An effective security measures for nuclear power plant using big data analysis approach

被引:43
|
作者
Lee, Sangdo [1 ,2 ]
Huh, Jun-Ho [3 ]
机构
[1] Soongsil Univ, Dept Comp Sci & Engn, Seoul, South Korea
[2] Korea Hydro & Nucl Power KHNP Co LTD, Secur & ICT Dept, Cyber Secur Control Team, Gyeongju, South Korea
[3] Catholic Univ Pusan, Dept Software, Busan, South Korea
来源
JOURNAL OF SUPERCOMPUTING | 2019年 / 75卷 / 08期
基金
新加坡国家研究基金会;
关键词
Nuclear power plant; Big data analysis; AI; Artificial intelligence; Security; NEURAL-NETWORKS;
D O I
10.1007/s11227-018-2440-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Among the many hacking attempts carried out against information systems for the past few years, cyber-attacks that could lead to a national-level threat included attacks against nuclear facilities particularly nuclear power stations. Two of the typical examples are the Stuxnet attack against an Iranian nuclear facility and the cyber threat against Korea Hydro and Nuclear Power in December 2015. The former has proven that a direct cyber-attack can actually stop the nuclear power station, and the latter has shown that people can be terrorized with only a (cyber) threat. After these incidents, security measures for cyber-attacks against industrial control systems have been strengthened. The nuclear power stations also changed their passive concept of executing security measures by operating the plant with an isolated network to prepare for the cyber-attacks carried out by malicious codes. The difference between the two concepts is that the latter has been formulated based on the possibility that most of the control systems can be targets of cyber-attacks. Threats against control systems are gradually increasing nowadays, so the relevant industries are implementing some measures to identify/develop safe and reliable digital equipment and identify risks to establish effective cyber security plans. Thus, this paper proposes a security measure based on the classification of past attack incidents against control systems and the big data analysis technique that processes the data generated from individual security equipment. The security of control systems is expected to be strengthened through such effective measure.
引用
收藏
页码:4267 / 4294
页数:28
相关论文
共 50 条
  • [1] An effective security measures for nuclear power plant using big data analysis approach
    Sangdo Lee
    Jun-Ho Huh
    [J]. The Journal of Supercomputing, 2019, 75 : 4267 - 4294
  • [2] Python']Python TensorFlow Big Data Analysis for the Security of Korean Nuclear Power Plants
    Lee, Sangdo
    Huh, Jun-Ho
    Kim, Yonghoon
    [J]. ELECTRONICS, 2020, 9 (09) : 1 - 19
  • [3] A study on classification of the security controls for the effective implementation to nuclear power plant
    Han, Sang Min
    Lee, Chanyoung
    Chae, Young Ho
    Seong, Poong Hyun
    [J]. NUCLEAR ENGINEERING AND TECHNOLOGY, 2022, 54 (04) : 1245 - 1252
  • [4] Risk Analysis of Cyber Security in Nuclear Power Plant
    Yan, Zhen-Yu
    Chun, Zeng-Jun
    Liu, Gao-Jun
    Zou, Lai-Long
    [J]. NUCLEAR POWER PLANTS: INNOVATIVE TECHNOLOGIES FOR INSTRUMENTATION AND CONTROL SYSTEMS, 2018, 455 : 139 - 147
  • [5] The security measures of FCS in power plant
    Han, Ka
    Yuan, Lihong
    [J]. MECHATRONICS AND INTELLIGENT MATERIALS II, PTS 1-6, 2012, 490-495 : 1446 - +
  • [6] EFFECTIVE SECURITY MECHANISMS FOR BIG DATA USING BLOCK CHAIN TECHNOLOGY
    Pothumani, S.
    Arunachalam, A. R.
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2021,
  • [7] An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks
    Alouneh, Sahel
    Al-Hawari, Feras
    Hababeh, Ismail
    Ghinea, Gheorghita
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [8] Network Security Analysis Using Big Data Technology
    Bachupally, Yogeshwar Rao
    Yuan, Xiaohong
    Roy, Kaushik
    [J]. SOUTHEASTCON 2016, 2016,
  • [9] Big Data Analysis for Effective Management of Power Distribution Network
    Chen, Xi
    La, Yuan
    Zhao, Ji-Guang
    Zhang, Wei
    Chang, Ting-Cheng
    [J]. SENSORS AND MATERIALS, 2021, 33 (01) : 453 - 470
  • [10] An Approach to Security for Unstructured Big Data
    Islam, Md. Ezazul
    Islam, Md. Rafiqul
    Ali, A. B. M. Shawkat
    [J]. REVIEW OF SOCIONETWORK STRATEGIES, 2016, 10 (02): : 105 - 123