Behaviour analysis techniques for supporting critical infrastructure security
by William Hurst; Madjid Merabti; Paul Fergus
International Journal of Critical Infrastructures (IJCIS), Vol. 10, No. 3/4, 2014

Abstract: Protecting critical infrastructures from cyber-threats in an increasingly digital age is a matter of growing urgency for governments and private industries across the globe. In a climate where cyber safety is an uncertainty, fresh and adaptive solutions to existing computer security approaches are a must. In this paper, we present our approach to supporting critical infrastructure security. Data is constructed from a critical infrastructure simulation, developed using Siemens Tecnomatix Plant Simulator and the programming language SimTalk. The data collected from the simulation, when both functioning as normal and during a cyber-attack scenario, is done through the use of observers. By extracting features from the data collected, threats to the system are identified by modelling system behaviour and identifying changes in patterns of activity by using three data classification techniques.

Online publication date: Wed, 14-Jan-2015

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Critical Infrastructures (IJCIS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com