Skip to main content

Advanced Tools to assEss and mitigate the criticality of ICT compoNents and their dependencies over Critical InfrAstructures

Livrables

Requirements and reference architecture of the cyber-physical IDS (interim version)

Requirements and reference architecture of the cyber-physical IDS (interim version)

Taxonomies

Taxonomies

Impact assessment intermediate report

Impact assessment intermediate report

Design of the Distributed IDS for IACS (interim version)

Design of the Distributed IDS for IACS (interim version)

Innovation & IPR Plan

Innovation & IPR Plan

Requirements and reference architecture of the cyber-physical IDS (final version)

Requirements and reference architecture of the cyber-physical IDS (final version)

Exploitation management (report & post-project plan) and business model final report

Exploitation management (report & post-project plan) and business model final report

Final Report on the Distribution of the Community’s Contribution

Final Report on the Distribution of the Community’s Contribution

Final Activity Report

Final Activity Report

First Periodic Management Report

First Periodic Management Report

Integration Report (1st release)

Integration Report (1st release)

Integration Report (2nd release)

Integration Report (2nd release)

Integration Plan

Integration Plan

Impact assessment methodology and criteria

Impact assessment methodology and criteria

Design and development Plan

Design and development Plan

Societal Impact Interim Report

Societal Impact Interim Report

Final ATENA prototype validation and evaluation of validation results (Final report)

Final ATENA prototype validation and evaluation of validation results (Final report)

Impact assessment preliminary report

Impact assessment preliminary report

Design and development report of the 2nd release of components

Design and development report of the 2nd release of components

Requirements and reference architecture of DSS (final report)

Requirements and reference architecture of DSS (final report)

Patentability Report

Patentability Report

Design of the Distributed IDS for IACS (final version)

Design of the Distributed IDS for IACS (final version)

Exploitation management (report & re-viewed plan) and business model interim report

Exploitation management (report & re-viewed plan) and business model interim report

Validation system implementation and aggregation (Interim report)

Validation system implementation and aggregation (Interim report)

Impact assessment final report

Impact assessment final report

Validation Plan

Validation Plan

Training, dissemination and communication (final report)

Training, dissemination and communication (final report)

Societal Impact Final Report

Societal Impact Final Report

IACS-oriented security components

IACS-oriented security components

Exploitation plan

Exploitation plan

First Report on the Distribution of the Community’s Contribution

First Report on the Distribution of the Community’s Contribution

State of the art

State of the art

Second Periodic Activity Report

Second Periodic Activity Report

Standardization Final report

Standardization Final report

Requirements and reference architecture of DSS (interim report)

Requirements and reference architecture of DSS (interim report)

Second Periodic Report on the Distribution of the Community’s Contribution

Second Periodic Report on the Distribution of the Community’s Contribution

Design and development report of the 1st release of components

Design and development report of the 1st release of components

Standardization interim report

Standardization interim report

First Periodic Activity Report

First Periodic Activity Report

Security Defined Software (interim report)

Security Defined Software (interim report)

Final Management Report

Final Management Report

Second Periodic Management Report

Second Periodic Management Report

Quality Plan

Quality Plan

Security Defined Software (final report)

Security Defined Software (final report)

Training, dissemination and communication (interim report)

Training, dissemination and communication (interim report)

Training, dissemination and communication plan & Project Web Site

Training, dissemination and communication plan & Project Web Site

Training, dissemination and communication (final DEC)

Training, dissemination and communication (final DEC)

Training, dissemination and communication (interim DEC)

Training, dissemination and communication (interim DEC)

Final ATENA prototype validation and evaluation of validation results (Final DEM)

Final ATENA prototype validation and evaluation of validation results (Final DEM)

Validation system implementation and aggregation (Interim DEM)

Validation system implementation and aggregation (Interim DEM)

Integrated tool suite (1st release)

Integrated tool suite (1st release)

Integrated tool suite (2st release)

Integrated tool suite (2st release)

Recherche de données OpenAIRE...

Publications

Network composition for optimal disturbance rejection

Auteurs: Riccardo Santini, Andrea Gasparri, Fabio Pasqualetti, Stefano Panzieri
Publié dans: 2016 American Control Conference (ACC), Issue 2016, 2016, Page(s) 3764-3769
DOI: 10.1109/ACC.2016.7525499

Improved Multi-Criteria Distribution Network Reconfiguration with Information Fusion

Auteurs: Dario Masucci, Chiara Foglietta, Cosimo Palazzo, Stefano Panzieri
Publié dans: 19th International Conference on Information Fusion (FUSION 2016), Issue 2016, 2016, Page(s) 256-263
DOI: 10.5281/zenodo.2649901

Smart Behavioural Filter for SCADA Network

Auteurs: Giovanni Corbò, Chiara Foglietta, Cosimo Palazzo, Stefano Panzieri
Publié dans: Industrial Networks and Intelligent Systems. INISCOM 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 188, Issue Volume 188, 2017, Page(s) 101-110
DOI: 10.1007/978-3-319-52569-3_9

Security implications of SCADA ICS virtualization: survey and future trends

Auteurs: Cruz, Tiago and Queiroz, Rui and Simoes, Paulo and Monteiro, Edmundo
Publié dans: Proceedings of the 15th European Conference on Cyber Warfare and Security (Eccws 2016), 2016, Page(s) 74-83
DOI: 10.13140/RG.2.1.1064.2167

Attacking SCADA systems: A practical perspective

Auteurs: Luis Rosa, Tiago Cruz, Paulo Simoes, Edmundo Monteiro, Leonid Lev
Publié dans: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017, Page(s) 741-746
DOI: 10.23919/INM.2017.7987369

Active distribution grids: A MatLab-Simulink tool for energy performance analysis

Auteurs: E. Ciancamerla, M. Minichino, M.C. Falvo, L. Martirano
Publié dans: 2016 AEIT International Annual Conference (AEIT), 2016, Page(s) 1-5
DOI: 10.23919/AEIT.2016.7892749

Building an NFV-based vRGW: Lessons learned

Auteurs: Jorge Proenca, Tiago Cruz, Paulo Simoes, Goncalo Gaspar, Bruno Parreira, Alexandre Laranjeira, Fernando Bastos
Publié dans: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2017, Page(s) 653-658
DOI: 10.1109/CCNC.2017.7983208

On the optimization of energy storage system placement for protecting power transmission grids against dynamic load altering attacks

Auteurs: Alessandro Di Giorgio, Alessandro Giuseppi, Francesco Liberati, Antonio Ornatelli, Antonio Rabezzano, Lorenzo Ricciardi Celsi
Publié dans: 2017 25th Mediterranean Conference on Control and Automation (MED), 2017, Page(s) 986-992
DOI: 10.1109/MED.2017.7984247

Cyber attacks on SCADA of critical infrastructures by an hybrid testbed

Auteurs: E. Ciancamerla, B. Fresilli, M. Minichino, T. Patriarca
Publié dans: 6th International Defense and Homeland Security Simulation Workshop, DHSS, Larnaca, Cyprus 26-28 September 201, 2016, Page(s) 15-24

Controlled electricity distribution network black start with energy storage system support

Auteurs: Alessandro Di Giorgio, Alessandro Giuseppi, Francesco Liberati, Antonio Pietrabissa
Publié dans: 2017 25th Mediterranean Conference on Control and Automation (MED), 2017, Page(s) 781-786
DOI: 10.1109/MED.2017.7984213

Security for mobile device assets: a survey

Auteurs: Lima, A. and Tiago Cruz and Sousa, B. and Simões P.
Publié dans: Proceedings of the 12th International Conference on Cyber Warfare and Security (ICCWS 2017), 2017, Page(s) 227-236

Dynamic Risk Analyses Based on a Risk Taxonomy for Critical Infrastructures

Auteurs: Steve Muller, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin, Paul Hoffmann
Publié dans: Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science, Issue vol. 10242, 2017, Page(s) 163-175
DOI: 10.1007/978-3-319-71368-7_14

An evolved security architecture for distributed Industrial Automation and Control Systems

Auteurs: Rosa, L. and Proença, J.D.G. and Henriques, J.P. and Graveto, V. and Tiago Cruz and Simões, P. and Caldeira, F. and Monteiro, E.
Publié dans: Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS 2017), 2017, Page(s) 380-390

Machine Learning for Reliable Network Attack Detection in SCADA Systems

Auteurs: Lopez Perez, Rocio; Adamsky, Florian; Soua, Ridha; Engel, Thomas
Publié dans: Proceedings The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18). (2018)., Issue 2018 IEEE Trustcom/BigDataSE, 2018, Page(s) 633-638

A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning

Auteurs: Martina Panfili, Alessandro Giuseppi, Andrea Fiaschetti, Homoud B. Al-Jibreen, Antonio Pietrabissa, Franchisco Delli Priscoli
Publié dans: 2018 26th Mediterranean Conference on Control and Automation (MED), 2018, Page(s) 460-465
DOI: 10.1109/MED.2018.8442695

Distributed Wardrop Load Balancing in Multi-MTU SCADA Systems

Auteurs: Vincenzo Suraci, Lorenzo Ricciardi Celsi, Alessandro Giuseppi, Gioacchino Manfredi, Alessandro Di Giorgio
Publié dans: 2018 26th Mediterranean Conference on Control and Automation (MED), 2018, Page(s) 1-9
DOI: 10.1109/med.2018.8442485

Risk Adverse Virtual Power Plant Control in Unsecure Power Systems

Auteurs: Alessandro Giuseppi, Roberto Germana, Alessandro Di Giorgio
Publié dans: 2018 26th Mediterranean Conference on Control and Automation (MED), 2018, Page(s) 1-9
DOI: 10.1109/med.2018.8442768

Machine Learning for Reliable Network Attack Detection in SCADA Systems

Auteurs: Rocio Lopez Perez, Florian Adamsky, Ridha Soua, Thomas Engel
Publié dans: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, Page(s) 633-638
DOI: 10.1109/trustcom/bigdatase.2018.00094

Forget the Myth of the Air Gap: Machine Learningfor Reliable Intrusion Detection in SCADA Systems

Auteurs: Lopez Perez, Rocio; Adamsky, Florian; Soua, Ridha; Engel, Thomas
Publié dans: EAI Endorsed Transactions on Security and Safety. European Alliance for Innovation (EAI) (2019)., Issue 1, 2019
DOI: 10.4108/eai.25-1-2019.159348

Detecting Integrity Attacks in IoT-based Cyber Physical Systems: a Case Study on Hydra Testbed

Auteurs: Federica Battisti, Giuseppe Bernieri, Marco Carli, Michela Lopardo, Federica Pascucci
Publié dans: 2018 Global Internet of Things Summit (GIoTS), 2018, Page(s) 1-6
DOI: 10.1109/giots.2018.8534437

Modeling and simulation of Critical Infrastructures Interdependencies for risk mitigation

Auteurs: Iassinovski, Serguei; Minichino, Michele; Ciancamerla, Ester
Publié dans: Congress on Intelligent Systems and Information Technologies (IS&IT'17), Issue 1, 2019
DOI: 10.5281/zenodo.3067463

Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection

Auteurs: Rinaldi, Giulia; Adamsky, Florian; Soua, Ridha; Baiocchi, Andrea; Engel, Thomas
Publié dans: 10th International Conference on Networks of the Future (NoF). (2019)., Issue 5, 2019

Heterogeneous and distributed simulation models for Critical Infrastructures Interdependencies analysis and risk mitigation

Auteurs: Iassinovski, Serguei; Ciancamerla, Ester; Fresilli, Benedetto; Lavalle, Luisa; Patriarca, Tatiana; Tofani, Alberto
Publié dans: Congress on Intelligent Systems and Information Technologies (IS&IT'18), Issue 1, 2019
DOI: 10.5281/zenodo.3055109

Exploiting System Model for Securing CPS: the Anomaly Based IDS Perspective

Auteurs: Riccardo Colelli, Stefano Panzieri, Federica Pascucci
Publié dans: 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), 2018, Page(s) 1171-1174
DOI: 10.1109/ETFA.2018.8502495

Securing Cyber-Physical Systems: An Optimization Framework based on OSSTMM and Genetic Algorithms

Auteurs: Alessandro Giuseppi, Andrea Tortorelli, Roberto Germana, Francesco Liberati, Andrea Fiaschetti
Publié dans: 2019 27th Mediterranean Conference on Control and Automation (MED), 2019, Page(s) 50-56
DOI: 10.1109/MED.2019.8798506

A Framework for Improved Home Network Security (pre-print)

Auteurs: A. Craveiro, A. Oliveira, J. Proença, T. Cruz, P. Simões
Publié dans: 18th European Conference on Cyber Warfare and Security (ECCWS 2019), 2019

Leveraging virtualization techniques for improving SCADA ICS Security and Reliability

Auteurs: T Cruz, R Queiroz, J Proença, P Simões, E Monteiro
Publié dans: Journal of Information Warfare, Issue Volume 15, Issue 3, 2016, Page(s) 81-100, ISSN 1445-3312

Towards energy efficiency of interdependent urban networks

Auteurs: Giuseppe Alonge, Ester Ciancamerla, Alberto Mastrilli, Michele Minichino, Angelo Nicotra, Marco Ranno, Maurizio Reali, Pasquale Regina
Publié dans: International Journal of Simulation and Process Modelling, Issue 11/6, 2016, Page(s) 529, ISSN 1740-2123
DOI: 10.1504/ijspm.2016.082923

Virtualizing Programmable Logic Controllers: Toward a Convergent Approach

Auteurs: Tiago Cruz, Paulo Simoes, Edmundo Monteiro
Publié dans: IEEE Embedded Systems Letters, Issue 8/4, 2016, Page(s) 69-72, ISSN 1943-0663
DOI: 10.1109/les.2016.2608418

Robust protection scheme against cyber-physical attacks in power systems

Auteurs: Alessandro Di Giorgio, Antonio Pietrabissa, Francesco DelliPriscoli, Alberto Isidori
Publié dans: IET Control Theory & Applications, Issue 12/13, 2018, Page(s) 1792-1801, ISSN 1751-8644
DOI: 10.1049/iet-cta.2017.0725

Integrated protection of industrial control systems from cyber-attacks: the ATENA approach

Auteurs: F. Adamsky, M. Aubigny, F. Battisti, M. Carli, F. Cimorelli, T. Cruz, A. Di Giorgio, C. Foglietta, A. Galli, A. Giuseppi, F. Liberati, A. Neri, S. Panzieri, F. Pascucci, J. Proenca, P. Pucci, L. Rosa, R. Soua
Publié dans: International Journal of Critical Infrastructure Protection, Issue 21, 2018, Page(s) 72-82, ISSN 1874-5482
DOI: 10.1016/j.ijcip.2018.04.004

Economic Model Predictive and Feedback Control of a Smart Grid Prosumer Node

Auteurs: Francesco Liberati, Alessandro Di Giorgio
Publié dans: Energies, Issue 11/1, 2018, Page(s) 48, ISSN 1996-1073
DOI: 10.3390/en11010048

A Comprehensive Security Analysis of a SCADA Protocol: From OSINT to Mitigation

Auteurs: Luis Rosa, Miguel Freitas, Sergey Mazo, Edmundo Monteiro, Tiago Cruz, Paulo Simoes
Publié dans: IEEE Access, Issue 7, 2019, Page(s) 42156-42168, ISSN 2169-3536
DOI: 10.1109/access.2019.2906926

From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment

Auteurs: Chiara Foglietta, Dario Masucci, Cosimo Palazzo, Riccardo Santini, Stefano Panzieri, Luis Rosa, Tiago Cruz, Leonid Lev
Publié dans: IEEE Systems Journal, Issue 13/1, 2019, Page(s) 424-435, ISSN 1932-8184
DOI: 10.1109/JSYST.2018.2824252

A stealth monitoring mechanism for cyber-physical systems

Auteurs: Vitor Graveto, Luís Rosa, Tiago Cruz, Paulo Simões
Publié dans: International Journal of Critical Infrastructure Protection, Issue 24, 2019, Page(s) 126-143, ISSN 1874-5482
DOI: 10.1016/j.ijcip.2018.10.006

Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence

Auteurs: Konstantia Barmpatsalou, Tiago Cruz, Edmundo Monteiro, Paulo Simoes
Publié dans: IEEE Access, Issue 6, 2018, Page(s) 59705-59727, ISSN 2169-3536
DOI: 10.1109/access.2018.2875068

Smart Behavioural Filter for Industrial Internet of Things

Auteurs: Giovanni Corbò, Chiara Foglietta, Cosimo Palazzo, Stefano Panzieri
Publié dans: Mobile Networks and Applications, Issue 23/4, 2018, Page(s) 809-816, ISSN 1383-469X
DOI: 10.1007/s11036-017-0882-1

On the Use of Ontology Data for Protecting Critical Infrastructures (pre-print)

Auteurs: Henriques, J.P., Caldeira F., Cruz, T., and Simões, P.
Publié dans: Journal of Information Warfare, Issue "Vol. 17, #4", 2019, Page(s) 38-55, ISSN 1445-3312

SDN-Enabled Virtual Data Diode

Auteurs: Miguel Borges de Freitas, Luis Rosa, Tiago Cruz, Paulo Simões
Publié dans: Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers, Issue 11387, 2019, Page(s) 102-118
DOI: 10.1007/978-3-030-12786-2_7

Denial of Service Attacks: Detecting the Frailties of Machine Learning Algorithms in the Classification Process

Auteurs: Ivo Frazão, Pedro Henriques Abreu, Tiago Cruz, Hélder Araújo, Paulo Simões
Publié dans: Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers, Issue 11260, 2019, Page(s) 230-235
DOI: 10.1007/978-3-030-05849-4_19

Network Softwarization for IACS Security Applications

Auteurs: Freitas, Miguel Rosado Borges de
Publié dans: Issue 1, 2018

Cyber-security Modbus ICS Dataset

Auteurs: I. Frazão, P. Abreu, T. Cruz, H Araújo, P. Simões
Publié dans: 2019
DOI: 10.21227/pjff-1a03