Advertisement

A Service-Oriented Approach for Assessing Infrastructure Security

  • Marcelo Masera
  • Igor Nai Fovino
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 253)

The pervasive use of information and communication technologies (ICT) in critical infrastructures requires security assessment approaches that consider the highly interconnected nature of ICT systems. Several approaches incorporate the relationships between structural and functional descriptions and security goals, and associate vulnerabilities with known attacks. However, these methodologies are typically based on the analysis of local problems. This paper proposes a methodology that systematically correlates and analyzes structural, functional and security information. The security assessment of critical infrastructure systems is enhanced using a service-oriented perspective, which focuses the analysis on the concept of service, linking the interactions among services – modeled as service chains – with vulnerabilities, threats and attacks.

Keywords: Security assessment, vulnerabilities, threats, attacks, services, systemof- systems

Keywords

Critical Infrastructure Attack Tree Security Assessment Information Asset Service Chain 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [1]
    C. Alberts and A. Dorofee, Managing Information Security Risks: The OCTAVE (SM) Approach, Addison-Wesley, Boston, Massachusetts, 2002.Google Scholar
  2. [2]
    O. Alhazmi, Y. Malaiya and I. Ray, Security vulnerabilities in software systems: A quantitative perspective, in Data and Applications Security XIX (LNCS 3654), S. Jajodia and D. Wijesekera (Eds. ), Springer, Berlin- Heidelberg, Germany, pp. 281-294, 2005.CrossRefGoogle Scholar
  3. [3]
    A. Avizienis, J. Laprie, B. Randell and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol. 1(1), pp 11-33, 2004.CrossRefGoogle Scholar
  4. [4]
    E. Bertino, D. Bruschi, S. Franzoni, I. Nai Fovino and S. Valtolina, Threat modeling for SQL servers, Proceedings of the Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, pp. 189-201, 2004.Google Scholar
  5. [5]
    M. Bishop, Computer Security: Art and Science, Addison-Wesley, Boston, Massachusetts, 2003.Google Scholar
  6. Citicus, Citicus ONE (www.citicus.com ).
  7. [7]
    F. den Braber, T. Dimitrakos, B. Gran, M. Lund, K. Stølen and J. Aagedal, The CORAS methodology: Model-based risk management using UML and UP, in UML and the Unified Process, L. Favre (Ed. ), IGI Publishing, Hershey, Pennsylvania, pp. 332-357, 2003.CrossRefGoogle Scholar
  8. [8]
    G. Dondossola, J. Szanto, M. Masera and I. Nai Fovino, Evaluation of the effects of intentional threats to power substation control systems, Proceed- ings of the International Workshop on Complex Network and Infrastruc- ture Protection, 2006.Google Scholar
  9. [9]
    Institute of Electrical and Electronics Engineers, IEEE Standard Glossary of Software Engineering Terminology (IEEE Standard 610. 12-1990), Pis- cataway, New Jersey, 1990.Google Scholar
  10. [10]
    International Organization for Standardization, Code of Practice for Information Security Management (ISO/IEC 17799:2000), Geneva, Switzerland, 2000.Google Scholar
  11. [11]
    A. Jones and D. Ashenden, Risk Management for Computer Security: Protecting Your Network and Information Assets, Elsevier ButterworthHeinemann, Oxford, United Kingdom, 2005.Google Scholar
  12. [12]
    M. Keeney, E. Kowalski, D. Cappelli, A. Moore, T. Shimeall and S. Rogers, Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors, Technical Report, U. S. Secret Service and CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, 2005.Google Scholar
  13. [13]
    M. Masera, Interdependencies and security assessment: A dependability view, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Taipei, 2006.Google Scholar
  14. [14]
    M. Masera and I. Nai Fovino, A framework for the security assessment of remote control applications of critical infrastructures, Proceedings of the Twenty-Ninth ESReDA Seminar, 2005.Google Scholar
  15. [15]
    M. Masera and I. Nai Fovino, Emergent disservices in interdependent systems and systems-of-systems, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2006.Google Scholar
  16. [16]
    M. Masera and I. Nai Fovino, Modeling information assets for security risk assessment in industrial settings, Proceedings of the Fifteenth EICAR Annual Conference, 2006.Google Scholar
  17. [17]
    M. Masera and I. Nai Fovino, Models for security assessment and management, Proceedings of the International Workshop on Complex Network and Infrastructure Protection, 2006.Google Scholar
  18. [18]
    M. Masera and I. Nai Fovino, Through the description of attacks: A multidimensional view, Proceedings of the Twenty-Fifth International Conference on Computer Safety, Reliability and Security, pp. 15-28, 2006.Google Scholar
  19. [19]
    J. McDermott, Attack net penetration testing, Proceedings of the New Security Paradigms Workshop, pp. 15-22, 2002.Google Scholar
  20. Microsoft Corporation, Microsoft Security Assessment Tool (www.securityguidance.com ).
  21. [21]
    B. Schneier, Attack trees: Modeling security threats, Dr. Dobb’s Journal, December 1999.Google Scholar
  22. SecurityFocus, Bugtraq vulnerability database (securityfocus. com).Google Scholar
  23. [23]
    J. Steffan and M. Schumacher, Collaborative attack modeling, Proceedings of the ACM Symposium on Applied Computing, pp. 253-259, 2002.Google Scholar
  24. [24]
    G. Stoneburner, A. Goguen and A. Feringa, Risk Management Guide for Information Technology Systems, Special Publication 800-30, National Institute of Standards and Technology, U. S. Department of Commerce, Gaithersburg, Maryland, 2002.Google Scholar
  25. [25]
    F. Swiderski and W. Snyder, Threat Modeling, Microsoft Press, Redmond, Washington, 2004.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Marcelo Masera
    • 1
  • Igor Nai Fovino
    • 1
  1. 1.Institute for the Protection and Security of the CitizenJoint Research Center of the European CommissionItaly

Personalised recommendations