Visible to the public Monitoring Security Compliance of Critical Processes

TitleMonitoring Security Compliance of Critical Processes
Publication TypeConference Paper
Year of Publication2014
AuthorsRieke, R., Repp, J., Zhdanova, M., Eichler, J.
Conference NameParallel, Distributed and Network-Based Processing (PDP), 2014 22nd Euromicro International Conference on
Date PublishedFeb
KeywordsAutomata, Business, Computational modeling, critical infrastructures, critical processes, hydroelectric power plant, hydroelectric power stations, model-based support, Monitoring, operational formal models, power system security, Predictive models, predictive security analysis, process behavior analysis, process behavior model, process specifications, process-aware information systems, Runtime, security, security compliance, security information and event management, security modeling and simulation, security monitoring, security policies
Abstract

Enforcing security in process-aware information systems at runtime requires the monitoring of systems' operation using process information. Analysis of this information with respect to security and compliance aspects is growing in complexity with the increase in functionality, connectivity, and dynamics of process evolution. To tackle this complexity, the application of models is becoming standard practice. Considering today's frequent changes to processes, model-based support for security and compliance analysis is not only needed in pre-operational phases but also at runtime. This paper presents an approach to support evaluation of the security status of processes at runtime. The approach is based on operational formal models derived from process specifications and security policies comprising technical, organizational, regulatory and cross-layer aspects. A process behavior model is synchronized by events from the running process and utilizes prediction of expected close-future states to find possible security violations and allow early decisions on countermeasures. The applicability of the approach is exemplified by a misuse case scenario from a hydroelectric power plant.

URLhttps://ieeexplore.ieee.org/document/6787328/
DOI10.1109/PDP.2014.106
Citation Key6787328