An effective security measures for nuclear power plant using big data analysis approach

被引:45
作者
Lee, Sangdo [1 ,2 ]
Huh, Jun-Ho [3 ]
机构
[1] Soongsil Univ, Dept Comp Sci & Engn, Seoul, South Korea
[2] Korea Hydro & Nucl Power KHNP Co LTD, Secur & ICT Dept, Cyber Secur Control Team, Gyeongju, South Korea
[3] Catholic Univ Pusan, Dept Software, Busan, South Korea
基金
新加坡国家研究基金会;
关键词
Nuclear power plant; Big data analysis; AI; Artificial intelligence; Security; NEURAL-NETWORKS;
D O I
10.1007/s11227-018-2440-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Among the many hacking attempts carried out against information systems for the past few years, cyber-attacks that could lead to a national-level threat included attacks against nuclear facilities particularly nuclear power stations. Two of the typical examples are the Stuxnet attack against an Iranian nuclear facility and the cyber threat against Korea Hydro and Nuclear Power in December 2015. The former has proven that a direct cyber-attack can actually stop the nuclear power station, and the latter has shown that people can be terrorized with only a (cyber) threat. After these incidents, security measures for cyber-attacks against industrial control systems have been strengthened. The nuclear power stations also changed their passive concept of executing security measures by operating the plant with an isolated network to prepare for the cyber-attacks carried out by malicious codes. The difference between the two concepts is that the latter has been formulated based on the possibility that most of the control systems can be targets of cyber-attacks. Threats against control systems are gradually increasing nowadays, so the relevant industries are implementing some measures to identify/develop safe and reliable digital equipment and identify risks to establish effective cyber security plans. Thus, this paper proposes a security measure based on the classification of past attack incidents against control systems and the big data analysis technique that processes the data generated from individual security equipment. The security of control systems is expected to be strengthened through such effective measure.
引用
收藏
页码:4267 / 4294
页数:28
相关论文
共 41 条
[1]  
[Anonymous], 2012, NETWORK SECURITY
[2]  
[Anonymous], 2016, J CONVERGENCE
[3]  
[Anonymous], Nist special publication 800-38a. online
[4]   Ring hulls of semiprime homomorphic images [J].
Birkenmeier, Gary F. ;
Park, Jae Keol ;
Rizvi, S. Tariq .
MODULES AND COMODULES, 2008, :101-+
[5]   Principally Quasi-Baer Ring Hulls [J].
Birkenmeier, Gary F. ;
Park, Jae Keol ;
Rizvi, S. Tariq .
ADVANCES IN RING THEORY, 2010, :47-+
[6]   Big Data Analytics for Security [J].
Cardenas, Alvaro A. ;
Manadhata, Pratyusa K. ;
Rajan, Sreeranga P. .
IEEE SECURITY & PRIVACY, 2013, 11 (06) :74-76
[7]   Identification of nuclear power plant transients using the Particle Swarm Optimization algorithm [J].
Carlos Canedo Medeiros, Jose Antonio ;
Schirru, Roberto .
ANNALS OF NUCLEAR ENERGY, 2008, 35 (04) :576-582
[8]  
Eom S., 2018, J AMBIENT INTELL HUM, V1, P1, DOI [10.1007/s12652-018-0698-2, DOI 10.1007/S12652-018-0698-2]
[9]  
[冯登国 Feng Dengguo], 2014, [计算机学报, Chinese Journal of Computers], V37, P246
[10]   Treatment Planning in Smart Medical: A Sustainable Strategy [J].
Hao, Fei ;
Park, Doo-Soon ;
Woo, Sang Yeon ;
Min, Se Dong ;
Park, Sewon .
JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2016, 12 (04) :711-723