{"title":"Automatic Identification of Critical Digital Assets","authors":"Jonathan West, J. Hale, M. Papa, P. Hawrylak","doi":"10.1109/ICDIS.2019.00040","DOIUrl":null,"url":null,"abstract":"Within the nuclear reactor domain, many of the assets which were once analog are being phased out and replaced with digital assets. The ability to automatically identify which of these digital assets are also critical assets as defined by the Nuclear Regulatory Commission (NRC) is an important step in building an effective cybersecurity program for the nuclear power domain. This paper presents an approach to automatically identify these critical digital assets. Three variations of this approach are presented in this paper. The runtime of these three implementations is obtained to demonstrate how each scales as network model sizes for nuclear reactors increase.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDIS.2019.00040","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Within the nuclear reactor domain, many of the assets which were once analog are being phased out and replaced with digital assets. The ability to automatically identify which of these digital assets are also critical assets as defined by the Nuclear Regulatory Commission (NRC) is an important step in building an effective cybersecurity program for the nuclear power domain. This paper presents an approach to automatically identify these critical digital assets. Three variations of this approach are presented in this paper. The runtime of these three implementations is obtained to demonstrate how each scales as network model sizes for nuclear reactors increase.