Skip to main content

Communication Links Vulnerability Model for Cyber Security Mitigation

  • Conference paper
  • First Online:
Ad Hoc Networks

Abstract

We consider the problem of defining a metric to capture communication links vulnerability that is a function of threat models of concern. The model is based on the Confidentiality-Integrity-Availability (C-I-A) framework and combines communication links parametric models with dynamical historical models. The proposed model arrives at a vulnerability matrix to describe the cyber component of a cyber-physical system. The vulnerability matrix is used for flexible adaptive constrained routing implemented on Software Defined Networks (SDNs) as a mitigation approach for threats of concern.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hammad, E., Zhao, J., Farraj, A., Kundur, D.: Mitigating link insecurities in smart grids via QoS multi-constraint routing. In: IEEE ICC Workshops: Workshop on Integrating Communications, Control, and Computing Technologies for Smart Grid (ICT4SG) (2016)

    Google Scholar 

  2. Hohlbaum, F., Braendle, M., Alvarez, F.: Cyber security practical considerations for implementing iec 62351, ABB Technical Report (2010)

    Google Scholar 

  3. International Federation of Red Cross and Red Crescent Societies: What is vulnerability (2016). http://www.ifrc.org/en/what-we-do/disaster-management/about-disasters/what-is-a-disaster/what-is-vulnerability/. Accessed 14 June 2016

  4. Jüttner, A., Szviatovski, B., Mécs, I., Rajkó, Z.: Lagrange relaxation based method for the QoS routing problem. In: Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol. 2, pp. 859–868 (2001)

    Google Scholar 

  5. Ku, I., Lu, Y., Gerla, M., Gomes, R.L., Ongaro, F., Cerqueira, E.: Towards software-defined vanet: architecture and services. In: 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET), pp. 103–110. IEEE (2014)

    Google Scholar 

  6. Kuipers, F., Van Mieghem, P., Korkmaz, T., Krunz, M.: An overview of constraint-based path selection algorithms for QoS routing. IEEE Commun. Mag. 40(12), 50–55 (2002)

    Article  Google Scholar 

  7. Liotta, A., Geelen, D., van Kempen, G., van Hoogstraten, F.: A survey on networks for smart-metering systems. Int. J. Pervasive Comput. Commun. 8(1), 23–52 (2012)

    Article  Google Scholar 

  8. Mendonca, M., Obraczka, K., Turletti, T.: The case for software-defined networking in heterogeneous networked environments. In: Proceedings of the 2012 ACM Conference on CoNEXT Student Workshop, pp. 59–60. ACM (2012)

    Google Scholar 

  9. Mininet: Mininet (2015). http://mininet.org/. Accessed 9 June 2015

  10. Nunes, B., Mendonca, M., Nguyen, X.-N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun. Surv. Tutorials 16(3), 1617–1634 (2014)

    Article  Google Scholar 

  11. Open Networking Foundation: Software-defined networking: the new norm for networks. ONF White Paper (2012)

    Google Scholar 

  12. Project Floodlight: Project Floodlight (2015). http://www.projectfloodlight.org/floodlight/. Accessed 9 June 2015

  13. Stamp, J., Campbell, P., DePoy, J., Dillinger, J., Young, W.: Sustainable Security for Infrastructure Scada. Sandia National Laboratories, Albuquerque (2003). www.sandia.gov/scada/documents/SustainableSecurity.pdf

  14. Wang, A.J.A.: Information security models and metrics. In: Proceedings of the 43rd Annual Southeast Regional Conference, vol. 2, pp. 178–184. ACM (2005)

    Google Scholar 

  15. White, G.B.: The community cyber security maturity model. In: 2011 IEEE International Conference on Technologies for Homeland Security (HST), pp. 173–178. IEEE (2011)

    Google Scholar 

  16. Xiao, Y., Thulasiraman, K., Xue, G., Jüttner, A.: The constrained shortest path problem: algorithmic approaches and an algebraic study with generalization. AKCE Int. J. Graphs Comb. 2(2), 63–86 (2005)

    MathSciNet  MATH  Google Scholar 

  17. Zhao, J., Hammad, E., Farraj, A., Kundur, D.: Network-aware QoS routing for smart grids using software defined networks. In: Leon-Garcia, A., et al. (eds.) Smart City 360, pp. 384–394. Springer, Heidelberg (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eman Hammad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Hammad, E., Farraj, A., Kundur, D. (2017). Communication Links Vulnerability Model for Cyber Security Mitigation. In: Zhou, Y., Kunz, T. (eds) Ad Hoc Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 184. Springer, Cham. https://doi.org/10.1007/978-3-319-51204-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51204-4_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51203-7

  • Online ISBN: 978-3-319-51204-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics