Towards Automatic Critical Infrastructure Protection through Machine Learning

作者: Lorena Cazorla , Cristina Alcaraz , Javier Lopez

DOI: 10.1007/978-3-319-03964-0_18

关键词:

摘要: Critical Infrastructure Protection (CIP) faces increasing challenges in number and sophistication, which makes vital to provide new forms of protection face every day’s threats. In order make such holistic, covering all the needs systems from point view security, prevention aspects situational awareness should be considered. Researchers Institutions stress need providing intelligent automatic solutions for protection, calling our attention Intrusion Detection Systems (IDS) with active reaction capabilities. this paper, we support automating processes implicated IDS critical infrastructures theorize that introduction Machine Learning (ML) techniques will helpful implementing adaptable capable adjusting situations timely reacting threats anomalies. To end, study different levels automation can implement, outline a methodology endow scenarios preventive automation. Finally, analyze current presented literature contrast them against proposed methodology.

参考文章(16)
Bruno Dutertre, Steven Cheung, Martin Fong, Alfonso Valdes, Ulf Lindqvist, Keith Skinner, Using Model-based Intrusion Detection for SCADA Networks ,(2006)
Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, Sean Smith, Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems international conference on critical infrastructure protection. pp. 31- 46 ,(2011) , 10.1007/978-3-642-24864-1_3
Dina Hadiosmanovic, Damiano Bolzoni, Pieter Hartel, Sandro Etalle, MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures EC2ND '11 Proceedings of the 2011 Seventh European Conference on Computer Network Defense. pp. 41- 48 ,(2011) , 10.1109/EC2ND.2011.10
Mark A. Hall, Ian H. Witten, Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques ,(1999)
Andrea Carcano, Igor Nai Fovino, Marcelo Masera, Alberto Trombetta, State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept Critical Information Infrastructures Security. ,vol. 6027, pp. 138- 150 ,(2010) , 10.1007/978-3-642-14379-3_12
Christof Störmann, Jan Kästner, Patrick Düssel, Christian Gehl, Pavel Laskov, Jens-Uwe Bußer, Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection Critical Information Infrastructures Security. ,vol. 6027, pp. 85- 97 ,(2010) , 10.1007/978-3-642-14379-3_8
Cristina Alcaraz, Javier Lopez, Wide-Area Situational Awareness for Critical Infrastructure Protection IEEE Computer. ,vol. 46, pp. 30- 37 ,(2013) , 10.1109/MC.2013.72
Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, Sean Smith, Intrusion detection for resource-constrained embedded control systems in the power grid International Journal of Critical Infrastructure Protection. ,vol. 5, pp. 74- 83 ,(2012) , 10.1016/J.IJCIP.2012.02.002
Hui Lin, Adam Slagell, Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol cyber security and information intelligence research workshop. pp. 5- ,(2013) , 10.1145/2459976.2459982
Kalle Burbeck, Simin Nadjm-Tehrani, Adaptive real-time anomaly detection with incremental clustering Information Security Technical Report. ,vol. 12, pp. 56- 67 ,(2007) , 10.1016/J.ISTR.2007.02.004