An effective security measures for nuclear power plant using big data analysis approach

被引:45
作者
Lee, Sangdo [1 ,2 ]
Huh, Jun-Ho [3 ]
机构
[1] Soongsil Univ, Dept Comp Sci & Engn, Seoul, South Korea
[2] Korea Hydro & Nucl Power KHNP Co LTD, Secur & ICT Dept, Cyber Secur Control Team, Gyeongju, South Korea
[3] Catholic Univ Pusan, Dept Software, Busan, South Korea
基金
新加坡国家研究基金会;
关键词
Nuclear power plant; Big data analysis; AI; Artificial intelligence; Security; NEURAL-NETWORKS;
D O I
10.1007/s11227-018-2440-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Among the many hacking attempts carried out against information systems for the past few years, cyber-attacks that could lead to a national-level threat included attacks against nuclear facilities particularly nuclear power stations. Two of the typical examples are the Stuxnet attack against an Iranian nuclear facility and the cyber threat against Korea Hydro and Nuclear Power in December 2015. The former has proven that a direct cyber-attack can actually stop the nuclear power station, and the latter has shown that people can be terrorized with only a (cyber) threat. After these incidents, security measures for cyber-attacks against industrial control systems have been strengthened. The nuclear power stations also changed their passive concept of executing security measures by operating the plant with an isolated network to prepare for the cyber-attacks carried out by malicious codes. The difference between the two concepts is that the latter has been formulated based on the possibility that most of the control systems can be targets of cyber-attacks. Threats against control systems are gradually increasing nowadays, so the relevant industries are implementing some measures to identify/develop safe and reliable digital equipment and identify risks to establish effective cyber security plans. Thus, this paper proposes a security measure based on the classification of past attack incidents against control systems and the big data analysis technique that processes the data generated from individual security equipment. The security of control systems is expected to be strengthened through such effective measure.
引用
收藏
页码:4267 / 4294
页数:28
相关论文
共 41 条
[31]  
Park Jong-Hun, 2015, [Journal of the Korea Convergence Society, 한국융합학회논문지], V6, P1, DOI 10.15207/JKCS.2015.6.6.001
[32]   Big data security and privacy issues in healthcare Nanthealth [J].
Patil, Harsh Kupwade ;
Seshadri, Ravi .
2014 IEEE INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS), 2014, :762-765
[33]   Big Data and Hadoop-A Study in Security Perspective [J].
Saraladevi, B. ;
Pazhaniraja, N. ;
Paul, P. Victer ;
Basha, M. S. Saleem ;
Dhavachelvan, P. .
BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 :596-601
[34]  
Schneier B, 2007, APPL CRYPTOGRAPHY PR, P1
[35]  
Sharma PK, 2017, J INF PROCESS SYST, V13, P184
[36]   Mastering the game of Go with deep neural networks and tree search [J].
Silver, David ;
Huang, Aja ;
Maddison, Chris J. ;
Guez, Arthur ;
Sifre, Laurent ;
van den Driessche, George ;
Schrittwieser, Julian ;
Antonoglou, Ioannis ;
Panneershelvam, Veda ;
Lanctot, Marc ;
Dieleman, Sander ;
Grewe, Dominik ;
Nham, John ;
Kalchbrenner, Nal ;
Sutskever, Ilya ;
Lillicrap, Timothy ;
Leach, Madeleine ;
Kavukcuoglu, Koray ;
Graepel, Thore ;
Hassabis, Demis .
NATURE, 2016, 529 (7587) :484-+
[37]   Importance of input data normalization for the application of neural networks to complex industrial problems [J].
Sola, J ;
Sevilla, J .
IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 1997, 44 (03) :1464-1468
[38]  
Stallings W, 2003, CRYPTOGRAPHY NETWORK, P1
[39]   Transaction processing in consistency-aware user's applications deployed on NoSQL databases [J].
Teresa Gonzalez-Aparicio, Maria ;
Ogunyadeka, Adewole ;
Younas, Muhammad ;
Tuya, Javier ;
Casado, Ruben .
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2017, 7
[40]   The spread of true and false news online [J].
Vosoughi, Soroush ;
Roy, Deb ;
Aral, Sinan .
SCIENCE, 2018, 359 (6380) :1146-+