Abstract
Physical and cybersecurity is an important topic to be managed in complex communication systems. Specialized equipments and devices help human operators in managing security issues. The security manager of such system shall be capable to correctly decode all the incoming inputs from perceiving subsystems, that can be of different types, and that shall be aggregated and interpreted in the actual environments in order to generate alarms and countermeasures. This paper presents the design of a Decision and Control Unit (DCU) for such systems. The DCU aims at helping the security manager of the system to take informed decision in real-time reducing him/her workload. The general requirements, the architecture and the design of this decision support and decision making system are presented. An example of alarm detection is finally outlined.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cannataro, M., Cuzzocrea, A., Pugliese, A.: A probabilistic approach to model adaptive hypermedia systems. In: Proceedings of the International Workshop for Web Dynamics, pp. 12–30 (2001)
Hall, M.J., Hansen, D.D., Jones, K.: Cross-domain situational awareness and collaborative working for cyber security. In: 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1–8. IEEE (2015)
Boulmakoul, A., Karim, L., Elbouziri, A., Lbath, A.: A system architecture for heterogeneous moving-object trajectory metamodel using generic sensors: tracking airport security case study. IEEE Syst. J. 9(1), 283–291 (2015)
Gould, D., Pollard, R., Sarno, C., Tittensor, P.: Developments to a multiband passive radar demonstrator system. In: 2007 IET International Conference on Radar Systems, pp. 1–5. IET (2007)
Capria, A., Petri, D., Martorella, M., Conti, M., DalleMese, E., Berizzi, F.: DVB-T passive radar for vehicles detection in urban environment. In: 2010 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), pp. 3917–3920. IEEE (2010)
Lukin, K., Mogyla, A., Palamarchuk, V., Vyplavin, P., Zemlyaniy, O., Shiyan, Y., Zaets, M.: Ka-band bistatic ground-based noise waveform sar for short-range applications. IET Radar Sonar Navig. 2(4), 233–243 (2008)
Callegari, C., Gazzarrini, L., Giordano, S., Pagano, M., Pepe, T.: A novel PCA-based network anomaly detection. In: 2011 IEEE International Conference on Communications (ICC), pp. 1–5. IEEE (2011)
Callegari, C., Giordano, S., Pagano, M.: On the combined use of sketches and CUSUM for anomaly detection. In: 2015 International Conference on Computing and Network Communications (CoCoNet), pp. 157–162. IEEE (2015)
Callegari, C., Pietro, A.D., Giordano, S., Pepe, T., Procissi, G.: The LogLog counting reversible sketch: a distributed architecture for detecting anomalies in backbone networks. In: 2012 IEEE International Conference on Communications (ICC), pp. 1287–1291. IEEE (2012)
Chierichetti, F., Epasto, A., Kumar, R., Lattanzi, S., Mirrokni, V.: Efficient algorithms for public-private social networks. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 139–148. ACM (2015)
Chowdhury, N.M.K., Boutaba, R.: A survey of network virtualization. Comput. Netw. 54(5), 862–876 (2010)
Tootoonchian, A., Gorbunov, S., Ganjali, Y., Casado, M., Sherwood, R.: On controller performance in software-defined networks. Hot-ICE 12, 1–6 (2012)
Choo, K.R., Bishop, M., Glisson, W.B., Nance, K.L.: Internet- and cloud-of-things cybersecurity research challenges and advances. Comput. Secur. 74, 275–276 (2018)
Leszczyna, R.: Cybersecurity and privacy in standards for smart grids - a comprehensive survey. Comput. Stand. Interfaces 56, 62–73 (2018)
Takahashi, T., Panta, B., Kadobayashi, Y., Nakao, K.: Web of cybersecurity: linking, locating, and discovering structured cybersecurity information. Int. J. Commun. Syst. 31(3) (2018)
Cuzzocrea, A., Furfaro, F., Saccà, D.: Enabling OLAP in mobile environments via intelligent data cube compression techniques. J. Intell. Inf. Syst. 33(2), 95–143 (2009)
Cuzzocrea, A.: Accuracy control in compressed multidimensional data cubes for quality of answer-based OLAP tools. In: Proceedings of the 18th International Conference on Scientific and Statistical Database Management, SSDBM 2006, 3–5 July 2006, Vienna, Austria, pp. 301–310 (2006)
Cuzzocrea, A., Fortino, G., Rana, O.F.: Managing data and processes in cloud-enabled large-scale sensor networks: state-of-the-art and future research directions. In: 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, CCGrid 2013, Delft, Netherlands, 13–16 May 2013, pp. 583–588 (2013)
Das, S.: Social cybersecurity: understanding and leveraging social influence to increase security sensitivity. IT - Inf. Technol. 58(5), 237–245 (2016)
Hatfield, J.M.: Social engineering in cybersecurity: the evolution of a concept. Comput. Secur. 73, 102–113 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Cuzzocrea, A., Nolich, M., Ukovich, W. (2018). An Innovative Architecture for Supporting Cyber-Physical Security Systems. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2018. ICCSA 2018. Lecture Notes in Computer Science(), vol 10964. Springer, Cham. https://doi.org/10.1007/978-3-319-95174-4_50
Download citation
DOI: https://doi.org/10.1007/978-3-319-95174-4_50
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-95173-7
Online ISBN: 978-3-319-95174-4
eBook Packages: Computer ScienceComputer Science (R0)