• DocumentCode
    166676
  • Title

    Big Data Analysis Techniques for Cyber-threat Detection in Critical Infrastructures

  • Author

    Hurst, Wolfgang ; Merabti, Madjid ; Fergus, P.

  • Author_Institution
    PROTECT: Res. Centre for Critical Infrastruct. Comput. Technol. & Protection Sch. of Comput. & Math. Sci., Liverpool John Moores Univ., Liverpool, UK
  • fYear
    2014
  • fDate
    13-16 May 2014
  • Firstpage
    916
  • Lastpage
    921
  • Abstract
    The research presented in this paper offers a way of supporting the security currently in place in critical infrastructures by using behavioural observation and big data analysis techniques to add to the Defence in Depth (DiD). As this work demonstrates, applying behavioural observation to critical infrastructure protection has effective results. Our design for Behavioural Observation for Critical Infrastructure Security Support (BOCISS) processes simulated critical infrastructure data to detect anomalies which constitute threats to the system. This is achieved using feature extraction and data classification. The data is provided by the development of a nuclear power plant simulation using Siemens Tecnomatix Plant Simulator and the programming language SimTalk. Using this simulation, extensive realistic data sets are constructed and collected, when the system is functioning as normal and during a cyber-attack scenario. The big data analysis techniques, classification results and an assessment of the outcomes is presented.
  • Keywords
    Big Data; critical infrastructures; feature extraction; pattern classification; programming languages; security of data; BOCISS process; DiD; Siemens Tecnomatix Plant Simulator; anomaly detection; behavioural observation; big data analysis techniques; critical infrastructure protection; critical infrastructure security support process; cyber-attack scenario; cyber-threat detection; data classification; defence in depth; feature extraction; nuclear power plant simulation; programming language SimTalk; realistic data set; simulated critical infrastructure data; Big data; Data models; Feature extraction; Inductors; Security; Support vector machine classification; Water resources; Behavioural Observation; Big Data; Critical Infrastructure; Data Classification; Simulation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on
  • Conference_Location
    Victoria, BC
  • Print_ISBN
    978-1-4799-2652-7
  • Type

    conf

  • DOI
    10.1109/WAINA.2014.141
  • Filename
    6844756