DocumentCode :
166676
Title :
Big Data Analysis Techniques for Cyber-threat Detection in Critical Infrastructures
Author :
Hurst, Wolfgang ; Merabti, Madjid ; Fergus, P.
Author_Institution :
PROTECT: Res. Centre for Critical Infrastruct. Comput. Technol. & Protection Sch. of Comput. & Math. Sci., Liverpool John Moores Univ., Liverpool, UK
fYear :
2014
fDate :
13-16 May 2014
Firstpage :
916
Lastpage :
921
Abstract :
The research presented in this paper offers a way of supporting the security currently in place in critical infrastructures by using behavioural observation and big data analysis techniques to add to the Defence in Depth (DiD). As this work demonstrates, applying behavioural observation to critical infrastructure protection has effective results. Our design for Behavioural Observation for Critical Infrastructure Security Support (BOCISS) processes simulated critical infrastructure data to detect anomalies which constitute threats to the system. This is achieved using feature extraction and data classification. The data is provided by the development of a nuclear power plant simulation using Siemens Tecnomatix Plant Simulator and the programming language SimTalk. Using this simulation, extensive realistic data sets are constructed and collected, when the system is functioning as normal and during a cyber-attack scenario. The big data analysis techniques, classification results and an assessment of the outcomes is presented.
Keywords :
Big Data; critical infrastructures; feature extraction; pattern classification; programming languages; security of data; BOCISS process; DiD; Siemens Tecnomatix Plant Simulator; anomaly detection; behavioural observation; big data analysis techniques; critical infrastructure protection; critical infrastructure security support process; cyber-attack scenario; cyber-threat detection; data classification; defence in depth; feature extraction; nuclear power plant simulation; programming language SimTalk; realistic data set; simulated critical infrastructure data; Big data; Data models; Feature extraction; Inductors; Security; Support vector machine classification; Water resources; Behavioural Observation; Big Data; Critical Infrastructure; Data Classification; Simulation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on
Conference_Location :
Victoria, BC
Print_ISBN :
978-1-4799-2652-7
Type :
conf
DOI :
10.1109/WAINA.2014.141
Filename :
6844756
Link To Document :
بازگشت