Projects per year
Abstract
Industry 4.0 and the ongoing digital transformation along with a large number interconnected machines and devices increase the role of cybersecurity, cyber incident handling and incident response in the factories of the future (FoF). Cyber incident information sharing plays a major role when we need to formulate situational pictures about FoF operations and environment, and respond to cybersecurity threats related to e.g. the implementation of novel technologies. Sharing of incident information has a major drawback since it may reveal too much about the attack target, e.g. in the case of legacy systems and therefore restrictions may apply. We have developed a proof-of-concept service that combines access control and encryption of data at high granularity and a mechanism for requesting access to restricted cyber incident information. The objective was to demonstrate how access to restricted incident data fields could be managed in a fine-grained manner to enhance information sharing.
Original language | English |
---|---|
Title of host publication | Data Mining and Machine Learning |
Subtitle of host publication | 3rd International Conference on Data Mining and Machine Learning (DMML 2022) |
Editors | David Wyld, Dhinaharan Nagamalai |
Publisher | AIRCC Publishing Corporation |
Number of pages | 14 |
Volume | 12 |
Edition | 7 |
ISBN (Electronic) | 978-1-925953-66-4 |
Publication status | Published - 2022 |
MoE publication type | A4 Article in a conference publication |
Event | 3rd International Conference on Data Mining and Machine Learning, DMML 2022 - Copenhagen, Denmark Duration: 23 Apr 2022 → 24 Apr 2022 |
Conference
Conference | 3rd International Conference on Data Mining and Machine Learning, DMML 2022 |
---|---|
Abbreviated title | DMML 2022 |
Country/Territory | Denmark |
City | Copenhagen |
Period | 23/04/22 → 24/04/22 |
Keywords
- incident management
- visualisation
- cybersecurity
- information sharing
Fingerprint
Dive into the research topics of 'How to Enhance the Sharing of Cyber Incident Information via Fine-Grained Access Control'. Together they form a unique fingerprint.Projects
- 1 Finished