An effective security measures for nuclear power plant using big data analysis approach

被引:43
|
作者
Lee, Sangdo [1 ,2 ]
Huh, Jun-Ho [3 ]
机构
[1] Soongsil Univ, Dept Comp Sci & Engn, Seoul, South Korea
[2] Korea Hydro & Nucl Power KHNP Co LTD, Secur & ICT Dept, Cyber Secur Control Team, Gyeongju, South Korea
[3] Catholic Univ Pusan, Dept Software, Busan, South Korea
来源
JOURNAL OF SUPERCOMPUTING | 2019年 / 75卷 / 08期
基金
新加坡国家研究基金会;
关键词
Nuclear power plant; Big data analysis; AI; Artificial intelligence; Security; NEURAL-NETWORKS;
D O I
10.1007/s11227-018-2440-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Among the many hacking attempts carried out against information systems for the past few years, cyber-attacks that could lead to a national-level threat included attacks against nuclear facilities particularly nuclear power stations. Two of the typical examples are the Stuxnet attack against an Iranian nuclear facility and the cyber threat against Korea Hydro and Nuclear Power in December 2015. The former has proven that a direct cyber-attack can actually stop the nuclear power station, and the latter has shown that people can be terrorized with only a (cyber) threat. After these incidents, security measures for cyber-attacks against industrial control systems have been strengthened. The nuclear power stations also changed their passive concept of executing security measures by operating the plant with an isolated network to prepare for the cyber-attacks carried out by malicious codes. The difference between the two concepts is that the latter has been formulated based on the possibility that most of the control systems can be targets of cyber-attacks. Threats against control systems are gradually increasing nowadays, so the relevant industries are implementing some measures to identify/develop safe and reliable digital equipment and identify risks to establish effective cyber security plans. Thus, this paper proposes a security measure based on the classification of past attack incidents against control systems and the big data analysis technique that processes the data generated from individual security equipment. The security of control systems is expected to be strengthened through such effective measure.
引用
收藏
页码:4267 / 4294
页数:28
相关论文
共 50 条
  • [21] Analysis of Big Data Security Practices
    Revathy, P.
    Mukesh, Rajeswari
    [J]. PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2017, : 264 - 267
  • [22] Alarm Analysis for Nuclear Power Plant by a Functional Modeling Approach
    Qing, Xianguo
    Zhao, Yang
    Li, Wei
    Zhou, Ling
    Xiong, Yan
    Cheng, Bo
    [J]. 2018 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2018, : 4780 - 4784
  • [23] A Distribute Parallel Approach for Big Data Scale Optimal Power Flow with Security Constraints
    Liu, Lanchao
    Khodaei, Amin
    Yin, Wotao
    Han, Zhu
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2013, : 774 - 778
  • [24] Computer Network Security and Preventive Measures in the Age of Big Data
    Xiao, Min
    Guo, Mei
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INTELLIGENT ROBOTICS (ICMIR-2019), 2020, 166 : 438 - 442
  • [25] Impact of Information Security measures on the Velocity of Big Data Infrastructures
    Dupre, Lionel
    Demchenko, Yuri
    [J]. 2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 484 - 491
  • [26] Network Information Security and Protection Measures in the Age of Big Data
    Gao Wenling
    [J]. 2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 191 - 193
  • [27] The accident at the Chernobyl nuclear power plant: A critical analysis of the consequences and protective measures
    S. T. Belyaev
    V. F. Demin
    V. S. Osmachkin
    [J]. Atomic Energy, 1997, 83 : 855 - 862
  • [28] The accident at the Chernobyl nuclear power plant: A critical analysis of the consequences and protective measures
    Belyaev, ST
    Demin, VF
    Osmachkin, VS
    [J]. ATOMIC ENERGY, 1997, 83 (06) : 855 - 862
  • [29] A Smart Approach using Multi-agent System for Big Data Security
    Kassimi, Dounya
    Kazar, Okba
    Barka, Ezedin
    Merizig, Abdelhak
    Houhamdi, Zina
    Athamena, Belkacem
    Zaoui, Meftah
    [J]. 2022 9TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, IOTSMS, 2022, : 75 - 81
  • [30] Big data approach for effective ionic radii
    Gebhardt, Julian
    Rappe, Andrew M.
    [J]. COMPUTER PHYSICS COMMUNICATIONS, 2019, 237 : 238 - 243