Abstract—
The task of collecting and preparing data for CPS security monitoring is formulated. A method for simulation and evaluation of a system for collecting and preparing data for security monitoring and principles for constructing an adaptive solution are given. An example of building and optimizing an adaptive system for CPS monitoring is given.
Similar content being viewed by others
REFERENCES
Vvedenie v problemu kiberbezopasnosti avtomatizirovannykh sistem upravleniya tekhnologicheskimi protsessami. Sbornik statei (Introduction to the Problem of Cybersecurity of Automated Control Systems for Technological Processes. Collection of Articles), Zegzhda, D.P., Ed., St. Petersburg, 2018.
Semenov, V.V., Salakhuddinova, K.I., Lebedev, I.S., and Sukhoparov, M.E., Identification of abnormal deviations in the functioning of cyber-physical systems devices, Prikl. Inf., 2019, no. 6, pp. 114–122.
Burlov, V.G., et al., Industry 4.0. Threats and requirements for the process of managing information security of cyberphysical systems, Inf. Tekhnol. Sist.: Upr. Ekon. Transp. Pravo, 2019, no. 3, pp. 126–129.
Coletta, A. and Armando, A., Security monitoring for industrial control systems, Security of Industrial Control Systems and Cyber Physical Systems, First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015; Lect. Notes Comput. Sci., 2016, vol. 9588, pp. 48–62.
Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Therm. Eng., 2016, vol. 63, no. 13, pp. 948–956.
Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81–87. https://doi.org/10.1145/2947626.2947639
Lavrova, D.S. and Vasil’ev, Y.S., An ontological model of the domain of applications for the Internet of Things in analyzing information security, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 817–823.
Pavlenko, E.Y., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829–834.
Sanfelice, R.G., Analysis and design of cyber-physical systems: A hybrid control systems approach, in Cyber-Physical Systems, CRC Press, 2015, pp. 3–31.
Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.
Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in VANETs, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954–958.
Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for Internet of Things applying metagenome fast analysis, Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, WorldS4, 2019, pp. 129–135.
Belenko, V., Chernenko, V., Kalinin, M., and Krundyshev, V., Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems, 2018 International Russian Automation Conference, RusAutoCon, 2018. https://doi.org/10.1109/RUSAUTOCON.2018.8501783
Zegzhda, D., Lavrova, D., and Khushkeev, A., Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series, Proceedings – 2019 IEEE International Conference on Industrial Cyber Physical Systems, ICPS, 2019, pp. 780–784.
Petrenko, S.A., Review of methods of immune protection of anticipation of disturbances on the cyber systems of Industry 4.0, Zashch. Inf., INSIDE, 2019, no. 5, pp. 36–48.
Lomako, A.G., Ovcharov, V.A., and Petrenko, S.A., A method for investigating security incidents using behavior profiles of network objects, Distantsionnye obrazovatel’nye tekhnologii. Materialy III Vserossiiskoi nauchno-prakticheskoi konferentsii (Distance Educational Technologies. Proc. III All-Russian Scientific and Practical Conference), Yalta, 2018, pp. 366–373.
Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60–64.
Lavrova, D., Poltavtseva, M., Shtyrkina, A., and Zegzhda, P., Detection of cyber threats to network infrastructure of digital production based on the methods of Big Data and multifractal analysis of traffic, SHS Web Conf., 2018, vol. 44, p. 00051. https://doi.org/10.1051/shsconf/20184400051
Saenko, I.B., Kushnerevich, A.G., and Kotenko, I.V., Implementation of a distributed parallel computing platform for collecting and preprocessing large monitoring data in cyber-physical systems, Mezhdunarodnyi kongress po informatike: informatsionnye sistemy i tekhnologii (CSIST-2016). Materialy mezhdunarodnogo nauchnogo kongressa (International Congress on Informatics: Information Systems and Technologies (CSIST-2016). Materials of the International Scientific Congress), Minsk, 2016, pp. 641–645.
Klasa, T. and El Fray, I., Load-balanced integrated information security monitoring system, Ann. Comput. Sci. Inf. Syst., 2017, vol. 13, pp. 213–221.
Marchal, S., Jiang, X., State, R., and Engel, T., A big data architecture for large scale security monitoring, 2014 IEEE International Congress on Big Data, 2014, pp. 56–63. https://doi.org/10.1109/BigData.Congress.2014.18
Manogaran, G., et al., A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system, Future Gener. Comput. Syst., 2018, vol. 82, pp. 375–387. https://doi.org/10.1016/j.future.2017.10.045
Kazarin, O.V., Sharyapov, R.A., and Yashchenko, V.V., Multifactorial classification of threats to information security of cyber-physical systems, Vestn. RGGU Inf. Inf. Bezop., Mat., 2019, no. 1, pp. 39–55.
Poltavtseva, M.A., Support for the inference mechanism of access control systems based on ontologies in a relational server, Metody Tekh. Sredstva Obespecheniya Bezop. Inf., 2016, no. 25, pp. 109–111.
Biryukov, D.N. and Lomako, A.G., An approach to the construction of information security systems capable of synthesizing scenarios of proactive behavior in an information conflict, Zashch. Inf., INSIDE, 2014, no. 6, pp. 42–50.
Pavlenko, E., Zegzhda, D., and Poltavtseva, M., Ensuring the sustainability of cyberphysical systems based on dynamic reconfiguration, 2019 IEEE International Conference on Industrial Cyber Physical Systems, 2019, pp. 785–789. https://doi.org/10.1109/ICPHYS.2019.8780193
Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665–672.
Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337–344.
Poltavtseva, M.A., Zegzhda, P.D., and Pankov, I.D., The hierarchial data aggregation method in backbone traffic streaming analyzing to ensure digital systems information security, 11th International Conference “Management of Large-Scale System Development,” MLSD, 2018, pp. 1–5.
ACKNOWLEDGMENTS
The results of this work were obtained using the computing resources of the supercomputer center of the Peter the Great St. Petersburg Polytechnic University (SCC Polytechnic, http://www.spbstu.ru).
Funding
This work was supported by the Russian Foundation for Basic Research, project no. 18-29-03102.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by I. Obrezanova
About this article
Cite this article
Poltavtseva, M.A., Zegzhda, D.P. Building an Adaptive System for Collecting and Preparing Data for Security Monitoring. Aut. Control Comp. Sci. 54, 968–976 (2020). https://doi.org/10.3103/S0146411620080283
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411620080283