{"title":"通过行为观察管理关键基础设施","authors":"William Hurst, M. Merabti, P. Fergus","doi":"10.1109/NESEA.2012.6474015","DOIUrl":null,"url":null,"abstract":"Managing critical infrastructures under the growing cyber-threat is becoming a matter of international urgency. The volume and frequency of cyber-related incidents on the rise yearly, and the level of sophistication is increasing. Critical infrastructures are key service providers and heavily interconnected, meaning any damaging impact would result in devastating consequences and potential cascading failure. In this paper, our system, which uses behavioural observation techniques to offer a level of critical infrastructure support, is detailed. Our approach monitors the operation of an infrastructure and identifies any abnormalities which occur by detecting changes in patterns of behaviour. This is done through the development of a model of correct behaviour which then acts as inference model for expected system behaviour. Using this inference model, we then highlight a threat to our simulation environment by observing changes in patterns of activity. Related research and the results of our implementation is discussed.","PeriodicalId":245642,"journal":{"name":"2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Managing critical infrastructures through behavioural observation\",\"authors\":\"William Hurst, M. Merabti, P. Fergus\",\"doi\":\"10.1109/NESEA.2012.6474015\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Managing critical infrastructures under the growing cyber-threat is becoming a matter of international urgency. The volume and frequency of cyber-related incidents on the rise yearly, and the level of sophistication is increasing. Critical infrastructures are key service providers and heavily interconnected, meaning any damaging impact would result in devastating consequences and potential cascading failure. In this paper, our system, which uses behavioural observation techniques to offer a level of critical infrastructure support, is detailed. Our approach monitors the operation of an infrastructure and identifies any abnormalities which occur by detecting changes in patterns of behaviour. This is done through the development of a model of correct behaviour which then acts as inference model for expected system behaviour. Using this inference model, we then highlight a threat to our simulation environment by observing changes in patterns of activity. Related research and the results of our implementation is discussed.\",\"PeriodicalId\":245642,\"journal\":{\"name\":\"2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NESEA.2012.6474015\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NESEA.2012.6474015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Managing critical infrastructures through behavioural observation
Managing critical infrastructures under the growing cyber-threat is becoming a matter of international urgency. The volume and frequency of cyber-related incidents on the rise yearly, and the level of sophistication is increasing. Critical infrastructures are key service providers and heavily interconnected, meaning any damaging impact would result in devastating consequences and potential cascading failure. In this paper, our system, which uses behavioural observation techniques to offer a level of critical infrastructure support, is detailed. Our approach monitors the operation of an infrastructure and identifies any abnormalities which occur by detecting changes in patterns of behaviour. This is done through the development of a model of correct behaviour which then acts as inference model for expected system behaviour. Using this inference model, we then highlight a threat to our simulation environment by observing changes in patterns of activity. Related research and the results of our implementation is discussed.