An effective security measures for nuclear power plant using big data analysis approach

被引:43
|
作者
Lee, Sangdo [1 ,2 ]
Huh, Jun-Ho [3 ]
机构
[1] Soongsil Univ, Dept Comp Sci & Engn, Seoul, South Korea
[2] Korea Hydro & Nucl Power KHNP Co LTD, Secur & ICT Dept, Cyber Secur Control Team, Gyeongju, South Korea
[3] Catholic Univ Pusan, Dept Software, Busan, South Korea
来源
JOURNAL OF SUPERCOMPUTING | 2019年 / 75卷 / 08期
基金
新加坡国家研究基金会;
关键词
Nuclear power plant; Big data analysis; AI; Artificial intelligence; Security; NEURAL-NETWORKS;
D O I
10.1007/s11227-018-2440-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Among the many hacking attempts carried out against information systems for the past few years, cyber-attacks that could lead to a national-level threat included attacks against nuclear facilities particularly nuclear power stations. Two of the typical examples are the Stuxnet attack against an Iranian nuclear facility and the cyber threat against Korea Hydro and Nuclear Power in December 2015. The former has proven that a direct cyber-attack can actually stop the nuclear power station, and the latter has shown that people can be terrorized with only a (cyber) threat. After these incidents, security measures for cyber-attacks against industrial control systems have been strengthened. The nuclear power stations also changed their passive concept of executing security measures by operating the plant with an isolated network to prepare for the cyber-attacks carried out by malicious codes. The difference between the two concepts is that the latter has been formulated based on the possibility that most of the control systems can be targets of cyber-attacks. Threats against control systems are gradually increasing nowadays, so the relevant industries are implementing some measures to identify/develop safe and reliable digital equipment and identify risks to establish effective cyber security plans. Thus, this paper proposes a security measure based on the classification of past attack incidents against control systems and the big data analysis technique that processes the data generated from individual security equipment. The security of control systems is expected to be strengthened through such effective measure.
引用
收藏
页码:4267 / 4294
页数:28
相关论文
共 50 条
  • [41] Guaging the Effectivity of Existing Security Measures for Big Data in Cloud Environment
    Dule, Chhaya S.
    Girijamma, H. A.
    [J]. SOFTWARE ENGINEERING TRENDS AND TECHNIQUES IN INTELLIGENT SYSTEMS, CSOC2017, VOL 3, 2017, 575 : 209 - 219
  • [42] Multi-State Reliability Measures Analysis of Nuclear Power Plant (NPP) System
    Kumar, Amit
    Saxena, Anshumaan
    Ram, Mangey
    [J]. INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2020, 27 (02)
  • [43] Anomaly Detection in Nuclear Power Plant Data using Support Vector Data Description
    Maurya, Chandresh Kumar
    Toshniwal, Durga
    [J]. 2014 IEEE STUDENTS' TECHNOLOGY SYMPOSIUM (IEEE TECHSYM), 2014, : 82 - 86
  • [44] Analysis of critical electricity price for the investment for constructing a nuclear power plant using real options approach
    Takizawa, S
    Omori, R
    Suzuki, A
    Ono, R
    [J]. JOURNAL OF NUCLEAR SCIENCE AND TECHNOLOGY, 2001, 38 (10) : 907 - 909
  • [45] A Methodological Approach for Big Data Security: Application for NoSQL Data Stores
    Heni, Houyem
    Gargouri, Faiez
    [J]. NEURAL INFORMATION PROCESSING, ICONIP 2015, PT IV, 2015, 9492 : 685 - 692
  • [46] Network security analysis using big data technology and improved neural network
    Bao, Ke
    Ding, Yourong
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020,
  • [47] Big Data and the Industrial Internet Meet the Power Plant
    Reitenbach, Gail
    [J]. POWER, 2016, 160 (01) : 26 - 31
  • [48] Big Data Security using Fragmentation in Mongo Data Store
    Heni, Houyem
    Gargouri, Faiez
    [J]. VISION 2020: INNOVATION MANAGEMENT, DEVELOPMENT SUSTAINABILITY, AND COMPETITIVE ECONOMIC GROWTH, 2016, VOLS I - VII, 2016, : 801 - 812
  • [49] Sentiment Analysis of Real Time Twitter data using Big data Approach
    Rodrigues, Anisha P.
    Rao, Archana
    Chiplunkar, Niranjan N.
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON COMPUTATIONAL SYSTEMS AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTION (CSITSS-2017), 2017, : 175 - 180
  • [50] EFFECTIVE SOFTWARE VERIFICATION AND VALIDATION APPROACH FOR NUCLEAR POWER PLANT DIGITAL INSTRUMENTATION AND CONTROL SYSTEMS
    Yang, Steve
    Ding, Jun
    Miao, Huifang
    Zheng, Jianxiang
    [J]. PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING 2010, VOL 1, 2011, : 659 - 665