Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation - (Short Paper)

We present an architecture capable to protect Critical Infrastructures from one of the most harmful categories of Denial of Service (DoS) attacks, commonly known in the literature as either “low-rate”, or “stealth” attacks. Stealth attacks do represent the last generation of network threats, since they minimize both cost and visibility, at the same time achieving an effectiveness which is comparable to that of common brute force attacks. The study is conducted by exploiting an actual deployment of an architecture for the effective protection of Critical infrastructures, designed and developed within the INSPIRE European Project.

[1]  Stefano Avallone,et al.  A splitting infrastructure for load balancing and security in an MPLS network , 2007, 2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities.

[2]  Salvatore J. Stolfo,et al.  A framework for constructing features and models for intrusion detection systems , 2000, TSEC.

[3]  Aleksandar Kuzmanovic,et al.  Low-rate TCP-targeted denial of service attacks and counter strategies , 2006, TNET.