Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Behaviour analysis techniques for supporting critical infrastructure security

Hurst, W, Merabti, M and Fergus, P (2014) Behaviour analysis techniques for supporting critical infrastructure security. International Journal of Critical Infrastructures, 10 (3-4). ISSN 1475-3219

[img]
Preview
Text
Behavioural Classification for Enhancing Critical Infrastructure Security.pdf - Accepted Version

Download (572kB) | Preview

Abstract

Protecting critical infrastructures from cyber-threats in an increasingly digital age is a matter of growing urgency for governments and private industries across the globe. In a climate where cyber-security is an uncertainty, fresh and adaptive solutions to existing computer security approaches are a must. In this paper, we present our approach to supporting critical infrastructure security. The use of our critical infrastructure simulation, developed using Siemens Tecnomatix Plant Simulator and the programming language SimTalk, is used to construct realistic data from a simulated nuclear power plant. The data collected from the simulation, when both functioning as normal and during a cyber-attack scenario, is done through the use of an observer pattern. By extracting features from the data collected, threats to the system are identified by modelling system behaviour and identifying changes in patterns of activity by using three data classification techniques.

Item Type: Article
Uncontrolled Keywords: 0905 Civil Engineering
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: Computer Science
Publisher: Inderscience
Date Deposited: 25 Jan 2019 16:09
Last Modified: 25 Jan 2019 16:10
URI: http://researchonline.ljmu.ac.uk/id/eprint/10035

Actions (login required)

View Item View Item