Towards Automatic Critical Infrastructure Protection through Machine Learning

被引:0
作者
Cazorla, Lorena [1 ]
Alcaraz, Cristina [1 ]
Lopez, Javier [1 ]
机构
[1] Univ Malaga, Network Informat & Comp Secur NICS Lab, E-29071 Malaga, Spain
来源
CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2013 | 2013年 / 8328卷
关键词
Critical Infrastructure Protection; Machine Learning; Intrusion Detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical Infrastructure Protection (CIP) faces increasing challenges in number and in sophistication, which makes vital to provide new forms of protection to face every day's threats. In order to make such protection holistic, covering all the needs of the systems from the point of view of security, prevention aspects and situational awareness should be considered. Researchers and Institutions stress the need of providing intelligent and automatic solutions for protection, calling our attention to the need of providing Intrusion Detection Systems (IDS) with intelligent active reaction capabilities. In this paper, we support the need of automating the processes implicated in the IDS solutions of the critical infrastructures and theorize that the introduction of Machine Learning (ML) techniques in IDS will be helpful for implementing automatic adaptable solutions capable of adjusting to new situations and timely reacting in the face of threats and anomalies. To this end, we study the different levels of automation that the IDS can implement, and outline a methodology to endow critical scenarios with preventive automation. Finally, we analyze current solutions presented in the literature and contrast them against the proposed methodology.
引用
收藏
页码:197 / 203
页数:7
相关论文
共 17 条
[1]   Wide-Area Situational Awareness for Critical Infrastructure Protection [J].
Alcaraz, Cristina ;
Lopez, Javier .
COMPUTER, 2013, 46 (04) :30-37
[2]  
[Anonymous], 2011, COM2011163 EUR COMM
[3]  
[Anonymous], 2009, COM2009149 EUR COMM
[4]  
Carcano A, 2010, LECT NOTES COMPUT SC, V6027, P138
[5]  
Chertoff M., 2009, NAT INFR PROT PLAN
[6]  
Cheung S., 2007, Proceedings of the SCADA Security Scientific Symposium, P127
[7]  
D'Antonio S, 2006, LECT NOTES COMPUT SC, V4347, P222
[8]  
Düssel P, 2010, LECT NOTES COMPUT SC, V6027, P85
[9]  
Hadziosmanovic D., 2011, MELISSA AUTOMATED DE
[10]  
Lin H., 2012, Adapting bro into scada: Building a specification-based intrusion detection system for the dnp3 protocol