skip to main content
10.1145/3384941.3409590acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis

Published: 06 October 2020 Publication History

Abstract

The recent and increasing interconnection of industrial systems with information technologies creates a new paradigm in which new challenges arise. Being able to provide an explanation when accidents and attacks strike the system is one of them. This article presents an event model designed to provide useful and relevant information for diagnosis of safety and security events. We provide a means for system experts to model elementary events that are automatically recombined in complex and complete scenarios. We specifically focus on the ability to represent countermeasures and sequences of events, recurrent problems in the literature. We also introduce a means to precisely measure the wear of components, an important feature for the model to obtain accurate values. We showcase the use of our model for diagnosis purposes on a cyber-physical system testbed.

References

[1]
Piètre-Cambacédès, L., Bouissou, M.: Modeling safety and security interdependencies with bdmp (boolean logic driven Markov processes). In: 2010 IEEE International Conference on Systems, Man and Cybernetics. 2852--2861
[2]
Vesely, W.E., Goldberg, F.F., Roberts, N.H., Haasl, D.F.: Fault tree handbook. Report, DTIC Document (1981)
[3]
Bruce, S.: Attack trees. Dr. Dobb's Journal (1999)
[4]
Pearl, J.: Fusion, propagation, and structuring in belief networks. Artificial Intelligence 29(3) (1986) 241--288
[5]
Bourget, E., Cuppens, F., Cuppens-Boulahia, N., Dubus, S., Foley, S.N., Laarouchi, Y.: Probabilistic event graph to model safety and security for diagnosis purposes. In: DBSec 2018: Data and Applications Security and Privacy XXXII. 38--47
[6]
Foley, S.N., Autrel, F., Bourget, E., Cledel, T., Grunenwald, S., Hernan, J.R., Kabil,A., Larsen, R., Rooney, V.M., Vanhulst, K.: Science hackathons for cyber physical system security research: Putting cps test bed platforms to good use. In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 3264897, ACM (2018) 102--107
[7]
Durga Rao, K., Gopika, V., Sanyasi Rao, V.V.S., Kushwaha, H.S., Verma, A.K., Srividya, A.: Dynamic fault tree analysis using monte carlo simulation in probabilistic safety assessment. Reliability Engineering & System Safety 94(4) (2009) 872--883
[8]
Aliee, H., Zarandi, H.R.: A fast and accurate fault tree analysis based on stochastic logic implemented on field-programmable gate arrays. IEEE Transactions on Reliability 62(1) (2013) 13--22
[9]
Bouissou, M., Bon, J.L.: A new formalism that combines advantages of fault-trees and Markov models: Boolean logic driven Markov processes. Volume 82. (2003)
[10]
Piètre-Cambacédès, L., Bouissou, M.: Beyond attack trees: Dynamic security modeling with boolean logic driven markov processes (bdmp). In: Proceedings of the 2010 European Dependable Computing Conference, 1827752, IEEE Computer Society 199--208
[11]
Dutuit, Y., Châtelet, E., Signoret, J.P., Thomas, P.: Dependability modelling and evaluation by using stochastic petri nets: application to two test cases. Reliability Engineering & System Safety 55(2) (1997) 117--124
[12]
Volovoi, V.: Modeling of system reliability petri nets with aging tokens. Reliability Engineering & System Safety 84(2) (2004) 149--161
[13]
Codetta-Raiteri, D.: The conversion of dynamic fault trees to stochastic petri nets, as a case of graph transformation. Electronic Notes in Theoretical Computer Science 127(2) (2005) 45--60
[14]
Li, B., Lu, R., Choo, K.K.R., Wang, W., Luo, S.: On reliability analysis of smart grids under topology attacks: A stochastic petri net approach. ACM Trans. Cyber-Phys. Syst. 3(1) (2018) 1--25
[15]
Cuppens, F., Ortalo, R. In: LAMBDA: A Language to Model a Database for Detection of Attacks. Springer Berlin Heidelberg, Berlin, Heidelberg (2000) 197--216
[16]
Cuppens, F., Miege, A.: Alert correlation in a cooperative intrusion detection framework. In: Proceedings 2002 IEEE Symposium on Security and Privacy. 202--215
[17]
Cuppens, F., Autrel, F., Miege, A., Benferhat, S.: Recognizing malicious intention in an intrusion detection process. In: HIS. 806--817
[18]
Noel, S., Robertson, E., Jajodia, S.: Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. (2004)
[19]
Ning, P., Cui, Y., Reeves, D.S.: Constructing attack scenarios through correlation of intrusion alerts. In: Proceedings of the 9th ACM conference on Computer and communications security, 586144, ACM (2002) 245--254
[20]
Braynov, S., Jadliwala, M.: Representation and analysis of coordinated attacks.In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 1035434, ACM (2003) 43--51
[21]
Bouissou, M., Villatte, N., Bouhadana, H., Bannelier, M.: Knowledge modelling and reliability processing: presentation of the figaro language and associated tools. Report, Electricite de France (EDF) (December 1991)
[22]
Arnold, F., Hermanns, H., Pulungan, R., Stoelinga, M. In: Time-Dependent Analysis of Attacks. Springer Berlin Heidelberg, Berlin, Heidelberg (2014) 285--305
[23]
Cuppens, F., Autrel, F., Bouzida, Y., Garcia, J., Gombault, S., Sans, T.: Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annales Des Télécommunications 61(1) (2006) 197--217
[24]
Bistarelli, S., Fioravanti, F., Peretti, P.: Defense trees for economic evaluation of security investments. In: First International Conference on Availability, Reliability and Security (ARES'06). 8 pp.
[25]
Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: 18th Annual Computer Security Applications Conference, 2002. Proceedings. (Dec 2002) 301--310
[26]
Lee, W., Fan, W., Miller, M., Stolfo, S.J., Zadok, E.: Toward cost-sensitive modeling for intrusion detection and response. J. Comput. Secur. 10(1--2) (July 2002) 5--22
[27]
Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., Dubus, S., Martin, A.: Success likelihood of ongoing attacks for intrusion detection and response systems.In: 2009 International Conference on Computational Science and Engineering. Volume 3. (2009) 83--91
[28]
Dugan, J.B., Bavuso, S.J., Boyd, M.A.: Fault trees and sequence dependencies. In: Annual Proceedings on Reliability and Maintainability Symposium. 286--293
[29]
Schroeder, B., Gibson, G.A.: Disk failures in the real world: what does an mttf of 1,000,000 hours mean to you? In: Proceedings of the 5th USENIX conference on File and Storage Technologies, 1267904, USENIX Association 1

Cited By

View all
  • (2023)Towards an understanding of reliability of software-intensive systems-of-systemsInformation and Software Technology10.1016/j.infsof.2023.107186158(107186)Online publication date: Jun-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CPSS '20: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop
October 2020
72 pages
ISBN:9781450376082
DOI:10.1145/3384941
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 October 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. countermeasures
  2. cyber-physical systems
  3. diagnosis
  4. event model
  5. industrial systems
  6. safety
  7. security

Qualifiers

  • Research-article

Funding Sources

  • CPER Cyber SSI
  • Institut Mines-Tlcom

Conference

ASIA CCS '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 43 of 135 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Towards an understanding of reliability of software-intensive systems-of-systemsInformation and Software Technology10.1016/j.infsof.2023.107186158(107186)Online publication date: Jun-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media