Attack-defense game for critical infrastructure considering the cascade effect

2021 ◽  
Vol 216 ◽  
pp. 107958
Author(s):  
Fu Chaoqi ◽  
Gao Yangjun ◽  
Zhong Jilong ◽  
Sun Yun ◽  
Zhang Pengtao ◽  
...  
Author(s):  
Farid Kadri ◽  
Babiga Birregah ◽  
Eric Châtelet

AbstractRecent events show a significant increase in the number of disasters with natural and/or technological causes, which could have potentially serious consequences for critical infrastructures. Were these infrastructures to fail or be destroyed, the resulting cascade effect (chain of accidents) could lead to catastrophic damage and affect not only the plants, but also people, the environment and the economy. This rise in the number of disasters over the years is due to industrial and human activity as well as society’s sensitivity to major events (hazards). The construction of industrial complexes brings with it stocks of hazardous substances, increased transport infrastructure (road, railways, shipping and pipelines), a rise in population and its concentration, malicious behavior and human error. This paper presents a methodology for carrying out risk assessments on critical infrastructure through the analysis of cascade effects. The proposed methodology can be used to provide critical infrastructures with greater protection and to limit/mitigate the extent of the damage caused by their failure. The paper ends with a conclusion and as series of proposal for improving such an analysis.


2020 ◽  
Vol 2 (1) ◽  
pp. 35-42
Author(s):  
Hemalatha R ◽  
Rhesa M.J. ◽  
Revathi S

The hest for technological advancement in mobile communication is due to augmentation of wireless user. The deployment of 5G mobile communication is less than 4G mobile communication due to challenges in security like cyberwarfare, espionage, critical infrastructure threats. Nevertheless, critic of neurological discomforts, tissue damage in living organisms occur in the existence of EMF radiation. Also, physical scarcity for spectral efficiency arises due to ubiquitous data traffic. Inspite of these disputes data rate, low latency, device to device communication is also a challenge. In this paper we provide a survey on radiation effects, security threats, traffic management.


1999 ◽  
Author(s):  
Maximilian K. Bremer ◽  
Daniel Feliz ◽  
Troy Perry

2021 ◽  
Vol 11 (16) ◽  
pp. 7228
Author(s):  
Edward Staddon ◽  
Valeria Loscri ◽  
Nathalie Mitton

With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical Infrastructure applications. We believe this can be a guide to aid further researchers in their choice of adapted categorisation approaches. Indeed, adapting appropriated categorisation leads to a quicker attack detection, identification, and recovery. It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.


Sign in / Sign up

Export Citation Format

Share Document