Ranking of security controlling strategies driven by quantitative threat analysis. Tavolo 2: "Big data security evaluation" UNIFI-CNR Nicola Nostro, Ilaria.

Slides:



Advertisements
Similar presentations
Open repositories: value added services The Socionet example Sergey Parinov, CEMI RAS and euroCRIS.
Advertisements

Provenance-Aware Storage Systems Margo Seltzer April 29, 2005.
Catalogue Energy Interventions Data and Information Needs Development and Energy in Africa First National Workshop September 1, 2005 ….innovating energy.
Meeting TENACE PhD Session Fai della Paganella, 11 febbraio 2014 R esilient C omputing L ab A methodology and supporting techniques for the assessment.
1 st Review Meeting, Brussels 5/12/12 – Technical progress (P. Paganelli, Bluegreen) iCargo 1st Review Meeting Brussels 5/12/12 Technical.
UCAIug HAN SRS v2.0 Summary August 12, Scope of HAN SRS in the NIST conceptual model.
Ranking of security controlling strategies driven by quantitative threat analysis. Tavolo 2: "Big data security evaluation" UNIFI-CNR Nicola Nostro, Andrea.
Page16/2/2015 Sirlan Usage and usability considerations for SIRLAN solution success.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
UGDIE PROJECT MEETING Bled September WP6 – Assessment and Evaluation Evaluation Planning  Draft Evaluation plan.
Introduction (Pendahuluan)  Information Security.
Software Process and Product Metrics
Advanced Metering Infrastructure
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
Introduction to Computer Technology
Enterprise Architecture
Romaric GUILLERM Hamid DEMMOU LAAS-CNRS Nabil SADOU SUPELEC/IETR ESM'2009, October 26-28, 2009, Holiday Inn Leicester, Leicester, United Kingdom.
Getting ready for Advanced Metering Infrastructure Paper by : Rajesh Nimare Presented by : Prashant Sharma.
Romaric GUILLERM Hamid DEMMOU LAAS-CNRS Nabil SADOU SUPELEC/IETR.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Dr. István Fekete: The Role of Integrated Risk Management in Organizations April11th, Budapest.
Supporting Resilence in Air Traffic Management A. Tedeschi, M. Felici, V. Meduri, C. Riccucci SERENE 2008 November 17-19, 2008, Newcastle upon Tyne, UK.
Thirteenth Lecture Hour 8:30 – 9:20 am, Sunday, September 16 Software Management Disciplines Process Automation (from Part III, Chapter 12 of Royce’ book)
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Text CONSEG 09 Domain Knowledge assisted Requirements Evolution (K-RE)
1 “ Understanding leads to perfection” Author: Herb Isenberg Ph.D A Bird’s Eye View Quality Foundations January 2011.
Slide 1 D2.TCS.CL5.04. Subject Elements This unit comprises five Elements: 1.Define the need for tourism product research 2.Develop the research to be.
Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack.
Verification of Information Flow Properties in Cyber-Physical Systems Ravi Akella, Bruce McMillin Department of Computer Science Missouri University of.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
State of Maine NASACT Presentation “Using the Business Case to Guide a Transformation Procurement” 1 Using the Business Case to Guide a Transformation.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
1 Chapter 23 Estimation for Software Projects. 2 Software Project Planning The overall goal of project planning is to establish a pragmatic strategy for.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Information Security Antipatterns in Software Requriements Engineering Miroslav Kis Presented by Liping Cai.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
1 Dept of Information and Communication Technology Creating Objects in Flexible Authorization Framework ¹ Dep. of Information and Communication Technology,
Architectural Design lecture 10. Topics covered Architectural design decisions System organisation Control styles Reference architectures.
9/17/2002 COSYSMO Usage Experience Panel: What is Happening at Lockheed Martin Garry Roedler, Lockheed Martin Engineering Process Improvement Center
1 CIM OSA CIMOSA Computer Integrated Manufacturing Open System Architecture 1 David CHEN IMS-LAPS, University Bordeaux 1.
Geneva, Switzerland, April 2012 Introduction to session 7 - “Advancing e-health standards: Roles and responsibilities of stakeholders” ​ Marco Carugi.
JEMMA: an open platform for a connected Smart Grid Gateway GRUPPO TELECOM ITALIA MAS2TERING Smart Grid Workshop Brussels, September Strategy &
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
A Secure JBoss Platform Nicola Mezzetti Acknowledgments: F. Panzieri.
Relay Placement Problem in Smart Grid Deployment Wei-Lun Wang and Quincy Wu Department of Computer Science and Information Engineering, National Chi Nan.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Rational Unified Process Fundamentals Best Practices of Software Engineering Rational Unified Process Fundamentals Best Practices of Software Engineering.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
 CMMI  REQUIREMENT DEVELOPMENT  SPECIFIC AND GENERIC GOALS  SG1: Develop CUSTOMER Requirement  SG2: Develop Product Requirement  SG3: Analyze.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Cloud Accounting Survey of current status Andrea Guarise – Bologna- Giornata di studio sul Cloud Computing 6 Febbraio 2013.
Statistical process model Workshop in Ukraine October 2015 Karin Blix Quality coordinator
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Myongji University HMCL
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Summary of our work Password Eavesdropping
CIM Modeling for E&U - (Short Version)
Presented by Munezero Immaculee Joselyne PhD in Software Engineering
DT249/4 Information Systems Engineering Lecture 0
Instantiation of the Concept in GAMMA Prototypes
Chapter 13 & 14 Software Testing Strategies and Techniques
Final Conference 18 Set 2018.
Results Based Management for Monitoring & Evaluation
Effective Risk Management in Decision Making Process
Item 7.11 SDMX Progress report
Implementation Plan system integration required for each iteration
Chapter 13 & 14 Software Testing Strategies and Techniques 1 Software Engineering: A Practitioner’s Approach, 6th edition by Roger S. Pressman.
Presentation transcript:

Ranking of security controlling strategies driven by quantitative threat analysis. Tavolo 2: "Big data security evaluation" UNIFI-CNR Nicola Nostro, Ilaria Matteucci, Andrea Ceccarelli, Felicita Di Giandomenico, Fabio Martinelli, Andrea Bondavalli

Outline 1.General description of work 2.Basics 3.Architecture/Framework 4.Use case 5.Conclusions and future works

Fai della Paganella 1.General description of work 2.Basics 3.Architecture/Framework

General description of the work Security analysis and design are key activities for the protection of critical systems and infrastructure. Traditional approaches: – Apply a qualitative threat assessment – Results used as input for the security design such that appropriate countermeasures are selected Our work: selection and ranking of security controlling strategies driven by quantitative threat analysis – Threat analysis that identifies attack points and paths, and ranks attacks (costs, difficulty,...) – Such enriched information is used for more elaborated controlling strategies that derive the appropriate monitoring rules and select countermeasures.

Framework Architecture Threat analysis supported by security models provides information on: – Attackers – Attacks and Attack points (as usual from threat analysis) – Attack paths – Relevance of the path (from a security viewpoint)/necessity of countermeasures – Weights: costs, probabilities Security control strategies – Uses weights, relevance of the paths – Current objective: ranking of quantitative security controlling strategies – Final output is the definition of countermeasures based on the evaluation of the controlled paths

High-level Workflow (system) functional requirements dependability and security requirements Threats Analysis Requirements Controlling strategies Design of security countermeasures

Next Steps –Fai della Paganella Identification of appropriate Case Study Preliminary version of paper in progress Iterative approach to framework

What’s new! CEMS use case Submission to DEVVARTS SAFECOMP – DEvelopment, Verification and VAlidation of cRiTical Systems

Customer Energy Management System A Customer Energy Management System (CEMS) is an application service or device that communicates with devices in the home. It may have interfaces to the meter to read usage data or to the operations domain to get pricing or other information to make automated or manual decisions to control energy consumption more efficiently.

Man in the Middle Attack In MIM attack an opponent captures messages exchanged between the EMG and the CEMS. It can – partially alter the content of the messages – Delay messages – reorder messages to produce an unauthorized effect – collect information without altering the content of the messages violation of integrity, availability or confidentiality.

Two profiles: Criminal and Hacker

Is a Control strategies better than another? To select the controller strategy that better fit a set of requirements (e.g., the minimum cost) we associate to each step a value obtained by the threat analysis. where k, k’ denote these values. ;;

Quantitative Control strategies Definition. Given a path t = (a 1,k 1 ) … (a n,k n ), the label of t is given by (a 1 … a n ) belongs to Act*, and its run weight by |t| = k 1 * … * k n belongs to K, where the product * denotes the product of the considered semiring K. The valuation of a process intuitively corresponds to the sum of all possible quantity of the traces belonging to the process. Given an attack F, and a semiring K, a controller E 2 is better than a controller E 1 w.r.t. F the valuation of E 1 on F is less then the valuation of E 2 on F. NOTE: the interested reader will find all the evaluations in the paper….

Additional information The paper is going to be submitted to DEVVARTS We will add also proability of attack as measure for driving the definition of security countermeasures Future work: deploy the selected controlling system into the system and evaluate the global system.