A prototype of cyber incident diagnosis mechanism for cyber attacks early recognition support system

Shu Hosokawa, Masatoshi Enomoto, Kohei Matsumoto, Makoto Takahashi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

When abnormalities, including equipment failure and/or cyberattacks, occur in the control system of a production site, it is essential to specify their cause to ensure rapid restoration of the productive equipment. However, it is difficult for control engineers to quickly determine whether the cause is a cyberattack, malware infection, or failure resulting from the state information captured by the plant, because they do not always understand cybersecurity and tend to think about failure diagnosis first. Motivated by this, this paper proposes an information provision system to separate cyberattack information from abnormality information for cyberattack early recognition support. A prototype of an early recognition support system was developed and its validity demonstrated via a simulated plant.

Original languageEnglish
Title of host publication2015 10th Asian Control Conference
Subtitle of host publicationEmerging Control Techniques for a Sustainable World, ASCC 2015
EditorsHazlina Selamat, Hafiz Rashidi Haruna Ramli, Ahmad Athif Mohd Faudzi, Ribhan Zafira Abdul Rahman, Asnor Juraiza Ishak, Azura Che Soh, Siti Anom Ahmad
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479978625
DOIs
Publication statusPublished - 2015 Sep 8
Event10th Asian Control Conference, ASCC 2015 - Kota Kinabalu, Malaysia
Duration: 2015 May 312015 Jun 3

Publication series

Name2015 10th Asian Control Conference: Emerging Control Techniques for a Sustainable World, ASCC 2015

Other

Other10th Asian Control Conference, ASCC 2015
CountryMalaysia
CityKota Kinabalu
Period15/5/3115/6/3

ASJC Scopus subject areas

  • Control and Systems Engineering

Fingerprint Dive into the research topics of 'A prototype of cyber incident diagnosis mechanism for cyber attacks early recognition support system'. Together they form a unique fingerprint.

Cite this