Operational support for critical infrastructure security

William Hurst*, Madjid Merabti, Paul Fergus

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference paperAcademicpeer-review

3 Citations (Scopus)

Abstract

With the level of cyber-attacks increasing in volume and sophistication, the need for improved counter measures is growing. The repercussions of a successful attack on a critical infrastructure would result in a paralysing impact on the economy and the general population as a whole. For that reason, the framework proposed in our previous work details the use of a system for supporting security. Our aim is to provide support through collecting data from multiple sources of information. In doing so, our objective is to develop a more detailed overview of the operations inside critical infrastructures. Using this approach, we identify attacks taking place by uncovering changes in patterns of expected behaviour. The work is being done as part of the research being carried out at LJMU PROTECT Centre. This paper presents an overview of our system design and details how it would provide additional support through greater defence in depth. Related research into how critical infrastructures are currently protected, and our development and progress are also discussed.

Original languageEnglish
Title of host publicationProceedings of the 14th IEEE International Conference on High Performance Computing and Communications, HPCC-2012 - 9th IEEE International Conference on Embedded Software and Systems, ICESS-2012
Pages1473-1478
Number of pages6
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event14th IEEE International Conference on High Performance Computing and Communications, HPCC-2012 - 9th IEEE International Conference on Embedded Software and Systems, ICESS-2012 - Liverpool, United Kingdom
Duration: 25 Jun 201227 Jun 2012

Publication series

NameProceedings of the 14th IEEE International Conference on High Performance Computing and Communications, HPCC-2012 - 9th IEEE International Conference on Embedded Software and Systems, ICESS-2012

Conference

Conference14th IEEE International Conference on High Performance Computing and Communications, HPCC-2012 - 9th IEEE International Conference on Embedded Software and Systems, ICESS-2012
CountryUnited Kingdom
CityLiverpool
Period25/06/1227/06/12

Keywords

  • Behavioural Observation
  • Critical Infrastructure
  • Critical Infrastructure Protection
  • Defence in Depth
  • Intrusion Detection System
  • Middleware
  • Security
  • Unified Threat Management system

Fingerprint Dive into the research topics of 'Operational support for critical infrastructure security'. Together they form a unique fingerprint.

Cite this