Interconnected computing units are used more and more in our daily lives, starting from the transportation systems and ending with gas and electricity distribution, together with tenths or hundreds of systems and sensors, called critical infrastructures. In this context, cyber protection is vital because they represent one of the most important parts of a country's economy thus making them very attractive to cyber criminals or malware attacks. Even though the detection technologies for new threats have improved over time, modern malware still manage to pass even the most secure and well organized computer networks, firewalls and intrusion detection equipments, making all systems vulnerable. This is the main reason that automatic learning is used more often than any other detection algorithms as it can learn from existing attacks and prevent newer ones. In this paper we discuss the issues threatening critical infrastructures systems and propose a framework based on machine learning algorithms and game theory decision models that can be used to protect such systems. We present the results taken after implementing it using three distinct classifiers - k nearest neighbors, decision trees and support vector machines.
[1]
Andrew McLennan,et al.
Gambit: Software Tools for Game Theory
,
2006
.
[2]
Henrik Hassel,et al.
Impact of Functional Models in a Decision Context of Critical Infrastructure Vulnerability Reduction
,
2014
.
[3]
Youki Kadobayashi,et al.
Ontological approach toward cybersecurity in cloud computing
,
2010,
SIN.
[4]
Min Ouyang,et al.
Review on modeling and simulation of interdependent critical infrastructure systems
,
2014,
Reliab. Eng. Syst. Saf..
[5]
Gerald G. Brown,et al.
Defending Critical Infrastructure
,
2006,
Interfaces.
[6]
Ion Bica,et al.
RASSH - Reinforced adaptive SSH honeypot
,
2014,
2014 10th International Conference on Communications (COMM).
[7]
Cezar Plesca,et al.
Comparison-based computations over fully homomorphic encrypted data
,
2014,
2014 10th International Conference on Communications (COMM).
[8]
Stuart Starr,et al.
Cyberpower and National Security
,
2009
.
[9]
Hongmei Chi,et al.
Designing and implementing cloud-based digital forensics hands-on labs
,
2012,
InfoSecCD.