SlideShare a Scribd company logo
F. Flammini, A. Gaglione, N. Mazzocca, C. Pragliola DETECT: a novel framework for the detection of attacks to critical infrastructures presented by Andrea Gaglione Dipartimento di Informatica e Sistemistica Università di Napoli “Federico II” Via Claudio 21, 80125 Napoli Email:  [email_address] Web:  http://wpage.unina.it/andrea.gaglione   European Safety & Reliability Conference, ESREL’08 22-25 September 2008 ,  Valencia, Spain
Outline Contextualization and scope of the work EDL (Event Description Language) DETECT architecture and an example scenario Conclusions and future works
Critical Infrastructure Protection Transportation Banking Energy and utilities Government Health
CIP event cycle … our work Realization of the DETECT framework which receives inputs coming from sensor systems co rrelates the inputs for detection of threats Analysis and assessment Remediation Indications and warning Mitigation Response Reconstitution Pre-Event Post-Event The phases build on one another Comprehensive solution for infrastructure  assurance Event
The DETECT approach Model-based  logical  and  temporal  correlation  of  basic  events  detected  by  intelligent  video-surveillance and/or sensor networks Early  warning  of  complex  attack  scenarios  since their first evolution steps Output of DETECT: identifier(s) of the suspected scenario alarm level, associated to scenario evolution Possible integration with SMS/SCADA systems DETECT Engine Alarm level (1, 2, 3, ...) Detected attack scenario Event  History Scenario Repository
The Event Description Language (EDL) Event:  happening that occurs (in a system) at some location and at some point in time Primitive Event:  condition on a specific sensor Composite Event:  combination of primitive events defined by means of proper operators Chakravarthy, S. & Mishra, D. 1994. Snoop: An expressive event specification language for active databases.  Data Knowl. Eng. , Vol. 14, No. 1, pp. 1–26. Operators OR:  E1 OR E2    occurs when at least one of its components (E1, E2) occurs AND : E1 AND E2    occur when both of its component occurr ANY:  ANY(m, E1, E2, …, En), m<=n    occur when m out of n distinct events specified in the expression occur SEQ:  E1 SEQ E2    occurs when E2 occurs provided that E1 is already occurred
Event Trees Composite events are represented by event  trees Example: E7 = (E1 OR E2) AND (E2 SEQ (E4 AND E6)) Temporal Constraints define a validity interval for  a composite event can  be  added  to  any  operator Example:  ( E1 AND E2 )  =  True Leaf:   primitive event internal node: EDL operator  formal expression     t1< t | ( E1(t)    E2(t1)    E1(t1)    E2(t) ) [T]    |t – t1| ≤ T
The software architecture of DETECT Event History database with the list of primitive events detected  by sensors EDL Repository database of known attack scenarios Detection Engine can support both deterministic and heuristic models our implementation: Event Trees Model Generator builds the detection model(s) starting from the EDL files Model Manager  (4 submodules): Model Feeder:  one for each model, instantiates the input of the detection engine by performing queries on the Event History Model Executor : triggers the execution of the  model solver Model Updater : allows for online modification of the model Output Manager : stores the output of the model(s) Current implementation
Parameter contexts States which occurrences of component events play an active part in the detection process Recent:  only the most recent occurrence of the initiator is considered Chronicle:  the initiator-terminator pair is unique Continuous:  each initiator starts the detection of the event Cumulative:  all occurrence of primitive events are accumulated until the composite events  is detected
An example scenario Terrorist threat in a subway station Intrusion and drop of explosive in a tunnel the attacker stays on the platform for a long time the attacker goes down the track and moves inside the tunnel portal the attacker drops the explosive bag inside the tunnel and leaves the station   Security system Intelligent cameras (S1)  human tracking Active infrared barriers (S2) Explosive sniffer (S3) Tunnel portal protection
An example scenario Scenario evolution: (E1 AND E2) OR E3 SEQ (E4  AND E5) extended presence  on the platform (E1 by  S1 ) train passing (E2 by  S1 ) platform line crossing  (E3 by  S1 ) tunnel intrusion (E4 by  S2 ) explosive detection  (E5 by  S3 )
Conclusions and future works Advantages of the methodology w.r.t. traditional approaches Logic correlation of events Early warning of complex attack scenario and automatic response to emergencies   Future developments Implement a heuristic detection model to complement deterministic detection Integration of DETECT with the SeNsIM framework
THE END Thank you for your kind attention … any questions?

More Related Content

PPTX
Video Multi-Object Tracking using Deep Learning
PPTX
Session 2: Genome-Informed Diagnostics - In-field Detection of Bacterial Plan...
PDF
Estimation of Reliability Indices of Two Component Identical System in the Pr...
PDF
Master Thesis Presentation
PPT
Cisis08 Detect+Se Ns Im
PPTX
Dealing with the need for Infrastructural Support in Ambient Intelligence
PPT
Performance Measurement of MEMS Elements
Video Multi-Object Tracking using Deep Learning
Session 2: Genome-Informed Diagnostics - In-field Detection of Bacterial Plan...
Estimation of Reliability Indices of Two Component Identical System in the Pr...
Master Thesis Presentation
Cisis08 Detect+Se Ns Im
Dealing with the need for Infrastructural Support in Ambient Intelligence
Performance Measurement of MEMS Elements

Similar to Esrel08 Final (20)

PPT
Analysis of the Behavior of Event Processing Applications
PDF
Cost-effective software reliability through autonomic tuning of system resources
PPTX
Temporal Relations Mining Approach to Improve Dengue Outbreak and Intrusion T...
PPTX
Software architecture introduction to the abstraction gssi_nov2013
PPT
Phd Defense 2007
PPT
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
PPTX
UNIT III Event Handling of the car j.pptx
PDF
SPECIFICATION OF THE STATE’S LIFETIME IN THE DEVS FORMALISM BY FUZZY CONTROLLER
PDF
A Coupled Discrete-Event and Motion Planning Methodology for Automated Safety...
PDF
U4301106110
PDF
A high security and noise immunity of speech based on double chaotic masking
PDF
Cellular Automata- Dengue Fever
PPT
ARES - SeCIHD'11 Francesco Flammini
PPT
Supp HAZOP 1 Hazard Analysis Review: The Concept of Risk
PPTX
Technical Appraisal Tool, MICE - Acting on Change 2016
PPTX
On the Semantics of Real-Time Domain Specific Modeling Languages
PDF
Sensors and Actuators Integration in Embedded Systems
PDF
Graph Spectra through Network Complexity Measures: Information Content of Eig...
PPT
Introduction to signals and systems
Analysis of the Behavior of Event Processing Applications
Cost-effective software reliability through autonomic tuning of system resources
Temporal Relations Mining Approach to Improve Dengue Outbreak and Intrusion T...
Software architecture introduction to the abstraction gssi_nov2013
Phd Defense 2007
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
UNIT III Event Handling of the car j.pptx
SPECIFICATION OF THE STATE’S LIFETIME IN THE DEVS FORMALISM BY FUZZY CONTROLLER
A Coupled Discrete-Event and Motion Planning Methodology for Automated Safety...
U4301106110
A high security and noise immunity of speech based on double chaotic masking
Cellular Automata- Dengue Fever
ARES - SeCIHD'11 Francesco Flammini
Supp HAZOP 1 Hazard Analysis Review: The Concept of Risk
Technical Appraisal Tool, MICE - Acting on Change 2016
On the Semantics of Real-Time Domain Specific Modeling Languages
Sensors and Actuators Integration in Embedded Systems
Graph Spectra through Network Complexity Measures: Information Content of Eig...
Introduction to signals and systems
Ad

More from Francesco Flammini (20)

PDF
TRA Visions Senior Researcher Award 2024.pdf
PDF
RAILS - Railway Gazette 2023 (Flammini).pdf
PDF
Award-Fedcsis Conference 2023.pdf
PDF
Internationalization of the Curriculum Conference Certificate
PPTX
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
PDF
Appreciation Certificate
PDF
Digital Twins for Trustworthy Autonomy
PDF
IEEE GCAIIoT 2020 certificate
PPTX
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
PDF
Science of Computer Programming, Certificate of Reviewing
PDF
ACM DSP appointment letter
PPTX
“AI techniques in cyber-security applications”. Flammini lnu susec19
PDF
Ansaldo STS Innovation award 2009
PDF
Ansaldo STS Innovation Award 2014 - Francesco Flammini
PDF
IoT Research & Education at LNU
PDF
Francesco Flammini - talk at DISCORAIL'19
PPTX
Towards railway virtual coupling
PPTX
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
PDF
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
PDF
Attestato FLAMMINI ISO 14298
TRA Visions Senior Researcher Award 2024.pdf
RAILS - Railway Gazette 2023 (Flammini).pdf
Award-Fedcsis Conference 2023.pdf
Internationalization of the Curriculum Conference Certificate
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
Appreciation Certificate
Digital Twins for Trustworthy Autonomy
IEEE GCAIIoT 2020 certificate
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
Science of Computer Programming, Certificate of Reviewing
ACM DSP appointment letter
“AI techniques in cyber-security applications”. Flammini lnu susec19
Ansaldo STS Innovation award 2009
Ansaldo STS Innovation Award 2014 - Francesco Flammini
IoT Research & Education at LNU
Francesco Flammini - talk at DISCORAIL'19
Towards railway virtual coupling
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
Attestato FLAMMINI ISO 14298
Ad

Recently uploaded (20)

PPT
What is a Computer? Input Devices /output devices
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
project resource management chapter-09.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
The various Industrial Revolutions .pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
A novel scalable deep ensemble learning framework for big data classification...
What is a Computer? Input Devices /output devices
cloud_computing_Infrastucture_as_cloud_p
gpt5_lecture_notes_comprehensive_20250812015547.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Getting started with AI Agents and Multi-Agent Systems
project resource management chapter-09.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Chapter 5: Probability Theory and Statistics
The various Industrial Revolutions .pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Assigned Numbers - 2025 - Bluetooth® Document
OMC Textile Division Presentation 2021.pptx
1 - Historical Antecedents, Social Consideration.pdf
Hindi spoken digit analysis for native and non-native speakers
WOOl fibre morphology and structure.pdf for textiles
Developing a website for English-speaking practice to English as a foreign la...
A novel scalable deep ensemble learning framework for big data classification...

Esrel08 Final

  • 1. F. Flammini, A. Gaglione, N. Mazzocca, C. Pragliola DETECT: a novel framework for the detection of attacks to critical infrastructures presented by Andrea Gaglione Dipartimento di Informatica e Sistemistica Università di Napoli “Federico II” Via Claudio 21, 80125 Napoli Email: [email_address] Web: http://wpage.unina.it/andrea.gaglione European Safety & Reliability Conference, ESREL’08 22-25 September 2008 , Valencia, Spain
  • 2. Outline Contextualization and scope of the work EDL (Event Description Language) DETECT architecture and an example scenario Conclusions and future works
  • 3. Critical Infrastructure Protection Transportation Banking Energy and utilities Government Health
  • 4. CIP event cycle … our work Realization of the DETECT framework which receives inputs coming from sensor systems co rrelates the inputs for detection of threats Analysis and assessment Remediation Indications and warning Mitigation Response Reconstitution Pre-Event Post-Event The phases build on one another Comprehensive solution for infrastructure assurance Event
  • 5. The DETECT approach Model-based logical and temporal correlation of basic events detected by intelligent video-surveillance and/or sensor networks Early warning of complex attack scenarios since their first evolution steps Output of DETECT: identifier(s) of the suspected scenario alarm level, associated to scenario evolution Possible integration with SMS/SCADA systems DETECT Engine Alarm level (1, 2, 3, ...) Detected attack scenario Event History Scenario Repository
  • 6. The Event Description Language (EDL) Event: happening that occurs (in a system) at some location and at some point in time Primitive Event: condition on a specific sensor Composite Event: combination of primitive events defined by means of proper operators Chakravarthy, S. & Mishra, D. 1994. Snoop: An expressive event specification language for active databases. Data Knowl. Eng. , Vol. 14, No. 1, pp. 1–26. Operators OR: E1 OR E2  occurs when at least one of its components (E1, E2) occurs AND : E1 AND E2  occur when both of its component occurr ANY: ANY(m, E1, E2, …, En), m<=n  occur when m out of n distinct events specified in the expression occur SEQ: E1 SEQ E2  occurs when E2 occurs provided that E1 is already occurred
  • 7. Event Trees Composite events are represented by event trees Example: E7 = (E1 OR E2) AND (E2 SEQ (E4 AND E6)) Temporal Constraints define a validity interval for a composite event can be added to any operator Example: ( E1 AND E2 ) = True Leaf: primitive event internal node: EDL operator  formal expression  t1< t | ( E1(t)  E2(t1)  E1(t1)  E2(t) ) [T]  |t – t1| ≤ T
  • 8. The software architecture of DETECT Event History database with the list of primitive events detected by sensors EDL Repository database of known attack scenarios Detection Engine can support both deterministic and heuristic models our implementation: Event Trees Model Generator builds the detection model(s) starting from the EDL files Model Manager (4 submodules): Model Feeder: one for each model, instantiates the input of the detection engine by performing queries on the Event History Model Executor : triggers the execution of the model solver Model Updater : allows for online modification of the model Output Manager : stores the output of the model(s) Current implementation
  • 9. Parameter contexts States which occurrences of component events play an active part in the detection process Recent: only the most recent occurrence of the initiator is considered Chronicle: the initiator-terminator pair is unique Continuous: each initiator starts the detection of the event Cumulative: all occurrence of primitive events are accumulated until the composite events is detected
  • 10. An example scenario Terrorist threat in a subway station Intrusion and drop of explosive in a tunnel the attacker stays on the platform for a long time the attacker goes down the track and moves inside the tunnel portal the attacker drops the explosive bag inside the tunnel and leaves the station Security system Intelligent cameras (S1) human tracking Active infrared barriers (S2) Explosive sniffer (S3) Tunnel portal protection
  • 11. An example scenario Scenario evolution: (E1 AND E2) OR E3 SEQ (E4 AND E5) extended presence on the platform (E1 by S1 ) train passing (E2 by S1 ) platform line crossing (E3 by S1 ) tunnel intrusion (E4 by S2 ) explosive detection (E5 by S3 )
  • 12. Conclusions and future works Advantages of the methodology w.r.t. traditional approaches Logic correlation of events Early warning of complex attack scenario and automatic response to emergencies Future developments Implement a heuristic detection model to complement deterministic detection Integration of DETECT with the SeNsIM framework
  • 13. THE END Thank you for your kind attention … any questions?