Automatically generating security models from system models to aid in the evaluation of AMI deployment options

Michael Rausch, Ken Keefe, Brett Feddersen, William H. Sanders

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

System architects should use security models to gain insight into how different design choices impact the overall security of a system. However, it is often difficult for those who do not possess a security modeling background to construct such models. To overcome this challenge we present a case study that demonstrates a novel approach that uses an ontology-assisted model generator to automatically create ADVISE security models from intuitive hand-built system models. More specifically, we consider a case study of a hypothetical utility that wishes to select the most cost-effective of several different intrusion detection system approaches to defend its Advanced Metering Infrastructure (AMI) deployment. We construct an AMI-focused ontology that consists of system model elements, security model elements, and the mapping between the two. We then use the ontology in conjunction with the generator to create security models from a system model. Finally, we discuss the benefits of the use of the approach relative to previous approaches, including an explanation of how it significantly eases the burden of creating complex security models for users without prior security modeling experience.

Original languageEnglish (US)
Title of host publicationCritical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers
EditorsGregorio D’Agostino, Antonio Scala
PublisherSpringer-Verlag
Pages156-167
Number of pages12
ISBN (Print)9783319998428
DOIs
StatePublished - Jan 1 2018
Event12th International Conference on Critical Information Infrastructures Security, CRITIS 2017 - Lucca, Italy
Duration: Oct 8 2017Oct 13 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10707 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other12th International Conference on Critical Information Infrastructures Security, CRITIS 2017
CountryItaly
CityLucca
Period10/8/1710/13/17

Fingerprint

Advanced metering infrastructures
Security Model
Infrastructure
Evaluation
Ontology
Model
Generator
Background Modeling
Intrusion Detection
Intuitive
Intrusion detection
Costs
Modeling
Computer systems

Keywords

  • ADVISE
  • AMI
  • Automatic model generation
  • Forecasting
  • Möbius
  • Risk assessment
  • Security
  • Smart grid

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Rausch, M., Keefe, K., Feddersen, B., & Sanders, W. H. (2018). Automatically generating security models from system models to aid in the evaluation of AMI deployment options. In G. D’Agostino, & A. Scala (Eds.), Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers (pp. 156-167). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10707 LNCS). Springer-Verlag. https://doi.org/10.1007/978-3-319-99843-5_14

Automatically generating security models from system models to aid in the evaluation of AMI deployment options. / Rausch, Michael; Keefe, Ken; Feddersen, Brett; Sanders, William H.

Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers. ed. / Gregorio D’Agostino; Antonio Scala. Springer-Verlag, 2018. p. 156-167 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10707 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rausch, M, Keefe, K, Feddersen, B & Sanders, WH 2018, Automatically generating security models from system models to aid in the evaluation of AMI deployment options. in G D’Agostino & A Scala (eds), Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10707 LNCS, Springer-Verlag, pp. 156-167, 12th International Conference on Critical Information Infrastructures Security, CRITIS 2017, Lucca, Italy, 10/8/17. https://doi.org/10.1007/978-3-319-99843-5_14
Rausch M, Keefe K, Feddersen B, Sanders WH. Automatically generating security models from system models to aid in the evaluation of AMI deployment options. In D’Agostino G, Scala A, editors, Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers. Springer-Verlag. 2018. p. 156-167. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-99843-5_14
Rausch, Michael ; Keefe, Ken ; Feddersen, Brett ; Sanders, William H. / Automatically generating security models from system models to aid in the evaluation of AMI deployment options. Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers. editor / Gregorio D’Agostino ; Antonio Scala. Springer-Verlag, 2018. pp. 156-167 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{4b8980b9c4ea41e89d3fe099660f8be3,
title = "Automatically generating security models from system models to aid in the evaluation of AMI deployment options",
abstract = "System architects should use security models to gain insight into how different design choices impact the overall security of a system. However, it is often difficult for those who do not possess a security modeling background to construct such models. To overcome this challenge we present a case study that demonstrates a novel approach that uses an ontology-assisted model generator to automatically create ADVISE security models from intuitive hand-built system models. More specifically, we consider a case study of a hypothetical utility that wishes to select the most cost-effective of several different intrusion detection system approaches to defend its Advanced Metering Infrastructure (AMI) deployment. We construct an AMI-focused ontology that consists of system model elements, security model elements, and the mapping between the two. We then use the ontology in conjunction with the generator to create security models from a system model. Finally, we discuss the benefits of the use of the approach relative to previous approaches, including an explanation of how it significantly eases the burden of creating complex security models for users without prior security modeling experience.",
keywords = "ADVISE, AMI, Automatic model generation, Forecasting, M{\"o}bius, Risk assessment, Security, Smart grid",
author = "Michael Rausch and Ken Keefe and Brett Feddersen and Sanders, {William H.}",
year = "2018",
month = "1",
day = "1",
doi = "10.1007/978-3-319-99843-5_14",
language = "English (US)",
isbn = "9783319998428",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer-Verlag",
pages = "156--167",
editor = "Gregorio D’Agostino and Antonio Scala",
booktitle = "Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers",

}

TY - GEN

T1 - Automatically generating security models from system models to aid in the evaluation of AMI deployment options

AU - Rausch, Michael

AU - Keefe, Ken

AU - Feddersen, Brett

AU - Sanders, William H.

PY - 2018/1/1

Y1 - 2018/1/1

N2 - System architects should use security models to gain insight into how different design choices impact the overall security of a system. However, it is often difficult for those who do not possess a security modeling background to construct such models. To overcome this challenge we present a case study that demonstrates a novel approach that uses an ontology-assisted model generator to automatically create ADVISE security models from intuitive hand-built system models. More specifically, we consider a case study of a hypothetical utility that wishes to select the most cost-effective of several different intrusion detection system approaches to defend its Advanced Metering Infrastructure (AMI) deployment. We construct an AMI-focused ontology that consists of system model elements, security model elements, and the mapping between the two. We then use the ontology in conjunction with the generator to create security models from a system model. Finally, we discuss the benefits of the use of the approach relative to previous approaches, including an explanation of how it significantly eases the burden of creating complex security models for users without prior security modeling experience.

AB - System architects should use security models to gain insight into how different design choices impact the overall security of a system. However, it is often difficult for those who do not possess a security modeling background to construct such models. To overcome this challenge we present a case study that demonstrates a novel approach that uses an ontology-assisted model generator to automatically create ADVISE security models from intuitive hand-built system models. More specifically, we consider a case study of a hypothetical utility that wishes to select the most cost-effective of several different intrusion detection system approaches to defend its Advanced Metering Infrastructure (AMI) deployment. We construct an AMI-focused ontology that consists of system model elements, security model elements, and the mapping between the two. We then use the ontology in conjunction with the generator to create security models from a system model. Finally, we discuss the benefits of the use of the approach relative to previous approaches, including an explanation of how it significantly eases the burden of creating complex security models for users without prior security modeling experience.

KW - ADVISE

KW - AMI

KW - Automatic model generation

KW - Forecasting

KW - Möbius

KW - Risk assessment

KW - Security

KW - Smart grid

UR - http://www.scopus.com/inward/record.url?scp=85053899275&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85053899275&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-99843-5_14

DO - 10.1007/978-3-319-99843-5_14

M3 - Conference contribution

AN - SCOPUS:85053899275

SN - 9783319998428

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 156

EP - 167

BT - Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers

A2 - D’Agostino, Gregorio

A2 - Scala, Antonio

PB - Springer-Verlag

ER -