SlideShare a Scribd company logo
1 of 55
Download to read offline
State Monitoring
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 1
 Prerequisites
 CITADEL framework basic knowledge
 Specifications and Verification Tools for
CITADEL Modeling
 Related material
 CITADEL D4.4 MILS Monitoring System
 CITADEL D3.3 CITADEL Design Techniques to
Specify, Verify, and Synthesize Policies for
Run-Time Monitors
 Module Configuring - MILS Monitoring System
- State Monitoring. D6.6 Training Materials for
Electronic Delivery
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 2
Other materials and knowledge
 Monitoring Plane Basic Knowledge
 Basic Technology Overview
 Specification of State Control /
Monitoring Policies
 State Monitoring in CITADEL
 Implementation of State Monitoring
applications
 Linear Temporal Logic Policies
 Sources and Related Reading
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 3
Contents
Monitoring Plane Basic
Knowledge
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 4
 Specific critical functions served by
monitoring within the MILS adaptation
architecture
 perform runtime observation to assure that
properties previously proven in the current
assurance case continue to hold
 detect conditions that cause the current
configuration to no longer satisfy the current
conformance property
 detect violation of assumptions in the current
assurance case or other conditions that should
trigger adaptation
 build context awareness.
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 5
Purpose of the Monitoring Plane
 Provides evaluation of the runtime system
behavior
 Works on the system level in coherence
with the Separation Kernel
 Addresses the need of creating bespoke
monitors and monitoring applications
 For this purpose it implements
● simple and reusable monitoring algorithms and
security policies
● a toolchain for developing new policies
● a way to compose the existing policies and
algorithm
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 6
State Monitoring
Basic Technology
Overview
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 7
 Kaspersky Security System (KSS)
 Is a flexible and extendable security
mechanism
 can be integrated in a system as a
separate engine for
● security policies specification
● security verdicts calculation
 Developed with MILS concept in mind
● keeps the principle of separation of access
computation and decision enforcement
● offers architectural and language mechanisms,
which, applied together, can form an adjustable
security monitoring system
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 8
Initial technology
 Putting the security policies
computation away from applications
provides a number of benefits
 From application’s point of view
● there is no need for applications to
implement security policies
● there is no need to change applications if
the security policy changes
● security policy is not limited to the means
supported by applications
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 9
Separation advantages (1)
 From security engine’s point of view
● policies are abstracted away from
applications
● policies operate over abstract domains
● policies are not aware of differences
between applications, resources, etc.
● policy may remain stable even if
applications change significantly
● system-wide security policy is a
composition of smaller policies
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 10
Separation advantages (2)
Detached Security System
Architectural Design
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 11
 consists of separated execution
environments, where technology
specific applications are executed, e.g.
interaction between processes,
external communications, local
computations, process control, human-
machine interfaces etc.
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 12
Application layer
 controls the execution of entities,
mediates interactions between entities,
and communicates with the security
system to receive and enforce the
verdicts
 for the MILS platform, the role of SRM
is played by the Foundational Plane
Reference monitor
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 13
 Computes a verdict based on system
state, input data, and configured
security policy
 Each entity on its execution is
associated with a security context
 A security context is a data structure,
which is used by stateful polices to
keep security related attributes
required to compute a decision
The layer for the security system
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 14
Implementation Example
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 15
Specification of State
Control/Monitoring Policies
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 16
 The KSS architecture and its framework
are designed to provide support for
diverse security policies, including
monitoring policies
 The specification framework consists of
● a set of policies templates for the security
server
● interface definition language (IDL)
● + component definition language (CDL)
● + entity definition language (EDL)
● security specification language (CFG)
● toolchain to translate CFG specification into
executable code
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 17
Monitoring Specification Support
KSS: Policy Definition Framework
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 18
 Industrial process specification
 a simple processing unit which consists of the
conveyor transferring the detail and the drill
which makes a hole in this detail in the given
location when the detail is under the drill
 the system can be viewed as consisted
of two communicating parties
● entity, sending control commands (SCADA)
● entity, responsible for command
implementation and sending sensor
information (Factory)
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 19
Example
Example: Process description
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 20
Example:
Policy Definition Framework
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 21
The set of
Definition
languages
Configuration
language
Application
developing
practices
IDL, CDL, EDL CFG Component design,
separation of
concerns, SoD, …
 Traditional access control policies are
locked into a fixed set of internal system
prerequisites and usually don’t consider
time and environment
 Linear Temporal Logic is the appropriate
logical tool for modeling the process and
check it execution
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 22
Example: Designing Policies
Multilayer security configuration
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 23
Example: Process specification (IDL)
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 24
State Monitoring in
CITADEL
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 25
The CITADEL approach to MILS
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 26
 The Monitoring Plane monitors the
components in the Operational Plane
and the resources in the Foundational
Plane and generates alarms when it
detects event patterns that indicate
faulty or suspicious system behaviour.
The monitored components, properties
and resulting alarms are specified in
the model.
CITADEL’s view on Monitoring
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 27
 It is up to Foundational Plane, what to
do with the verdicts computed by the
Security System
 this helps to implement the monitoring
using the same mechanism
 This also helps with adaptivity, i.e. by
passing the verdicts about operations to
adaptation / reconfiguration
mechanisms it can provide a feedback
to the operational plane
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 28
How KSS is used for state monitoring
Generic Monitoring Model
(Intrusion Detection)
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 29
 E-box – sensors (specific for State
Monitoring)
 A-box – analysers (State Monitoring
policies in terms of the basic KSS
technology)
 D-box – log
 R-box – reaction: reconfiguration and
adaptation
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 30
In CITADEL Context
 Types of events under State Monitoring
and Event sensors
 Typical monitoring policies
 Means of integration of specification
framework monitoring policies with the
system modeling framework
 Means of integration with Configuration
and Adaptation mechanisms
What needs to be considered
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 31
 The monitoring plane shall obtain and
save the data from diverse origins
 system data
 application data
 security events
 configuration log
 data from external IDS and antimalware
engines
 physical characteristics of the process
provided by cyberphysical controls
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 32
Sources of monitoring data
 Integration of AADL specifications with
configuration of monitoring policies
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 33
Sources of monitoring policies
Implementation of State
Monitoring applications
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 34
 Layered implementation
 Allows integrating monitoring plane with
operational plane and monitoring plane
with foundational plane in a way
allowing properly separate their
concerns
 Increases flexibility and ability to
support the development of bespoke
monitoring applications
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 35
Implementation
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 36
High-level design
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 37
Implementation Scheme
Implementation
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 38
SLIM
IDL
CFG
EDL
 The temporal property (linear temporal logic,
or LTL, formula) is extracted from the
AADL/SLIM specification and exported in
the format that can be accepted by the state
monitoring engine.
Phase 1: Model Integration
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 39
 State monitoring engine is then composed
with this property and appropriate security
configuration in order to generate the state
monitor code, the C-file with all the policy
logic
Phase 2: Monitoring Configuration
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 40
 The solution specific monitor library is linked
then with the state monitor (KSS) to
implement the state monitoring according to
the specification given at the model level
Phase 3: Technical Integration
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 41
 Summary:
 specify the objects for monitoring
 get the data (from the operational plane
etc.)
 renew sensors
 for every objects check the completion
of the monitoring rules
Creating Bespoke Monitoring
Applications
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 42
How to create
a bespoke monitoring application (1)
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 43
 The process of monitors synthesis
 For the given SLIM definition, monitor
code is generated for every FDIR
component
● A component of Fault Detection, Isolation
and Recovery:
● optional input ports, for connecting the
monitor to monitored components
● at least one alarm port
How to create
a bespoke monitoring application (2)
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 44
 The generated code of the monitoring
library:
 The IDL specification for every FDIR
component
 The common CFG for components
 Some C code supporting CFG
 The monitor is based on the monitoring
library
How to create
a bespoke monitoring application (3)
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 45
 What is automated:
 Connection to Adaptation Engine (AE)
and Configuration (CA)
● handshakes are similar to CF-testbed
 Alarm generation (JSON format/CF-
testbed) and deliver to AE and CA
 Searching for event potentially
requiring monitor starting/ stopping/
restarting
How to create
a bespoke monitoring application (4)
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 46
 What is not automated:
 Sensors (are individual per case)
 Initial configuration transfer
Linear Temporal Logic
Policies
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 47
What is LTL
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 48
 Linear Temporal Logic (LTL) is a useful
tool in formal specification and runtime
verification of temporal safety
properties
 LTL formulae define a set of event
traces where each even has an index
and an identifier of its type such as
 observed command
 action
 other observable event
Specification of LTL Policies for
Runtime Monitors (1)
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 49
 In the CITADEL Modeling Language
 the policies are specified as AADL
properties of a monitor component,
representing the actual runtime monitor.
 The monitor component is a component of
category system tagged with property
FDIR (to specify that it is a component of
the Fault Detection, Isolation and Recovery
subsystem).
 It also specifies
● an alarm port, used to model raising of the
alarm
● the input ports representing the signals coming
from the SUS
Specification of LTL Policies for
Runtime Monitors (2)
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 50
 The alarm port can also be tagged with an
optional property MonitoringProperty,
● an LTL formula over parameters, input ports
and data subcomponents of the monitor
● MonitoringProperty specifies the nominal
operational conditions, that is, the alarm should
be raised when the MonitoringProperty does not
hold
● This property can be used in reasoning
about possible reconfigurations by the
Adaptation System, and for automatic synthesis
of monitor code
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 51
Example of LTL specification in AADL
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 52
Example of LTL specification in KSS
The runtime verification of policies in the CITADEL Monitoring Plane is
implemented by the Kaspersky Security System (KSS). The monitoring
properties specified in the CITADEL Modeling Language are
automatically extracted and translated into the input configuration of
the KSS.
The above monitoring property will be converted into the following KSS
LTL specification
Process definition
with LTL in KSS CFG
(industrial case mentioned earlier)
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 53
 where ’|’,’!’ and ’==>’ mean OR, NOT and IMPLY
respectively.
 This specification is detailed with KSS CFG language to
set the informal drilling safety properties for drilling are
expressed in LTL as a custom policy for security server
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 54
Process definition
with LTL in KSS CFG
(industrial case mentioned earlier)
[1] CITADEL D4.4 MILS Monitoring System
[2] CITADEL D3.3 CITADEL Design Techniques to Specify, Verify, and
Synthesize Policies for Run-Time Monitors
[3] Tverdyshev S., Blasum H., Rudina E., Kulagin D., Dyakin P., Moiseev
S. (2016) Security Architecture and Specification Framework for Safe and
Secure Industrial Automation. In: Rome E., Theocharidou M., Wolthusen
S. (eds) Critical Information Infrastructures Security. CRITIS 2015.
Lecture Notes in Computer Science, vol 9578. Springer, Cham
[4] Kort, Semen, Kulagin, Dimitry, & Rudina, Ekaterina. (2017). An
approach to Separation of Duties validation for MILS security
configurations. Zenodo. http://doi.org/10.5281/zenodo.571156
[5] CITADEL D4.5 Integrated and tested Adaptive MILS Platform
[6] CITADEL. D4.3 MILS adaptation system
[7] Module Configuring - MILS Monitoring System - State Monitoring.
D6.6 Training Materials for Electronic Delivery
Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 55
Sources and related reading

More Related Content

What's hot

Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9Ian Sommerville
 
MVC Architecture from Maintenance Quality Attributes Perspective
MVC Architecture from Maintenance Quality Attributes PerspectiveMVC Architecture from Maintenance Quality Attributes Perspective
MVC Architecture from Maintenance Quality Attributes PerspectiveCSCJournals
 
Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...
Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...
Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...Ákos Horváth
 
EDA Applications and Benefits for Smart Manufacturing
EDA Applications and Benefits for Smart ManufacturingEDA Applications and Benefits for Smart Manufacturing
EDA Applications and Benefits for Smart ManufacturingKimberly Daich
 
Software engineering in industrial automation state of-the-art review
Software engineering in industrial automation state of-the-art reviewSoftware engineering in industrial automation state of-the-art review
Software engineering in industrial automation state of-the-art reviewTiago Oliveira
 
Transformation of simulink models to iec 61499 function blocks for verificati...
Transformation of simulink models to iec 61499 function blocks for verificati...Transformation of simulink models to iec 61499 function blocks for verificati...
Transformation of simulink models to iec 61499 function blocks for verificati...Tiago Oliveira
 
Engineering Software Products: 10. Devops and code management
Engineering Software Products: 10. Devops and code managementEngineering Software Products: 10. Devops and code management
Engineering Software Products: 10. Devops and code managementsoftware-engineering-book
 
Smarter Manufacturing with SEMI Standards: Practical Approaches for Plug-and-...
Smarter Manufacturing with SEMI Standards: Practical Approaches for Plug-and-...Smarter Manufacturing with SEMI Standards: Practical Approaches for Plug-and-...
Smarter Manufacturing with SEMI Standards: Practical Approaches for Plug-and-...Kimberly Daich
 
The Role of Models in Semiconductor Smart Manufacturing
The Role of Models in Semiconductor Smart ManufacturingThe Role of Models in Semiconductor Smart Manufacturing
The Role of Models in Semiconductor Smart ManufacturingKimberly Daich
 
Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...IJECEIAES
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1Mohammed Romi
 
Ch15-Software Engineering 9
Ch15-Software Engineering 9Ch15-Software Engineering 9
Ch15-Software Engineering 9Ian Sommerville
 
Integrated Smart Controller Implementation
Integrated  Smart Controller ImplementationIntegrated  Smart Controller Implementation
Integrated Smart Controller ImplementationEU ARCADIA PROJECT
 
2016 state of industrial internet application development
2016 state of industrial internet application development2016 state of industrial internet application development
2016 state of industrial internet application developmenteraser Juan José Calderón
 
Smart Manufacturing in the Gigafab Era
Smart Manufacturing in the Gigafab Era  Smart Manufacturing in the Gigafab Era
Smart Manufacturing in the Gigafab Era Kimberly Daich
 
Ch17-Software Engineering 9
Ch17-Software Engineering 9Ch17-Software Engineering 9
Ch17-Software Engineering 9Ian Sommerville
 

What's hot (19)

Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9
 
MVC Architecture from Maintenance Quality Attributes Perspective
MVC Architecture from Maintenance Quality Attributes PerspectiveMVC Architecture from Maintenance Quality Attributes Perspective
MVC Architecture from Maintenance Quality Attributes Perspective
 
Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...
Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...
Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...
 
A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector ...
A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector ...A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector ...
A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector ...
 
Ch8.testing
Ch8.testingCh8.testing
Ch8.testing
 
EDA Applications and Benefits for Smart Manufacturing
EDA Applications and Benefits for Smart ManufacturingEDA Applications and Benefits for Smart Manufacturing
EDA Applications and Benefits for Smart Manufacturing
 
Software engineering in industrial automation state of-the-art review
Software engineering in industrial automation state of-the-art reviewSoftware engineering in industrial automation state of-the-art review
Software engineering in industrial automation state of-the-art review
 
Transformation of simulink models to iec 61499 function blocks for verificati...
Transformation of simulink models to iec 61499 function blocks for verificati...Transformation of simulink models to iec 61499 function blocks for verificati...
Transformation of simulink models to iec 61499 function blocks for verificati...
 
Engineering Software Products: 10. Devops and code management
Engineering Software Products: 10. Devops and code managementEngineering Software Products: 10. Devops and code management
Engineering Software Products: 10. Devops and code management
 
Smarter Manufacturing with SEMI Standards: Practical Approaches for Plug-and-...
Smarter Manufacturing with SEMI Standards: Practical Approaches for Plug-and-...Smarter Manufacturing with SEMI Standards: Practical Approaches for Plug-and-...
Smarter Manufacturing with SEMI Standards: Practical Approaches for Plug-and-...
 
The Role of Models in Semiconductor Smart Manufacturing
The Role of Models in Semiconductor Smart ManufacturingThe Role of Models in Semiconductor Smart Manufacturing
The Role of Models in Semiconductor Smart Manufacturing
 
Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1
 
Ch15-Software Engineering 9
Ch15-Software Engineering 9Ch15-Software Engineering 9
Ch15-Software Engineering 9
 
Ch25 configuration management
Ch25 configuration managementCh25 configuration management
Ch25 configuration management
 
Integrated Smart Controller Implementation
Integrated  Smart Controller ImplementationIntegrated  Smart Controller Implementation
Integrated Smart Controller Implementation
 
2016 state of industrial internet application development
2016 state of industrial internet application development2016 state of industrial internet application development
2016 state of industrial internet application development
 
Smart Manufacturing in the Gigafab Era
Smart Manufacturing in the Gigafab Era  Smart Manufacturing in the Gigafab Era
Smart Manufacturing in the Gigafab Era
 
Ch17-Software Engineering 9
Ch17-Software Engineering 9Ch17-Software Engineering 9
Ch17-Software Engineering 9
 

Similar to Advanced tech module - state monitoring

Google GCP-PCSE Certificate Is Your Best Choice
Google GCP-PCSE Certificate Is Your Best ChoiceGoogle GCP-PCSE Certificate Is Your Best Choice
Google GCP-PCSE Certificate Is Your Best ChoiceAmaaira Johns
 
Lecture 6 & 7.pdf
Lecture 6 & 7.pdfLecture 6 & 7.pdf
Lecture 6 & 7.pdfRaoShahid10
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld
 
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdfCybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdfssuser7b150d
 
Security 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and ReportingSecurity 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and ReportingPrecisely
 
PSI Pharmaway 1.0
PSI Pharmaway 1.0PSI Pharmaway 1.0
PSI Pharmaway 1.0Dash Way
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...akquinet enterprise solutions GmbH
 
OSD AT&L Defense Acquisition Process Chart
OSD AT&L Defense Acquisition Process ChartOSD AT&L Defense Acquisition Process Chart
OSD AT&L Defense Acquisition Process ChartTom "Blad" Lindblad
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryAshley Zupkus
 
Enforcing Corporate Security Policies via Computational Intelligence Techniques
Enforcing Corporate Security Policies via Computational Intelligence TechniquesEnforcing Corporate Security Policies via Computational Intelligence Techniques
Enforcing Corporate Security Policies via Computational Intelligence TechniquesJuan J. Merelo
 
Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Jay Steidle
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsMuhammadTalha436
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentNicole Gaehle, MSIST
 
Demystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceDemystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceMirantis
 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessSeungjoo Kim
 

Similar to Advanced tech module - state monitoring (20)

Google GCP-PCSE Certificate Is Your Best Choice
Google GCP-PCSE Certificate Is Your Best ChoiceGoogle GCP-PCSE Certificate Is Your Best Choice
Google GCP-PCSE Certificate Is Your Best Choice
 
Lecture 6 & 7.pdf
Lecture 6 & 7.pdfLecture 6 & 7.pdf
Lecture 6 & 7.pdf
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
 
CMMC DFARS/NIST SP 800-171
CMMC DFARS/NIST SP 800-171 CMMC DFARS/NIST SP 800-171
CMMC DFARS/NIST SP 800-171
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
Review_2013
Review_2013Review_2013
Review_2013
 
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdfCybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
 
Security 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and ReportingSecurity 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and Reporting
 
PSI Pharmaway 1.0
PSI Pharmaway 1.0PSI Pharmaway 1.0
PSI Pharmaway 1.0
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
OSD AT&L Defense Acquisition Process Chart
OSD AT&L Defense Acquisition Process ChartOSD AT&L Defense Acquisition Process Chart
OSD AT&L Defense Acquisition Process Chart
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industry
 
Enforcing Corporate Security Policies via Computational Intelligence Techniques
Enforcing Corporate Security Policies via Computational Intelligence TechniquesEnforcing Corporate Security Policies via Computational Intelligence Techniques
Enforcing Corporate Security Policies via Computational Intelligence Techniques
 
Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15
 
On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements Document
 
Demystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceDemystifying Cloud Security Compliance
Demystifying Cloud Security Compliance
 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC Process
 

More from RamnGonzlezRuiz2

Certification readiness strategy
Certification readiness strategyCertification readiness strategy
Certification readiness strategyRamnGonzlezRuiz2
 
Citadel training on context awareness solution
Citadel training on context awareness solutionCitadel training on context awareness solution
Citadel training on context awareness solutionRamnGonzlezRuiz2
 
Mils architectural approach
Mils architectural approachMils architectural approach
Mils architectural approachRamnGonzlezRuiz2
 
CITADEL configuration and reconfiguration synthesis
CITADEL configuration and reconfiguration synthesisCITADEL configuration and reconfiguration synthesis
CITADEL configuration and reconfiguration synthesisRamnGonzlezRuiz2
 
State monitoring configuration
State monitoring configurationState monitoring configuration
State monitoring configurationRamnGonzlezRuiz2
 

More from RamnGonzlezRuiz2 (8)

Certification readiness strategy
Certification readiness strategyCertification readiness strategy
Certification readiness strategy
 
Citadel training on context awareness solution
Citadel training on context awareness solutionCitadel training on context awareness solution
Citadel training on context awareness solution
 
Mils architectural approach
Mils architectural approachMils architectural approach
Mils architectural approach
 
CITADEL configuration and reconfiguration synthesis
CITADEL configuration and reconfiguration synthesisCITADEL configuration and reconfiguration synthesis
CITADEL configuration and reconfiguration synthesis
 
Configuring monitoring
Configuring monitoringConfiguring monitoring
Configuring monitoring
 
Introduction to citadel
Introduction to citadelIntroduction to citadel
Introduction to citadel
 
State monitoring configuration
State monitoring configurationState monitoring configuration
State monitoring configuration
 
Adaptation-Engine traning
Adaptation-Engine traningAdaptation-Engine traning
Adaptation-Engine traning
 

Recently uploaded

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

Advanced tech module - state monitoring

  • 1. State Monitoring Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 1
  • 2.  Prerequisites  CITADEL framework basic knowledge  Specifications and Verification Tools for CITADEL Modeling  Related material  CITADEL D4.4 MILS Monitoring System  CITADEL D3.3 CITADEL Design Techniques to Specify, Verify, and Synthesize Policies for Run-Time Monitors  Module Configuring - MILS Monitoring System - State Monitoring. D6.6 Training Materials for Electronic Delivery Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 2 Other materials and knowledge
  • 3.  Monitoring Plane Basic Knowledge  Basic Technology Overview  Specification of State Control / Monitoring Policies  State Monitoring in CITADEL  Implementation of State Monitoring applications  Linear Temporal Logic Policies  Sources and Related Reading Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 3 Contents
  • 4. Monitoring Plane Basic Knowledge Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 4
  • 5.  Specific critical functions served by monitoring within the MILS adaptation architecture  perform runtime observation to assure that properties previously proven in the current assurance case continue to hold  detect conditions that cause the current configuration to no longer satisfy the current conformance property  detect violation of assumptions in the current assurance case or other conditions that should trigger adaptation  build context awareness. Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 5 Purpose of the Monitoring Plane
  • 6.  Provides evaluation of the runtime system behavior  Works on the system level in coherence with the Separation Kernel  Addresses the need of creating bespoke monitors and monitoring applications  For this purpose it implements ● simple and reusable monitoring algorithms and security policies ● a toolchain for developing new policies ● a way to compose the existing policies and algorithm Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 6 State Monitoring
  • 7. Basic Technology Overview Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 7
  • 8.  Kaspersky Security System (KSS)  Is a flexible and extendable security mechanism  can be integrated in a system as a separate engine for ● security policies specification ● security verdicts calculation  Developed with MILS concept in mind ● keeps the principle of separation of access computation and decision enforcement ● offers architectural and language mechanisms, which, applied together, can form an adjustable security monitoring system Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 8 Initial technology
  • 9.  Putting the security policies computation away from applications provides a number of benefits  From application’s point of view ● there is no need for applications to implement security policies ● there is no need to change applications if the security policy changes ● security policy is not limited to the means supported by applications Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 9 Separation advantages (1)
  • 10.  From security engine’s point of view ● policies are abstracted away from applications ● policies operate over abstract domains ● policies are not aware of differences between applications, resources, etc. ● policy may remain stable even if applications change significantly ● system-wide security policy is a composition of smaller policies Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 10 Separation advantages (2)
  • 11. Detached Security System Architectural Design Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 11
  • 12.  consists of separated execution environments, where technology specific applications are executed, e.g. interaction between processes, external communications, local computations, process control, human- machine interfaces etc. Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 12 Application layer
  • 13.  controls the execution of entities, mediates interactions between entities, and communicates with the security system to receive and enforce the verdicts  for the MILS platform, the role of SRM is played by the Foundational Plane Reference monitor Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 13
  • 14.  Computes a verdict based on system state, input data, and configured security policy  Each entity on its execution is associated with a security context  A security context is a data structure, which is used by stateful polices to keep security related attributes required to compute a decision The layer for the security system Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 14
  • 15. Implementation Example Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 15
  • 16. Specification of State Control/Monitoring Policies Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 16
  • 17.  The KSS architecture and its framework are designed to provide support for diverse security policies, including monitoring policies  The specification framework consists of ● a set of policies templates for the security server ● interface definition language (IDL) ● + component definition language (CDL) ● + entity definition language (EDL) ● security specification language (CFG) ● toolchain to translate CFG specification into executable code Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 17 Monitoring Specification Support
  • 18. KSS: Policy Definition Framework Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 18
  • 19.  Industrial process specification  a simple processing unit which consists of the conveyor transferring the detail and the drill which makes a hole in this detail in the given location when the detail is under the drill  the system can be viewed as consisted of two communicating parties ● entity, sending control commands (SCADA) ● entity, responsible for command implementation and sending sensor information (Factory) Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 19 Example
  • 20. Example: Process description Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 20
  • 21. Example: Policy Definition Framework Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 21 The set of Definition languages Configuration language Application developing practices IDL, CDL, EDL CFG Component design, separation of concerns, SoD, …
  • 22.  Traditional access control policies are locked into a fixed set of internal system prerequisites and usually don’t consider time and environment  Linear Temporal Logic is the appropriate logical tool for modeling the process and check it execution Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 22 Example: Designing Policies
  • 23. Multilayer security configuration Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 23
  • 24. Example: Process specification (IDL) Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 24
  • 25. State Monitoring in CITADEL Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 25
  • 26. The CITADEL approach to MILS Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 26
  • 27.  The Monitoring Plane monitors the components in the Operational Plane and the resources in the Foundational Plane and generates alarms when it detects event patterns that indicate faulty or suspicious system behaviour. The monitored components, properties and resulting alarms are specified in the model. CITADEL’s view on Monitoring Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 27
  • 28.  It is up to Foundational Plane, what to do with the verdicts computed by the Security System  this helps to implement the monitoring using the same mechanism  This also helps with adaptivity, i.e. by passing the verdicts about operations to adaptation / reconfiguration mechanisms it can provide a feedback to the operational plane Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 28 How KSS is used for state monitoring
  • 29. Generic Monitoring Model (Intrusion Detection) Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 29
  • 30.  E-box – sensors (specific for State Monitoring)  A-box – analysers (State Monitoring policies in terms of the basic KSS technology)  D-box – log  R-box – reaction: reconfiguration and adaptation Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 30 In CITADEL Context
  • 31.  Types of events under State Monitoring and Event sensors  Typical monitoring policies  Means of integration of specification framework monitoring policies with the system modeling framework  Means of integration with Configuration and Adaptation mechanisms What needs to be considered Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 31
  • 32.  The monitoring plane shall obtain and save the data from diverse origins  system data  application data  security events  configuration log  data from external IDS and antimalware engines  physical characteristics of the process provided by cyberphysical controls Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 32 Sources of monitoring data
  • 33.  Integration of AADL specifications with configuration of monitoring policies Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 33 Sources of monitoring policies
  • 34. Implementation of State Monitoring applications Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 34
  • 35.  Layered implementation  Allows integrating monitoring plane with operational plane and monitoring plane with foundational plane in a way allowing properly separate their concerns  Increases flexibility and ability to support the development of bespoke monitoring applications Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 35 Implementation
  • 36. Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 36 High-level design
  • 37. Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 37 Implementation Scheme
  • 38. Implementation Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 38 SLIM IDL CFG EDL
  • 39.  The temporal property (linear temporal logic, or LTL, formula) is extracted from the AADL/SLIM specification and exported in the format that can be accepted by the state monitoring engine. Phase 1: Model Integration Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 39
  • 40.  State monitoring engine is then composed with this property and appropriate security configuration in order to generate the state monitor code, the C-file with all the policy logic Phase 2: Monitoring Configuration Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 40
  • 41.  The solution specific monitor library is linked then with the state monitor (KSS) to implement the state monitoring according to the specification given at the model level Phase 3: Technical Integration Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 41
  • 42.  Summary:  specify the objects for monitoring  get the data (from the operational plane etc.)  renew sensors  for every objects check the completion of the monitoring rules Creating Bespoke Monitoring Applications Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 42
  • 43. How to create a bespoke monitoring application (1) Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 43  The process of monitors synthesis  For the given SLIM definition, monitor code is generated for every FDIR component ● A component of Fault Detection, Isolation and Recovery: ● optional input ports, for connecting the monitor to monitored components ● at least one alarm port
  • 44. How to create a bespoke monitoring application (2) Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 44  The generated code of the monitoring library:  The IDL specification for every FDIR component  The common CFG for components  Some C code supporting CFG  The monitor is based on the monitoring library
  • 45. How to create a bespoke monitoring application (3) Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 45  What is automated:  Connection to Adaptation Engine (AE) and Configuration (CA) ● handshakes are similar to CF-testbed  Alarm generation (JSON format/CF- testbed) and deliver to AE and CA  Searching for event potentially requiring monitor starting/ stopping/ restarting
  • 46. How to create a bespoke monitoring application (4) Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 46  What is not automated:  Sensors (are individual per case)  Initial configuration transfer
  • 47. Linear Temporal Logic Policies Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 47
  • 48. What is LTL Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 48  Linear Temporal Logic (LTL) is a useful tool in formal specification and runtime verification of temporal safety properties  LTL formulae define a set of event traces where each even has an index and an identifier of its type such as  observed command  action  other observable event
  • 49. Specification of LTL Policies for Runtime Monitors (1) Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 49  In the CITADEL Modeling Language  the policies are specified as AADL properties of a monitor component, representing the actual runtime monitor.  The monitor component is a component of category system tagged with property FDIR (to specify that it is a component of the Fault Detection, Isolation and Recovery subsystem).  It also specifies ● an alarm port, used to model raising of the alarm ● the input ports representing the signals coming from the SUS
  • 50. Specification of LTL Policies for Runtime Monitors (2) Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 50  The alarm port can also be tagged with an optional property MonitoringProperty, ● an LTL formula over parameters, input ports and data subcomponents of the monitor ● MonitoringProperty specifies the nominal operational conditions, that is, the alarm should be raised when the MonitoringProperty does not hold ● This property can be used in reasoning about possible reconfigurations by the Adaptation System, and for automatic synthesis of monitor code
  • 51. Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 51 Example of LTL specification in AADL
  • 52. Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 52 Example of LTL specification in KSS The runtime verification of policies in the CITADEL Monitoring Plane is implemented by the Kaspersky Security System (KSS). The monitoring properties specified in the CITADEL Modeling Language are automatically extracted and translated into the input configuration of the KSS. The above monitoring property will be converted into the following KSS LTL specification
  • 53. Process definition with LTL in KSS CFG (industrial case mentioned earlier) Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 53
  • 54.  where ’|’,’!’ and ’==>’ mean OR, NOT and IMPLY respectively.  This specification is detailed with KSS CFG language to set the informal drilling safety properties for drilling are expressed in LTL as a custom policy for security server Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 54 Process definition with LTL in KSS CFG (industrial case mentioned earlier)
  • 55. [1] CITADEL D4.4 MILS Monitoring System [2] CITADEL D3.3 CITADEL Design Techniques to Specify, Verify, and Synthesize Policies for Run-Time Monitors [3] Tverdyshev S., Blasum H., Rudina E., Kulagin D., Dyakin P., Moiseev S. (2016) Security Architecture and Specification Framework for Safe and Secure Industrial Automation. In: Rome E., Theocharidou M., Wolthusen S. (eds) Critical Information Infrastructures Security. CRITIS 2015. Lecture Notes in Computer Science, vol 9578. Springer, Cham [4] Kort, Semen, Kulagin, Dimitry, & Rudina, Ekaterina. (2017). An approach to Separation of Duties validation for MILS security configurations. Zenodo. http://doi.org/10.5281/zenodo.571156 [5] CITADEL D4.5 Integrated and tested Adaptive MILS Platform [6] CITADEL. D4.3 MILS adaptation system [7] Module Configuring - MILS Monitoring System - State Monitoring. D6.6 Training Materials for Electronic Delivery Kaspersky Lab UK Training – Advanced Technical Module – State Monitoring 55 Sources and related reading