Abstract
Mission-critical systems, such as navigational spacecraft and drone surveillance systems, play a crucial role in a nation’s infrastructure. Since these systems are prone to attacks, we must design resilient systems that can withstand attacks. Thus, we need to specify, analyze, and understand where such attacks are possible and how to mitigate them while a mission-critical system is being designed. This paper specifies the mission-critical system as a workflow consisting of atomic tasks connected using various operators. Real-world workflows can be large and complex. Towards this end, we propose using Coloured Petri Nets (CPN), which has tool support for automated analysis. We use a drone surveillance mission example to illustrate our approach. Such an automated approach is practical for verifying and analyzing the resiliency of mission-critical systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aalst, W.M.P.: Verification of workflow nets. In: Azéma, P., Balbo, G. (eds.) ICATPN 1997. LNCS, vol. 1248, pp. 407–426. Springer, Heidelberg (1997). https://doi.org/10.1007/3-540-63139-9_48
van der Aalst, W.: Structural characterizations of sound workflow nets (1996)
Arpinar, I.B., Halici, U., Arpinar, S., Doğaç, A.: Formalization of workflows and correctness issues in the presence of concurrency. Distrib. Parallel Databases 7(2), 199–248 (1999). https://doi.org/10.1023/A:1008758612291
Bride, H., Kouchnarenko, O., Peureux, F.: Verifying modal workflow specifications using constraint solving. In: Albert, E., Sekerinski, E. (eds.) IFM 2014. LNCS, vol. 8739, pp. 171–186. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10181-1_11
Bride, H., Kouchnarenko, O., Peureux, F., Voiron, G.: Workflow nets verification: SMT or CLP? In: ter Beek, M.H., Gnesi, S., Knapp, A. (eds.) FMICS/AVoCS -2016. LNCS, vol. 9933, pp. 39–55. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45943-1_3
Chong, J., Pal, P., Atigetchi, M., Rubel, P., Webber, F.: Survivability architecture of a mission critical system: the DPASA example. In: 21st Annual Computer Security Applications Conference (ACSAC 2005), pp. 10–pp. IEEE (2005)
Fong, P.W.L.: Results in workflow resiliency: complexity, new formulation, and ASP encoding, pp. 185–196. Association for Computing Machinery, New York (2019)
Houliotis, K., Oikonomidis, P., Charchalakis, P., Stipidis, E.: Mission-critical systems design framework. Adv. Sci. Technol. Eng. Syst. J. 3(2), 128–137 (2018)
Jensen, K., Kristensen, L., Wells, L.: Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems. STTT 9, 213–254 (2007). https://doi.org/10.1007/s10009-007-0038-x
Jensen, K., Kristensen, L.M.: Coloured Petri Nets: Modelling and Validation of Concurrent Systems, 1st edn. Springer, Heidelberg (2009). https://doi.org/10.1007/b95112
Jensen, K., Kristensen, L.M.: CPN ML programming. In: Jensen, K., Kristensen, L.M. (eds.) Coloured Petri Nets, pp. 43–77. Springer, Heidelberg (2009). https://doi.org/10.1007/b95112_3
Mace, J., Morisset, C., van Moorsel, A.: Modelling user availability in workflow resiliency analysis. In: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, pp. 1–10. ACM (2015)
Mace, J.C., Morisset, C., van Moorsel, A.: Quantitative workflow resiliency. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 344–361. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11203-9_20
Mace, J.C., Morisset, C., van Moorsel, A.: WRAD: tool support for workflow resiliency analysis and design. In: Crnkovic, I., Troubitsyna, E. (eds.) SERENE 2016. LNCS, vol. 9823, pp. 79–87. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45892-2_6
Mace, J.C., Morisset, C., Moorsel, A.: Impact of policy design on workflow resiliency computation time. In: Campos, J., Haverkort, B.R. (eds.) QEST 2015. LNCS, vol. 9259, pp. 244–259. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22264-6_16
Ponsard, C., Massonet, P., Molderez, J.F., Rifaut, A., van Lamsweerde, A., Van Tran, H.: Early verification and validation of mission critical systems. Formal Methods Syst. Des. 30(3), 233–247 (2007). https://doi.org/10.1007/s10703-006-0028-8
Ratzer, A.V., et al.: CPN tools for editing, simulating, and analysing coloured Petri nets. In: van der Aalst, W.M.P., Best, E. (eds.) ICATPN 2003. LNCS, vol. 2679, pp. 450–462. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-44919-1_28. http://cpntools.org
van der Aalst, W.M., ter Hofstede, A.H.: Verification of workflow task structures: a Petri-net-baset approach. Inf. Syst. 25(1), 43–69 (2000). https://doi.org/10.1016/S0306-4379(00)00008-9. https://www.sciencedirect.com/science/article/pii/S0306437900000089
Wang, Q., Li, N.: Satisfiability and resiliency in workflow authorization systems. ACM Trans. Inf. Syst. Secur. 13(4), 1–35 (2010)
Yang, P., Xie, X., Ray, I., Lu, S.: Satisfiability analysis of workflows with control-flow patterns and authorization constraints. IEEE Trans. Serv. Comput. 7(2), 237–251 (2014). https://doi.org/10.1109/TSC.2013.31
Zavatteri, M., Viganò, L.: Last man standing: static, decremental and dynamic resiliency via controller synthesis. J. Comput. Secur. 27(3), 343–373 (2019)
Acknowledgements
This work was supported in part by funding from NSF under Award Numbers CNS 1715458, DMS 2123761, CNS 1822118, NIST, ARL, Statnett, AMI, NewPush, and Cyber Risk Research.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Abdelgawad, M., Ray, I., Vasquez, T. (2023). Workflow Resilience for Mission Critical Systems. In: Dolev, S., Schieber, B. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2023. Lecture Notes in Computer Science, vol 14310. Springer, Cham. https://doi.org/10.1007/978-3-031-44274-2_37
Download citation
DOI: https://doi.org/10.1007/978-3-031-44274-2_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-44273-5
Online ISBN: 978-3-031-44274-2
eBook Packages: Computer ScienceComputer Science (R0)