In this paper we present the approach we have taken in the INSPIRE (INcreasing Security and Protection through Infrastructure REsilience) project to increase the protection of Critical Infrastructures (CIs). The core idea of the INSPIRE project is to protect Critical Infrastructures by making the underlying communication network more secure and resilient. In order to do so, we devised a routing mechanism that allows the communication infrastructure interconnecting SCADA (Supervisory Control And Data Acquisition) systems, the key building blocks of CIs, to be resilient to both node failures and attacks. The approach is to split the packets of a SCADA traffic flow on two node-disjoint paths by exploiting the capabilities of the Multi-Protocol Label Switching communication paradigm. The security of the SCADA traffic is improved since the proposed approach allows for a fast re-route of the flows traversing a node under attack, thus preserving the confidentiality of the transmitted information.

Use of traffic engineering techniques to increase resilience of SCADA networks

D'ANTONIO, Salvatore;
2010-01-01

Abstract

In this paper we present the approach we have taken in the INSPIRE (INcreasing Security and Protection through Infrastructure REsilience) project to increase the protection of Critical Infrastructures (CIs). The core idea of the INSPIRE project is to protect Critical Infrastructures by making the underlying communication network more secure and resilient. In order to do so, we devised a routing mechanism that allows the communication infrastructure interconnecting SCADA (Supervisory Control And Data Acquisition) systems, the key building blocks of CIs, to be resilient to both node failures and attacks. The approach is to split the packets of a SCADA traffic flow on two node-disjoint paths by exploiting the capabilities of the Multi-Protocol Label Switching communication paradigm. The security of the SCADA traffic is improved since the proposed approach allows for a fast re-route of the flows traversing a node under attack, thus preserving the confidentiality of the transmitted information.
2010
978-1-4244-8080-7
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11367/21075
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? ND
social impact