF networks is found in our simulation much smaller than single SF network or interdependent SF networks without flows.

  17. Analysis of AODV and DSR in Presence of Wormhole Attack in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    VIVEK SHARMA,

    2010-11-01

    Full Text Available An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe security attack in ad hocnetworks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits at one location in the network, tunnels them (possiblyselectively to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and locationbased wireless security systems. This paper analyses the performance of AODV and DSR routing protocols with and without wormhole attack. This would be a great help for the people conducting research on real world problems in MANET security.

  18. New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Mohd Nazri Ismail

    2012-08-01

    Full Text Available Cloud computing paradigm as one of new concept in world of computing in general and especially in computer network, give a new facilities such as IaaS (infrastructure as service, PaaS (platform as stricter and SaaS (software as service. All this services offered by utilization of new and old techniques such as resources sharing distributed networking, virtualization. But it still suffering from some shortages and one of the most important one is security threats. and one of the most dangers is Distributed denial-of-service (DDoS, and for overcome this threat many techniques has been proposed and most of them give more attention to one aspect either detecting or preventing or tracing the sources of attack and a few which address the attack in all its aspect. here we propose new framework to counter this attack by detect the attack using covariance matrix statistical method and determine the sources of attack using TTl Distance average and Finlay we apply a technique to eliminate attack by get benefit from the Honeypot method to block all attacks sources and transfer the legitimate traffic to another virtual machine not affected by attack.

  19. Social experience infrastructure

    DEFF Research Database (Denmark)

    Kvistgaard, Peter

    2006-01-01

    Using the case of Kühlungsborn in Mecklenburg-Vorpommern as an example of a resort in which social experience infrastructure plays a pivotal role in the ongoing success of attracting German tourists from especially Berlin, Hamburg and Hanover it is the aim of this article in a descriptive and...... explorative fashion to share with others thoughts and ideas concerning the development of new ways to construct/reconstruct recreational spaces with a better coherence with regard to designing experiences. This article claims that it is possible to design recreational spaces with good social experience...... infrastructure in order to create experience spaces for personal experiences (in line with Schultze’s social constructivist view of experiences) without completely adhering to the economic rationalist thoughts and guidelines of Pine & Gilmore that claim that experiences can be designed and controlled by...

  20. Grievous Temporal and Occipital Injury Caused by a Bear Attack

    OpenAIRE

    Sampath Chandra Prasad; Nikhil Dinaker Thada; Pallavi Rao; Smitha Rani Thada; Kishore Chandra Prasad

    2013-01-01

    Bear attacks are reported from nearly every part of the world. The chance of a human encountering a bear increases as the remote bear territory diminishes. The sloth bear is one of the three species of bears found in India, which inhabits the forests of India and its neighboring countries. Here we describe a teenager who came to us with a critical injury involving the face, temporal and occipital bones inflicted by a sloth bear attack. He underwent a temporal exploration, facial nerve decompr...

  1. Glossary of Spatial Data Infrastructure

    Directory of Open Access Journals (Sweden)

    Nedjeljko Frančula

    2011-12-01

    Full Text Available All items are listed in the Glossary by alphabetical order. If an item consists of two or more words, the first is always a noun. For example: spatial data infrastructure is listed as infrastructure, saptial data.

  2. Chef infrastructure automation cookbook

    CERN Document Server

    Marschall, Matthias

    2015-01-01

    This book is for system engineers and administrators who have a fundamental understanding of information management systems and infrastructure. It helps if you've already played around with Chef; however, this book covers all the important topics you will need to know. If you don't want to dig through a whole book before you can get started, this book is for you, as it features a set of independent recipes you can try out immediately.

  3. GRID infrastructure sustainability guidelines

    OpenAIRE

    Ray, Nicolas; Gorgan, Dorian; Giuliani, Gregory

    2010-01-01

    A grid computing infrastructure can be defined as a cluster of loosely coupled, networked computers acting in concert to perform very large tasks. Grid computing is an important part of the enviroGRIDS project, because it will allow one to perform computationally-intensive simulations of the hydrological balance of the Black Sea Catchment and will permit to analyze large quantity of high resolution data sets. It is therefore important that the ability to use grid computing is maintained throu...

  4. Internet: Infrastructure, users, regulation

    OpenAIRE

    Mikhail Doroshevich; Marina Sokolova

    2014-01-01

    By the end of 2014, Belarus totaled over 5 million Internet users, which constitutes 70% of the population aged 15 to 74. The Internet has become not only an integral part of everyday life, but also a platform for activities of state-controlled and private companies and organizations. Infrastructural development (like broadband Internet) remains a key element of the strategy of an informationoriented society. The download speed in Belarus is lower than in the neighboring countries and the cos...

  5. Systems Infrastructure (SYS 18)

    OpenAIRE

    Richard Guy; John Hicks; Karen Weeks

    2006-01-01

    The Systems Infrastructure team assembles, tests, and provides complete sensor network solutions containing both exploratory and hardened components, from high-level applications and analysis tools, down to hardware at the sensor platform level. Recent significant progress is seen in SensorBase and ESS2 at the database and application levels; in disruption-tolerant data delivery and system control software and in the integration of the latest wireless routing algorithms.

  6. Breeding programme and infrastructure

    OpenAIRE

    Zonabend König, Emelie

    2016-01-01

    The aim of this thesis was to study potential breeding strategies for indigenous livestock in Eastern and Southern Africa under low input production systems. The thesis covered a study of the status of supportive infrastructure for use of animal genetic resources. The case of Red Maasai sheep was studied as a model for design of strategies for improvement of an indigenous breed under threat. Studies [I-II] were performed through participatory approaches by use of structured interviews, while ...

  7. Flipping journals to open: Rethinking publishing infrastructure

    OpenAIRE

    Fecher, Benedikt; Wagner, Gert G.

    2015-01-01

    The resignation of the editorial board of an Elsevier-owned linguistics journal and its open access reorganization could get the ball rolling for other journals to follow suit. This case is a reminder that open access means more than just providing access to an article; it means rethinking the whole process of publishing. Open access also raises important questions about who owns the critical information infrastructure for online publishing.

  8. Decentralized Provision of Public Infrastructure and Corruption

    OpenAIRE

    Anwar Shah

    2014-01-01

    During the past three decades, a large number of countries have introduced reforms to decentralize public decision making. Such reforms have proved controversial. Critics of these reforms argue that decentralized provision of infrastructure enhances vulnerability to corruption. Proponents of these reforms counter that corruption arises from lack of people empowerment and decentralization by bringing decision making closer to people shines sunlight on government operations and empowers people ...

  9. Enhancing Infrastructure Security in Real Estate

    Directory of Open Access Journals (Sweden)

    Kyle Dees

    2011-12-01

    Full Text Available s a result of the increased dependency on obtaining information and connecting each computer togetherfor ease of access/communication, organizations risk being attacked and losing private information through breaches or insecure business activities. To help protect organizations and their assets, companies need to develop a strong understanding of the risks imposed on their company and the security solutions designed to prevent/minimize vulnerabilities. To reduce the impact threats have on a network, organizations need to: design a defense layer system that provides multiple instances of protection to prevent unauthorized access to core information, implement a strong network hardware/intrusion prevention system, and create all-inclusive network/security policies that detail user rules and company rights. In order to enhance the overall security of a basic infrastructure, this paper will provide a detailed look into gathering the organizational requirements, designing and implementing a secure physical network layout, and selecting the standards needed to prevent unauthorized access.

  10. In Situ Nuclear Characterization Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    James A. Smith; J. Rory Kennedy

    2011-11-01

    To be able to evolve microstructure with a prescribed in situ process, an effective measurement infrastructure must exist. This interdisciplinary infrastructure needs to be developed in parallel with in situ sensor technology. This paper discusses the essential elements in an effective infrastructure.

  11. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica...

  12. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  13. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  14. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  15. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number of a...

  16. California Hydrogen Infrastructure Project

    Energy Technology Data Exchange (ETDEWEB)

    Heydorn, Edward C

    2013-03-12

    Air Products and Chemicals, Inc. has completed a comprehensive, multiyear project to demonstrate a hydrogen infrastructure in California. The specific primary objective of the project was to demonstrate a model of a real-world retail hydrogen infrastructure and acquire sufficient data within the project to assess the feasibility of achieving the nation's hydrogen infrastructure goals. The project helped to advance hydrogen station technology, including the vehicle-to-station fueling interface, through consumer experiences and feedback. By encompassing a variety of fuel cell vehicles, customer profiles and fueling experiences, this project was able to obtain a complete portrait of real market needs. The project also opened its stations to other qualified vehicle providers at the appropriate time to promote widespread use and gain even broader public understanding of a hydrogen infrastructure. The project engaged major energy companies to provide a fueling experience similar to traditional gasoline station sites to foster public acceptance of hydrogen. Work over the course of the project was focused in multiple areas. With respect to the equipment needed, technical design specifications (including both safety and operational considerations) were written, reviewed, and finalized. After finalizing individual equipment designs, complete station designs were started including process flow diagrams and systems safety reviews. Material quotes were obtained, and in some cases, depending on the project status and the lead time, equipment was placed on order and fabrication began. Consideration was given for expected vehicle usage and station capacity, standard features needed, and the ability to upgrade the station at a later date. In parallel with work on the equipment, discussions were started with various vehicle manufacturers to identify vehicle demand (short- and long-term needs). Discussions included identifying potential areas most suited for hydrogen fueling

  17. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  18. Detecting security attacks with SIEM : SERCO project report

    NARCIS (Netherlands)

    Paassen R.J.G. van; Hut, D.H.; Boltjes, B.; Trichias, K.

    2012-01-01

    The ‘Critical ICT Infrastructures’ program managed by prof. dr. ir. Rob Kooij is a strategic research program that aims to improve the quality of ICT infrastructures. The red line for all projects within this program is quality and dependability for all information and communication technology. Espe

  19. Neighbor Attack And Detection Mechanism In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    S. Parthiban

    2012-04-01

    Full Text Available In Mobile Ad-Hoc Networks (MANETs, security is one of the most important concerns because a MANETs system is much more vulnerable to attacks than a wired or infrastructure-based wireless network. Designing an effective security protocol for MANET is a very challenging task. This is mainlydue to the unique characteristics of MANETs, namely shared broadcast radio channel, insecure operatingenvironment, lack of central authority, lack of association among users, limited availability of resources, and physical vulnerability. In this paper we present simulation based study of the impact of neighbor attack on mesh-based Mobile Ad-Hoc Network (MANET. And also we study the number of attackers and position affects the performance metrics such as packet delivery ratio and throughput. The study enables us to propose a secure neighbor detection mechanism (SNDM. A generic detection mechanism against neighbor attack for On Demand Routing Protocols is simulated on GlomoSim environment.

  20. Detection and Prevention of Gray Hole and Black Hole Attack in MANET

    Directory of Open Access Journals (Sweden)

    Deepali Raut

    2014-08-01

    Full Text Available An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of service, Routing table overflow, Impersonation, Energy consumption, Information disclosure etc. A black hole attack node attracts all packets by falsely claiming a fresh route to the destination node and absorbs them without forwarding them to destination. In this work the effect of Black hole and Gray Hole attack on DSR protocol has been considered. Simulation has been performed on the basis of performance parameters and effect has been analyzed using NS2 simulator. 

  1. A Model of Biological Attacks on a Realistic Population

    Science.gov (United States)

    Carley, Kathleen M.; Fridsma, Douglas; Casman, Elizabeth; Altman, Neal; Chen, Li-Chiou; Kaminsky, Boris; Nave, Demian; Yahja, Alex

    The capability to assess the impacts of large-scale biological attacks and the efficacy of containment policies is critical and requires knowledge-intensive reasoning about social response and disease transmission within a complex social system. There is a close linkage among social networks, transportation networks, disease spread, and early detection. Spatial dimensions related to public gathering places such as hospitals, nursing homes, and restaurants, can play a major role in epidemics [Klovdahl et. al. 2001]. Like natural epidemics, bioterrorist attacks unfold within spatially defined, complex social systems, and the societal and networked response can have profound effects on their outcome. This paper focuses on bioterrorist attacks, but the model has been applied to emergent and familiar diseases as well.

  2. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang

    2012-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to

  3. Generic attack approaches for industrial control systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  4. Hidden Attacks on Power Grid: Optimal Attack Strategies and Mitigation

    OpenAIRE

    Deka, Deepjyoti; Baldick, Ross; Vishwanath, Sriram

    2014-01-01

    Real time operation of the power grid and synchronism of its different elements require accurate estimation of its state variables. Errors in state estimation will lead to sub-optimal Optimal Power Flow (OPF) solutions and subsequent increase in the price of electricity in the market or, potentially overload and create line outages. This paper studies hidden data attacks on power systems by an adversary trying to manipulate state estimators. The adversary gains control of a few meters, and is...

  5. Regulation of gas infrastructure expansion

    International Nuclear Information System (INIS)

    The topic of this dissertation is the regulation of gas infrastructure expansion in the European Union (EU). While the gas market has been liberalised, the gas infrastructure has largely remained in the regulated domain. However, not necessarily all gas infrastructure facilities - such as gas storage facilities, LNG import terminals and certain gas transmission pipelines - need to be regulated, as there may be scope for competition. In practice, the choice of regulation of gas infrastructure expansion varies among different types of gas infrastructure facilities and across EU Member States. Based on a review of economic literature and on a series of in-depth case studies, this study explains these differences in choices of regulation from differences in policy objectives, differences in local circumstances and differences in the intrinsic characteristics of the infrastructure projects. An important conclusion is that there is potential for a larger role for competition in gas infrastructure expansion.

  6. Radiation protection infrastructure

    International Nuclear Information System (INIS)

    A prerequisite for the safe use of ionizing radiation in a country is the availability of an adequate infrastructure to achieve the desired degree of protection. The extent of such an infrastructure, generally comprising regulatory mechanisms and technical capabilities for application and enforcement of regulations, has to be commensurate with the stage of technological development. The expanding application of ionizing radiation in medicine, industry and research calls for vigorous promotion of effective radiation protection efforts, not only to prevent any unsafe practices but also to assess correctly and provide authoritative information on the safety of adopted practices. Experience reveals that radiation protection practices vary considerably from one country to another. The regulatory structures and type of organization with regard to radiation protection are very different, depending on a number of factors such as the constitutional framework, the legal and administrative systems of the country concerned, the state of technical development, the status of application of radiation sources, the existence of research and associated institutions, and the technical skills and financial resources available. Radiation protection principles evolve with time as further experience is gained and as new research evidence becomes available. Regulation of radiation protection has to take account of such changes and adapt to changing conditions. Forty-eight papers from 29 Member States and two International Organizations were presented in nine scientific sessions. Topics included radiation protection regulation and licensing notification, registration, inspection and control programmes, education and training, the role of supporting institutions such as national laboratories and research institutes, the role of professional associations, the contribution of radiation protection services, and international activities. A concluding panel addressed development strategies to

  7. Agile Infrastructure Monitoring

    Science.gov (United States)

    Andrade, P.; Ascenso, J.; Fedorko, I.; Fiorini, B.; Paladin, M.; Pigueiras, L.; Santos, M.

    2014-06-01

    At the present time, data centres are facing a massive rise in virtualisation and cloud computing. The Agile Infrastructure (AI) project is working to deliver new solutions to ease the management of CERN data centres. Part of the solution consists in a new "shared monitoring architecture" which collects and manages monitoring data from all data centre resources. In this article, we present the building blocks of this new monitoring architecture, the different open source technologies selected for each architecture layer, and how we are building a community around this common effort.

  8. Fractal actors and infrastructures

    DEFF Research Database (Denmark)

    Bøge, Ask Risom

    2011-01-01

    -network-theory (ANT) into surveillance studies (Ball 2002, Adey 2004, Gad & Lauritsen 2009). In this paper, I further explore the potential of this connection by experimenting with Marilyn Strathern’s concept of the fractal (1991), which has been discussed in newer ANT literature (Law 2002; Law 2004; Jensen 2007). I...... under surveillance. Based on fieldwork conducted in 2008 and 2011 in relation to my Master’s thesis and PhD respectively, I illustrate fractal concepts by describing the acts, actors and infrastructure that make up the ‘DNA surveillance’ conducted by the Danish police....

  9. LHCb Silicon Tracker infrastructure

    CERN Document Server

    Ermoline, Yuri

    2004-01-01

    The LHCb Silicon Tracker is a vital part of the experiment. It consists of four planar stations: one trigger and three inner tracking stations. The operation of the Silicon Tracker detectors and electronics is provided by its infrastructure: cooling system, high- and low-voltage power supply systems, temperature and radiation monitoring systems. Several components of these systems are located in the experimental hall and subjected to radiation. This paper mainly concentrates on the recent development: requirements definition, evaluation of possible implementation scenarios, component choice and component radiation tests.

  10. Agile infrastructure monitoring

    International Nuclear Information System (INIS)

    At the present time, data centres are facing a massive rise in virtualisation and cloud computing. The Agile Infrastructure (AI) project is working to deliver new solutions to ease the management of CERN data centres. Part of the solution consists in a new 'shared monitoring architecture' which collects and manages monitoring data from all data centre resources. In this article, we present the building blocks of this new monitoring architecture, the different open source technologies selected for each architecture layer, and how we are building a community around this common effort.

  11. Green Infrastructure, Groundwater and the Sustainable City

    Science.gov (United States)

    Band, L. E.

    2014-12-01

    The management of water is among the most important attributes of urbanization. Provision of sufficient quantities and quality of freshwater, treatment and disposal of wastewater and flood protection are critical for urban sustainability. Over the last century, two major shifts in water management paradigms have occurred, the first to improve public health with the provision of infrastructure for centralized sanitary effluent collection and treatment, and the rapid drainage and routing of stormwater. A current shift in paradigm is now occurring in response to the unintended consequences of sanitary and stormwater management, which have degraded downstream water bodies and shifted flood hazard downstream. Current infrastructure is being designed and implemented to retain, rather than rapidly drain, stormwater, with a focus on infiltration based methods. In urban areas, this amounts to a shift in hydrologic behavior to depression focused recharge. While stormwater is defined as surface flow resulting from developed areas, an integrated hydrologic systems approach to urban water management requires treatment of the full critical zone. In urban areas this extends from the top of the vegetation and building canopy, to a subsurface depth including natural soils, fill, saprolite and bedrock. In addition to matric and network flow in fracture systems, an urban "karst" includes multiple generations of current and past infrastructure, which has developed extensive subsurface pipe networks for supply and drainage, enhancing surface/groundwater flows and exchange. In this presentation, Band will discuss the need to focus on the urban critical zone, and the development and adaptation of new modeling and analytical approaches to understand and plan green infrastructure based on surface/groundwater/ecosystem interactions, and implications for the restoration and new design of cities.

  12. Prevention of Co-operative Black Hole attack in Manet on DSR protocol using Cryptographic Algorithm

    Directory of Open Access Journals (Sweden)

    G.Vennila

    2014-10-01

    Full Text Available The Mobile ad-hoc network (MANET is a collection of wireless mobile node in which each node can communicate with other node without use of predefined infrastructure. Currently, a lot of efficient protocols have been proposed for MANET. All of these efficient Routing protocols are depends only conviction and supportive environment. Conversely, the networks are more vulnerable to various kinds of routing attacks with the presence of malicious nodes. Black hole attack is one of network layer attack. In this attack, A malicious node make use of routing protocol to advertise itself that has a shortest path to reach destination, drops at the cost of original routing packets. In our work, the proposed algorithm is used to secure the DSR protocol. This will help to improve the performance of Mobile Ad hoc network due to the attack. There are several prevention mechanisms to eliminate the Black Hole attack in MANET. The aim of the paper is to provide better prevention of Co-operative Black hole attack in MANET and how it affects the performance metrics in terms of throughput and delay of the network by comparing the network performance with and without black hole nodes.

  13. An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack

    Directory of Open Access Journals (Sweden)

    ZUBAIR AHMED KHAN

    2016-07-01

    Full Text Available MANETs (Mobile Ad Hoc Networks are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time and RSSI (Received Signal Strength Indicator for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead.

  14. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  15. Nuclear hybrid energy infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Vivek; Tawfik, Magdy S.

    2015-02-01

    The nuclear hybrid energy concept is becoming a reality for the US energy infrastructure where combinations of the various potential energy sources (nuclear, wind, solar, biomass, and so on) are integrated in a hybrid energy system. This paper focuses on challenges facing a hybrid system with a Small Modular Reactor at its core. The core of the paper will discuss efforts required to develop supervisory control center that collects data, supports decision-making, and serves as an information hub for supervisory control center. Such a center will also be a model for integrating future technologies and controls. In addition, advanced operations research, thermal cycle analysis, energy conversion analysis, control engineering, and human factors engineering will be part of the supervisory control center. Nuclear hybrid energy infrastructure would allow operators to optimize the cost of energy production by providing appropriate means of integrating different energy sources. The data needs to be stored, processed, analyzed, trended, and projected at right time to right operator to integrate different energy sources.

  16. Diabetes Ups Risk of Heart Attack Death

    Science.gov (United States)

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  17. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    ... medlineplus.gov/ency/patientinstructions/000080.htm Diabetes - preventing heart attack and stroke To use the sharing features on ... with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure ...

  18. Heart attack - what to ask your doctor

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000231.htm Heart attack - what to ask your doctor To use the ... features on this page, please enable JavaScript. A heart attack occurs when blood flow to a part of ...

  19. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  20. DULOXETINE-RELATED PANIC ATTACKS

    OpenAIRE

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-01-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients’ trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who respon...