SlideShare a Scribd company logo
1 of 24
Making (Implicit) Security
Requirements Explicit for
Cyber-Physical Systems:
A Maritime Use Case
Security Analysis
Tope Omitola,
Abdolbaghi Rezazadeh,
Michael Butler
1
Presented at the 3rd International Workshop on
Cyber-Security and Functional Safety in Cyber-
Physical Systems (IWCFS 2019), Linz, Austria, August
26 - 29, 2019
CONTENT
• Importance of Software Requirements
• Critical Maritime Infrastructure (CMI)
• Security Requirements Analysis for CMI
• System Theoretic Process Analysis (STPA) for Safety
Requirements Analysis
• STPA for Security Requirements Analysis
• STPA for CMI Security Requirements Analysis
• Conclusions
2
Importance of
Software Requirements
•System Requirements
are very important
•“Blueprints” everyone on
project works from
3
Reason for
Software
Project Failure
• “Unclear Requirements” –
Top 3 or 4 reason why
projects fail –(Standish
Group & Software
Engineering Institute)
• Why “Unclear
Requirements” – One
reason - Implicit
Knowledge NOT made
Explicit Enough 4
Requirements Analysis is
Critical to the Success or
Failure of a Project
• Question - How to make the
Requirements Gathering
Explicit Enough
• Requirements analysis
usually done iteratively with
many delicate social and
other trade-offs involved
5
CRITICAL MARITIME
INFRASTRUCTURE
(CMI)
• Maritime is V. BIG business
(80% Global Trade)
• Important to Global
Transport and Supply Chains
• Maritime Infrastructure Is
Increasingly Networked
Together (Ships, On-Shore
Based Bridge, Controller)
6
CRITICAL MARITIME
INFRASTRUCTURE (CMI)
-- CYBER-THREATS
• Increased Networking
Brings Increased Risk of
Cyber-Threats
• Getting Security
Requirements Right Are
Important First Steps in
Securing CMI
7
SOME RELATED WORK IN
SECURITY
REQUIREMENTS ANALYSIS
• THROP: Fault-error-failure
chain model of single
component
• THROP: NOT useful for inter-
connected systems (e.g. CPS)
• STRIDE: Threat-centric
approach. Good approach to
Focus on Threats
• STRIDE: Focuses on Software
Systems – NOT useful for CPS
(H/W + S/W)
8
APPLYING STPA TO
SECURITY
REQUIREMENTS
ANALYSIS
• System Theoretic
Process Analysis focuses
on inter-connected
components (H/W &
S/W)
• Useful for CPS
• Usually Applied to
Safety Requirements
9
STPA -
Concepts
• Safety Constraints
• A Hierarchical Safety
Control Structure
• Process Models 10
THE SEVEN STEPS OF STPA
• State System Purpose
• Identify accidents
• Identify system hazards associated
with accidents
• Construct high-level control
structure
• Translate system hazards to high-
level safety requirements
• Identify Unsafe Control Actions
• Use Results to Create/Improve
Design
11
STPA – Applied to Security
STPA – SAFETY STPA - SECURITY
State System Purpose State System Purpose
Identify Accidents Identify System Losses
Identify System Hazards Identify System Threats
Construct Control Structure Construct Control Structure
Translate Hazards into Safety
Requirements
Translate Threats to Security
Constraints
Identify Unsafe Control Actions Identify Insecure Actions
Use Results to Create Design Use Results to Create/Improve
Design 12
SYSTEM PURPOSE – MARITIME
COMMS SYSTEM (MNS)
• This may require a few iterations
• “The Provision of Timely, Confidential,
Correct Communication of Navigation
Data, Acknowledgements and Route
Updates between Controller and Ship”
13
IDENTIFY SYSTEM LOSSES
Loss (from CS’s perspective) Loss (from Ship’s perspective)
L1: Not receiving ship location
data (affects data
provisioning)
L5: Not receiving navigation data from CS (affects
data provisioning)
L2: Receiving incorrect ship
location data (affects data
correctness)
L6: Receiving incorrect navigation data from CS
(affects data correctness)
L3: Receiving ship location
data v. late (affects timeliness)
L7: Receiving navigation data v. late (affects
timeliness)
L4: Unauthorised agent read
ship location data (affects data
L8: Unauthorised agent read navigation data
(affects data confidentiality) 14
IDENTIFY SYSTEM THREATS
Threats Threats
T1 Message
Congestion
T2
Interference
T3 Tampering T4 Injection Attack
T5 Replay Attack T6 Relay Attack
T7 Identity Spoofing T8 Loss of
Communications
Infrastructure
T9 Denial of Service T10 Traffic Analysis
T11 Eaves-dropping 15
CONTROL
STRUCTURE
• What are the main components
• What Role does each play
• What are command actions being used to interact
TRANSLATE
THREATS TO
SECURITY
CONSTRAINTS
(Some Example
Constraints)
What constraints need to be in place to prevent threat
conditions from occurring?
Threat System Constraint
T1 Message
Congestion
SC1 The system shall be able to prove the
identity of agents during long, probably
intermittent, transactions
T2 Interference SC2 The system shall guarantee against
communication interference between CS
and Ship
T4 Injection Attack SC4 The system shall maintain strong
mutual continuous authentication, of CS
and Ship, during all operations'
transactions
17
IDENTIFY (SECURE) AND INSECURE ACTIONS
Malicious Control
Action
Not Providing
Exposes Threats
Providing
Exposes
Threats
Wrong Time or
Wrong Order
Exposes Threats
Stopped
Too Soon
or
Applied
Too Long
Exposes
Threats
Address Resolution
Protocol spoofing
None UCA1. IS, T,
RPA, RLA, IA
As in UCA1 As in UCA1
IP spoofing None As in UCA1 As in UCA1 As in UCA1
Packet Tampering None As in UCA1 As in UCA1 As in UCA1
Eavesdropping None UCA2. Eavesdropping. As in UCA2 As in UCA2
Traffic Analysis
command
None UCA3. Traffic Analysis As in UCA3 As in UCA3
(T: Tampering, I: Interference, IA: Injection Attack, RPA: Replay Attack, RLA: Relay Attack,
IS: Identity Spoofing, DoS: DoS Attack, TA: Traffic Analysis, E: Eavesdropping).
18
(Possible) Mitigation Strategies and Techniques –
To Improve System Design
Threat Type Loss Link Mitigation Strategy Mitigation Technique
Identity spoofing L4, L8
(Confidentiality)
Crypto https/ssl
Tampering L2, L6
(Integrity)
Crypto ipsec, ssl
Traffic Analysis L4, L8
(Confidentiality)
Packet padding Message
Encryption
DoS L1, L3, L5, L7
(Availability)
Watch out for
Resource
exhaustion
Network provisioning
using access control lists
19
Systematic Security Analysis and System Trade-offs
• Can be used for design trade-offs & to relax system
purpose.
• System’s new purpose: “the provision of timely and
correct communication of navigation data,
acknowledgements and route updates, between SBB
and Ship". (Here, data confidentiality requirement
removed).
• Allows us to reduce system losses of interest, reduce
system threats of interest, system constraints, etc.
20
Systematic Security Analysis and System Trade-offs
Purpose Losses Threats Constraints Mit. Strg. Mit. Tech.
Provision of
timely &
correct
communi-
cation
of nav.
data,acks &
updates
between CS
& Ship
L1,
L2,
L3,
L5,
L6,
L7
T1,
T2,
T3,
T4,
T5,
T6,
T7,
T8,
T9
SC1,
SC2,
SC3,
SC4,
SC5,
SC6,
SC7,
SC8,
SC9
Crypt
ographic
& To
watch
out for
exhaustible
resources
(a)
HTTPS/SSL
,
IPSEC,
MACs &
(b) ACLs
HELPED US REMOVE LOSS 8 & THREAT 10; as a result of not including data
confidentiality in Requirement 21
SERIOUS THREATS TO CMI
22
CONCLUSIONS & FUTURE WORK
•Getting Security Requirements Right Is Very Important
•Systems Theory & Concepts from Safety Analyses (esp.
STPA) useful for security analysis of CMI
•STPA Systematic Approach (The 7 Steps) Can Help Elicit
System Purpose, Identify System Losses & Threats
•Can Help Derive System Constraints Useful To
Construct Mitigation Procedures
•Future Work: Use Event-B to Verify System Constraints
23
Questions
• Acknowledgement:
• Work conducted within the ENABLE-S3
project that has received funding from the
ECSEL Joint Undertaking under Grant
Agreement no. 692455.
24

More Related Content

What's hot

Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat DetectionNapier University
 
Teri_Radichel_Top_5_Priorities_for_Cloud_Security
Teri_Radichel_Top_5_Priorities_for_Cloud_SecurityTeri_Radichel_Top_5_Priorities_for_Cloud_Security
Teri_Radichel_Top_5_Priorities_for_Cloud_SecurityTriNimbus
 
Prioritized Approach Twenty Critical Controls 2008
Prioritized Approach Twenty Critical Controls 2008Prioritized Approach Twenty Critical Controls 2008
Prioritized Approach Twenty Critical Controls 2008Donald E. Hester
 
Functional Safety and Security process alignment
Functional Safety and Security process alignmentFunctional Safety and Security process alignment
Functional Safety and Security process alignmentAlan Tatourian
 
ADRIAN BOWENS Udated Resume2 good 2
ADRIAN BOWENS Udated Resume2 good 2ADRIAN BOWENS Udated Resume2 good 2
ADRIAN BOWENS Udated Resume2 good 2Adrian Bowens
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorEnergySec
 
The CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for DefenseThe CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for DefenseEnclaveSecurity
 
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
Advanced Persistent Threat in ICS/SCADA/IOT world: a case studyAdvanced Persistent Threat in ICS/SCADA/IOT world: a case study
Advanced Persistent Threat in ICS/SCADA/IOT world: a case studyFrancesco Faenzi
 
NIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation ProcessNIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation Processtimmcguinness
 
Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3MLG College of Learning, Inc
 
Lumension Security Solutions
Lumension Security SolutionsLumension Security Solutions
Lumension Security SolutionsHassaanSahloul
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsAlan Tatourian
 

What's hot (20)

Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat Detection
 
Outlier+Overview
Outlier+OverviewOutlier+Overview
Outlier+Overview
 
Teri_Radichel_Top_5_Priorities_for_Cloud_Security
Teri_Radichel_Top_5_Priorities_for_Cloud_SecurityTeri_Radichel_Top_5_Priorities_for_Cloud_Security
Teri_Radichel_Top_5_Priorities_for_Cloud_Security
 
Prioritized Approach Twenty Critical Controls 2008
Prioritized Approach Twenty Critical Controls 2008Prioritized Approach Twenty Critical Controls 2008
Prioritized Approach Twenty Critical Controls 2008
 
Functional Safety and Security process alignment
Functional Safety and Security process alignmentFunctional Safety and Security process alignment
Functional Safety and Security process alignment
 
ADRIAN BOWENS Udated Resume2 good 2
ADRIAN BOWENS Udated Resume2 good 2ADRIAN BOWENS Udated Resume2 good 2
ADRIAN BOWENS Udated Resume2 good 2
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
 
The CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for DefenseThe CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for Defense
 
Lesson 1- Intrusion Detection
Lesson 1- Intrusion DetectionLesson 1- Intrusion Detection
Lesson 1- Intrusion Detection
 
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
Advanced Persistent Threat in ICS/SCADA/IOT world: a case studyAdvanced Persistent Threat in ICS/SCADA/IOT world: a case study
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
 
SIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security FrameworkSIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security Framework
 
NIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation ProcessNIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation Process
 
Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
 
Lumension Security Solutions
Lumension Security SolutionsLumension Security Solutions
Lumension Security Solutions
 
Skybox security
Skybox security Skybox security
Skybox security
 
Lesson 2 - IDPS
Lesson 2 - IDPSLesson 2 - IDPS
Lesson 2 - IDPS
 
Canadian Cyber Cecurity
Canadian Cyber CecurityCanadian Cyber Cecurity
Canadian Cyber Cecurity
 
Canadian Cyber Cecurity
Canadian Cyber CecurityCanadian Cyber Cecurity
Canadian Cyber Cecurity
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 

Similar to Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: A Maritime Use Case Security Analysis

Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4CrispnCrunch
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Shakeel Ali
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?Alan Tatourian
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docxSUBHI7
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...akquinet enterprise solutions GmbH
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systemsAlan Tatourian
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiDataWorks Summit
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackersShawn Wells
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMScscpconf
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security TutorialNeil Matatall
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopDavid Sweigert
 
SOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfSOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfinfosec train
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Skybox Security
 
D03302030036
D03302030036D03302030036
D03302030036theijes
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
 

Similar to Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: A Maritime Use Case Security Analysis (20)

Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
SOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfSOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdf
 
Wc4
Wc4Wc4
Wc4
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
 
D03302030036
D03302030036D03302030036
D03302030036
 
Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 

Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: A Maritime Use Case Security Analysis

  • 1. Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: A Maritime Use Case Security Analysis Tope Omitola, Abdolbaghi Rezazadeh, Michael Butler 1 Presented at the 3rd International Workshop on Cyber-Security and Functional Safety in Cyber- Physical Systems (IWCFS 2019), Linz, Austria, August 26 - 29, 2019
  • 2. CONTENT • Importance of Software Requirements • Critical Maritime Infrastructure (CMI) • Security Requirements Analysis for CMI • System Theoretic Process Analysis (STPA) for Safety Requirements Analysis • STPA for Security Requirements Analysis • STPA for CMI Security Requirements Analysis • Conclusions 2
  • 3. Importance of Software Requirements •System Requirements are very important •“Blueprints” everyone on project works from 3
  • 4. Reason for Software Project Failure • “Unclear Requirements” – Top 3 or 4 reason why projects fail –(Standish Group & Software Engineering Institute) • Why “Unclear Requirements” – One reason - Implicit Knowledge NOT made Explicit Enough 4
  • 5. Requirements Analysis is Critical to the Success or Failure of a Project • Question - How to make the Requirements Gathering Explicit Enough • Requirements analysis usually done iteratively with many delicate social and other trade-offs involved 5
  • 6. CRITICAL MARITIME INFRASTRUCTURE (CMI) • Maritime is V. BIG business (80% Global Trade) • Important to Global Transport and Supply Chains • Maritime Infrastructure Is Increasingly Networked Together (Ships, On-Shore Based Bridge, Controller) 6
  • 7. CRITICAL MARITIME INFRASTRUCTURE (CMI) -- CYBER-THREATS • Increased Networking Brings Increased Risk of Cyber-Threats • Getting Security Requirements Right Are Important First Steps in Securing CMI 7
  • 8. SOME RELATED WORK IN SECURITY REQUIREMENTS ANALYSIS • THROP: Fault-error-failure chain model of single component • THROP: NOT useful for inter- connected systems (e.g. CPS) • STRIDE: Threat-centric approach. Good approach to Focus on Threats • STRIDE: Focuses on Software Systems – NOT useful for CPS (H/W + S/W) 8
  • 9. APPLYING STPA TO SECURITY REQUIREMENTS ANALYSIS • System Theoretic Process Analysis focuses on inter-connected components (H/W & S/W) • Useful for CPS • Usually Applied to Safety Requirements 9
  • 10. STPA - Concepts • Safety Constraints • A Hierarchical Safety Control Structure • Process Models 10
  • 11. THE SEVEN STEPS OF STPA • State System Purpose • Identify accidents • Identify system hazards associated with accidents • Construct high-level control structure • Translate system hazards to high- level safety requirements • Identify Unsafe Control Actions • Use Results to Create/Improve Design 11
  • 12. STPA – Applied to Security STPA – SAFETY STPA - SECURITY State System Purpose State System Purpose Identify Accidents Identify System Losses Identify System Hazards Identify System Threats Construct Control Structure Construct Control Structure Translate Hazards into Safety Requirements Translate Threats to Security Constraints Identify Unsafe Control Actions Identify Insecure Actions Use Results to Create Design Use Results to Create/Improve Design 12
  • 13. SYSTEM PURPOSE – MARITIME COMMS SYSTEM (MNS) • This may require a few iterations • “The Provision of Timely, Confidential, Correct Communication of Navigation Data, Acknowledgements and Route Updates between Controller and Ship” 13
  • 14. IDENTIFY SYSTEM LOSSES Loss (from CS’s perspective) Loss (from Ship’s perspective) L1: Not receiving ship location data (affects data provisioning) L5: Not receiving navigation data from CS (affects data provisioning) L2: Receiving incorrect ship location data (affects data correctness) L6: Receiving incorrect navigation data from CS (affects data correctness) L3: Receiving ship location data v. late (affects timeliness) L7: Receiving navigation data v. late (affects timeliness) L4: Unauthorised agent read ship location data (affects data L8: Unauthorised agent read navigation data (affects data confidentiality) 14
  • 15. IDENTIFY SYSTEM THREATS Threats Threats T1 Message Congestion T2 Interference T3 Tampering T4 Injection Attack T5 Replay Attack T6 Relay Attack T7 Identity Spoofing T8 Loss of Communications Infrastructure T9 Denial of Service T10 Traffic Analysis T11 Eaves-dropping 15
  • 16. CONTROL STRUCTURE • What are the main components • What Role does each play • What are command actions being used to interact
  • 17. TRANSLATE THREATS TO SECURITY CONSTRAINTS (Some Example Constraints) What constraints need to be in place to prevent threat conditions from occurring? Threat System Constraint T1 Message Congestion SC1 The system shall be able to prove the identity of agents during long, probably intermittent, transactions T2 Interference SC2 The system shall guarantee against communication interference between CS and Ship T4 Injection Attack SC4 The system shall maintain strong mutual continuous authentication, of CS and Ship, during all operations' transactions 17
  • 18. IDENTIFY (SECURE) AND INSECURE ACTIONS Malicious Control Action Not Providing Exposes Threats Providing Exposes Threats Wrong Time or Wrong Order Exposes Threats Stopped Too Soon or Applied Too Long Exposes Threats Address Resolution Protocol spoofing None UCA1. IS, T, RPA, RLA, IA As in UCA1 As in UCA1 IP spoofing None As in UCA1 As in UCA1 As in UCA1 Packet Tampering None As in UCA1 As in UCA1 As in UCA1 Eavesdropping None UCA2. Eavesdropping. As in UCA2 As in UCA2 Traffic Analysis command None UCA3. Traffic Analysis As in UCA3 As in UCA3 (T: Tampering, I: Interference, IA: Injection Attack, RPA: Replay Attack, RLA: Relay Attack, IS: Identity Spoofing, DoS: DoS Attack, TA: Traffic Analysis, E: Eavesdropping). 18
  • 19. (Possible) Mitigation Strategies and Techniques – To Improve System Design Threat Type Loss Link Mitigation Strategy Mitigation Technique Identity spoofing L4, L8 (Confidentiality) Crypto https/ssl Tampering L2, L6 (Integrity) Crypto ipsec, ssl Traffic Analysis L4, L8 (Confidentiality) Packet padding Message Encryption DoS L1, L3, L5, L7 (Availability) Watch out for Resource exhaustion Network provisioning using access control lists 19
  • 20. Systematic Security Analysis and System Trade-offs • Can be used for design trade-offs & to relax system purpose. • System’s new purpose: “the provision of timely and correct communication of navigation data, acknowledgements and route updates, between SBB and Ship". (Here, data confidentiality requirement removed). • Allows us to reduce system losses of interest, reduce system threats of interest, system constraints, etc. 20
  • 21. Systematic Security Analysis and System Trade-offs Purpose Losses Threats Constraints Mit. Strg. Mit. Tech. Provision of timely & correct communi- cation of nav. data,acks & updates between CS & Ship L1, L2, L3, L5, L6, L7 T1, T2, T3, T4, T5, T6, T7, T8, T9 SC1, SC2, SC3, SC4, SC5, SC6, SC7, SC8, SC9 Crypt ographic & To watch out for exhaustible resources (a) HTTPS/SSL , IPSEC, MACs & (b) ACLs HELPED US REMOVE LOSS 8 & THREAT 10; as a result of not including data confidentiality in Requirement 21
  • 23. CONCLUSIONS & FUTURE WORK •Getting Security Requirements Right Is Very Important •Systems Theory & Concepts from Safety Analyses (esp. STPA) useful for security analysis of CMI •STPA Systematic Approach (The 7 Steps) Can Help Elicit System Purpose, Identify System Losses & Threats •Can Help Derive System Constraints Useful To Construct Mitigation Procedures •Future Work: Use Event-B to Verify System Constraints 23
  • 24. Questions • Acknowledgement: • Work conducted within the ENABLE-S3 project that has received funding from the ECSEL Joint Undertaking under Grant Agreement no. 692455. 24