Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard

IF 2.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS International Journal of Information Security Pub Date : 2024-04-13 DOI:10.1007/s10207-024-00841-z
Abdullah Hamad N. Almoqbil
{"title":"Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard","authors":"Abdullah Hamad N. Almoqbil","doi":"10.1007/s10207-024-00841-z","DOIUrl":null,"url":null,"abstract":"<p>Securing critical infrastructure, particularly nuclear power plants, against emerging cyber threats necessitates innovative cybersecurity approaches. This research introduces FusionGuard, a hybrid machine learning-based anomaly detection system designed for early warnings of ransomware and spyware intrusions within nuclear power plant systems. Meticulously tailored to the unique characteristics of nuclear power plant networks, FusionGuard leverages diverse datasets encompassing normal operational behavior and historical threat data. Through cutting-edge machine learning algorithms, the system dynamically adapts to the network's baseline behavior, effectively identifying deviations indicative of ransomware or spyware activities. Rigorous experimentation and validation using real-world data and simulated attack scenarios affirm FusionGuard's proficiency in detecting anomalous behavior with remarkable accuracy and minimal false positives. The research also explores the system's scalability and adaptability to evolving attack vectors, fortifying the cybersecurity posture of nuclear power plant systems in a dynamic threat landscape. In summary, FusionGuard promises to fortify the security of nuclear power plant systems against ransomware and spyware threats by capitalizing on machine learning and anomaly detection. Serving as a sentinel, the system issues timely alerts and enables proactive responses, contributing substantively to the ongoing discourse on protecting essential systems in high-stakes environments.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"49 1","pages":""},"PeriodicalIF":2.4000,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s10207-024-00841-z","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Securing critical infrastructure, particularly nuclear power plants, against emerging cyber threats necessitates innovative cybersecurity approaches. This research introduces FusionGuard, a hybrid machine learning-based anomaly detection system designed for early warnings of ransomware and spyware intrusions within nuclear power plant systems. Meticulously tailored to the unique characteristics of nuclear power plant networks, FusionGuard leverages diverse datasets encompassing normal operational behavior and historical threat data. Through cutting-edge machine learning algorithms, the system dynamically adapts to the network's baseline behavior, effectively identifying deviations indicative of ransomware or spyware activities. Rigorous experimentation and validation using real-world data and simulated attack scenarios affirm FusionGuard's proficiency in detecting anomalous behavior with remarkable accuracy and minimal false positives. The research also explores the system's scalability and adaptability to evolving attack vectors, fortifying the cybersecurity posture of nuclear power plant systems in a dynamic threat landscape. In summary, FusionGuard promises to fortify the security of nuclear power plant systems against ransomware and spyware threats by capitalizing on machine learning and anomaly detection. Serving as a sentinel, the system issues timely alerts and enables proactive responses, contributing substantively to the ongoing discourse on protecting essential systems in high-stakes environments.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于 FusionGuard 对核电站系统中的勒索软件和间谍软件进行早期预警的异常检测
要确保关键基础设施(尤其是核电站)免受新出现的网络威胁,就必须采用创新的网络安全方法。本研究介绍了 FusionGuard,这是一种基于机器学习的混合异常检测系统,旨在对核电站系统中的勒索软件和间谍软件入侵发出预警。FusionGuard 针对核电站网络的独特性进行了精心定制,利用了包括正常操作行为和历史威胁数据在内的各种数据集。通过尖端的机器学习算法,该系统可动态适应网络的基线行为,有效识别表明勒索软件或间谍软件活动的偏差。使用真实数据和模拟攻击场景进行的严格实验和验证证实,FusionGuard 能够非常准确地检测异常行为,误报率极低。研究还探讨了系统的可扩展性和对不断变化的攻击载体的适应性,从而在动态威胁环境中强化核电站系统的网络安全态势。总之,FusionGuard 利用机器学习和异常检测技术,有望加强核电站系统的安全,抵御勒索软件和间谍软件的威胁。作为一个哨兵,该系统能及时发出警报并做出积极主动的响应,为当前保护高风险环境中的重要系统的讨论做出实质性贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Information Security
International Journal of Information Security 工程技术-计算机:理论方法
CiteScore
6.30
自引率
3.10%
发文量
52
审稿时长
12 months
期刊介绍: The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation. Coverage includes system security: intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation; network security: Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures; content protection: watermarking, software protection, tamper resistant software; applications: electronic commerce, government, health, telecommunications, mobility.
期刊最新文献
“Animation” URL in NFT marketplaces considered harmful for privacy An overview of proposals towards the privacy-preserving publication of trajectory data Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by design An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption Secure multi-party computation with legally-enforceable fairness
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1