Skip to main content

Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation

(Short Paper)

  • Conference paper
Critical Information Infrastructure Security (CRITIS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6983))

Abstract

We present an architecture capable to protect Critical Infrastructures from one of the most harmful categories of Denial of Service (DoS) attacks, commonly known in the literature as either “low-rate”, or “stealth” attacks. Stealth attacks do represent the last generation of network threats, since they minimize both cost and visibility, at the same time achieving an effectiveness which is comparable to that of common brute force attacks. The study is conducted by exploiting an actual deployment of an architecture for the effective protection of Critical infrastructures, designed and developed within the INSPIRE European Project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kuzmanovic, A., Knightly, E.W.: Low-rate tcp-targeted denial of service attacks and counter strategies. IEEE/ACM Transactions on Networking 14(4), 683–696 (2006)

    Article  Google Scholar 

  2. Avallone, S., Manetti, V., Mariano, M., Romano, S.P.: A splitting infrastructure for load balancing and security in an mpls network. In: Proceedings of TridentCom 2007, Orlando, FL, USA. IEEE (May 2007)

    Google Scholar 

  3. Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC) 3(4), 227–261 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Avallone, S., Mazzariello, C., Oliviero, F., Romano, S.P. (2013). Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds) Critical Information Infrastructure Security. CRITIS 2011. Lecture Notes in Computer Science, vol 6983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41476-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41476-3_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41475-6

  • Online ISBN: 978-3-642-41476-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics