Big data analysis techniques for cyber-threat detection in critical infrastructures

William Hurst, Madjid Merabti, Paul Fergus

Research output: Chapter in Book/Report/Conference proceedingConference paperAcademicpeer-review

14 Citations (Scopus)

Abstract

The research presented in this paper offers a way of supporting the security currently in place in critical infrastructures by using behavioural observation and big data analysis techniques to add to the Defence in Depth (DiD). As this work demonstrates, applying behavioural observation to critical infrastructure protection has effective results. Our design for Behavioural Observation for Critical Infrastructure Security Support (BOCISS) processes simulated critical infrastructure data to detect anomalies which constitute threats to the system. This is achieved using feature extraction and data classification. The data is provided by the development of a nuclear power plant simulation using Siemens Tecnomatix Plant Simulator and the programming language SimTalk. Using this simulation, extensive realistic data sets are constructed and collected, when the system is functioning as normal and during a cyber-attack scenario. The big data analysis techniques, classification results and an assessment of the outcomes is presented.

Original languageEnglish
Title of host publicationProceedings - 2014 IEEE 28th International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014
PublisherIEEE computer society
Pages916-921
Number of pages6
ISBN (Print)9781479926527
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event28th IEEE International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014 - Victoria, BC, Canada
Duration: 13 May 201416 May 2014

Publication series

NameProceedings - 2014 IEEE 28th International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014

Conference

Conference28th IEEE International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014
CountryCanada
CityVictoria, BC
Period13/05/1416/05/14

Keywords

  • Behavioural Observation
  • Big Data
  • Critical Infrastructure
  • Data Classification
  • Simulation

Fingerprint Dive into the research topics of 'Big data analysis techniques for cyber-threat detection in critical infrastructures'. Together they form a unique fingerprint.

Cite this