Operational Support for Critical Infrastructure Security

作者: William Hurst , Madjid Merabti , Paul Fergus , None

DOI: 10.1109/HPCC.2012.215

关键词:

摘要: With the level of cyber-attacks increasing in volume and sophistication, need for improved counter measures is growing. The repercussions a successful attack on critical infrastructure would result paralysing impact economy general population as whole. For that reason, framework proposed our previous work details use system supporting security. Our aim to provide support through collecting data from multiple sources information. In doing so, objective develop more detailed overview operations inside infrastructures. Using this approach, we identify attacks taking place by uncovering changes patterns expected behaviour. being done part research carried out at LJMU PROTECT Centre. This paper presents an design how it additional greater defence depth. Related into infrastructures are currently protected, development progress also discussed.

参考文章(17)
Tim Bass, Intrusion detection systems and multisensor data fusion Communications of The ACM. ,vol. 43, pp. 99- 105 ,(2000) , 10.1145/332051.332079
Sebastian Roschke, Feng Cheng, Christoph Meinel, A Flexible and Efficient Alert Correlation Platform for Distributed IDS 2010 Fourth International Conference on Network and System Security. pp. 24- 31 ,(2010) , 10.1109/NSS.2010.26
Julian L. Rrushi, An exploration of defensive deception in industrial communication networks International Journal of Critical Infrastructure Protection. ,vol. 4, pp. 66- 75 ,(2011) , 10.1016/J.IJCIP.2011.06.002
Ying Zhang, Fachao Deng, Zhen Chen, Yibo Xue, Chuang Lin, None, UTM-CM: A Practical Control Mechanism Solution for UTM System communications and mobile computing. ,vol. 1, pp. 86- 90 ,(2010) , 10.1109/CMC.2010.267
F. Bouhafs, M. Mackay, M. Merabti, Links to the Future: Communication Requirements and Challenges in the Smart Grid IEEE Power & Energy Magazine. ,vol. 10, pp. 24- 32 ,(2012) , 10.1109/MPE.2011.943134
S. Benson Edwin Raj, A. Annie Portia, Analysis on credit card fraud detection methods 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET). pp. 152- 156 ,(2011) , 10.1109/ICCCET.2011.5762457
Madjid Merabti, Michael Kennedy, William Hurst, None, Critical infrastructure protection: A 21 st century challenge international conference on communications. pp. 1- 6 ,(2011) , 10.1109/ICCITECHNOL.2011.5762681
Fachao Deng, Anan Luo, Yaokun Zhang, Zhen Chen, Xuehai Peng, Xin Jiang, Dongsheng Peng, TNC-UTM: A Holistic Solution to Secure Enterprise Networks 2008 The 9th International Conference for Young Computer Scientists. pp. 2240- 2245 ,(2008) , 10.1109/ICYCS.2008.380
Xue Hong-Ye, MultiCore Systems Architecture Design and Implementation of UTM international symposium on information science and engineering. ,vol. 1, pp. 441- 445 ,(2008) , 10.1109/ISISE.2008.263