dynamic graphical models for security and safety joint
play

Dynamic graphical models for security and safety joint modeling July - PowerPoint PPT Presentation

Dynamic graphical models for security and safety joint modeling July 12 th 2015 GraMSec Workshop, Verona Marc Bouissou 1,2 Siwar Kriaa 1,2 Ludovic Pitre-Cambacds 1 1 EDF R&D, 2 cole Centrale Paris Context: pervasive computing Rail


  1. Dynamic graphical models for security and safety joint modeling July 12 th 2015 GraMSec Workshop, Verona Marc Bouissou 1,2 Siwar Kriaa 1,2 Ludovic Piètre-Cambacédès 1 1 EDF R&D, 2 École Centrale Paris

  2. Context: pervasive computing Rail transportation Aerospace Automobiles Medical Energy 2 - Marc Bouissou – GraMSec 2015

  3. Outline Introduction Safety/security convergence Why Petri nets, SAN and BDMP Petri nets and SAN Formalism description Use case: security of a metro station BDMP Formalism description Use case: a pipeline Conclusion 1

  4. Introduction Safety: Security: accidents, failures Cyber-attacks Industrial systems are more and more complex and interconnected Safety and security domains historically separated Industrial systems targeted by cyber-attacks Large consequences on the system’s environment Their requirements converge for complex systems

  5. Terminology Safety and security (SEMA referential) [1] � � Malevolent Security ? (Security M-A) S-E & M-A � � Accidental Safety ? (Safety M-A) S-E & M-A Sys. � Env. Env. � Sys. Sys. � Sys. (Safety S-E) (Security S-E) Safety in (cyber) Security this talk in this talk [1] L. Pietre-Cambacedes and C. Chaudet, "The SEMA referential framework: Avoiding ambiguities in the terms “security” and “safety”," International Journal of Critical Infrastructure Protection, Vol. 3 Issue 2, pp. 55-66, July 2010.

  6. Safety and security Similarities Differences Protection aim Random vs intelligent Risk = fundamental notion Stability vs evolution Not "additive" Access to information Importance of human factors Vocabulary Synergy between the two communities: possible & desirable

  7. Interdependences Safety Security Interdependences Antagonism Conditional dependence Mutual reinforcement Independence Stakes Correct risk evaluation Cost optimization 7 - Marc Bouissou – GraMSec 2015

  8. Dynamic graphical models to study such interdependencies We need a holistic approach Single model describing both safety and security aspects State of the art [2] identified the following dynamic graphical formalisms: Stochastic Petri nets and SANs BDMP Dynamic Bayesian nets All of them can be simulated and have a probabilistic basis Formalisms too specific of one domain have been discarded (e.g. Mobius/ADVISE) [2] A Survey of Approaches Combining Safety and Security for Industrial Control Systems Siwar Kriaa, Ludovic Pietre-Cambacedes, Marc Bouissou, and Yoran Halgand 8 - Marc Bouissou – GraMSec 2015

  9. SPN & SAN Stochastic Petri Nets and Stochastic Activity networks

  10. Stochastic Petri nets Standard SPN must be used in a bottom-up manner Patterns can ease the model construction The resulting model is flat and lacks structure Assessing methods: Markovian Petri net => all Markov analysis methods Non Markovian => Monte Carlo simulation Reminder: "ingredients" of GSPN inhibitor arcs Tokens Transitions Weighed (instantaneous or with random delay) arcs Places 10 - Marc Bouissou – GraMSec 2015

  11. Example taken from [3] Connecting Model A to Model B Well suited for describing a sequence Attack pattern (single phase) Faulty sensor Single phase intervention [3] Flammini et al. A Petri Net Pattern-Oriented Approach for the Design of Physical Protection Systems. Safecomp 2014 11 - Marc Bouissou – GraMSec 2015

  12. Assembling patterns Security of a Metro station [3] 12 - Marc Bouissou – GraMSec 2015

  13. Stochastic Petri nets pros and cons Theoretically, unlimited modeling power (Turing machine) Not suited for representing structure functions (nor instantaneous far reaching interactions) Spaghetti plate syndrome => validation is very hard C A B 5 objects 16 objects 13 - Marc Bouissou – GraMSec 2015

  14. Stochastic Activity Networks [4] SAN are strongly linked to the tool Möbius (formerly UltraSAN) Enable a hierarchical decomposition of the model Atomic model: see next slide [4] W. H. Sanders and J. F. Meyer, "Stochastic Activity Networks: Formal Definitions and Concepts" Lecture Notes in Computer Science no. 2090, pp. 315-343. Berlin: Springer, 2001. 14 - Marc Bouissou – GraMSec 2015

  15. SAN atomic model = Stochastic Petri net + following extensions Activities (= transitions) can have several outputs (probabilistically chosen) Input gates: contain the definition of a Boolean function of the input places marking that defines the enabling of the activity, and the modification of the input places marking when the transition fires Output gates: contain a set of actions to perform on output places when the transition fires Input and output gates are defined using C++ syntax => the graph can "hide" a lot of information Output gate Places Input gate Transition with two output cases 15 - Marc Bouissou – GraMSec 2015

  16. Communication between submodels Shared places (not apparent on the GUI) Shared variables 16 - Marc Bouissou – GraMSec 2015

  17. SAN pros and cons Can solve the problem of structure function representation (but not graphically) Instantaneous far reaching interactions? Maybe, with very complicated input and output gate functions In a "normal" use Lots of small spaghetti plates with sauce => validation is still very hard Sauce can be hot chili! (input and output functions, shared variables are hidden) 17 - Marc Bouissou – GraMSec 2015

  18. BDMP Boolean logic Driven Markov Processes

  19. BDMP CV Since 2002, Interest proven in reliability and safety engineering � Dynamic � Readable � Tractable Invented and used at EDF (NPP safety, � substations, data centers reliability,…) Complete theory and software framework � ⇒ Adapted to attack and defense modeling [5] [5] L. Pietre-Cambacedes, M. Bouissou, Attack and defense dynamic modeling with BDMP. MMM-ACNS 2010, St Petersbourg, September 2010.

  20. BDMP can be used to model any kind of system… Repairable or not Multiphase Multistate …

  21. Tools associated to BDMP formalism KB3 * * And Petri nets! Download: http://sourceforge.net/projects/visualfigaro/

  22. An example of BDMP in security: attack of a remote access server

  23. RAS attack BDMP – Step 0 (attack just started)

  24. RAS attack BDMP – Step 1

  25. RAS attack BDMP – Step 2

  26. RAS attack BDMP – Attacker’s objective reached

  27. An important mechanism of BDMP: filtering of relevant events If one of these leaves is realized, it makes the other one irrelevant and thus inhibited

  28. The same LoggedIntoTheRAS LoggedIntoTheRAS example as a it_4 it_4 Petri Net RAS_access_granted RAS_access_granted it_2 it_2 it_3 it_3 SuccessWardialing SuccessWardialing VulnerabilityFoundAndExploited VulnerabilityFoundAndExploited A5 A5 it_1 it_1 PotentialWardialing PotentialWardialing AuthenticationWithPassword AuthenticationWithPassword SuccessFindVuln SuccessFindVuln SuccessExploitVuln SuccessExploitVuln A3 A3 Inhibitor arcs A1 A1 A2 A2 A4 A4 needed to represent the top level trigger ! PotentialBruteforce PotentialBruteforce PotentialSocialEng PotentialSocialEng PotentialFindVuln PotentialFindVuln PotentialExploitVuln PotentialExploitVuln Inhibitor arcs needed for irrelevant event filtering 28 - Marc Bouissou – GraMSec 2015

  29. Principles of sequences exploration in a locally defined Markov chain (Figseq) System model (BDMP or simulation model): - events that may occur and Target : set of system states consequences on system Truncating criteria : probability, Process Model transitions number, ... Parameters Mission time Initial state System state Sequence : succession of events Event : - failure, repair, - any change of the system state Stop on target Absorbing state Stop on truncating criteria

  30. Quantification (1/2) – Time-domain analysis Taking advantage of the BDMP framework Efficient sequence exploration with trimming Probability to reach the objective in a given time Overall mean time to the attack success 0.55 Probability of each explored sequence 1.07 x 10 5 s Ordered list of sequences Cf. hereunder Sequences Probability in Average duration Contribution mission time after init. Attack steps 4.878x10 3 [Wardialing, Bruteforce] 0.2717 0.4877 9.7561x10 3 [Wardialing, Find_vuln, Bruteforce] 0.1272 0.2329 9.7561 x10 3 [Wardialing, Find_vuln, Exploit _ vuln] 0.1272 0.2329 4.8780 x10 3 [Wardialing, Social_eng.] 0.0136 0.0249 9.7561 x10 3 [Wardialing, Find_vuln, Social_eng.] 0.0064 0.0116 30

  31. Quantification (2/2) – Time-independent Classical values attributed to attack tree leaves Fixed probabilities � (dynamically) covered by stochastic processes Monetary cost � scenario cost, average attack cost Boolean indicators (specific requirements, properties) Need of internal knowledge, internal support Need of specific tool, piece of information � Characterization of selected scenarios Minimum attacker skills (Generalization) Continuous, Boolean, Discrete attributes All computable thanks to the Attack tree structure 31

  32. An example in safety: system to be modeled GRID CB_up_2 CB_up_1 diesel generator transfo2 transfo1 CB_dw_1 CB_dw_2 CB_dies line_2 line_1

  33. The BDMP in KB3

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend