Building India’s First Cyber-Security Test-Bed for CI

Author(s):  
Rohit Negi ◽  
Sandeep Kumar Shukla
2015 ◽  
Vol 737 ◽  
pp. 210-213
Author(s):  
Liang Chen ◽  
Xiao Jun Zuo ◽  
Yu Fei Wang

Analyzing the characters and abstracting the system model of the distribution automation system, information security test-bed of distribution automation is designed. Meanwhile, information security test and evaluation framework is proposed based on the lifecycle of distribution automation system. The evaluation activities and the testing methods are analyzed and key problems and solutions of information security evaluation and reinforcement requirements for distribution automation system are introduced. The work in this paper can effectively support the information security protection of distribution automation system, and can provide reference for other power industrial control systems.


2019 ◽  
Vol 2019 ◽  
pp. 1-8
Author(s):  
Mohammad Faisal ◽  
Sohail Abbas ◽  
Haseeb Ur Rahman ◽  
Muhammad Zahid Khan ◽  
Arif Ur Rahman

Latest technologies of voice over IP (VoIP) and mobile messaging for smartphones messengers such as WhatsApp, Viber, Skype, etc., offer free-of-charge facilities of worldwide SMS, MMS, and voice calls to their users, unlike the traditional and expensive cellular or telephone networks’ services. Customers of the formerly mentioned messengers are estimated in millions because of the attractive features offered by them. However, these messengers face many cyber security threats and the required security features are either not available at all or are insufficient for efficiently countering the threats. Professionals working in the domain of cyber security are challenged by the devastating effects of distributed denial of service (DDoS) attacks on all major platforms including Apple Macintosh, Windows, Unix, and Linux. In this paper, we demonstrate the effect of DDoS attack on the performance of an IRC server using a test bed. We use a game theoretic model to analyze the feasibility of DDoS attacks on the IRC platform, keeping in view the attacker’s objective. The analysis will help the security experts to propose appropriate countermeasures to reduce the attackers’ utility, thereby making it less attractive for those attackers to launch the attack.


2017 ◽  
Vol 68 (1) ◽  
pp. 54 ◽  
Author(s):  
Monica Ravishankar ◽  
D. Vijay Rao ◽  
C. R. S. Kumar

<p class="p1">National critical infrastructures are vital to the functioning of modern societies and economies. The dependence on these infrastructures is so succinct that their incapacitation or destruction has a debilitating and cascading effect on national security. Critical infrastructure sectors ranging from financial services to power and transportation to communications and health care, all depend on massive information communication technology networks. Cyberspace is composed of numerous interconnected computers, servers and databases that hold critical data and allow critical infrastructures to function. Securing critical data in a cyberspace that holds against growing and evolving cyber threats is an important focus area for most countries across the world. A novel approach is proposed to assess the vulnerabilities of own networks against adversarial attackers, where the adversary’s perception of strengths and vulnerabilities are modelled using game theoretic techniques. The proposed game theoretic framework models the uncertainties of information with the players (attackers and defenders) in terms of their information sets and their behaviour is modelled and assessed using a probability and belief function framework. The attack-defence scenarios are exercised on a virtual cyber warfare test-bed to assess and evaluate vulnerability of cyber systems. Optimal strategies for attack and defence are computed for the players which are validated using simulation experiments on the cyber war-games testbed, the results of which are used for security analyses.</p>


Sign in / Sign up

Export Citation Format

Share Document