Managing critical infrastructures through behavioural observation

William Hurst*, Madjid Merabti, Paul Fergus

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference paperAcademicpeer-review

4 Citations (Scopus)

Abstract

Managing critical infrastructures under the growing cyber-threat is becoming a matter of international urgency. The volume and frequency of cyber-related incidents on the rise yearly, and the level of sophistication is increasing. Critical infrastructures are key service providers and heavily interconnected, meaning any damaging impact would result in devastating consequences and potential cascading failure. In this paper, our system, which uses behavioural observation techniques to offer a level of critical infrastructure support, is detailed. Our approach monitors the operation of an infrastructure and identifies any abnormalities which occur by detecting changes in patterns of behaviour. This is done through the development of a model of correct behaviour which then acts as inference model for expected system behaviour. Using this inference model, we then highlight a threat to our simulation environment by observing changes in patterns of activity. Related research and the results of our implementation is discussed.

Original languageEnglish
Title of host publicationProceedings - 2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application, NESEA 2012
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application, NESEA 2012 - Liverpool, United Kingdom
Duration: 13 Dec 201214 Dec 2012

Publication series

NameProceedings - 2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application, NESEA 2012

Conference/symposium

Conference/symposium2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application, NESEA 2012
Country/TerritoryUnited Kingdom
CityLiverpool
Period13/12/1214/12/12

Keywords

  • Behavioural Observation
  • Critical Infrastructure Protection
  • Cyber-attack
  • Inference Model
  • Middleware

Fingerprint

Dive into the research topics of 'Managing critical infrastructures through behavioural observation'. Together they form a unique fingerprint.

Cite this