Abstract
We consider the problem of defining a metric to capture communication links vulnerability that is a function of threat models of concern. The model is based on the Confidentiality-Integrity-Availability (C-I-A) framework and combines communication links parametric models with dynamical historical models. The proposed model arrives at a vulnerability matrix to describe the cyber component of a cyber-physical system. The vulnerability matrix is used for flexible adaptive constrained routing implemented on Software Defined Networks (SDNs) as a mitigation approach for threats of concern.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hammad, E., Zhao, J., Farraj, A., Kundur, D.: Mitigating link insecurities in smart grids via QoS multi-constraint routing. In: IEEE ICC Workshops: Workshop on Integrating Communications, Control, and Computing Technologies for Smart Grid (ICT4SG) (2016)
Hohlbaum, F., Braendle, M., Alvarez, F.: Cyber security practical considerations for implementing iec 62351, ABB Technical Report (2010)
International Federation of Red Cross and Red Crescent Societies: What is vulnerability (2016). http://www.ifrc.org/en/what-we-do/disaster-management/about-disasters/what-is-a-disaster/what-is-vulnerability/. Accessed 14 June 2016
Jüttner, A., Szviatovski, B., Mécs, I., Rajkó, Z.: Lagrange relaxation based method for the QoS routing problem. In: Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol. 2, pp. 859–868 (2001)
Ku, I., Lu, Y., Gerla, M., Gomes, R.L., Ongaro, F., Cerqueira, E.: Towards software-defined vanet: architecture and services. In: 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET), pp. 103–110. IEEE (2014)
Kuipers, F., Van Mieghem, P., Korkmaz, T., Krunz, M.: An overview of constraint-based path selection algorithms for QoS routing. IEEE Commun. Mag. 40(12), 50–55 (2002)
Liotta, A., Geelen, D., van Kempen, G., van Hoogstraten, F.: A survey on networks for smart-metering systems. Int. J. Pervasive Comput. Commun. 8(1), 23–52 (2012)
Mendonca, M., Obraczka, K., Turletti, T.: The case for software-defined networking in heterogeneous networked environments. In: Proceedings of the 2012 ACM Conference on CoNEXT Student Workshop, pp. 59–60. ACM (2012)
Mininet: Mininet (2015). http://mininet.org/. Accessed 9 June 2015
Nunes, B., Mendonca, M., Nguyen, X.-N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun. Surv. Tutorials 16(3), 1617–1634 (2014)
Open Networking Foundation: Software-defined networking: the new norm for networks. ONF White Paper (2012)
Project Floodlight: Project Floodlight (2015). http://www.projectfloodlight.org/floodlight/. Accessed 9 June 2015
Stamp, J., Campbell, P., DePoy, J., Dillinger, J., Young, W.: Sustainable Security for Infrastructure Scada. Sandia National Laboratories, Albuquerque (2003). www.sandia.gov/scada/documents/SustainableSecurity.pdf
Wang, A.J.A.: Information security models and metrics. In: Proceedings of the 43rd Annual Southeast Regional Conference, vol. 2, pp. 178–184. ACM (2005)
White, G.B.: The community cyber security maturity model. In: 2011 IEEE International Conference on Technologies for Homeland Security (HST), pp. 173–178. IEEE (2011)
Xiao, Y., Thulasiraman, K., Xue, G., Jüttner, A.: The constrained shortest path problem: algorithmic approaches and an algebraic study with generalization. AKCE Int. J. Graphs Comb. 2(2), 63–86 (2005)
Zhao, J., Hammad, E., Farraj, A., Kundur, D.: Network-aware QoS routing for smart grids using software defined networks. In: Leon-Garcia, A., et al. (eds.) Smart City 360, pp. 384–394. Springer, Heidelberg (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Hammad, E., Farraj, A., Kundur, D. (2017). Communication Links Vulnerability Model for Cyber Security Mitigation. In: Zhou, Y., Kunz, T. (eds) Ad Hoc Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 184. Springer, Cham. https://doi.org/10.1007/978-3-319-51204-4_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-51204-4_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51203-7
Online ISBN: 978-3-319-51204-4
eBook Packages: Computer ScienceComputer Science (R0)