Skip to main content

An Innovative Architecture for Supporting Cyber-Physical Security Systems

  • Conference paper
  • First Online:
Book cover Computational Science and Its Applications – ICCSA 2018 (ICCSA 2018)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10964))

Included in the following conference series:

Abstract

Physical and cybersecurity is an important topic to be managed in complex communication systems. Specialized equipments and devices help human operators in managing security issues. The security manager of such system shall be capable to correctly decode all the incoming inputs from perceiving subsystems, that can be of different types, and that shall be aggregated and interpreted in the actual environments in order to generate alarms and countermeasures. This paper presents the design of a Decision and Control Unit (DCU) for such systems. The DCU aims at helping the security manager of the system to take informed decision in real-time reducing him/her workload. The general requirements, the architecture and the design of this decision support and decision making system are presented. An example of alarm detection is finally outlined.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cannataro, M., Cuzzocrea, A., Pugliese, A.: A probabilistic approach to model adaptive hypermedia systems. In: Proceedings of the International Workshop for Web Dynamics, pp. 12–30 (2001)

    Google Scholar 

  2. Hall, M.J., Hansen, D.D., Jones, K.: Cross-domain situational awareness and collaborative working for cyber security. In: 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1–8. IEEE (2015)

    Google Scholar 

  3. Boulmakoul, A., Karim, L., Elbouziri, A., Lbath, A.: A system architecture for heterogeneous moving-object trajectory metamodel using generic sensors: tracking airport security case study. IEEE Syst. J. 9(1), 283–291 (2015)

    Article  Google Scholar 

  4. Gould, D., Pollard, R., Sarno, C., Tittensor, P.: Developments to a multiband passive radar demonstrator system. In: 2007 IET International Conference on Radar Systems, pp. 1–5. IET (2007)

    Google Scholar 

  5. Capria, A., Petri, D., Martorella, M., Conti, M., DalleMese, E., Berizzi, F.: DVB-T passive radar for vehicles detection in urban environment. In: 2010 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), pp. 3917–3920. IEEE (2010)

    Google Scholar 

  6. Lukin, K., Mogyla, A., Palamarchuk, V., Vyplavin, P., Zemlyaniy, O., Shiyan, Y., Zaets, M.: Ka-band bistatic ground-based noise waveform sar for short-range applications. IET Radar Sonar Navig. 2(4), 233–243 (2008)

    Article  Google Scholar 

  7. Callegari, C., Gazzarrini, L., Giordano, S., Pagano, M., Pepe, T.: A novel PCA-based network anomaly detection. In: 2011 IEEE International Conference on Communications (ICC), pp. 1–5. IEEE (2011)

    Google Scholar 

  8. Callegari, C., Giordano, S., Pagano, M.: On the combined use of sketches and CUSUM for anomaly detection. In: 2015 International Conference on Computing and Network Communications (CoCoNet), pp. 157–162. IEEE (2015)

    Google Scholar 

  9. Callegari, C., Pietro, A.D., Giordano, S., Pepe, T., Procissi, G.: The LogLog counting reversible sketch: a distributed architecture for detecting anomalies in backbone networks. In: 2012 IEEE International Conference on Communications (ICC), pp. 1287–1291. IEEE (2012)

    Google Scholar 

  10. Chierichetti, F., Epasto, A., Kumar, R., Lattanzi, S., Mirrokni, V.: Efficient algorithms for public-private social networks. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 139–148. ACM (2015)

    Google Scholar 

  11. Chowdhury, N.M.K., Boutaba, R.: A survey of network virtualization. Comput. Netw. 54(5), 862–876 (2010)

    Article  Google Scholar 

  12. Tootoonchian, A., Gorbunov, S., Ganjali, Y., Casado, M., Sherwood, R.: On controller performance in software-defined networks. Hot-ICE 12, 1–6 (2012)

    Google Scholar 

  13. Choo, K.R., Bishop, M., Glisson, W.B., Nance, K.L.: Internet- and cloud-of-things cybersecurity research challenges and advances. Comput. Secur. 74, 275–276 (2018)

    Article  Google Scholar 

  14. Leszczyna, R.: Cybersecurity and privacy in standards for smart grids - a comprehensive survey. Comput. Stand. Interfaces 56, 62–73 (2018)

    Article  Google Scholar 

  15. Takahashi, T., Panta, B., Kadobayashi, Y., Nakao, K.: Web of cybersecurity: linking, locating, and discovering structured cybersecurity information. Int. J. Commun. Syst. 31(3) (2018)

    Article  Google Scholar 

  16. Cuzzocrea, A., Furfaro, F., Saccà, D.: Enabling OLAP in mobile environments via intelligent data cube compression techniques. J. Intell. Inf. Syst. 33(2), 95–143 (2009)

    Article  Google Scholar 

  17. Cuzzocrea, A.: Accuracy control in compressed multidimensional data cubes for quality of answer-based OLAP tools. In: Proceedings of the 18th International Conference on Scientific and Statistical Database Management, SSDBM 2006, 3–5 July 2006, Vienna, Austria, pp. 301–310 (2006)

    Google Scholar 

  18. Cuzzocrea, A., Fortino, G., Rana, O.F.: Managing data and processes in cloud-enabled large-scale sensor networks: state-of-the-art and future research directions. In: 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, CCGrid 2013, Delft, Netherlands, 13–16 May 2013, pp. 583–588 (2013)

    Google Scholar 

  19. Das, S.: Social cybersecurity: understanding and leveraging social influence to increase security sensitivity. IT - Inf. Technol. 58(5), 237–245 (2016)

    Google Scholar 

  20. Hatfield, J.M.: Social engineering in cybersecurity: the evolution of a concept. Comput. Secur. 73, 102–113 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alfredo Cuzzocrea .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cuzzocrea, A., Nolich, M., Ukovich, W. (2018). An Innovative Architecture for Supporting Cyber-Physical Security Systems. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2018. ICCSA 2018. Lecture Notes in Computer Science(), vol 10964. Springer, Cham. https://doi.org/10.1007/978-3-319-95174-4_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-95174-4_50

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-95173-7

  • Online ISBN: 978-3-319-95174-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics