lnu.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
DETECT: A novel framework for the detection of attacks to critical infrastructures
Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).ORCID iD: 0000-0002-2833-7196
2009 (English)In: Safety, Reliability and Risk Analysis: Theory, Methods and Applications - Proceedings of the Joint ESREL and SRA-Europe Conference, 2009, p. 105-112Conference paper, Published paper (Refereed)
Abstract [en]

Critical Infrastructure Protection (CIP) against potential threats has become a major issue in modern society. CIP involves a set of multidisciplinary activities and requires the adoption of proper protection mechanisms, usually supervised by centralized monitoring systems. This paper presents the motivation, the working principles and the software architecture of DETECT (DEcision Triggering Event Composer & Tracker), a new framework aimed at the automatic and early detection of threats against critical infrastructures. The framework is based on the fact that non trivial attack scenarios are made up by a set of basic steps which have to be executed in a predictable sequence (with possible variants). Such scenarios are identified during Vulnerability Assessment which is a fundamental phase of the Risk Analysis for critical infrastructures. DETECT operates by performing a model-based logical, spatial and temporal correlation of basic events detected by the sensorial subsystem (possibly including intelligent video-surveillance, wireless sensor networks, etc.). In order to achieve this aim, DETECT is based on a detection engine which is able to reason about heterogeneous data, implementing a centralized application of "data fusion". The framework can be interfaced with or integrated in existing monitoring systems as a decision support tool or even to automatically trigger adequate countermeasures. © Taylor & Francis Group, London.© 2009 Taylor & Francis Group.

Place, publisher, year, edition, pages
2009. p. 105-112
Keywords [en]
Attack scenarios, Centralized monitoring systems, Critical infrastructure protection, Decision support tools, Early detection, Heterogeneous data, Intelligent video, Model-based, Monitoring system, Multi-disciplinary activities, Non-trivial, Potential threats, Protection mechanisms, Spatial and temporal correlation, Vulnerability assessments, Working principles, Data fusion, Decision support systems, Monitoring, Public works, Reliability analysis, Reliability theory, Risk analysis, Risk assessment, Risk perception, Security systems, Software architecture, Wireless sensor networks, Critical infrastructures
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:lnu:diva-73686Scopus ID: 2-s2.0-79952333081ISBN: 9780415485135 OAI: oai:DiVA.org:lnu-73686DiVA, id: diva2:1213870
Conference
Joint ESREL (European Safety and Reliability) and SRA-Europe (Society for Risk Analysis Europe) Conference, 22 September 2008 through 25 September 2008, Valencia
Note

Conference code: 83674; Cited By :15; Export Date: 26 April 2018; Conference Paper; Correspondence Address: Flammini, F.; ANSALDO STS, Ansaldo Segnalamento Ferroviario S.p.A., Naples, Italy; References: Alferes, J.J., Tagni, G.E., Implementation of a complex event engine for the web (2006) Proceedings of IEEE Services Computing Workshops (SCW 2006), , September 18-22. Chicago, Illinois, USA; Buss, A.H., Modeling with event graphs (1996) Proc. Winter Simulation Conference, pp. 153-160; Cassandra, A.R., Baker, D., Rashid, M., CEDMOS: Complex Event Detection and Monitoring System (1999) MCC Tecnical Report CEDMOS-002-99, MCC, , Austin, TX; Chakravarthy, S., Mishra, D., Snoop: An expressive event specification language for active databases (1994) Data Knowi. Eng., 14 (1), pp. 1-26; Chakravarthy, S., Krishnaprasad, V., Anwar, E., Kim, S., Composite events for active databases: Semantics, contexts and detection (1994) Proceedings of the 20th International Conference on Very Large Data Bases, , September 12-15, 1994; Bocca, J.B., Jarke, M., Zaniolo, C., Very Large Data Bases, pp. 606-617. , Eds. Morgan Kaufmann Publishers, San Francisco, CA; Dayal, U., Blaustein, B.T., Buchmann, A.P., Chakravarthy, S., Hsu, M., Ledin, R., McCarthy, D.R., Jauhari, R., The HiPAC project: Combining active databases and timing constraints (1988) SIGMOD Record, 17 (1), pp. 51-70; Garcia, M.L., (2001) The Design and Evaluation of Physical Protection Systems, , Butterworth-Heinemann, USA; Gatziu, S., Dittrich, K.R., Detecting composite events in active databases using petri nets (1994) Proceedings of the 4th International Workshop on Research Issues in Data Engineering: Active Database Systems, pp. 2-9; Gatziu, S., Dittrich, K.R., Events in an object-oriented database system (2003) Proceedings of the 1st International; Gerani, N.H., Jagadish, H.V., Shmueli, O., (1992) Event Specification in An Object-Oriented Database, , In; Gerani, N.H., Jagadish, H.V., Shmueli, O., COMPOSE a system for composite event specification and detection (1992) Technical Report, AT&T Bell Laboratories, , Murray Hill, NJ; Jain, A.K., Mao, J., Mohiuddin, K.M., Artificial neural networks: A tutorial (1996) IEEE Computer, 29 (3), pp. 56-63; Jones, A.K., Sielken, R.S., Computer system intrusion detection: A survey (2000) Technical Report, Computer Science Dept., , University of Virginia; Krishnaprasad, V., (1994) Event Detection for Supporting Active Capability in An OODBMS: Semantics, Architecture and Implementation, , Master's Thesis. University of Florida; (2008) LENEL OnGuard, , http://www.lenel.com; Lewis, F.L., Wireless sensor networks (2004) Smart Environments: Technologies, Protocols, and Applications, , ed. DJ. Cook and S.K. Das. John Wiley, New York; Lewis, T.G., (2006) Critical Infrastructure Protection in Homeland Security: Defending A Networked Nation, , John Wiley, New York; (2008) Object Management Group UML, , http://www.omg.org/uml; OLE for Process Communication, , http://www.opc.org; Remagnino, P., Velastin, S.A., Foresti, G.L., Trivedi, M., Novel concepts and challenges for the next generation of video surveillance systems (2007) Machine Vision and Applications, 18 (3-4), pp. 135-137. , DOI 10.1007/s00138-006-0059-6; Roman, R., Alcaraz, C., Lopez, J., The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection (2007) Information Security Technical Report, 12 (1), pp. 24-31. , DOI 10.1016/j.istr.2007.02.003, PII S1363412707000052; Tzafestas, S.G., (1999) Advances in Intelligent Autonomous Systems, , Kluwer

Available from: 2018-06-05 Created: 2018-06-05 Last updated: 2018-06-05

Open Access in DiVA

No full text in DiVA

Scopus

Authority records BETA

Flammini, Francesco

Search in DiVA

By author/editor
Flammini, Francesco
By organisation
Department of computer science and media technology (CM)
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 1 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf