Operational Support for Critical Infrastructure Security

被引:0
作者
Hurst, William [1 ]
Merabti, Madjid [1 ]
Fergus, Paul [1 ]
机构
[1] Liverpool John Moores Univ, PROTECT Res Ctr Crit Infrastruct Comp Technol & P, Sch Comp & Math Sci, Liverpool L3 3AF, Merseyside, England
来源
2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS) | 2012年
关键词
Critical Infrastructure; Critical Infrastructure Protection; Unified Threat Management system; Intrusion Detection System; Middleware; Security; Defence in Depth; Behavioural Observation;
D O I
10.1109/HPCC.2012.215
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the level of cyber-attacks increasing in volume and sophistication, the need for improved counter measures is growing. The repercussions of a successful attack on a critical infrastructure would result in a paralysing impact on the economy and the general population as a whole. For that reason, the framework proposed in our previous work details the use of a system for supporting security. Our aim is to provide support through collecting data from multiple sources of information. In doing so, our objective is to develop a more detailed overview of the operations inside critical infrastructures. Using this approach, we identify attacks taking place by uncovering changes in patterns of expected behaviour. The work is being done as part of the research being carried out at LJMU PROTECT Centre. This paper presents an overview of our system design and details how it would provide additional support through greater defence in depth. Related research into how critical infrastructures are currently protected, and our development and progress are also discussed.
引用
收藏
页码:1473 / 1478
页数:6
相关论文
共 19 条
  • [1] [Anonymous], P IRIS NAT S SENS DA
  • [2] Intrusion detection systems and multisensor data fusion
    Bass, T
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 99 - 105
  • [3] Beltran Laura Pla, 2011, 12 ANN POSTGRADUATE
  • [4] Benson Edwin Raj S., 2011, 2011 Proceedings of International Conference on Computer, Communication and Electrical Technology (ICCCET 2011), P152, DOI 10.1109/ICCCET.2011.5762457
  • [5] Links to the Future
    Bouhafs, Faycal
    Mackay, Michael
    Merabti, Madjid
    [J]. IEEE POWER & ENERGY MAGAZINE, 2011, 10 (01): : 24 - 32
  • [6] Chao Y., 2009, WIR MOB COMP CCWMC 2, P389
  • [7] Deng FC, 2008, PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, P2240, DOI 10.1109/ICYCS.2008.380
  • [8] Hernantes J., 2011, COLLABORATIVE MODELI, DOI [10.1109/HICSS.2011.113, DOI 10.1109/HICSS.2011.113]
  • [9] Hurst William, 2011, 12 ANN POSTGRADUATE
  • [10] League S. J., 1997, Proceedings. 13th Annual Computer Security Applications Conference (Cat. No.97TB100213), P118, DOI 10.1109/CSAC.1997.646181