Go with the flow: toward workflow-oriented security assessment

  • Authors:
  • Binbin Chen;Zbigniew Kalbarczyk;David M. Nicol;William H. Sanders;Rui Tan;William G. Temple;Nils Ole Tippenhauer;An Hoa Vu;David K.Y. Yau

  • Affiliations:
  • Advanced Digital Sciences Center, Singapore, Singapore;University of Illinois at Urbana-Champaign, Urbana-Champaign, IL, USA;University of Illinois at Urbana-Champaign, Urbana-Champaign, IL, USA;University of Illinois at Urbana-Champaign, Urbana-Champaign, IL, USA;Advanced Digital Sciences Center, Singapore, Singapore;Advanced Digital Sciences Center, Singapore, Singapore;Advanced Digital Sciences Center, Singapore, Singapore;Advanced Digital Sciences Center, Singapore, Singapore;Singapore University of Technology and Design, Singapore, Singapore

  • Venue:
  • Proceedings of the 2013 workshop on New security paradigms workshop
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we advocate the use of workflow---describing how a system provides its intended functionality---as a pillar of cybersecurity analysis and propose a holistic workflow-oriented assessment framework. While workflow models are currently used in the area of performance and reliability assessment, these approaches are designed neither to assess a system in the presence of an active attacker, nor to assess security aspects such as confidentiality. On the other hand, existing security assessment methods typically focus on modeling the active attacker (e.g., attack graphs), but many rely on restrictive models that are not readily applicable to complex (e.g., cyber-physical or cyber-human) systems. By "going with the flow," our assessment framework can naturally adopt a holistic view of such systems, unifying information about system components, their properties, and possible attacks to argue about a security goal. The argument is expressed in a graph structure, based on inputs from several distinct classes that are integrated in a systematic manner. That rigorous structure allows our approach to provide quantitative assessment in an automated fashion (like reliability assessment tools and attack graphs), while maintaining a broad assessment scope. We demonstrate our security assessment process using the case of Advanced Metering Infrastructure in a smart power grid and obtain quantitative results for system availability and confidentiality.