Application of the JDL data fusion process model for cyber security

Author(s):  
Nicklaus A. Giacobe
Author(s):  
Mohammad Nourizadeh ◽  
Mohammad Shakerpour ◽  
Nader Meskin ◽  
Devrim Unal

In this project, the hybrid testbed architecture is selected for the development of ICS testbed where the Tennessee Eastman (TE) plant is simulated inside PC and the remaining components are implemented using real industrial hardware. TE plant is selected as the industrial process for the developed cybersecur ity testbed due to the following reasons. First, the TE modTheel is a wellknown chemical process plant used in control systems research and it dynamics is well understood. Second, it should be properly cont rolled otherwise small disturbance will drive the system toward an unsafe and unstable operat ion. The inherent unstable open-loop property of the TE process model presents a real-world scenario in which a cyberattack could represent a real risk to human safety, environmental safety, and economic viability. Third, the process is complex, coupled and nonlinear, and has many degrees of freedom by which to control and perturb the dynamics of the process.


2016 ◽  
Vol 6 (3) ◽  
pp. 17-30 ◽  
Author(s):  
Ignatius Swart ◽  
Barry Irwin ◽  
Marthie M. Grobler

The potential attack surface of a nation is large and no single source of cyber security data provides all the required information to accurately describe the cyber security readiness of a nation. There are a variety of specialised data sources available to assess the state of a nation in key areas such as botnets, spam servers and incorrectly configured hosts. By applying data fusion principles, the potential exists to provide a representative view of all combined data sources. This research will examine a variety of currently available Internet data sources and apply it to an adapted Joint Directors of Laboratories (JDL) data fusion model in order to illustrate the potential gains and current limitations. The JDL model has been adapted to suit national level cyber sensor data fusion with the aim to formally define and reduce data ambiguity and enhance fusion capability in a real world system. A case study highlights the results of applying available open source security information against the model to relate to the current South African cyber landscape.


Author(s):  
Bin Ma ◽  
Nannan Li ◽  
Kuan Huang ◽  
Changtao Wang ◽  
Zhonghua Han ◽  
...  

2003 ◽  
Vol 56 (3) ◽  
pp. 429-441 ◽  
Author(s):  
Ph. Bonnifait ◽  
P. Bouron ◽  
D. Meizel ◽  
P. Crubillé

A localization system using GPS, ABS sensors and a driving wheel encoder is described and tested through real experiments. A new odometric technique using the four ABS sensors is presented. Due to the redundancy of measurements, the precision is better than the method using differential odometry on the rear wheels only. The sampling is performed when necessary and when a GPS measurement is performed. This implies a noticeable reduction of the GPS latency, simplifying the data-fusion process and improving the quality of its results.


2011 ◽  
Vol 10 ◽  
pp. 1029-1034 ◽  
Author(s):  
Yan Zhang ◽  
Shuguang Huang ◽  
Shize Guo ◽  
Junmao Zhu

Sign in / Sign up

Export Citation Format

Share Document