Behavioural observation for critical infrastructure security support

William Hurst, Madjid Merabti, Paul Fergus

Research output: Contribution to conferenceConference paperAcademicpeer-review

7 Citations (Scopus)

Abstract

The research presented in this paper offers a way of supporting the security currently in place in critical infrastructures by using behavioural observation to add to the Defence in Depth (DiD). Our approach is proactive and continually looks to identify patterns or behaviour, which is out of place in the ordinary operations of the infrastructure. As this work demonstrates, applying behavioural observation to critical infrastructure protection has effective results. In this paper, our design for Behavioural Observation for Critical Infrastructure Security Support (BOCISS) is presented. This entails an outline of the system architecture, an explanation of the system modes of operation, the development of a simulation for data construction purposes and the evaluation of our system using our simulated data.

Original languageEnglish
Pages36-41
Number of pages6
DOIs
Publication statusPublished - 2013
Externally publishedYes
EventUKSim-AMSS 7th European Modelling Symposium on Computer Modelling and Simulation, EMS 2013 - Manchester, United Kingdom
Duration: 20 Nov 201322 Nov 2013

Conference

ConferenceUKSim-AMSS 7th European Modelling Symposium on Computer Modelling and Simulation, EMS 2013
CountryUnited Kingdom
CityManchester
Period20/11/1322/11/13

Keywords

  • Behavioural Observation
  • Critical Infrastructure
  • Cyber-Attack
  • Data Classification
  • Simulation

Fingerprint

Dive into the research topics of 'Behavioural observation for critical infrastructure security support'. Together they form a unique fingerprint.

Cite this