SlideShare a Scribd company logo
1 of 14
International Workshop on Computational Intelligence in Security for Information Systems
                                        CISIS ’08
                           October, 23-24, 2008, Genova, Italy




   F. Flammini, A. Gaglione, N. Mazzocca, V. Moscato, C. Pragliola
   Wireless Sensor Data Fusion for Critical
   Infrastructure Security

                             Andrea Gaglione
     AnsaldoSTS                              Department of Computer Science and Systems
     Business Innovation Unit                University of Naples “Federico II”
     Via Nuova delle Brecce, 260             Via Claudio 21, 80125 Naples, Italy
     80147 Naples, Italy                     Tel.: 081 768 3869 – Fax: 081 768 3816
     Tel.: 081 243 2695                      Email: andrea.gaglione@unina.it
     Email: gaglione.andrea@asf.ansaldo.it
                                             Web: http://wpage.unina.it/andrea.gaglione
Outline

           Contextualization and scope of the work
           Architectural proposal of the framework
           An example application
           Conclusions and future works




CISIS ‘08 - Genoa (Italy), October 23-24, 2008
                                                      2/14
Critical Infrastructure Protection
                                                 Transportation


                       Government                                  Banking




                         Energy and
                           utilities
                                                                  Health




CISIS ‘08 - Genoa (Italy), October 23-24, 2008
                                                                             3/14
CIP event cycle

         Analysis and                            Indications
                              Remediation                        Mitigation       Response   Reconstitution
         assessment                              and warning


                                                 Event



                     Pre-Event                                                Post-Event




                                                                  basic idea: attack
         THREAT
          ROUTE                                                scenarios are made of a
                     SENSING                                      set of basic steps
                      POINTS




CISIS ‘08 - Genoa (Italy), October 23-24, 2008
                                                                                                          4/14
Motivation and proposal

         Integration of data coming from different sensor
          systems (also Wireless Sensor Networks)

         On-line reasoning about the events captured by
          sensor systems



          Decision support and early warning system used
           to effectively face security threats by exploiting
                        the advantages of WSN
CISIS ‘08 - Genoa (Italy), October 23-24, 2008
                                                                5/14
The SeNsIM framework
         Sensor Networks Integration and Management
         Solves the heterogeneity issue
         Ensures system scalability
         Shows a unified view of different networks
                                                    Wrapper-mediator paradigm
                                                        a wrapper gathers the features of the
                                                         underlying network and retrieves sensor
                                                         data
                                                        the mediator keeps a repository of
                                                         connected networks and manages user
                                                         queries and the related results which are
                                                         stored in an appropriate DB table
                                                     …XML as modeling language

CISIS ‘08 - Genoa (Italy), October 23-24, 2008
                                                                                                6/14
The DETECT framework 1/2
         Decision Triggering Event Composer & Tracker

         Model-based (Event Trees formalism) logical and
          temporal correlation of basic events detected by
          intelligent video-surveillance and/or sensor networks

         Attack scenarios are described with a specific Event
          Description Language (EDL)
               Language operators:
                     OR: E1 OR E2  occurs when at least one of its components (E1, E2)
                      occurs
                     AND: E1 AND E2  occurs when both of its component occur
                     ANY: ANY(m, E1, E2, …, En), m<=n  occurs when m out of n distinct
                      events specified in the expression occur
                     SEQ: E1 SEQ E2  occurs when E2 occurs provided that E1 is already
                      occurred



CISIS ‘08 - Genoa (Italy), October 23-24, 2008
                                                                                           7/14
The DETECT framework 2/2
         Early warning of complex attack scenarios since their first
          evolution steps
         Output of DETECT:
               identifier(s) of the suspected scenario
               alarm level, associated to scenario evolution
         Possible integration with SMS/SCADA systems


                                             DETECT Engine
                     Scenario
                    Repository                               Detected
                                                             attack
                                                             scenario
                     Event
                     History                                 Alarm level
                                                             (1, 2, 3, ...)




CISIS ‘08 - Genoa (Italy), October 23-24, 2008
                                                                              8/14
Overall system architecture

         Integration of SeNsIM and DETECT in order to
          obtain an online reasoning about the events
          captured by different WSNs

         Sharing of the Event
          History DB
         Overall system GUI
               Editing attack scenarios
               Building user queries


CISIS ‘08 - Genoa (Italy), October 23-24, 2008
                                                         9/14
Software integration

         Sub-modules involved in
          the integration
               Query Builder allows the
                user for building queries
               Scenario Window to edit
                threats
               Shared Event History
                     Written by the Result
                      Handler
                     Read by the Model Feeder




CISIS ‘08 - Genoa (Italy), October 23-24, 2008
                                                 10/14
Example application scenario 1/2

         Terrorist attack on a railway line
               Multiple train halting and railway bridge bombing
                      Artificial occupation of the track circuits before and after a bridge
                      Interruption of the railway power line
                      Remote bombing of the bridge

         Formal description of the scenario
               Notation: sensor description (sensor ID) :: event description (event ID)
                      Fence vibration detector (S1) :: Possible on track intrusion (E1)
                      On track circuit_X sensor (S2) :: Occupation(E2)
                      Lineside train detector (S3) :: No train detected (E3)
                      On track circuit_Y sensor (S4) :: Occupation (E4)
                      Lineside train detector (S5) :: No train detected (E5)
                      Voltmeter (S6) :: No power (E6)
                      On-shaft accelerometer (S7) :: Structural movement (E7)

CISIS ‘08 - Genoa (Italy), October 23-24, 2008
                                                                                               11/14
Example application scenario 2/2

         EDL description of the scenario
                                (((E1 SEQ ((E2 AND E3) OR (E4 AND E5)))
                                                    OR
                                      ((E2 AND E3) AND (E4 AND E5)))
                                             SEQ E6) SEQ E7
                                                 Alert
                      Event detected                             Possible countermeasure
                                                 level

               Possible on track intrusion        1               Alert the security officier

               Artificial occupation of one
                                                  2         Trigger an emergency stop message
               or both track circuits

                  Railway power line off          3      If possible, switch on back-up power supply

                    Complete scenario             4           Emergency call to first responder


CISIS ‘08 - Genoa (Italy), October 23-24, 2008
                                                                                                       12/14
Conclusions and future works
         We provided an architectural proposal of a framework
          which:
               Collects data from heterogeneous source
               Correlates such data in order to enhance the protection
                of a critical infrastructure
     We described an example application of the framework
      to the case study of a railway transportation system
     We are currently developing missing modules of
      software system
     Next step: interfacing the framework with a real SMS




CISIS ‘08 - Genoa (Italy), October 23-24, 2008
                                                                      13/14
THE END

   Thank you for your kind attention
          …any questions?

More Related Content

Viewers also liked

A Business Process-Centric Approach To Financial Transactions
A Business Process-Centric Approach To Financial TransactionsA Business Process-Centric Approach To Financial Transactions
A Business Process-Centric Approach To Financial Transactionscorbanmiferreira
 
Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.montemorcillo
 
Model-Based Approaches for Railway Safety, Reliability and Security: The Expe...
Model-Based Approaches for Railway Safety, Reliability and Security: The Expe...Model-Based Approaches for Railway Safety, Reliability and Security: The Expe...
Model-Based Approaches for Railway Safety, Reliability and Security: The Expe...Francesco Flammini
 
Model-Based Approaches for Railway Safety, Reliability & Security
Model-Based Approaches for Railway Safety, Reliability & SecurityModel-Based Approaches for Railway Safety, Reliability & Security
Model-Based Approaches for Railway Safety, Reliability & SecurityFrancesco Flammini
 
Integrated smart surveillance systems for rail-based mass transportation
Integrated smart surveillance systems for rail-based mass transportationIntegrated smart surveillance systems for rail-based mass transportation
Integrated smart surveillance systems for rail-based mass transportationFrancesco Flammini
 
Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.montemorcillo
 
Kva kjenneteiknar ei nyheitssak - ved Arild Nybø, Mediebruket.no
Kva kjenneteiknar ei nyheitssak - ved Arild Nybø, Mediebruket.noKva kjenneteiknar ei nyheitssak - ved Arild Nybø, Mediebruket.no
Kva kjenneteiknar ei nyheitssak - ved Arild Nybø, Mediebruket.noArild Nybø
 
Datos Del Sistema Solar
Datos Del Sistema SolarDatos Del Sistema Solar
Datos Del Sistema Solarmontemorcillo
 
Sosiale medier som salskanal - ved Arild Nybø, Mediebruket.no
Sosiale medier som salskanal - ved Arild Nybø, Mediebruket.noSosiale medier som salskanal - ved Arild Nybø, Mediebruket.no
Sosiale medier som salskanal - ved Arild Nybø, Mediebruket.noArild Nybø
 

Viewers also liked (13)

Esrel08 Final
Esrel08 FinalEsrel08 Final
Esrel08 Final
 
Critis08 Q Ra
Critis08 Q RaCritis08 Q Ra
Critis08 Q Ra
 
A Business Process-Centric Approach To Financial Transactions
A Business Process-Centric Approach To Financial TransactionsA Business Process-Centric Approach To Financial Transactions
A Business Process-Centric Approach To Financial Transactions
 
RE 07 - art.02
RE  07 - art.02RE  07 - art.02
RE 07 - art.02
 
Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.
 
Model-Based Approaches for Railway Safety, Reliability and Security: The Expe...
Model-Based Approaches for Railway Safety, Reliability and Security: The Expe...Model-Based Approaches for Railway Safety, Reliability and Security: The Expe...
Model-Based Approaches for Railway Safety, Reliability and Security: The Expe...
 
Model-Based Approaches for Railway Safety, Reliability & Security
Model-Based Approaches for Railway Safety, Reliability & SecurityModel-Based Approaches for Railway Safety, Reliability & Security
Model-Based Approaches for Railway Safety, Reliability & Security
 
Integrated smart surveillance systems for rail-based mass transportation
Integrated smart surveillance systems for rail-based mass transportationIntegrated smart surveillance systems for rail-based mass transportation
Integrated smart surveillance systems for rail-based mass transportation
 
Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.Corpus Christi En Carcaboso.
Corpus Christi En Carcaboso.
 
Uiui444
Uiui444Uiui444
Uiui444
 
Kva kjenneteiknar ei nyheitssak - ved Arild Nybø, Mediebruket.no
Kva kjenneteiknar ei nyheitssak - ved Arild Nybø, Mediebruket.noKva kjenneteiknar ei nyheitssak - ved Arild Nybø, Mediebruket.no
Kva kjenneteiknar ei nyheitssak - ved Arild Nybø, Mediebruket.no
 
Datos Del Sistema Solar
Datos Del Sistema SolarDatos Del Sistema Solar
Datos Del Sistema Solar
 
Sosiale medier som salskanal - ved Arild Nybø, Mediebruket.no
Sosiale medier som salskanal - ved Arild Nybø, Mediebruket.noSosiale medier som salskanal - ved Arild Nybø, Mediebruket.no
Sosiale medier som salskanal - ved Arild Nybø, Mediebruket.no
 

Similar to Cisis08 Detect+Se Ns Im

Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehSmart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehnabati
 
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptxTOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptxNagarajusabhavath
 
An ontology for attacks in wireless sensor networks
An ontology for attacks in wireless sensor networksAn ontology for attacks in wireless sensor networks
An ontology for attacks in wireless sensor networksfying1982
 
SAM-IoT: Risk Assessment in IoT Case Study: Collaborative Robots System
SAM-IoT: Risk Assessment in IoT Case Study: Collaborative Robots SystemSAM-IoT: Risk Assessment in IoT Case Study: Collaborative Robots System
SAM-IoT: Risk Assessment in IoT Case Study: Collaborative Robots SystemBrain IoT Project
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesNiranjana Padmanabhan
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET Journal
 
Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network IJECEIAES
 
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKSA HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKSIJNSA Journal
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Eswar Publications
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
 
Network security ppt
Network security pptNetwork security ppt
Network security pptvidyapol01
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)ictseserv
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meetingfcleary
 
Real-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceReal-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceIRJET Journal
 
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital TwinEnabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital TwinMassimiliano Masi
 

Similar to Cisis08 Detect+Se Ns Im (20)

Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehSmart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
 
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptxTOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
 
An ontology for attacks in wireless sensor networks
An ontology for attacks in wireless sensor networksAn ontology for attacks in wireless sensor networks
An ontology for attacks in wireless sensor networks
 
SAM-IoT: Risk Assessment in IoT Case Study: Collaborative Robots System
SAM-IoT: Risk Assessment in IoT Case Study: Collaborative Robots SystemSAM-IoT: Risk Assessment in IoT Case Study: Collaborative Robots System
SAM-IoT: Risk Assessment in IoT Case Study: Collaborative Robots System
 
Dissertation defence
Dissertation defenceDissertation defence
Dissertation defence
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud Resources
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
 
Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network
 
ZONeSEC in ERNCIP
ZONeSEC in ERNCIPZONeSEC in ERNCIP
ZONeSEC in ERNCIP
 
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKSA HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
 
M026075079
M026075079M026075079
M026075079
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
 
Zonesec_ares
Zonesec_aresZonesec_ares
Zonesec_ares
 
Real-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceReal-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video Surveillance
 
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital TwinEnabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin
 

More from Francesco Flammini

TRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfTRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfFrancesco Flammini
 
RAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfRAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfFrancesco Flammini
 
Award-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfAward-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfFrancesco Flammini
 
Internationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateInternationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateFrancesco Flammini
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021Francesco Flammini
 
Digital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyDigital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyFrancesco Flammini
 
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...Francesco Flammini
 
Science of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingScience of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingFrancesco Flammini
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19Francesco Flammini
 
Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Francesco Flammini
 
Ansaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiAnsaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiFrancesco Flammini
 
IoT Research & Education at LNU
IoT Research & Education at LNUIoT Research & Education at LNU
IoT Research & Education at LNUFrancesco Flammini
 
Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini
 
Towards railway virtual coupling
Towards railway virtual couplingTowards railway virtual coupling
Towards railway virtual couplingFrancesco Flammini
 
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietySmart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietyFrancesco Flammini
 
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560Francesco Flammini
 

More from Francesco Flammini (20)

TRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfTRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdf
 
RAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfRAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdf
 
Award-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfAward-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdf
 
Internationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateInternationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference Certificate
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 
Appreciation Certificate
Appreciation CertificateAppreciation Certificate
Appreciation Certificate
 
Digital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyDigital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy Autonomy
 
IEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificateIEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificate
 
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
 
Science of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingScience of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of Reviewing
 
ACM DSP appointment letter
ACM DSP appointment letter ACM DSP appointment letter
ACM DSP appointment letter
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009
 
Ansaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiAnsaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco Flammini
 
IoT Research & Education at LNU
IoT Research & Education at LNUIoT Research & Education at LNU
IoT Research & Education at LNU
 
Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19
 
Towards railway virtual coupling
Towards railway virtual couplingTowards railway virtual coupling
Towards railway virtual coupling
 
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietySmart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
 
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
 
Attestato FLAMMINI ISO 14298
Attestato FLAMMINI ISO 14298Attestato FLAMMINI ISO 14298
Attestato FLAMMINI ISO 14298
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Cisis08 Detect+Se Ns Im

  • 1. International Workshop on Computational Intelligence in Security for Information Systems CISIS ’08 October, 23-24, 2008, Genova, Italy F. Flammini, A. Gaglione, N. Mazzocca, V. Moscato, C. Pragliola Wireless Sensor Data Fusion for Critical Infrastructure Security Andrea Gaglione AnsaldoSTS Department of Computer Science and Systems Business Innovation Unit University of Naples “Federico II” Via Nuova delle Brecce, 260 Via Claudio 21, 80125 Naples, Italy 80147 Naples, Italy Tel.: 081 768 3869 – Fax: 081 768 3816 Tel.: 081 243 2695 Email: andrea.gaglione@unina.it Email: gaglione.andrea@asf.ansaldo.it Web: http://wpage.unina.it/andrea.gaglione
  • 2. Outline  Contextualization and scope of the work  Architectural proposal of the framework  An example application  Conclusions and future works CISIS ‘08 - Genoa (Italy), October 23-24, 2008 2/14
  • 3. Critical Infrastructure Protection Transportation Government Banking Energy and utilities Health CISIS ‘08 - Genoa (Italy), October 23-24, 2008 3/14
  • 4. CIP event cycle Analysis and Indications Remediation Mitigation Response Reconstitution assessment and warning Event Pre-Event Post-Event basic idea: attack THREAT ROUTE scenarios are made of a SENSING set of basic steps POINTS CISIS ‘08 - Genoa (Italy), October 23-24, 2008 4/14
  • 5. Motivation and proposal  Integration of data coming from different sensor systems (also Wireless Sensor Networks)  On-line reasoning about the events captured by sensor systems Decision support and early warning system used to effectively face security threats by exploiting the advantages of WSN CISIS ‘08 - Genoa (Italy), October 23-24, 2008 5/14
  • 6. The SeNsIM framework  Sensor Networks Integration and Management  Solves the heterogeneity issue  Ensures system scalability  Shows a unified view of different networks  Wrapper-mediator paradigm  a wrapper gathers the features of the underlying network and retrieves sensor data  the mediator keeps a repository of connected networks and manages user queries and the related results which are stored in an appropriate DB table …XML as modeling language CISIS ‘08 - Genoa (Italy), October 23-24, 2008 6/14
  • 7. The DETECT framework 1/2  Decision Triggering Event Composer & Tracker  Model-based (Event Trees formalism) logical and temporal correlation of basic events detected by intelligent video-surveillance and/or sensor networks  Attack scenarios are described with a specific Event Description Language (EDL)  Language operators:  OR: E1 OR E2  occurs when at least one of its components (E1, E2) occurs  AND: E1 AND E2  occurs when both of its component occur  ANY: ANY(m, E1, E2, …, En), m<=n  occurs when m out of n distinct events specified in the expression occur  SEQ: E1 SEQ E2  occurs when E2 occurs provided that E1 is already occurred CISIS ‘08 - Genoa (Italy), October 23-24, 2008 7/14
  • 8. The DETECT framework 2/2  Early warning of complex attack scenarios since their first evolution steps  Output of DETECT:  identifier(s) of the suspected scenario  alarm level, associated to scenario evolution  Possible integration with SMS/SCADA systems DETECT Engine Scenario Repository Detected attack scenario Event History Alarm level (1, 2, 3, ...) CISIS ‘08 - Genoa (Italy), October 23-24, 2008 8/14
  • 9. Overall system architecture  Integration of SeNsIM and DETECT in order to obtain an online reasoning about the events captured by different WSNs  Sharing of the Event History DB  Overall system GUI  Editing attack scenarios  Building user queries CISIS ‘08 - Genoa (Italy), October 23-24, 2008 9/14
  • 10. Software integration  Sub-modules involved in the integration  Query Builder allows the user for building queries  Scenario Window to edit threats  Shared Event History  Written by the Result Handler  Read by the Model Feeder CISIS ‘08 - Genoa (Italy), October 23-24, 2008 10/14
  • 11. Example application scenario 1/2  Terrorist attack on a railway line  Multiple train halting and railway bridge bombing  Artificial occupation of the track circuits before and after a bridge  Interruption of the railway power line  Remote bombing of the bridge  Formal description of the scenario  Notation: sensor description (sensor ID) :: event description (event ID)  Fence vibration detector (S1) :: Possible on track intrusion (E1)  On track circuit_X sensor (S2) :: Occupation(E2)  Lineside train detector (S3) :: No train detected (E3)  On track circuit_Y sensor (S4) :: Occupation (E4)  Lineside train detector (S5) :: No train detected (E5)  Voltmeter (S6) :: No power (E6)  On-shaft accelerometer (S7) :: Structural movement (E7) CISIS ‘08 - Genoa (Italy), October 23-24, 2008 11/14
  • 12. Example application scenario 2/2  EDL description of the scenario (((E1 SEQ ((E2 AND E3) OR (E4 AND E5))) OR ((E2 AND E3) AND (E4 AND E5))) SEQ E6) SEQ E7 Alert Event detected Possible countermeasure level Possible on track intrusion 1 Alert the security officier Artificial occupation of one 2 Trigger an emergency stop message or both track circuits Railway power line off 3 If possible, switch on back-up power supply Complete scenario 4 Emergency call to first responder CISIS ‘08 - Genoa (Italy), October 23-24, 2008 12/14
  • 13. Conclusions and future works  We provided an architectural proposal of a framework which:  Collects data from heterogeneous source  Correlates such data in order to enhance the protection of a critical infrastructure  We described an example application of the framework to the case study of a railway transportation system  We are currently developing missing modules of software system  Next step: interfacing the framework with a real SMS CISIS ‘08 - Genoa (Italy), October 23-24, 2008 13/14
  • 14. THE END Thank you for your kind attention …any questions?