SlideShare a Scribd company logo
1 of 8
Download to read offline
AIIC
‐
ENEA

2010

                                                                 March
29,
2010

                                                                       Roma,
Italy





         Cyber
Dependencies:

Characteriza3on,
Discovery
and
Analysis


                         E.
Casalicchio

               University
of
Roma
–
Tor
Vergata

        Department
of
Computer
Science
System
and
Prod.





                   E.Casalicchio
‐
www.emilianocasalichio.eu

AIIC
‐
ENEA

2010

                                                                          March
29,
2010

Cyber
dependencies
                                                             Roma,
Italy




•  An
infrastructure
has
a
cyber
inter‐dependence
if
its
status
depends
on

   informa3on
transmi@ed
across
cyberspace.
 Rinaldi
et
al.
2003



 We are interested in understanding the coupling (inter-dependencies) among
       components, systems, services INSIDE the cyberinfrastructure




                  Components

           Services                Systems

 Cyberinfrastructure




                            E.Casalicchio
‐
www.emilianocasalichio.eu

AIIC
‐
ENEA

2010

                                                                                                March
29,
2010

 Mo3va3ons

                                                                                          Roma,
Italy


                                                        Vulnerability
&
                       Impact

                                                       Risk
Assessment
                        Analysis



                           • 
fundamental
               • 
(inter‐dependencies)
          • 
root/cause
of

                           and
strategic
IT
             Assets
respect
with
              failure

                           components,

                 the
vulnerabili3es
and
           propaga3on,

                Cyber
                                                                     • 
cascading
and

                           networks
and
                 risk
must
be
evaluated

               Security
                                                                   escala3ng

                           services
                     • 
Quan3ta3ve
metrics

                                                                                           phenomena

 Cyber
 treath

                                                                              Cyber dependencies discovery
                                                                                      and analysis
Natural
hazard




 Terrorism /
 physical
 attack
                                 E.Casalicchio
‐
www.emilianocasalichio.eu

AIIC
‐
ENEA

2010

                                                                                 March
29,
2010


Three
phases
                                                                          Roma,
Italy





•  Dimensions
of
                      Discovery

   analysis
                                                         •  Intensity

•  metrics
for
                                                      •  Impact

   dependencies
        •  Presence
of
                              •  Vulnerability

   evalua3on

             dependencies
                             •  Risk

•  methods
and
            respect
to

   mechanisms
for
         dimensions
of

   discovery
and
          analysis

   analysis

                                                                              Analysis

     Characteriza3on



                        E.Casalicchio
‐
www.emilianocasalichio.eu

AIIC
‐
ENEA

2010


Characteriza3on
of
Cyber
dependencies
                                                                 March
29,
2010

                                                                                                             Roma,
Italy



                           Logical
                            Locality
‐
Physical
 Inter‐/Intra‐system

Type
–
nature
of
the

                         (services)
                           or
logical
locaDon
 Inter‐/Intra‐domain

dependent
enDDes

                        Hardware/SoTware

                          (architectures)





Life
Cycle
–
when
dependencies
                                                     Strength
‐
the
    Persistent

are
introduced
in
the
system
life
                                                  intensity
of
     Op3onal
/

cycle

                Func3onal

                                                     6
                             dependencie
      Occasional



                Structural


                Resources
                                                    CriDcality
‐
the
potenDal
of

                                                                              becoming
disastrous


                                                                                                      Pre
/
Post
/Ex‐
                                                                                                        requisite

                                           Direct
(1st
order)

                 Order
‐
Directness

                 of
a
dependency
          Indirect
(2nd/
                                             nth
order)

                                       E.Casalicchio
‐
www.emilianocasalichio.eu

AIIC
‐
ENEA

2010

                                                                                                                 March
29,
2010

Characteriza3on
suggests
Metrics
                                                                                      Roma,
Italy




•  Strength


    –  probability
P
of
dependency
ac3va3on
P
in
[0,
1]



    –  Dura3on
T
(related
to
the
ac3vity/life
3me)
%T
in
[0,
1]

•  CriDcality






                                                                                                                         Severe

                                                                                                    Elevated

                                                                                         Guarded



                                                                                                                 High

    –  how
dangerous
a
dependency
can
be
(qualita3ve)





                                                                                  Low

         •  Pre‐requisite
(Severe),
Co‐requisite
(High,
Elevated)

         •  Ex‐requisite
(Guarded,
Low)


•  Order


    –  measure
of
the
cascade
effect

    –  Measure
of
the
distance
of
a
poten3al
target
from
the
source
of
a
failure

•  Locality

    –  Indicate
if
a
rela3onship
is
internal
or
external
the
system
or
layer
under

       considera3on

•  Life
cycle

    –  When
a
dependency
is
introduced

    –  Cost
of
dependency
removal

                                     E.Casalicchio
‐
www.emilianocasalichio.eu

AIIC
‐
ENEA

2010

                                                                                                       March
29,
2010

 Discovery
of
cyber
dependencies:
                                    Analysis
of
Dependencies:
             Roma,
Italy

 •  Off‐line,
sta3c
                                                   •  Off‐line,
sta3c

 •  Off‐line,
dynamic


Approaches:
                                                          Approaches:

•    Applica3on
Code
Analysis
(ACA)

                                                                      •  Component
Dependencies
Graph

•    Visual
model
analysis

(VMA)


•    Dynamic
program
analysis
(DPA)


                                                                      •  Dependencies
Structure
Matrix

•    
Performance
analysis
(PA)

•    System
informa3on
repositories
mining
(SRM)

                    Goal:

•    Message
exchange
sequence
or
pa@ern
mining
                      •  Evalua3on
of
metrics/indexes
to

     (MSM)

                                                             quan3fy
systems/service
coupling
in

                                                                         support
to:


                                                                                 •  Risk and Vulnerability
                                                                                    assessment
                                                                                 •  Impact analysis




                                    E.Casalicchio
‐
www.emilianocasalichio.eu

AIIC
‐
ENEA

2010

                                                                                  March
29,
2010

Open
discussion
                                                                        Roma,
Italy





                                        Discovery

                                                                        •  Off‐line
and/or

•  Dimensions
                                                             On‐line

                          •  On‐line

•  Metrics
                                                                dynamic

                             dynamic

                             approaches


    Characteriza3on
                                                           Analysis





  Casalicchio@ing.uniroma2.it

  h@p://www.emilianocasalicchio.eu

                           E.Casalicchio
‐
www.emilianocasalichio.eu


More Related Content

Viewers also liked

Tres centenarios claves, 1914-2014: Gomecismo, petróleo en Venezuela y Primer...
Tres centenarios claves, 1914-2014: Gomecismo, petróleo en Venezuela y Primer...Tres centenarios claves, 1914-2014: Gomecismo, petróleo en Venezuela y Primer...
Tres centenarios claves, 1914-2014: Gomecismo, petróleo en Venezuela y Primer...Daniel Teran-Solano
 
O2 presentation 010310_2_mod
O2 presentation 010310_2_modO2 presentation 010310_2_mod
O2 presentation 010310_2_modO2 Vet
 
Mezzi di comunicazione
Mezzi di comunicazioneMezzi di comunicazione
Mezzi di comunicazionegraziella90
 
Biancas Evaluation! Please Dont Delete Xxx
Biancas Evaluation! Please Dont Delete XxxBiancas Evaluation! Please Dont Delete Xxx
Biancas Evaluation! Please Dont Delete Xxxguest362287
 
Alos Font Hector
Alos Font HectorAlos Font Hector
Alos Font Hectorsukmak
 

Viewers also liked (6)

Tres centenarios claves, 1914-2014: Gomecismo, petróleo en Venezuela y Primer...
Tres centenarios claves, 1914-2014: Gomecismo, petróleo en Venezuela y Primer...Tres centenarios claves, 1914-2014: Gomecismo, petróleo en Venezuela y Primer...
Tres centenarios claves, 1914-2014: Gomecismo, petróleo en Venezuela y Primer...
 
O2 presentation 010310_2_mod
O2 presentation 010310_2_modO2 presentation 010310_2_mod
O2 presentation 010310_2_mod
 
Mezzi di comunicazione
Mezzi di comunicazioneMezzi di comunicazione
Mezzi di comunicazione
 
Biancas Evaluation! Please Dont Delete Xxx
Biancas Evaluation! Please Dont Delete XxxBiancas Evaluation! Please Dont Delete Xxx
Biancas Evaluation! Please Dont Delete Xxx
 
Pemuda
PemudaPemuda
Pemuda
 
Alos Font Hector
Alos Font HectorAlos Font Hector
Alos Font Hector
 

Similar to Casalicchio

Chiesa_ Isecom
Chiesa_ IsecomChiesa_ Isecom
Chiesa_ IsecomGoWireless
 
Automatic Detection0f Web Application Security Flaws
Automatic Detection0f Web Application Security FlawsAutomatic Detection0f Web Application Security Flaws
Automatic Detection0f Web Application Security FlawsAung Khant
 
Abandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled RegionsAbandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled RegionsIRJET Journal
 
Critical infrastructure disruptions: a generic system dynamic approach for de...
Critical infrastructure disruptions: a generic system dynamic approach for de...Critical infrastructure disruptions: a generic system dynamic approach for de...
Critical infrastructure disruptions: a generic system dynamic approach for de...Global Risk Forum GRFDavos
 
Soft computing based multilevel strategy for bridge integrity monitoring
Soft computing based multilevel strategy for bridge integrity monitoringSoft computing based multilevel strategy for bridge integrity monitoring
Soft computing based multilevel strategy for bridge integrity monitoringFranco Bontempi Org Didattica
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET Journal
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsIRJET Journal
 
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing ResearchFuture Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing ResearchAntonio Marcos Alberti
 

Similar to Casalicchio (9)

Chiesa_ Isecom
Chiesa_ IsecomChiesa_ Isecom
Chiesa_ Isecom
 
Direct Writing
Direct WritingDirect Writing
Direct Writing
 
Automatic Detection0f Web Application Security Flaws
Automatic Detection0f Web Application Security FlawsAutomatic Detection0f Web Application Security Flaws
Automatic Detection0f Web Application Security Flaws
 
Abandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled RegionsAbandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled Regions
 
Critical infrastructure disruptions: a generic system dynamic approach for de...
Critical infrastructure disruptions: a generic system dynamic approach for de...Critical infrastructure disruptions: a generic system dynamic approach for de...
Critical infrastructure disruptions: a generic system dynamic approach for de...
 
Soft computing based multilevel strategy for bridge integrity monitoring
Soft computing based multilevel strategy for bridge integrity monitoringSoft computing based multilevel strategy for bridge integrity monitoring
Soft computing based multilevel strategy for bridge integrity monitoring
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
 
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing ResearchFuture Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Casalicchio

  • 1. AIIC
‐
ENEA

2010
 March
29,
2010
 Roma,
Italy
 Cyber
Dependencies:
 Characteriza3on,
Discovery
and
Analysis
 E.
Casalicchio
 University
of
Roma
–
Tor
Vergata
 Department
of
Computer
Science
System
and
Prod.
 E.Casalicchio
‐
www.emilianocasalichio.eu

  • 2. AIIC
‐
ENEA

2010
 March
29,
2010
 Cyber
dependencies
 Roma,
Italy
 •  An
infrastructure
has
a
cyber
inter‐dependence
if
its
status
depends
on
 informa3on
transmi@ed
across
cyberspace.
 Rinaldi
et
al.
2003
 We are interested in understanding the coupling (inter-dependencies) among components, systems, services INSIDE the cyberinfrastructure Components Services Systems Cyberinfrastructure E.Casalicchio
‐
www.emilianocasalichio.eu

  • 3. AIIC
‐
ENEA

2010
 March
29,
2010
 Mo3va3ons

 Roma,
Italy
 Vulnerability
&
 Impact
 Risk
Assessment
 Analysis
 • 
fundamental
 • 
(inter‐dependencies)
 • 
root/cause
of
 and
strategic
IT
 Assets
respect
with
 failure
 components,

 the
vulnerabili3es
and
 propaga3on,
 Cyber
 • 
cascading
and
 networks
and
 risk
must
be
evaluated
 Security
 escala3ng
 services
 • 
Quan3ta3ve
metrics
 phenomena
 Cyber treath Cyber dependencies discovery and analysis Natural hazard Terrorism / physical attack E.Casalicchio
‐
www.emilianocasalichio.eu

  • 4. AIIC
‐
ENEA

2010
 March
29,
2010
 Three
phases
 Roma,
Italy
 •  Dimensions
of
 Discovery
 analysis
 •  Intensity
 •  metrics
for
 •  Impact
 dependencies
 •  Presence
of
 •  Vulnerability
 evalua3on

 dependencies
 •  Risk
 •  methods
and
 respect
to
 mechanisms
for
 dimensions
of
 discovery
and
 analysis
 analysis
 Analysis
 Characteriza3on
 E.Casalicchio
‐
www.emilianocasalichio.eu

  • 5. AIIC
‐
ENEA

2010
 Characteriza3on
of
Cyber
dependencies
 March
29,
2010
 Roma,
Italy
 Logical
 Locality
‐
Physical
 Inter‐/Intra‐system
 Type
–
nature
of
the
 (services)
 or
logical
locaDon
 Inter‐/Intra‐domain
 dependent
enDDes
 Hardware/SoTware
 (architectures)
 Life
Cycle
–
when
dependencies
 Strength
‐
the
 Persistent
 are
introduced
in
the
system
life
 intensity
of
 Op3onal
/
 cycle
 Func3onal
 6
 dependencie
 Occasional
 Structural
 Resources
 CriDcality
‐
the
potenDal
of
 becoming
disastrous

 Pre
/
Post
/Ex‐ requisite
 Direct
(1st
order)
 Order
‐
Directness
 of
a
dependency
 Indirect
(2nd/ nth
order)
 E.Casalicchio
‐
www.emilianocasalichio.eu

  • 6. AIIC
‐
ENEA

2010
 March
29,
2010
 Characteriza3on
suggests
Metrics
 Roma,
Italy
 •  Strength

 –  probability
P
of
dependency
ac3va3on
P
in
[0,
1]


 –  Dura3on
T
(related
to
the
ac3vity/life
3me)
%T
in
[0,
1]
 •  CriDcality

 Severe
 Elevated
 Guarded
 High
 –  how
dangerous
a
dependency
can
be
(qualita3ve)
 Low
 •  Pre‐requisite
(Severe),
Co‐requisite
(High,
Elevated)
 •  Ex‐requisite
(Guarded,
Low)

 •  Order

 –  measure
of
the
cascade
effect
 –  Measure
of
the
distance
of
a
poten3al
target
from
the
source
of
a
failure
 •  Locality
 –  Indicate
if
a
rela3onship
is
internal
or
external
the
system
or
layer
under
 considera3on
 •  Life
cycle
 –  When
a
dependency
is
introduced
 –  Cost
of
dependency
removal
 E.Casalicchio
‐
www.emilianocasalichio.eu

  • 7. AIIC
‐
ENEA

2010
 March
29,
2010
 Discovery
of
cyber
dependencies:
 Analysis
of
Dependencies:
 Roma,
Italy
 •  Off‐line,
sta3c
 •  Off‐line,
sta3c
 •  Off‐line,
dynamic
 Approaches:
 Approaches:
 •  Applica3on
Code
Analysis
(ACA)
 •  Component
Dependencies
Graph
 •  Visual
model
analysis

(VMA)

 •  Dynamic
program
analysis
(DPA)

 •  Dependencies
Structure
Matrix
 •  
Performance
analysis
(PA)
 •  System
informa3on
repositories
mining
(SRM)

 Goal:
 •  Message
exchange
sequence
or
pa@ern
mining
 •  Evalua3on
of
metrics/indexes
to
 (MSM)

 quan3fy
systems/service
coupling
in
 support
to:

 •  Risk and Vulnerability assessment •  Impact analysis E.Casalicchio
‐
www.emilianocasalichio.eu

  • 8. AIIC
‐
ENEA

2010
 March
29,
2010
 Open
discussion
 Roma,
Italy
 Discovery
 •  Off‐line
and/or
 •  Dimensions
 On‐line
 •  On‐line
 •  Metrics
 dynamic
 dynamic
 approaches
 Characteriza3on
 Analysis
 Casalicchio@ing.uniroma2.it
 h@p://www.emilianocasalicchio.eu
 E.Casalicchio
‐
www.emilianocasalichio.eu