TY - GEN
T1 - Operational support for critical infrastructure security
AU - Hurst, William
AU - Merabti, Madjid
AU - Fergus, Paul
PY - 2012
Y1 - 2012
N2 - With the level of cyber-attacks increasing in volume and sophistication, the need for improved counter measures is growing. The repercussions of a successful attack on a critical infrastructure would result in a paralysing impact on the economy and the general population as a whole. For that reason, the framework proposed in our previous work details the use of a system for supporting security. Our aim is to provide support through collecting data from multiple sources of information. In doing so, our objective is to develop a more detailed overview of the operations inside critical infrastructures. Using this approach, we identify attacks taking place by uncovering changes in patterns of expected behaviour. The work is being done as part of the research being carried out at LJMU PROTECT Centre. This paper presents an overview of our system design and details how it would provide additional support through greater defence in depth. Related research into how critical infrastructures are currently protected, and our development and progress are also discussed.
AB - With the level of cyber-attacks increasing in volume and sophistication, the need for improved counter measures is growing. The repercussions of a successful attack on a critical infrastructure would result in a paralysing impact on the economy and the general population as a whole. For that reason, the framework proposed in our previous work details the use of a system for supporting security. Our aim is to provide support through collecting data from multiple sources of information. In doing so, our objective is to develop a more detailed overview of the operations inside critical infrastructures. Using this approach, we identify attacks taking place by uncovering changes in patterns of expected behaviour. The work is being done as part of the research being carried out at LJMU PROTECT Centre. This paper presents an overview of our system design and details how it would provide additional support through greater defence in depth. Related research into how critical infrastructures are currently protected, and our development and progress are also discussed.
KW - Behavioural Observation
KW - Critical Infrastructure
KW - Critical Infrastructure Protection
KW - Defence in Depth
KW - Intrusion Detection System
KW - Middleware
KW - Security
KW - Unified Threat Management system
U2 - 10.1109/HPCC.2012.215
DO - 10.1109/HPCC.2012.215
M3 - Conference paper
AN - SCOPUS:84870404592
SN - 9780769547497
T3 - Proceedings of the 14th IEEE International Conference on High Performance Computing and Communications, HPCC-2012 - 9th IEEE International Conference on Embedded Software and Systems, ICESS-2012
SP - 1473
EP - 1478
BT - Proceedings of the 14th IEEE International Conference on High Performance Computing and Communications, HPCC-2012 - 9th IEEE International Conference on Embedded Software and Systems, ICESS-2012
T2 - 14th IEEE International Conference on High Performance Computing and Communications, HPCC-2012 - 9th IEEE International Conference on Embedded Software and Systems, ICESS-2012
Y2 - 25 June 2012 through 27 June 2012
ER -