Scroll Top


online identification of Failure and Attack on interdependent Critical InfrastructurES

Project Overview: 

Modernization of critical infrastructures is causing important architectural complexities with strong dependences on information systems. The need to integrate distributed automatic systems with the capability to prevent and mitigate anomalous situations is imminently necessary so as to ensure an acceptable level of protection. These anomalous situations can become: from hardware/software errors to failures, natural incidents, accidents and attacks (either physical and cyber attacks).

The FACIES project [1] therefore aims to the provision of distributed and automatic preventive solutions that help underlying systems guarantee their resilience and survivability at all times. This way, it is possible to offer a robust cooperation between entities which can share data streams irrespectively of the situation; i.e. either a normal situation or a threatening situation. This also means to foresee concrete solutions able to improve information management, delivering useful hints for information sharing during crisis situations, in addition to facilitating cooperation between public authorities and private entities under a continued control of threats.

Given that the vast majority of critical infrastructures are controlled by SCADA systems, the goals to achieve by NISC Lab within the FACIES project are twofold. On the one hand, NICS is in charge of addressing the detection of anomalies [2][3] and stealth attacks [4]  in SCADA systems, as well as the provision of a SOTA related to advanced automatic detection [4] and response [5] for these of types of threats. On the other hand, NICS Lab has actively collaborated with the rest of partners for discussion and resolution on-going of existing problems, data dissemination, integration of solutions and validation in laboratory.

  1. C. Alcaraz, and J. Lopez, FACIES: online identification of Failure and Attack on interdependent Critical InfrastructurES“,
    European CIIP Newsletter, vol. 7, European_CIIP_Newsletter, pp. 11-13, Nov 2013. 
  2. C. Alcaraz, and J. Lopez, Diagnosis Mechanism for Accurate Monitoring in Critical Infrastructure Protection“,
    Computer Standards & Interfaces, vol. 36, issue 3, Elsevier, pp. 501-512, 2014. DOI   (I.F.: 0.879)
  3. L. Cazorla, C. Alcaraz, and J. Lopez, Towards Automatic Critical Infrastructure Protection through Machine Learning“,
    8th International Conference on Critical Information Infrastructures Security, vol. 8328, Springer, pp. 197-203, 2013. DOI  
  4. L. Cazorla, C. Alcaraz, and J. Lopez, Cyber Stealth Attacks in Critical Information Infrastructures“,
    IEEE Systems Journal, vol. 12, issue 2, IEEE, pp. 1778-1792, 06/2018. DOI   (I.F.: 4.463)
  5. L. Cazorla, C. Alcaraz, and J. Lopez, Awareness and Reaction Strategies for Critical Infrastructure Protection“,
    Computers and Electrical Engineering, vol. 47, issue October, Elsevier, pp. 299-317, 2015. DOI   (I.F.: 1.084)