An effective security measures for nuclear power plant using big data analysis approach

Among the many hacking attempts carried out against information systems for the past few years, cyber-attacks that could lead to a national-level threat included attacks against nuclear facilities particularly nuclear power stations. Two of the typical examples are the Stuxnet attack against an Iranian nuclear facility and the cyber threat against Korea Hydro and Nuclear Power in December 2015. The former has proven that a direct cyber-attack can actually stop the nuclear power station, and the latter has shown that people can be terrorized with only a (cyber) threat. After these incidents, security measures for cyber-attacks against industrial control systems have been strengthened. The nuclear power stations also changed their passive concept of executing security measures by operating the plant with an isolated network to prepare for the cyber-attacks carried out by malicious codes. The difference between the two concepts is that the latter has been formulated based on the possibility that most of the control systems can be targets of cyber-attacks. Threats against control systems are gradually increasing nowadays, so the relevant industries are implementing some measures to identify/develop safe and reliable digital equipment and identify risks to establish effective cyber security plans. Thus, this paper proposes a security measure based on the classification of past attack incidents against control systems and the big data analysis technique that processes the data generated from individual security equipment. The security of control systems is expected to be strengthened through such effective measure.

[1]  Colin Tankard,et al.  Big data security , 2012, Netw. Secur..

[2]  Jun-Ho Huh,et al.  Big Data Analysis for Personalized Health Activities: Machine Learning Processing for Automatic Keyword Extraction Approach , 2018, Symmetry.

[3]  Alvaro A. Cárdenas,et al.  Big Data Analytics for Security , 2013, IEEE Security & Privacy.

[4]  Gary F. Birkenmeier,et al.  Principally Quasi-Baer Ring Hulls , 2010 .

[5]  Harsh Kupwade Patil,et al.  Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.

[6]  Han Liu,et al.  Rule Based Systems for Big Data , 2015 .

[7]  Sinan Aral,et al.  The spread of true and false news online , 2018, Science.

[8]  Jun-Ho Huh,et al.  Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment , 2018, J. Ambient Intell. Humaniz. Comput..

[9]  Rubén San-Segundo-Hernández,et al.  Feature extraction for robust physical activity recognition , 2017, Human-centric Computing and Information Sciences.

[10]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[11]  Katsumi Hirose,et al.  2011 Fukushima Dai-ichi nuclear power plant accident: summary of regional radioactive deposition monitoring results. , 2012, Journal of environmental radioactivity.

[12]  Tianbo Lu,et al.  Next Big Thing in Big Data: The Security of the ICT Supply Chain , 2013, 2013 International Conference on Social Computing.

[13]  P. Dhavachelvan,et al.  Big Data and Hadoop-a Study in Security Perspective , 2015 .

[14]  Michael I. Jordan,et al.  Machine learning: Trends, perspectives, and prospects , 2015, Science.

[15]  Muhammad Younas,et al.  Transaction processing in consistency-aware user’s applications deployed on NoSQL databases , 2017, Human-centric Computing and Information Sciences.

[16]  Agnieszka Jakobik,et al.  Big Data Security , 2016, Resource Management for Big Data Platforms.

[17]  Jun-Ho Huh,et al.  PLC-based design of monitoring system for ICT-integrated vertical fish farm , 2017, Human-centric Computing and Information Sciences.

[18]  J. Sola,et al.  Importance of input data normalization for the application of neural networks to complex industrial problems , 1997 .

[19]  Jun-Ho Huh,et al.  Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system , 2016, The Journal of Supercomputing.

[20]  Dongpo Zhang Big Data Security and Privacy Protection , 2018 .

[21]  Jun-Ho Huh,et al.  A location-based mobile health care facility search system for senior citizens , 2018, The Journal of Supercomputing.

[22]  Demis Hassabis,et al.  Mastering the game of Go with deep neural networks and tree search , 2016, Nature.

[23]  Fei Hao,et al.  Treatment Planning in Smart Medical: A Sustainable Strategy , 2016, J. Inf. Process. Syst..

[24]  Roberto Schirru,et al.  Identification of nuclear power plant transients using the Particle Swarm Optimization algorithm , 2008 .

[25]  Gary F. Birkenmeier,et al.  Ring Hulls of Semiprime Homomorphic Images , 2008 .

[26]  Jun-Ho Huh,et al.  Design and test bed experiments of server operation system using virtualization technology , 2016, Human-centric Computing and Information Sciences.

[27]  Jun-Ho Huh,et al.  Smart Grid Test Bed Using OPNET and Power Line Communication , 2017 .

[28]  Brett Lantz,et al.  Machine learning with R : learn how to use R to apply powerful machine learning methods and gain an insight into real-world applications , 2013 .

[29]  Atsushi Nagai,et al.  A Hierarchical Structure for the Sharp Constants of Discrete Sobolev Inequalities on a Weighted Complete Graph , 2017, Symmetry.

[30]  R. Kitchin The real-time city? Big data and smart urbanism , 2013 .

[31]  Silvana Trimi,et al.  Big-data applications in the government sector , 2014, Commun. ACM.

[32]  N. B. Anuar,et al.  The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..

[33]  Carl Hewitt,et al.  Open Information Systems Semantics for Distributed Artificial Intelligence , 1991, Artif. Intell..

[34]  Jun-Ho Huh,et al.  B+-tree construction on massive data with Hadoop , 2017, Cluster Computing.

[35]  Chun Chen,et al.  Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks , 2013, IEEE Transactions on Computers.

[36]  Jun-Ho Huh,et al.  Implementation of lightweight intrusion detection model for security of smart green house and vertical farm , 2018, Int. J. Distributed Sens. Networks.

[37]  Martin Gilje Jaatun,et al.  Reference deployment models for eliminating user concerns on cloud security , 2010, The Journal of Supercomputing.

[38]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[39]  Jong Hyuk Park,et al.  Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City , 2017, J. Inf. Process. Syst..