A multi-agent immunologically-inspired model for critical information infrastructure protection - An immunologically-inspired conceptual model for security on the power grid

S. M.A. Mavee, E. M. Ehlers

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

Critical Infrastructure (CI) is the term used to describe assets that are of utmost importance, or in other words, essential in the functioning of an environment. Societies depend on their critical infrastructure in order to maintain and continuously improve on their standards of living. As these systems increasingly depend on cyber-technology, their security on networked environments become crucial. The modern smart grid has become part of CI through the enhancement it provides to regular electricity grid infrastructure. The application of biologically inspired systems to ensure security in aspects such as intrusion detection, access control, anomaly detection and others has become a widely researched field in when dealing with networked computing systems. This paper discusses the importance of CI, the application of artificial immune systems in the protection of CI information systems and proposes a new model for smart grid protection using biologically inspired concepts.

Original languageEnglish
Title of host publicationProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
Pages1089-1096
Number of pages8
DOIs
Publication statusPublished - 2012
Event11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - Liverpool, United Kingdom
Duration: 25 Jun 201227 Jun 2012

Publication series

NameProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012

Conference

Conference11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
Country/TerritoryUnited Kingdom
CityLiverpool
Period25/06/1227/06/12

Keywords

  • Critical infrastructure
  • SCADA
  • danger theory
  • immune algorithms
  • immunological computation

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'A multi-agent immunologically-inspired model for critical information infrastructure protection - An immunologically-inspired conceptual model for security on the power grid'. Together they form a unique fingerprint.

Cite this