Framework for the Establishment of Resource-Aware Data Mining Techniques on Critical Infrastructures

  • Miguel Ángel Abad
  • Ernestina Menasalvas
Part of the Communications in Computer and Information Science book series (CCIS, volume 298)


Nowadays, the development of modern societies is based on the availability of essential services by means of industrial control systems or SCADA systems which form part of what has come to be known as critical infrastructures. SCADA systems are usually implemented in a distributed manner, in which some remote terminal units (RTU) are in charge of compiling all of the information from the sensors in the field. The implementation of any efficient protection mechanism in these RTUs demands a “context” and “resource aware” behavior, through the development of intelligent methods that in an efficient way could allow the device to react in a proactive way. However, RTUs are characterized by computational and storage limitations which make it difficult to provide the “intelligence” necessary to develop new decentralized protection systems, which could be useful for the early incident detection based on data mining techniques. This work deals with the problem of executing a classification algorithm in a device with limited computational possibilities. The design presented is characterized by its modularity, adaptability to the available resources, together with its capacity to be reused in other systems with similar characteristics. Results of the experiments carried out are also presented.


Data Mining Bayesian Network Intrusion Detection System Data Mining Technique Critical Infrastructure 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bandyopadhyay, S., Giannella, C., Maulik, U., Kargupta, H., Liu, K., Datta, S.: Clustering distributed data streams in peer-to-peer environments. Inf. Sci. 176(14), 1952–1985 (2006)CrossRefGoogle Scholar
  2. 2.
    Barkhuus, L., Dey, A.K.: Is context-aware computing taking control away from the user? Three levels of interactivity examined. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 149–156. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Bernstein, A., Provost, F.: An intelligent assistant for the knowledge discovery process. Information Systems Working Papers Series (2001)Google Scholar
  4. 4.
    Krutz, R.L.: Securing SCADA systems, pp. 4–16. Wiley Publishing, Inc. (2006)Google Scholar
  5. 5.
    Linda, O., Vollmer, T., Manic, M.: Neural network based intrusion detection system for critical infrastructures. In: Proceedings of the 2009 International Joint Conference on Neural Networks, IJCNN 2009, pp. 102–109. IEEE Press, Piscataway (2009)Google Scholar
  6. 6.
    Lopez, J., Alcaraz, C., Roman, R.: On the Protection and Technologies of Critical Information Infrastructures. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol. 4677, pp. 160–182. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  7. 7.
    Saitta, L., May, M.: Blueprint in Ubiquitous Knowledge Discovery (2007)Google Scholar
  8. 8.
    Mahmood, A.N., Hu, J., Tari, Z., Leckie, C.: Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic. J. Network and Computer Applications 33(4), 491–502 (2010)CrossRefGoogle Scholar
  9. 9.
    Menasalvas, E., Eibe, S., Gomes, J., Zanda, A.: Context-aware recommendations in ubiquitous devices (2008)Google Scholar
  10. 10.
    Ning, P., Jajodia, S.: Intrusion Detection Basics. In: Bidgoli, H, ed. (2006)Google Scholar
  11. 11.
    Scarfone, K., Mell, P.: Intrusion detection and prevention systems. In: Handbook of Information and Communication Security, pp. 177–192 (2010)Google Scholar
  12. 12.
    Shih, Y.S., Lim, T.S., Loh, W.Y.: A comparison of prediction accuracy, complexity, and training time of thirty-three old and new classification algorithms. Machine Learning 40, 203–228 (2000)zbMATHCrossRefGoogle Scholar
  13. 13.
    Witten, I.H., Frank, E.: Data Mining: Practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann (2005)Google Scholar
  14. 14.
    Wu, C.H., Yang, C.H., Lo, S.C., Vichare, N., Rhem, E., Pecht, M.: Automatic data mining for telemetry database of computer systems. Microelectronics Reliability (October 2010)Google Scholar
  15. 15.
    Yu, Z., Tsai, J.J.P., Weigert, T.: An adaptive automatically tuning intrusion detection system. ACM Transactions on Autonomous and Adaptive Systems 3 (August 2008)Google Scholar
  16. 16.
    Yu, Z., Tsai, J.J.P., Weigert, T.: An adaptive automatically tuning intrusion detection system. ACM Trans. Auton. Adapt. Syst. 3, 10:1–10:25 (2008)CrossRefGoogle Scholar
  17. 17.
    Zhang, J., Zulkernine, M.: Anomaly based network intrusion detection with unsupervised outlier detection. In: 2006 IEEE International Conference on Communications, pp. 2388–2393 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Miguel Ángel Abad
    • 1
  • Ernestina Menasalvas
    • 1
  1. 1.Facultad de InformaticaUniversidad Politecnica de MadridSpain

Personalised recommendations