1 / 16

Ranking of security controlling strategies driven by quantitative threat analysis.

Ranking of security controlling strategies driven by quantitative threat analysis. Tavolo 2: "Big data security evaluation " UNIFI-CNR Nicola Nostro , Ilaria Matteucci , Andrea Ceccarelli , Felicita Di Giandomenico , Fabio Martinelli , Andrea Bondavalli. Outline.

emmett
Download Presentation

Ranking of security controlling strategies driven by quantitative threat analysis.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ranking of security controlling strategies driven by quantitative threat analysis. Tavolo 2: "Big data security evaluation" UNIFI-CNR Nicola Nostro, IlariaMatteucci, Andrea Ceccarelli, Felicita Di Giandomenico, Fabio Martinelli, Andrea Bondavalli

  2. Outline • General description of work • Basics • Architecture/Framework • Use case • Conclusions and future works

  3. Fai della Paganella • General description of work • Basics • Architecture/Framework

  4. General description of the work • Security analysis and design are key activities for the protection of critical systems and infrastructure. • Traditional approaches: • Apply a qualitative threat assessment • Results used as input for the security design such that appropriate countermeasures are selected • Our work: selection and ranking of security controlling strategies driven by quantitative threat analysis • Threat analysis that identifies attack points and paths, and ranks attacks (costs, difficulty, ...) • Such enriched information is used for more elaborated controlling strategies that derive the appropriate monitoring rules and select countermeasures.

  5. Framework Architecture • Threat analysis supported by security models provides information on: • Attackers • Attacks and Attack points (as usual from threat analysis) • Attack paths • Relevance of the path (from a security viewpoint)/necessity of countermeasures • Weights: costs, probabilities • Security control strategies • Uses weights, relevance of the paths • Current objective: ranking of quantitative security controlling strategies • Final output is the definition of countermeasures based on the evaluation of the controlled paths

  6. High-level Workflow Threats Analysis Requirements Controlling strategies (system) functional requirements dependability and security requirements Design of security countermeasures

  7. Next Steps –Fai dellaPaganella • Identification of appropriate Case Study • Preliminary version of paper in progress • Iterative approach to framework

  8. What’s new! • CEMS use case • Submission to DEVVARTS workshop @ SAFECOMP • DEvelopment, Verification and VAlidation of cRiTical Systems

  9. Customer Energy Management System A Customer Energy Management System (CEMS) is an application service or device that communicates with devices in the home. It may have interfaces to the meter to read usage data or to the operations domain to get pricing or other information to make automated or manual decisions to control energy consumption more efficiently.

  10. Man in the Middle Attack • In MIM attack an opponent captures messages exchanged between the EMG and the CEMS. • It can • partially alter the content of the messages • Delay messages • reorder messages to produce an unauthorized effect • collect information without altering the content of the messages • violation of integrity, availability or confidentiality.

  11. Two profiles: Criminal and Hacker

  12. Is a Control strategies better than another? To select the controller strategy that better fit a set of requirements (e.g., the minimum cost) we associate to each step a value obtained by the threat analysis. where k, k’ denote these values. ; ;

  13. Quantitative Control strategies Definition. Given a path t = (a1,k1) … (an,kn), the label of t is given by (a1 … an) belongs to Act*, and its run weight by |t| = k1 * … * knbelongs to K, where the product * denotes the product of the considered semiring K. The valuation of a process intuitively corresponds to the sum of all possible quantity of the traces belonging to the process. Given an attack F, and a semiringK, a controller E2is betterthan a controller E1w.r.t. F the valuation of E1 on F is less then the valuation of E2 on F. NOTE: the interested reader will find all the evaluations in the paper….

  14. Additional information • The paperisgoing to be submitted to DEVVARTS • Wewilladdalsoproability of attackasmeasure for driving the definition of security countermeasures • Future work: deploy the selectedcontrollingsysteminto the system and evaluate the global system.

More Related