A Conceptual Nationwide Cyber Situational Awareness Framework for Critical Infrastructures

  • Hayretdin Bahşi
  • Olaf Manuel Maennel
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9417)


Protection of critical infrastructures against cyber threats is perceived as an important aspect of national security by many countries. These perceptions have extended the technical and organizational aspects of cyber security domain. However, decision makers still suffer from the lack of appropriate decision support systems. This position paper presents a conceptual framework for a nationwide system that monitors the national critical infrastructures and provides cyber situational awareness knowledge to organizational and national level decision makers. A research agenda is proposed for the implementation of this framework.


Cyber situational awareness Critical infrastructure 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Endsley, M.: Situation awareness global assessment technique (sagat). In: Proceedings of the IEEE 1988 National Aerospace and Electronics Conference, NAECON 1988, vol. 3, pp. 789–795 (1988)Google Scholar
  2. 2.
    Office, U.C.: The UK Cyber Security Strategy, protecting and promoting the UK in a digital world (2011)Google Scholar
  3. 3.
    Kaufmann, H., Hutter, R., Skopik, F., Mantere, M.: A structural design for a pan-european early warning system for critical infrastructures. e & i. Elektrotechnik und Informationstechnik 132, 117–121 (2015)CrossRefGoogle Scholar
  4. 4.
    Klimburg, A.: National cyber security framework manual. NATO Cooperative Cyber Defense Center of Excellence (2012)Google Scholar
  5. 5.
    Kowalski, S.: IT insecurity: a multi-disciplinary inquiry. Univ. (1994)Google Scholar
  6. 6.
    McLucas, A.C.: Decision making: risk management, systems thinking and situation awareness. Argos Press P/L (2003)Google Scholar
  7. 7.
    NIST: Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations (2011)Google Scholar
  8. 8.
    Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems 21, 11–25 (2001)CrossRefGoogle Scholar
  9. 9.
    Kokar, M.M., Matheus, C.J., Baclawski, K.: Ontology-based situation awareness. Information Fusion 10, 83–98 (2009)CrossRefGoogle Scholar
  10. 10.
    Rasmussen, J.: Risk management in a dynamic society: A modelling problem. Safety Science 27, 183–213 (1997)CrossRefGoogle Scholar
  11. 11.
    Alsabbagh, B., Kowalski, S.: A cultural adaption model for global cyber security warning systems. In: 5th International Conference on Communications, Networking and Information Technology Dubai, UAE, pp. 16–18 (2011)Google Scholar
  12. 12.
    Egozcue, E., Rodrguez, D.H., Ortiz, J.A., Villar, V.F., Luis, T.: Smart grid security: Recommendations for Europe and member states (2012)Google Scholar
  13. 13.
    Skopik, F., Friedberg, I., Fiedler, R.: Dealing with advanced persistent threats in smart grid ict networks. In: 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), pp. 1–5. IEEE (2014)Google Scholar
  14. 14.
    Zhou, C.V., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Computers & Security 29, 124–140 (2010)CrossRefGoogle Scholar
  15. 15.
    Paulitsch, M., Reiger, R., Strigini, L., Bloomfield, R.: Evidence-based security in aerospace: From safety to security and back again. In: 2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 21–22. IEEE (2012)Google Scholar
  16. 16.
    Bringer, M.L., Chelmecki, C.A., Fujinoki, H.: A survey: Recent advances and future trends in honeypot research. International Journal 4 (2012)Google Scholar
  17. 17.
    Yegneswaran, V., Barford, P., Paxson, V.: Using honeynets for internet situational awareness. In: Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets IV), Citeseer, pp. 17–22 (2005)Google Scholar
  18. 18.
    Aggarwal, C.C., Philip, S.Y.: A general survey of privacy-preserving data mining models and algorithms. Springer (2008)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Hayretdin Bahşi
    • 1
  • Olaf Manuel Maennel
    • 1
  1. 1.Centre for Digital Forensics and Cyber SecurityTallinn University of TechnologyTallinnEstonia

Personalised recommendations