Navigation path

FACIES: Online Identification of Failure and Attack on Interdependent Critical Infrastructures

Using theoretical and experimental activities, and by stepping up cooperation and exchange of information between operators and authorities, FACIES is seeking to develop techniques to detect online failures and attacks on interdependent infrastructures.

Project dates 01/09/2012 - 28/02/2014
FundCIPS
TopicCIP
Total budget€426 961
EU contribution90%
Project CoordinatorUniversity Campus Bio-Medico of Rome (Italy)
Project partners
  • University of Malaga (Spain)
  • RadioLABs (Italy)
  • University of Cyprus (Cyprus)
Associate Partners
  • AIIC – Italian Association Critical Infrastructures’ Experts (Italy)

Project Description

Geographic proximity, resource exchange and cyber dependencies all have an impact on the complex and mutually dependent environment inhabited by modern infrastructures. FACIES is investigating how to identify, in the early stages, a failure or attack in a scenario involving several interdependent critical infrastructures. The partners are doing this using a mix of theoretical and experimental activities and cooperative strategies.

Specifically, FACIES aims to illustrate the feasibility (and overall necessity) of a distributed approach, able to detect online failures and attacks. The approach is based on a method of system modelling and the use of partial and incomplete information. This is because the sensitive nature of the data may lead to reluctance on the part of the operators to release all relevant statistics.

Benefits and results

In addition to increasing information exchange and cooperation between critical infrastructure operators and public authorities, FACIES intends to develop and test a set of techniques able to identify physical failures associated with physical and cyber attacks. This would provide the capability to deploy countermeasures appropriately, in a distributed manner.

The project will prepare an overview of the most useful techniques for failure and intrusion detection and their respective applicability to the critical infrastructure scenario, as well as an overview of the threats posed by the ‘stealth-attack’ and possible counter-measures.

Other expected results include a test-bed for the analysis of physical and cyber attacks on interdependent infrastructures, and the development of a set of suitable qualitative and quantitative indexes to evaluate the degree of dependency of infrastructures.

Additional tools