Agent Interaction and State Determination in SCADA Systems. / Mcevoy, Richard; Wolthusen, Stephen D.

Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, 2012.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forthcoming

### Standard

Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, 2012.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

### Harvard

Mcevoy, R & Wolthusen, SD 2012, Agent Interaction and State Determination in SCADA Systems. in Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag.

### APA

Mcevoy, R., & Wolthusen, S. D. (Accepted/In press). Agent Interaction and State Determination in SCADA Systems. In Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection Springer-Verlag.

### Vancouver

Mcevoy R, Wolthusen SD. Agent Interaction and State Determination in SCADA Systems. In Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag. 2012

### Author

Mcevoy, Richard ; Wolthusen, Stephen D. / Agent Interaction and State Determination in SCADA Systems. Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, 2012.

### BibTeX

@inproceedings{669d16f964154d839cf363c5b0e32df3,
title = "Agent Interaction and State Determination in SCADA Systems",
abstract = "In critical infrastructure environments, we argue that both adversaries and operators will utilize agents to manage dynamic attack/defence interactions in future. Agent behavior and, in particular, agent interaction require adequate modelling tools to reason over such situations in distributed environments where the state (malicious or non-malicious) of a channel or process can vary dynamically depending on the actions of opposing sides in attack and defence. For this purpose, we propose an extension to applied $\pi$-calculus to model agent behavior. We apply this extended calculus to the formal analysis of a class of agent-based attacks and its detection to demonstrate its utility.. ",
author = "Richard Mcevoy and Wolthusen, {Stephen D.}",
year = "2012",
language = "English",
booktitle = "Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection",
publisher = "Springer-Verlag",

}

### RIS

TY - GEN

T1 - Agent Interaction and State Determination in SCADA Systems

AU - Mcevoy, Richard

AU - Wolthusen, Stephen D.

PY - 2012

Y1 - 2012

N2 - In critical infrastructure environments, we argue that both adversaries and operators will utilize agents to manage dynamic attack/defence interactions in future. Agent behavior and, in particular, agent interaction require adequate modelling tools to reason over such situations in distributed environments where the state (malicious or non-malicious) of a channel or process can vary dynamically depending on the actions of opposing sides in attack and defence. For this purpose, we propose an extension to applied $\pi$-calculus to model agent behavior. We apply this extended calculus to the formal analysis of a class of agent-based attacks and its detection to demonstrate its utility..

AB - In critical infrastructure environments, we argue that both adversaries and operators will utilize agents to manage dynamic attack/defence interactions in future. Agent behavior and, in particular, agent interaction require adequate modelling tools to reason over such situations in distributed environments where the state (malicious or non-malicious) of a channel or process can vary dynamically depending on the actions of opposing sides in attack and defence. For this purpose, we propose an extension to applied $\pi$-calculus to model agent behavior. We apply this extended calculus to the formal analysis of a class of agent-based attacks and its detection to demonstrate its utility..

M3 - Conference contribution

BT - Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection

PB - Springer-Verlag

ER -