Achieving Critical Infrastructure Protection through the Interaction of Computer Security and Network Forensics

被引:5
|
作者
Hunt, Ray [1 ]
Slay, Jill [2 ]
机构
[1] Univ Canterbury, Dept Comp Sci & Software Engn, Networks & Secur, Christchurch, New Zealand
[2] Univ South Australia, Div IT Engn & Environm, Res, Adelaide, SA, Australia
关键词
D O I
10.1109/PST.2010.5593243
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent years have seen substantial development in computer and network security design. This has been manifested as an every increasing range of new protocols, new encryption algorithms, new methods of authentication, smarter firewalls and intrusion detection techniques, new anti-malware products and many more. During the same period of time increasing demands for more trustworthy network infrastructure have seen the development of sophisticated analysis tools necessary to meet the operational requirements of law enforcement agencies. These include tools for e-discovery, commercial intelligence and national security. Thus the industry has seen equally significant developments in computer forensic tools where methods of searching for and detection of, malicious activity for presentation as evidence and provision of trust have become ever more sophisticated. To a considerable degree the science of security and forensics have seen both rapid but separate developments. This paper proposes that there are areas in common between these two important fields of endeavour and sets out techniques and ideas which demonstrate how they can overlap and work together in order to provide improved security and trustworthiness in critical infrastructures. In particular this paper addresses computer security and forensic analysis from a real-time perspective such that security events can be monitored in a live network while sound forensic data collection, storage and processing can be carried out in a manner which supports real-time security and at the same time still meeting the requirements of sound evidence.
引用
收藏
页码:23 / 30
页数:8
相关论文
共 50 条
  • [1] A forensics and compliance auditing framework for critical infrastructure protection
    Henriques, Joao
    Caldeira, Filipe
    Cruz, Tiago
    Simoes, Paulo
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2023, 42
  • [2] A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection
    Henriques, Joao
    Caldeira, Filipe
    Cruz, Tiago
    Simoes, Paulo
    IEEE ACCESS, 2024, 12 : 2409 - 2444
  • [3] PLC Security and Critical Infrastructure Protection
    Sandaruwan, G. P. H.
    Ranaweera, P. S.
    Oleshchuk, Vladimir A.
    2013 8TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2013, : 81 - 85
  • [4] ENERGY SECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
    Jaime Correa-Henao, Gabriel
    Maria Yusta-Loyo, Jose
    REVISTA DIGITAL LAMPSAKOS, 2013, (10): : 92 - 108
  • [5] Pipeline security - Protection of the critical infrastructure gas
    Schmidt, Jürgen
    Technische Sicherheit, 2017, 7 (09):
  • [6] Security That Matters: Critical Infrastructure and Objects of Protection
    Aradau, Claudia
    SECURITY DIALOGUE, 2010, 41 (05) : 491 - 514
  • [7] Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions
    Gupta, B. B.
    Agrawal, Dharma P.
    Yamaguchi, Shingo
    Arachchilage, Nalin A. G.
    Veluru, Suresh
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (9-10) : 513 - 515
  • [8] Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions
    B. B. Gupta
    Dharma P. Agrawal
    Shingo Yamaguchi
    Nalin A. G. Arachchilage
    Suresh Veluru
    Annals of Telecommunications, 2017, 72 : 513 - 515
  • [9] Research on Computer Network Security and Protection
    Liang, Tiantian
    2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 29, 2014, 29 : 244 - 247
  • [10] Protection of Critical Infrastructure in National Cyber Security Strategies
    Izycki, Eduardo
    Colli, Rodrigo
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 219 - 228