首页 > 最新文献

International Journal of Critical Infrastructure Protection最新文献

英文 中文
A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE 一个灵活的OT测试平台,用于评估IEC-61850 GOOSE的设备上实现
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100618
Matthew Boeding, M. Hempel, H. Sharif, Juan Lopez, K. Perumalla
{"title":"A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE","authors":"Matthew Boeding, M. Hempel, H. Sharif, Juan Lopez, K. Perumalla","doi":"10.1016/j.ijcip.2023.100618","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100618","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100618"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage 国家和国际海上态势感知模型示例和北溪管道破坏的影响
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100624
Tolga Ahmet Gülcan, Kadir Emrah Erginer

While many countries and international organizations with maritime security interests and rights at sea have developed new security strategies or policies in the wake of the 9/11 terrorist attacks in the United States of America, they have accordingly changed or created new maritime security strategies or doctrines with appropriate Maritime Situational Awareness (MSA) models as well. Maritime deterioration, climate change, cyberattacks, serious and organized crime, epidemics, and state-made threats are just some of the new and growing concerns affecting maritime security. The sabotage of the Nord Stream gas pipelines in the Baltic Sea has given maritime security doctrines and frameworks a new dimension. In this article, the current maritime security approaches and maritime domain or situational awareness (MDA/MSA) model examples of some countries and international organizations from different geographic regions and also the ones that are located in the maritime choke point regions where global maritime trade routes are located and also the effects of the Nord Stream Pipelines sabotages on these are examined in light of the new threats and risks. The principle result reached in this study is that countries and international structures should have a cross governmental maritime security strategy, or at least a doctrine, in order to guide their own maritime situational awareness models and identify information sharing architectures. The most important result of the sabotages on Nord Stream Pipelines for MSA models in this study is that the fastest and most cost-effective method for protecting critical infrastructure under the seas is the concept of systems such as Mothership controlled autonomous and unmanned underwater vehicles, extra large unmanned undersea vehicles and Synthetic-aperture radar (SAR) satellites.

尽管在美利坚合众国发生9/11恐怖袭击后,许多拥有海上安全利益和权利的国家和国际组织制定了新的安全战略或政策,但它们也相应地改变或创造了新的海上安全战略或理论,并采用了适当的海上态势感知模式。海洋恶化、气候变化、网络攻击、严重和有组织犯罪、流行病和国家制造的威胁只是影响海洋安全的一些新的、日益严重的问题。波罗的海北溪天然气管道遭到破坏,给海上安全理论和框架带来了新的层面。在本文中,来自不同地理区域的一些国家和国际组织,以及位于全球海上贸易路线所在的海上瓶颈地区的国家和组织,目前的海上安全方法和海上领域或态势感知(MDA/MSA)模型示例,以及北溪管道破坏对这些方法的影响,在鉴于新的威胁和风险。本研究得出的主要结果是,各国和国际结构应制定跨政府的海上安全战略,或至少制定一项原则,以指导本国的海上态势感知模型并确定信息共享架构。本研究中MSA模型对北溪管道的破坏最重要的结果是,保护海底关键基础设施的最快、最具成本效益的方法是使用系统的概念,如母舰控制的自主和无人水下航行器、超大型无人海底航行器和合成孔径雷达(SAR)卫星。
{"title":"National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage","authors":"Tolga Ahmet Gülcan,&nbsp;Kadir Emrah Erginer","doi":"10.1016/j.ijcip.2023.100624","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100624","url":null,"abstract":"<div><p><span>While many countries and international organizations with maritime security interests and rights at sea have developed new security strategies or policies in the wake of the 9/11 terrorist attacks in the United States of America<span>, they have accordingly changed or created new maritime security strategies or doctrines with appropriate Maritime Situational Awareness (MSA) models as well. Maritime deterioration, climate change, cyberattacks, serious and organized crime, epidemics, and state-made threats are just some of the new and growing concerns affecting maritime security. The sabotage of the Nord Stream gas pipelines in the Baltic Sea has given maritime security doctrines and frameworks a new dimension. In this article, the current maritime security approaches and maritime domain or situational awareness (MDA/MSA) model examples of some countries and international organizations from different geographic regions and also the ones that are located in the maritime choke point regions where global </span></span>maritime trade<span> routes are located and also the effects of the Nord Stream Pipelines sabotages on these are examined in light of the new threats and risks. The principle result reached in this study is that countries and international structures should have a cross governmental maritime security strategy, or at least a doctrine, in order to guide their own maritime situational awareness models and identify information sharing architectures. The most important result of the sabotages on Nord Stream Pipelines for MSA models in this study is that the fastest and most cost-effective method for protecting critical infrastructure under the seas is the concept of systems such as Mothership controlled autonomous and unmanned underwater vehicles, extra large unmanned undersea vehicles and Synthetic-aperture radar (SAR) satellites.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100624"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A forensics and compliance auditing framework for critical infrastructure protection 用于关键基础设施保护的取证和法规遵从性审核框架
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100613
João Henriques , Filipe Caldeira , Tiago Cruz , Paulo Simões

Contemporary societies are increasingly dependent on products and services provided by Critical Infrastructure (CI) such as power plants, energy distribution networks, transportation systems and manufacturing facilities. Due to their nature, size and complexity, such CIs are often supported by Industrial Automation and Control Systems (IACS), which are in charge of managing assets and controlling everyday operations.

As these IACS become larger and more complex, encompassing a growing number of processes and interconnected monitoring and actuating devices, the attack surface of the underlying CIs increases. This situation calls for new strategies to improve Critical Infrastructure Protection (CIP) frameworks, based on evolved approaches for data analytics, able to gather insights from the CI.

In this paper, we propose an Intrusion and Anomaly Detection System (IADS) framework that adopts forensics and compliance auditing capabilities at its core to improve CIP. Adopted forensics techniques help to address, for instance, post-incident analysis and investigation, while the support of continuous auditing processes simplifies compliance management and service quality assessment.

More specifically, after discussing the rationale for such a framework, this paper presents a formal description of the proposed components and functions and discusses how the framework can be implemented using a cloud-native approach, to address both functional and non-functional requirements. An experimental analysis of the framework scalability is also provided.

当代社会越来越依赖关键基础设施(CI)提供的产品和服务,如发电厂、能源分配网络、运输系统和制造设施。由于其性质、规模和复杂性,此类CI通常由负责管理资产和控制日常运营的工业自动化和控制系统(IACS)支持。随着这些IACS变得更大、更复杂,包括越来越多的流程和互连的监控和执行设备,底层CI的攻击面也会增加。这种情况需要新的策略来改进关键基础设施保护(CIP)框架,该框架基于数据分析的进化方法,能够从CI中收集见解。在本文中,我们提出了一个入侵和异常检测系统(IADS)框架,其核心采用取证和合规审计功能来改进CIP。采用的取证技术有助于解决事件后的分析和调查问题,而对持续审计流程的支持简化了合规管理和服务质量评估。更具体地说,在讨论了这种框架的基本原理后,本文对所提出的组件和功能进行了正式描述,并讨论了如何使用云原生方法来实现该框架,以满足功能和非功能需求。还对框架的可伸缩性进行了实验分析。
{"title":"A forensics and compliance auditing framework for critical infrastructure protection","authors":"João Henriques ,&nbsp;Filipe Caldeira ,&nbsp;Tiago Cruz ,&nbsp;Paulo Simões","doi":"10.1016/j.ijcip.2023.100613","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100613","url":null,"abstract":"<div><p>Contemporary societies are increasingly dependent on products and services provided by Critical Infrastructure (CI) such as power plants, energy distribution networks, transportation systems and manufacturing facilities. Due to their nature, size and complexity, such CIs are often supported by Industrial Automation and Control Systems (IACS), which are in charge of managing assets and controlling everyday operations.</p><p>As these IACS become larger and more complex, encompassing a growing number of processes and interconnected monitoring and actuating devices, the attack surface of the underlying CIs increases. This situation calls for new strategies to improve Critical Infrastructure Protection (CIP) frameworks, based on evolved approaches for data analytics, able to gather insights from the CI.</p><p>In this paper, we propose an Intrusion and Anomaly Detection System (IADS) framework that adopts forensics and compliance auditing capabilities at its core to improve CIP. Adopted forensics techniques help to address, for instance, post-incident analysis and investigation, while the support of continuous auditing processes simplifies compliance management and service quality assessment.</p><p>More specifically, after discussing the rationale for such a framework, this paper presents a formal description of the proposed components and functions and discusses how the framework can be implemented using a cloud-native approach, to address both functional and non-functional requirements. An experimental analysis of the framework scalability is also provided.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100613"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A multi-criteria framework for critical infrastructure systems resilience 关键基础设施系统弹性的多标准框架
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100616
Zhuyu Yang , Bruno Barroca , Katia Laffréchine , Alexandre Weppe , Aurélia Bony-Dandrieux , Nicolas Daclin

Critical infrastructure systems (CISs) play an essential role in modern society, as they are important for maintaining critical social functions, economic organisation, and national defence. Recently, CISs resilience has gained popularity in both academic and policy filed facing increased natural or technological disasters. Resilience assessments have become convenient and common tools for disaster management, as assessment results provide useful information to CIS managers. However, CISs resilience assessment is facing challenges of being practical to use in operational risk management.

Although there are many existing assessments for CISs resilience, some shortcomings relating to assessment criteria, which cannot turn resilience useful in practical operation, are frequent in their assessment process. Existing assessments are based on different definitions, which makes criteria generalization difficult. Besides, these assessments are not comprehensive enough. Especially, few assessments address both the cost, effectiveness, and safety of optimisation actions. Moreover, most of the suggested criteria are not specific enough for being used for practical CISs risk management in real cases.

This article develops therefore a multi-criteria framework (MCF) for CISs resilience, consisting of general criteria and a guide for defining specific sub-criteria. In this MCF, the side effects, cascading effects and cost-benefit in resilience scenarios are considered indispensable for CISs resilience assessment. The paper also presents an example of the application of the developed guide through two detailed scenarios, one on a single infrastructural system affected by a natural disaster, and the other addressing the interdependence of this infrastructural system and an urban healthcare system. The designed MCF contributes to the operationalisation and comprehensiveness of CISs resilience assessments.

关键基础设施系统在现代社会中发挥着至关重要的作用,因为它们对维持关键的社会功能、经济组织和国防至关重要。最近,面对日益严重的自然或技术灾害,CISs的复原力在学术和政策领域都越来越受欢迎。复原力评估已成为灾害管理的方便和通用工具,因为评估结果为独联体管理人员提供了有用的信息。然而,CISs的恢复力评估在操作风险管理中的实际应用面临挑战。尽管现有许多针对CISs恢复力的评估,但在其评估过程中,与评估标准相关的一些缺陷经常出现,这些缺陷无法使恢复力在实际操作中发挥作用。现有的评估基于不同的定义,这使得标准难以概括。此外,这些评估还不够全面。特别是,很少有评估同时涉及优化行动的成本、有效性和安全性。此外,大多数建议的标准还不够具体,无法用于实际案例中的CISs风险管理。因此,本文为CISs弹性开发了一个多标准框架(MCF),包括一般标准和定义特定子标准的指南。在该MCF中,复原力场景中的副作用、级联效应和成本效益被认为是CISs复原力评估不可或缺的。本文还通过两个详细的场景介绍了开发指南的应用示例,一个是受自然灾害影响的单一基础设施系统,另一个是解决该基础设施系统与城市医疗系统的相互依赖性。设计的MCF有助于CISs恢复力评估的操作化和全面性。
{"title":"A multi-criteria framework for critical infrastructure systems resilience","authors":"Zhuyu Yang ,&nbsp;Bruno Barroca ,&nbsp;Katia Laffréchine ,&nbsp;Alexandre Weppe ,&nbsp;Aurélia Bony-Dandrieux ,&nbsp;Nicolas Daclin","doi":"10.1016/j.ijcip.2023.100616","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100616","url":null,"abstract":"<div><p>Critical infrastructure systems (CISs) play an essential role in modern society, as they are important for maintaining critical social functions, economic organisation, and national defence. Recently, CISs resilience has gained popularity in both academic and policy filed facing increased natural or technological disasters. Resilience assessments have become convenient and common tools for disaster management, as assessment results provide useful information to CIS managers. However, CISs resilience assessment is facing challenges of being practical to use in operational risk management.</p><p>Although there are many existing assessments for CISs resilience, some shortcomings relating to assessment criteria, which cannot turn resilience useful in practical operation, are frequent in their assessment process. Existing assessments are based on different definitions, which makes criteria generalization difficult. Besides, these assessments are not comprehensive enough. Especially, few assessments address both the cost, effectiveness, and safety of optimisation actions. Moreover, most of the suggested criteria are not specific enough for being used for practical CISs risk management in real cases.</p><p>This article develops therefore a multi-criteria framework (MCF) for CISs resilience, consisting of general criteria and a guide for defining specific sub-criteria. In this MCF, the side effects, cascading effects and cost-benefit in resilience scenarios are considered indispensable for CISs resilience assessment. The paper also presents an example of the application of the developed guide through two detailed scenarios, one on a single infrastructural system affected by a natural disaster, and the other addressing the interdependence of this infrastructural system and an urban healthcare system. The designed MCF contributes to the operationalisation and comprehensiveness of CISs resilience assessments.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100616"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New threats and research problems for critical infrastructure 关键基础设施面临的新威胁和研究问题
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/S1874-5482(23)00042-2
Roberto Setola
{"title":"New threats and research problems for critical infrastructure","authors":"Roberto Setola","doi":"10.1016/S1874-5482(23)00042-2","DOIUrl":"https://doi.org/10.1016/S1874-5482(23)00042-2","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100629"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the comprehensive importance of power grid nodes based on DEA 基于DEA的电网节点综合重要性评估
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100614
Xing Gao, Yunxia Ye, Wenxin Su, Linyan Chen
{"title":"Assessing the comprehensive importance of power grid nodes based on DEA","authors":"Xing Gao, Yunxia Ye, Wenxin Su, Linyan Chen","doi":"10.1016/j.ijcip.2023.100614","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100614","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100614"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-criteria framework for critical infrastructure systems resilience 关键基础设施系统弹性的多标准框架
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100616
Zhuyu Yang, B. Barroca, Katia Laffréchine, Alexandre Weppe, Aurélia Bony-Dandrieux, N. Daclin
{"title":"A multi-criteria framework for critical infrastructure systems resilience","authors":"Zhuyu Yang, B. Barroca, Katia Laffréchine, Alexandre Weppe, Aurélia Bony-Dandrieux, N. Daclin","doi":"10.1016/j.ijcip.2023.100616","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100616","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100616"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction 关键基础设施保护的管理知识图谱方法:本体设计、信息提取和关系预测
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-23 DOI: 10.1016/j.ijcip.2023.100634
Jiarui Chen, Yiqin Lu, Yang Zhang, Fang Huang, Jiancheng Qin

Critical Infrastructures (CI) underpin the basic functioning of society and the economy. Proper governance of CI security management remains a crucial challenge. This study aims to construct a knowledge graph for modeling CI protection. While the previous research has focused on threat intelligence modeling and open knowledge bases, they miss considering the defense side. Accordingly, we propose a knowledge graph for critical infrastructure protection, CIPKG, that extends the management ontology to include the defense side. It addresses the cross-industry and cross-time information gaps that occur in the process of CI protection management, making it more comprehensive in structure than the existing knowledge graph. We employ simplified Structured Threat Information Expression as attack ontology and design a new ontology for the defense side, which could combine with the existing threat ontology to form the CI protection knowledge graph. To dynamically extract information from emerging knowledge, we employ a Bi-directional Long Short-Term Memory and Conditional Random Field model with pre-trained cybersecurity domain-specific Bidirectional Encoder Representations from Transformers to recognize the named entities from CI regulations and standards. To associate the threat part with the management portion of the knowledge graph, we adopt the Knowledge Graph Bidirectional Encoder Representations from Transformer model to capture the semantic information and predict the relationship between threat and management. After information extraction and relation prediction, we build a knowledge graph with 529,360 nodes and about 3,335,000 edges.

关键基础设施是社会和经济基本运作的基础。CI安全管理的适当治理仍然是一个关键挑战。本研究旨在构建一个用于CI保护建模的知识图。虽然之前的研究侧重于威胁情报建模和开放知识库,但他们没有考虑防御方面。因此,我们提出了一个用于关键基础设施保护的知识图CIPKG,它扩展了管理本体以包括防御端。它解决了CI保护管理过程中出现的跨行业、跨时间的信息缺口,使其在结构上比现有的知识图更全面。我们采用简化的结构化威胁信息表达作为攻击本体,并为防御方设计了一个新的本体,该本体可以与现有的威胁本体相结合,形成CI保护知识图。为了从新兴知识中动态提取信息,我们使用双向长短期记忆和条件随机场模型,该模型具有来自Transformers的预先训练的网络安全领域特定双向编码器表示,以识别CI法规和标准中的命名实体。为了将威胁部分与知识图的管理部分相关联,我们采用Transformer模型中的知识图双向编码器表示来捕获语义信息,并预测威胁与管理之间的关系。经过信息提取和关系预测,我们构建了一个具有529360个节点和大约3335000条边的知识图。
{"title":"A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction","authors":"Jiarui Chen,&nbsp;Yiqin Lu,&nbsp;Yang Zhang,&nbsp;Fang Huang,&nbsp;Jiancheng Qin","doi":"10.1016/j.ijcip.2023.100634","DOIUrl":"10.1016/j.ijcip.2023.100634","url":null,"abstract":"<div><p><span><span>Critical Infrastructures (CI) underpin the basic functioning of society and the economy. Proper governance of CI security management remains a crucial challenge. This study aims to construct a </span>knowledge graph for modeling </span>CI protection<span><span><span><span>. While the previous research has focused on threat intelligence modeling and open knowledge bases, they miss considering the defense side. Accordingly, we propose a knowledge graph for critical infrastructure protection, CIPKG, that extends the management ontology to include the defense side. It addresses the cross-industry and cross-time information gaps that occur in the process of CI protection management, making it more comprehensive in structure than the existing knowledge graph. We employ simplified Structured Threat Information Expression as attack ontology and design a new ontology for the defense side, which could combine with the existing threat ontology to form the CI protection knowledge graph. To dynamically extract information from emerging knowledge, we employ a Bi-directional Long Short-Term Memory and </span>Conditional Random Field model with pre-trained cybersecurity domain-specific </span>Bidirectional Encoder Representations from Transformers to recognize the named entities from CI </span>regulations and standards<span>. To associate the threat part with the management portion of the knowledge graph, we adopt the Knowledge Graph Bidirectional Encoder Representations from Transformer model to capture the semantic information and predict the relationship between threat and management. After information extraction and relation prediction, we build a knowledge graph with 529,360 nodes and about 3,335,000 edges.</span></span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100634"},"PeriodicalIF":3.6,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48992216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage 国家和国际海上态势感知模型实例和北溪管道破坏的影响
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-01 DOI: 10.1016/j.ijcip.2023.100624
T. A. Gülcan, K. E. Erginer
{"title":"National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage","authors":"T. A. Gülcan, K. E. Erginer","doi":"10.1016/j.ijcip.2023.100624","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100624","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100624"},"PeriodicalIF":3.6,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies 具有不同拓扑结构的弹性相互依赖关键基础设施的网络扩展决策评估
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100623
Achara Tiong, Hector A. Vergara
{"title":"Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies","authors":"Achara Tiong, Hector A. Vergara","doi":"10.1016/j.ijcip.2023.100623","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100623","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100623"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Critical Infrastructure Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1