Abstract
We present an architecture capable to protect Critical Infrastructures from one of the most harmful categories of Denial of Service (DoS) attacks, commonly known in the literature as either “low-rate”, or “stealth” attacks. Stealth attacks do represent the last generation of network threats, since they minimize both cost and visibility, at the same time achieving an effectiveness which is comparable to that of common brute force attacks. The study is conducted by exploiting an actual deployment of an architecture for the effective protection of Critical infrastructures, designed and developed within the INSPIRE European Project.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kuzmanovic, A., Knightly, E.W.: Low-rate tcp-targeted denial of service attacks and counter strategies. IEEE/ACM Transactions on Networking 14(4), 683–696 (2006)
Avallone, S., Manetti, V., Mariano, M., Romano, S.P.: A splitting infrastructure for load balancing and security in an mpls network. In: Proceedings of TridentCom 2007, Orlando, FL, USA. IEEE (May 2007)
Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC) 3(4), 227–261 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Avallone, S., Mazzariello, C., Oliviero, F., Romano, S.P. (2013). Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds) Critical Information Infrastructure Security. CRITIS 2011. Lecture Notes in Computer Science, vol 6983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41476-3_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-41476-3_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41475-6
Online ISBN: 978-3-642-41476-3
eBook Packages: Computer ScienceComputer Science (R0)