Skip to main content

The Threat of Digital Hacker Sabotage to Critical Infrastructures

  • Conference paper
Image Processing and Communications Challenges 5

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 233))

Summary

In this paper, we analyze the threat of digital sabotage, specifically Denial of Service (DoS) attacks, to critical infrastructures such as power plants, Intelligent Transportation Systems, airports, and similar. We compare the profile of critical infrastructure installations to known attacker profiles to establish which attackers are most likely to be a threat, thereby creating a more precise threat picture to help prioritize digital defence efforts in critical infrastructure. The main contribution of the paper is the identification of which hacker categories are most probably to attack critical infrastructures. Together with the profiles of the hacker categories this can be used for identifying appropriate countermeasures against potential attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anonymous, @YourAnonNews (2012), https://twitter.com/youranonnews/status/171941104860672000

  2. Antonatos, S., Akriditis, P., et al.: Defending against Hitlist Worms using Network Address Space Randomization. In: WORM 2005. ACM, USA (2005), 1-59593-229-1/05/0011

    Google Scholar 

  3. Capelli, D., Moore, A., et al.: Common Sense Guide to Prevention and Detection of Insider Threats, 3rd edn., Version 3.1. Software Engineering Institute, Carnegie Mellon University (2009)

    Google Scholar 

  4. Department of Homeland Security, National Cybersecurity and Communications Integration Center Bulletin: Assessment of Anonymous Threat to Control Systems, Department of Homeland Security, USA (2011)

    Google Scholar 

  5. Devost, M.G.: Current and Emerging Threats to Information Technology Systems and Critical Infra-structures. Global Business Briefing (2000)

    Google Scholar 

  6. Eronen, J., Karjalainen, K., et al.: Software Vulnerability vs. Critical Infrastructure - a Case Study of Antivirus Software. International Journal on Advances in Security 2(1) (2009) ISSN 1942-2636

    Google Scholar 

  7. Hald, S.L.N., Pedersen, J.M.: An Updated Taxonomy for Characterizing Hackers According to Their Threat Properties. In: 14th International Conference on Advanced Communication Technology (ICACT) 2012. IEEE (2012) ISBN 978-8955191639

    Google Scholar 

  8. Hunt, J.: Stuxnet, Security, and Taking Charge, Industrial Ethernet Book Issue 62/53, IEB Media GbR, Germany (2011) ISSN 1470-5745

    Google Scholar 

  9. Keeney, M., Cappelli, D., et al.: Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors. United States Secret Service and Carnegie Mellon Software Engineering Institute, USA (2005)

    Google Scholar 

  10. Lewis, J.A.: Cybersecurity and Critical Infrastructure Protection. Center for Strategic and International Studies, USA (2006)

    Google Scholar 

  11. Moteff, J.: Risk Management and Critical Infra-structure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences. Congressional Research Service, USA (2005)

    Google Scholar 

  12. Rogers, M.: A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation 3, 97–102 (2006)

    Article  Google Scholar 

  13. Rollins, J., Wilson, C.: Terrorist Capabilities for Cyberattack: Overview and Policy Issues. Congressional Research Service, USA (2007)

    Google Scholar 

  14. Shea, D.A.: Critical Infrastructure: Control Systems and the Terrorist Threat. Congressional Research Service, USA (2004)

    Google Scholar 

  15. Shou-Chuan, L., Wen-Chu, K., et al.: Defending against Internet Worm-like Infestations. In: Proceedings of the 18th International Conference on Advanced Information Networking and Application (AINA 2004). IEEE (2004) ISSN 0-7695-2051-0/04

    Google Scholar 

  16. The Honeynet Project. Know Your Enemy: Learning about Security Threats, 2nd edn. The Honeynet Project, USA (2004) ISBN 978-0321166463

    Google Scholar 

  17. The White House. The National Strategy to Secure Cyberspace, p. 5. The White House, USA (2003)

    Google Scholar 

  18. Vatis, M.A.: Cyber Attacks During the War on Terrorism: A Predictive Analysis. Institute for Security, Dartmouth College (2001)

    Google Scholar 

  19. Wiley, B.: Curious Yellow: The First Coordinated Worm Design (2002), http://blanu.net/curious_yellow.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sara Ligaard Norgaard Hald .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Norgaard Hald, S.L., Pedersen, J.M. (2014). The Threat of Digital Hacker Sabotage to Critical Infrastructures. In: S. Choras, R. (eds) Image Processing and Communications Challenges 5. Advances in Intelligent Systems and Computing, vol 233. Springer, Heidelberg. https://doi.org/10.1007/978-3-319-01622-1_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01622-1_43

  • Publisher Name: Springer, Heidelberg

  • Print ISBN: 978-3-319-01621-4

  • Online ISBN: 978-3-319-01622-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics