scispace - formally typeset
Journal ArticleDOI

A collaborative cyber incident management system for European interconnected critical infrastructures

TLDR
This paper proposes a system architecture for a National SOC, defining the functional components and interfaces it comprises, and describes the functionalities provided by the different system components to support SOC operators in performing incident management tasks.
Abstract
Today's Industrial Control Systems (ICSs) operating in critical infrastructures (CIs) are becoming increasingly complex; moreover, they are extensively interconnected with corporate information systems for cost-efficient monitoring, management and maintenance. This exposes ICSs to modern advanced cyber threats. Existing security solutions try to prevent, detect, and react to cyber threats by employing security measures that typically do not cross the organization's boundaries. However, novel targeted multi-stage attacks such as Advanced Persistent Threats (APTs) take advantage of the interdependency between organizations. By exploiting vulnerabilities of various systems, APT campaigns intrude several organizations using them as stepping stones to reach the target infrastructure. A coordinated effort to timely reveal such attacks, and promptly deploy mitigation measures is therefore required. Organizations need to cooperatively exchange security-relevant information to obtain a broader knowledge on the current cyber threat landscape and subsequently obtain new insight into their infrastructures and timely react if necessary. Cyber security operation centers (SOCs), as proposed by the European NIS directive, are being established worldwide to achieve this goal. CI providers are asked to report to the responsible SOCs about security issues revealed in their networks. National SOCs correlate all the gathered data, analyze it and eventually provide support and mitigation strategies to the affiliated organizations. Although many of these tasks can be automated, human involvement is still necessary to enable SOCs to adequately take decisions on occurring incidents and quickly implement counteractions. In this paper we present a collaborative approach to cyber incident information management for gaining situational awareness on interconnected European CIs. We provide a scenario and an illustrative use-case for our approach; we propose a system architecture for a National SOC, defining the functional components and interfaces it comprises. We further describe the functionalities provided by the different system components to support SOC operators in performing incident management tasks.

read more

Citations
More filters
Journal ArticleDOI

Security Operations Center: A Systematic Study and Open Challenges

TL;DR: In this article, a comprehensive literature survey is conducted to collate different views of security operations centers (SOCs) and the discovered literature is then used to determine the current state-of-theart of SOCs and derive primary building blocks.
Journal ArticleDOI

Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model

TL;DR: This paper outlines the main elements and relevant technologies for a multi-layer framework that create the necessary knowledge and awareness in relation to network threats over large and heterogeneous computing and networking environments.
Journal ArticleDOI

Systematic Literature Review to Investigate the Application of Open Source Intelligence (OSINT) with Artificial Intelligence

TL;DR: The application of a systematic literature review can show the application of OSINT with AI, and where the largest concentration of publications, which countries and continents develop the most research and the characteristics of these publications are concluded.
Proceedings ArticleDOI

Acquiring Cyber Threat Intelligence through Security Information Correlation

TL;DR: Three methods for security information correlation are introduced and implemented within the cyber threat intelligence analysis engine called CAESAIR and it is demonstrated how the presented techniques can be applied to support incident handling tasks performed by SOCs.
Journal ArticleDOI

An architecture to manage security operations for digital service chains

TL;DR: This paper consolidates existing gaps and research challenges towards advanced assurance and protection of trustworthy and reliable business chains spanning multiple administrative domains and heterogeneous infrastructures in a reference architecture.
References
More filters
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Journal ArticleDOI

An introduction to multisensor data fusion

TL;DR: This paper provides a tutorial on data fusion, introducing data fusion applications, process models, and identification of applicable techniques.
Book

Ontology Learning for the Semantic Web

TL;DR: The authors present an ontology learning framework that extends typical ontology engineering environments by using semiautomatic ontology construction tools and encompasses ontology import, extraction, pruning, refinement and evaluation.
Journal ArticleDOI

Multisensor data fusion: A review of the state-of-the-art

TL;DR: A comprehensive review of the data fusion state of the art is proposed, exploring its conceptualizations, benefits, and challenging aspects, as well as existing methodologies.
Journal ArticleDOI

Semantic integration: a survey of ontology-based approaches

TL;DR: The goal of the paper is to provide a reader who may not be very familiar with ontology research with introduction to major themes in this research and with pointers to different research projects.
Related Papers (5)