Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures

@article{Aubert2010RiskBasedMF,
  title={Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures},
  author={Jocelyn Aubert and Thomas Schaberreiter and Christophe Incoul and Djamel Khadraoui and Benjamin G{\^a}teau},
  journal={2010 International Conference on Availability, Reliability and Security},
  year={2010},
  pages={262-267}
}
In today’s world, where most of the critical infrastructures (CI) are based on distributed systems, security failures have become very common, even within large corporations. The critical infrastructures are tightly interconnected, mutually dependent, and are exposed everyday to new risks.These (inter)dependencies generate potential cascading effects that may spread a malfunction or an attack from one part of the system to another dependent infrastructure.In this paper, we propose a risk-based… CONTINUE READING

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-7 of 7 extracted citations

An evolving risk management framework for wireless sensor networks

2011 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA) Proceedings • 2011
View 4 Excerpts
Highly Influenced

A proactive risk-aware robotic sensor network for Critical Infrastructure Protection

2013 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA) • 2013

A response-aware risk management framework for search-and-rescue operations

2012 IEEE Congress on Evolutionary Computation • 2012
View 1 Excerpt

An online shadowed clustering algorithm applied to risk visualization in Territorial Security

2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications • 2012
View 2 Excerpts

Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures

2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS) • 2011
View 2 Excerpts

Similar Papers

Loading similar papers…