The research in the system field of Developing innovative cybersecurity techniques for the protection of critical infrastructures covers the methodologies for the protection of critical infrastructures that must pursue various objectives in three main phases: Prevention, Detection, and Reaction. In particular, this thesis describes the study, design and implementation of solutions for the Detection and Reaction phases of Critical Infrastructure Protection with a special focus on Mitigation and Incident Management methodologies of reaction. Nowadays, the protection of a critical infrastructure must cover both the physical and the cyber realm. We will propose novel solutions on the latter, while taking into account the necessary iterations between both. After giving an introduction and definition of critical infrastructure, the research is introduced by a critical analysis of the state-of-the-art and proposes new models for the integration of existing technologies under those conditions resulting from the intrinsically distributed and heterogeneous nature of most critical infrastructures. The tools initially described as a reference will be the basis used to bring the reasoning towards the experimental context and then to the innovations proposed in the detection, prevention and reaction phases. Subsequently, the Detection issues are presented through anomaly detection solutions applied to an Intrusion Detection Systems (IDS) supported by a novel system network architecture. This architecture is based on the paradigm of Software Defined Network (SDN) and was experimented in a real ground base station critical infrastructure. During the practical experimentation and the implementation of the prototypes, limitations and trade-offs related to the application of cybersecurity technologies in critical infrastructures have been highlighted. Original solutions for the Mitigation phases are suggested as an innovative HoneyNet integrating a virtualized decoy-system and an accurate fingerprinting of the attackers. Mitigation phases experimentation has also been conducted on the network of the critical infrastructure, a ground base station for satellite communications. The resulting observations of the research on the Detection and Mitigation phases led to original solutions for the an accurate fingerprinting of the attackers as means of an innovative HoneyNet integrating a virtualized decoy-system. The idea is to force each attacker to interact with his own synthetic system thus improving existing solutions that are based on stateless representations of the decoy-system. Our innovative approach proposes to enable a stateful honeypot able to recognize multiple intrusions of the same adversary. Incident Management is one of the most important topic in critical infrastructure protection. The main research results in this field that will be presented are focused on critical transport systems components and published in papers, international technical reports, surveys, and relevant juridical reports. Serious structural problems for the state-of-the-art forensic devices was evidenced by two case studies and led to the description of some novel solutions that exploit cryptographic technologies.

Mitigation and Incident Management methodologies for Critical Infrastructure protection

2019

Abstract

The research in the system field of Developing innovative cybersecurity techniques for the protection of critical infrastructures covers the methodologies for the protection of critical infrastructures that must pursue various objectives in three main phases: Prevention, Detection, and Reaction. In particular, this thesis describes the study, design and implementation of solutions for the Detection and Reaction phases of Critical Infrastructure Protection with a special focus on Mitigation and Incident Management methodologies of reaction. Nowadays, the protection of a critical infrastructure must cover both the physical and the cyber realm. We will propose novel solutions on the latter, while taking into account the necessary iterations between both. After giving an introduction and definition of critical infrastructure, the research is introduced by a critical analysis of the state-of-the-art and proposes new models for the integration of existing technologies under those conditions resulting from the intrinsically distributed and heterogeneous nature of most critical infrastructures. The tools initially described as a reference will be the basis used to bring the reasoning towards the experimental context and then to the innovations proposed in the detection, prevention and reaction phases. Subsequently, the Detection issues are presented through anomaly detection solutions applied to an Intrusion Detection Systems (IDS) supported by a novel system network architecture. This architecture is based on the paradigm of Software Defined Network (SDN) and was experimented in a real ground base station critical infrastructure. During the practical experimentation and the implementation of the prototypes, limitations and trade-offs related to the application of cybersecurity technologies in critical infrastructures have been highlighted. Original solutions for the Mitigation phases are suggested as an innovative HoneyNet integrating a virtualized decoy-system and an accurate fingerprinting of the attackers. Mitigation phases experimentation has also been conducted on the network of the critical infrastructure, a ground base station for satellite communications. The resulting observations of the research on the Detection and Mitigation phases led to original solutions for the an accurate fingerprinting of the attackers as means of an innovative HoneyNet integrating a virtualized decoy-system. The idea is to force each attacker to interact with his own synthetic system thus improving existing solutions that are based on stateless representations of the decoy-system. Our innovative approach proposes to enable a stateful honeypot able to recognize multiple intrusions of the same adversary. Incident Management is one of the most important topic in critical infrastructure protection. The main research results in this field that will be presented are focused on critical transport systems components and published in papers, international technical reports, surveys, and relevant juridical reports. Serious structural problems for the state-of-the-art forensic devices was evidenced by two case studies and led to the description of some novel solutions that exploit cryptographic technologies.
17-mag-2019
Italiano
Berizzi, Fabrizio
Donatiello, Lorenzo
Rannensberg, Kai
Colajanni, Michele
Capria, Amerigo
Università degli Studi di Pisa
File in questo prodotto:
File Dimensione Formato  
Doctoral_Thesis_18.pdf

accesso aperto

Tipologia: Altro materiale allegato
Dimensione 4.46 MB
Formato Adobe PDF
4.46 MB Adobe PDF Visualizza/Apri
PhD_Report_Alessandro_CANTELLI_FORTI_thesys.pdf

accesso aperto

Tipologia: Altro materiale allegato
Dimensione 135.83 kB
Formato Adobe PDF
135.83 kB Adobe PDF Visualizza/Apri
Summary_ENG_ITA.pdf

accesso aperto

Tipologia: Altro materiale allegato
Dimensione 94.09 kB
Formato Adobe PDF
94.09 kB Adobe PDF Visualizza/Apri

I documenti in UNITESI sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14242/132283
Il codice NBN di questa tesi è URN:NBN:IT:UNIPI-132283