Abstract
Original language | English |
---|---|
Pages (from-to) | 174-192 |
Number of pages | 19 |
Journal | International Journal of Critical Infrastructures |
Volume | 10 |
Issue number | 2 |
DOIs | |
Publication status | Published - 2014 |
Externally published | Yes |
Fingerprint
Cite this
}
Protecting critical infrastructures through behavioural observation. / Hurst, William; Merabti, Madjid; Iram, Shamaila; Fergus, Paul.
In: International Journal of Critical Infrastructures, Vol. 10, No. 2, 2014, p. 174-192.Research output: Contribution to journal › Article
TY - JOUR
T1 - Protecting critical infrastructures through behavioural observation
AU - Hurst, William
AU - Merabti, Madjid
AU - Iram, Shamaila
AU - Fergus, Paul
PY - 2014
Y1 - 2014
N2 - The increase in the use of ICT in critical infrastructures has meant that dependence on automation and control systems has brought new risk in an increasingly digital age. The increase in digitisation and interconnectivity has meant that cyber-attacks have the potential to bring operations to a halt from a remote location with devastating consequences. In response to this, in our previous work to date, we have looked into the use of behavioural observation techniques to provide critical infrastructure support through pattern detection, in order to identify threats to the system. In this paper, a continuation of our research is presented including the use of mathematical classifications to analyse the critical infrastructure data, which has been constructed through simulation. In our approach, we develop a pattern of behaviour for the simulation and identify changes in patterns, which are the result of an attack on the system.
AB - The increase in the use of ICT in critical infrastructures has meant that dependence on automation and control systems has brought new risk in an increasingly digital age. The increase in digitisation and interconnectivity has meant that cyber-attacks have the potential to bring operations to a halt from a remote location with devastating consequences. In response to this, in our previous work to date, we have looked into the use of behavioural observation techniques to provide critical infrastructure support through pattern detection, in order to identify threats to the system. In this paper, a continuation of our research is presented including the use of mathematical classifications to analyse the critical infrastructure data, which has been constructed through simulation. In our approach, we develop a pattern of behaviour for the simulation and identify changes in patterns, which are the result of an attack on the system.
KW - Behavioural observation
KW - Critical infrastructures
KW - Cyber attacks
KW - Security
KW - Data analysis
KW - Pattern detection
KW - Infrastructure protection
KW - ICT
KW - Threat identification
KW - Simulation
KW - Behaviour patterns
UR - http://www.inderscience.com/jhome.php?jcode=ijcis
U2 - 10.1504/IJCIS.2014.062972
DO - 10.1504/IJCIS.2014.062972
M3 - Article
VL - 10
SP - 174
EP - 192
JO - International Journal of Critical Infrastructures
JF - International Journal of Critical Infrastructures
SN - 1475-3219
IS - 2
ER -