Summary
In this paper, we analyze the threat of digital sabotage, specifically Denial of Service (DoS) attacks, to critical infrastructures such as power plants, Intelligent Transportation Systems, airports, and similar. We compare the profile of critical infrastructure installations to known attacker profiles to establish which attackers are most likely to be a threat, thereby creating a more precise threat picture to help prioritize digital defence efforts in critical infrastructure. The main contribution of the paper is the identification of which hacker categories are most probably to attack critical infrastructures. Together with the profiles of the hacker categories this can be used for identifying appropriate countermeasures against potential attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Anonymous, @YourAnonNews (2012), https://twitter.com/youranonnews/status/171941104860672000
Antonatos, S., Akriditis, P., et al.: Defending against Hitlist Worms using Network Address Space Randomization. In: WORM 2005. ACM, USA (2005), 1-59593-229-1/05/0011
Capelli, D., Moore, A., et al.: Common Sense Guide to Prevention and Detection of Insider Threats, 3rd edn., Version 3.1. Software Engineering Institute, Carnegie Mellon University (2009)
Department of Homeland Security, National Cybersecurity and Communications Integration Center Bulletin: Assessment of Anonymous Threat to Control Systems, Department of Homeland Security, USA (2011)
Devost, M.G.: Current and Emerging Threats to Information Technology Systems and Critical Infra-structures. Global Business Briefing (2000)
Eronen, J., Karjalainen, K., et al.: Software Vulnerability vs. Critical Infrastructure - a Case Study of Antivirus Software. International Journal on Advances in Security 2(1) (2009) ISSN 1942-2636
Hald, S.L.N., Pedersen, J.M.: An Updated Taxonomy for Characterizing Hackers According to Their Threat Properties. In: 14th International Conference on Advanced Communication Technology (ICACT) 2012. IEEE (2012) ISBN 978-8955191639
Hunt, J.: Stuxnet, Security, and Taking Charge, Industrial Ethernet Book Issue 62/53, IEB Media GbR, Germany (2011) ISSN 1470-5745
Keeney, M., Cappelli, D., et al.: Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors. United States Secret Service and Carnegie Mellon Software Engineering Institute, USA (2005)
Lewis, J.A.: Cybersecurity and Critical Infrastructure Protection. Center for Strategic and International Studies, USA (2006)
Moteff, J.: Risk Management and Critical Infra-structure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences. Congressional Research Service, USA (2005)
Rogers, M.: A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation 3, 97–102 (2006)
Rollins, J., Wilson, C.: Terrorist Capabilities for Cyberattack: Overview and Policy Issues. Congressional Research Service, USA (2007)
Shea, D.A.: Critical Infrastructure: Control Systems and the Terrorist Threat. Congressional Research Service, USA (2004)
Shou-Chuan, L., Wen-Chu, K., et al.: Defending against Internet Worm-like Infestations. In: Proceedings of the 18th International Conference on Advanced Information Networking and Application (AINA 2004). IEEE (2004) ISSN 0-7695-2051-0/04
The Honeynet Project. Know Your Enemy: Learning about Security Threats, 2nd edn. The Honeynet Project, USA (2004) ISBN 978-0321166463
The White House. The National Strategy to Secure Cyberspace, p. 5. The White House, USA (2003)
Vatis, M.A.: Cyber Attacks During the War on Terrorism: A Predictive Analysis. Institute for Security, Dartmouth College (2001)
Wiley, B.: Curious Yellow: The First Coordinated Worm Design (2002), http://blanu.net/curious_yellow.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Norgaard Hald, S.L., Pedersen, J.M. (2014). The Threat of Digital Hacker Sabotage to Critical Infrastructures. In: S. Choras, R. (eds) Image Processing and Communications Challenges 5. Advances in Intelligent Systems and Computing, vol 233. Springer, Heidelberg. https://doi.org/10.1007/978-3-319-01622-1_43
Download citation
DOI: https://doi.org/10.1007/978-3-319-01622-1_43
Publisher Name: Springer, Heidelberg
Print ISBN: 978-3-319-01621-4
Online ISBN: 978-3-319-01622-1
eBook Packages: EngineeringEngineering (R0)