@inproceedings{857527081180438882164538f172d2b3,
title = "Big data analysis techniques for cyber-threat detection in critical infrastructures",
abstract = "The research presented in this paper offers a way of supporting the security currently in place in critical infrastructures by using behavioural observation and big data analysis techniques to add to the Defence in Depth (DiD). As this work demonstrates, applying behavioural observation to critical infrastructure protection has effective results. Our design for Behavioural Observation for Critical Infrastructure Security Support (BOCISS) processes simulated critical infrastructure data to detect anomalies which constitute threats to the system. This is achieved using feature extraction and data classification. The data is provided by the development of a nuclear power plant simulation using Siemens Tecnomatix Plant Simulator and the programming language SimTalk. Using this simulation, extensive realistic data sets are constructed and collected, when the system is functioning as normal and during a cyber-attack scenario. The big data analysis techniques, classification results and an assessment of the outcomes is presented.",
keywords = "Behavioural Observation, Big Data, Critical Infrastructure, Data Classification, Simulation",
author = "William Hurst and Madjid Merabti and Paul Fergus",
year = "2014",
doi = "10.1109/WAINA.2014.141",
language = "English",
isbn = "9781479926527",
series = "Proceedings - 2014 IEEE 28th International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014",
publisher = "IEEE computer society",
pages = "916--921",
booktitle = "Proceedings - 2014 IEEE 28th International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014",
note = "28th IEEE International Conference on Advanced Information Networking and Applications Workshops, IEEE WAINA 2014 ; Conference date: 13-05-2014 Through 16-05-2014",
}