Automatically generating security models from system models to aid in the evaluation of AMI deployment options

Michael Rausch, Ken Keefe, Brett Feddersen, William H. Sanders

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

System architects should use security models to gain insight into how different design choices impact the overall security of a system. However, it is often difficult for those who do not possess a security modeling background to construct such models. To overcome this challenge we present a case study that demonstrates a novel approach that uses an ontology-assisted model generator to automatically create ADVISE security models from intuitive hand-built system models. More specifically, we consider a case study of a hypothetical utility that wishes to select the most cost-effective of several different intrusion detection system approaches to defend its Advanced Metering Infrastructure (AMI) deployment. We construct an AMI-focused ontology that consists of system model elements, security model elements, and the mapping between the two. We then use the ontology in conjunction with the generator to create security models from a system model. Finally, we discuss the benefits of the use of the approach relative to previous approaches, including an explanation of how it significantly eases the burden of creating complex security models for users without prior security modeling experience.

Original languageEnglish (US)
Title of host publicationCritical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers
EditorsGregorio D’Agostino, Antonio Scala
PublisherSpringer-Verlag Berlin Heidelberg
Pages156-167
Number of pages12
ISBN (Print)9783319998428
DOIs
StatePublished - Jan 1 2018
Event12th International Conference on Critical Information Infrastructures Security, CRITIS 2017 - Lucca, Italy
Duration: Oct 8 2017Oct 13 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10707 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other12th International Conference on Critical Information Infrastructures Security, CRITIS 2017
CountryItaly
CityLucca
Period10/8/1710/13/17

Keywords

  • ADVISE
  • AMI
  • Automatic model generation
  • Forecasting
  • Möbius
  • Risk assessment
  • Security
  • Smart grid

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Automatically generating security models from system models to aid in the evaluation of AMI deployment options'. Together they form a unique fingerprint.

  • Cite this

    Rausch, M., Keefe, K., Feddersen, B., & Sanders, W. H. (2018). Automatically generating security models from system models to aid in the evaluation of AMI deployment options. In G. D’Agostino, & A. Scala (Eds.), Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Revised Selected Papers (pp. 156-167). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10707 LNCS). Springer-Verlag Berlin Heidelberg. https://doi.org/10.1007/978-3-319-99843-5_14