Browsing by Author "Rios, Erkuden"
Now showing 1 - 9 of 9
Results Per Page
Sort Options
Item Continuous Deployment of Trustworthy Smart IoT Systems.(2020-07) Ferry, Nicolas; Nguyen, Phu H.; Song, Hui; Rios, Erkuden; Iturbe, Eider; Martinez, Satur; Rego, Angel; CIBERSEC&DLT; Tecnalia Research & InnovationWhile the next generation of IoT systems need to perform distributed processing and coordinated behaviour across IoT, Edge and Cloud infrastructures, their development and operation are still challenging. A major challenge is the high heterogeneity of their infrastructure, which broadens the surface for security attacks and increases the complexity of maintaining and evolving such complex systems. In this paper, we present our approach for Generation and Deployment of Smart IoT Systems (GeneSIS) to tame this complexity. GeneSIS leverages model-driven engineering to support the DevSecOps of Smart IoT Systems (SIS). More precisely, GeneSIS includes: (i) a domain specific modelling language to specify the deployment of SIS over IoT, Edge and Cloud infrastructure with the necessary concepts for security and privacy; and (ii) a models@run.time engine to enact the orchestration, deployment, and adaptation of these SIS. The results from our smart building case study have shown that GeneSIS can support security by design from the development (via deployment) to the operation of IoT systems and back again in a DevSecOps loop. In other words, GeneSIS enables IoT systems to keep up security and adapt to evolving conditions and threats while maintaining their trustworthiness.Item Continuous quantitative risk management in smart grids using attack defense trees(2020-08-07) Rios, Erkuden; Rego, Angel; Iturbe, Eider; Higuero, Marivi; Larrucea, Xabier; CIBERSEC&DLT; Tecnalia Research & InnovationAlthough the risk assessment discipline has been studied from long ago as a means to support security investment decision-making, no holistic approach exists to continuously and quantitatively analyze cyber risks in scenarios where attacks and defenses may target different parts of Internet of Things (IoT)-based smart grid systems. In this paper, we propose a comprehensive methodology that enables informed decisions on security protection for smart grid systems by the continuous assessment of cyber risks. The solution is based on the use of attack defense trees modelled on the system and computation of the proposed risk attributes that enables an assessment of the system risks by propagating the risk attributes in the tree nodes. The method allows system risk sensitivity analyses to be performed with respect to different attack and defense scenarios, and optimizes security strategies with respect to risk minimization. The methodology proposes the use of standard security and privacy defense taxonomies from internationally recognized security control families, such as the NIST SP 800-53, which facilitates security certifications. Finally, the paper describes the validation of the methodology carried out in a real smart building energy efficiency application that combines multiple components deployed in cloud and IoT resources. The scenario demonstrates the feasibility of the method to not only perform initial quantitative estimations of system risks but also to continuously keep the risk assessment up to date according to the system conditions during operation.Item Development and Operation of Trustworthy Smart IoT Systems: The ENACT Framework(Springer, 2020) Ferry, Nicolas; Dominiak, Jacek; Gallon, Anne; González, Elena; Iturbe, Eider; Lavirotte, Stéphane; Martinez, Saturnino; Metzger, Andreas; Muntés-Mulero, Victor; Nguyen, Phu H.; Palm, Alexander; Rego, Angel; Rios, Erkuden; Riviera, Diego; Solberg, Arnor; Song, Hui; Tigli, Jean Yves; Winter, Thierry; Bruel, Jean-Michel; Mazzara, Manuel; Meyer, Bertrand; CIBERSEC&DLT; Tecnalia Research & InnovationTo unleash the full potential of IoT, it is critical to facilitate threation and operation of trustworthy Smart IoT Systems (SIS). Software development and delivery of SIS would greatly benefit from DevOps as devices and IoT services requirements for reliability, quality, security and safety are paramount. However, DevOps practices are far from widely adopted in the IoT, in particular, due to a lack of key enabling tools. In last year paper at DevOps’18, we presented the ENACT research roadmap that identified the critical challenges to enable DevOps in the realm of trustworthy SIS. In this paper, we present the ENACT DevOps Framework as our current realization of these methods and tools.Item Methodology to obtain the security controls in multi-cloud applications(SCITEPRESS Digital Library, 2016) Afolaranmi, Samuel Olaiya; Gonzalez Moctezuma, Luis E.; Rak, Massimiliano; Casola, Valentina; Rios, Erkuden; Martinez Lastra, Jose L.; Cardoso, Jorge; Cardoso, Jorge; Ferguson, Donald; Munoz, Victor Mendez; Helfert, Markus; CIBERSEC&DLTWhat controls should be used to ensure adequate security level during operation is a non-trivial subject in complex software systems and applications. The problem becomes even more challenging when the application uses multiple cloud services which security measures are beyond the control of the application provider. In this paper, a methodology that enables the identification of the best security controls for multicloud applications which components are deployed in heterogeneous cloud providers is presented. The methodology is based on application decomposition and modelling of threats over the components, followed by the analysis of the risks together with the capture of cloud business and security requirements. The methodology has been applied in the MUSA EU H2020 project use cases as the first step for building up the multi-cloud applications’ security-aware Service Level Agreements (SLA). The identified security controls will be included in the applications’ SLAs for their monitoring and fulfilment assurance at operation.Item Self-healing Multi-Cloud Application Modelling(ACM Digital Library, 2017-08-29) Rios, Erkuden; Iturbe, Eider; Palacios, Maria Carmen; CIBERSEC&DLTCloud computing market forecasts and technology trends confirm that Cloud is an IT disrupting phenomena and that the number of companies with multi-cloud strategy is continuously growing. Cost optimization and increased competitiveness of companies that exploit multi-cloud will only be possible when they are able to leverage multiple cloud offerings, while mastering both the complexity of multiple cloud provider management and the protection against the higher exposure to attacks that multi-cloud brings. This paper presents the MUSA Security modelling language for multi-cloud applications which is based on the Cloud Application Modelling and Execution Language (CAMEL) to overcome the lack of expressiveness of state-of-the-art modelling languages towards easing: a) the automation of distributed deployment, b) the computation of composite Service Level Agreements (SLAs) that include security and privacy aspects, and c) the risk analysis and service match-making taking into account not only functionality and business aspects of the cloud services, but also security aspects. The paper includes the description of the MUSA Modeller as the Web tool supporting the modelling with the MUSA modelling language. The paper introduces also the MUSA SecDevOps framework in which the MUSA Modeller is integrated and with which the MUSA Modeller will be validated.Item SLA-Based continuous security assurance in multi-cloud devops(2017) Rios, Erkuden; Rak, Massimiliano; Iturbe, Eider; Mallouli, Wissam; CIBERSEC&DLTMulti-cloud applications, i.e.Those that are deployed over multiple independent Cloud providers, pose a number of challenges to the security-Aware development and operation. Security assurance in such applications is hard due to the lack of insights of security controls ap-plied by Cloud providers and the need of controlling the security levels of all the components and layers at a time. This paper presents the MUSA approach to Service Level Agreement (SLA)-based continuous security assurance in multi-cloud applications. The paper details the proposed model for capturing the security controls in the offered application Se-curity SLA and the approach to continuously monitor and asses the controls at operation phase. This new approach enables to easily align development security requirements with controls monitored at operation as well as early react at operation to any possible security incident or SLA violation.Item A Survey on honeypots, honeynets and their applications on smart grid(Institute of Electrical and Electronics Engineers Inc., 2019-06) Dalamagkas, Christos; Sarigiannidis, Panagiotis; Ioannidis, Dimosthenis; Iturbe, Eider; Nikolis, Odysseas; Ramos, Francisco; Rios, Erkuden; Sarigiannidis, Antonios; Tzovaras, Dimitrios; Jacquenet, Christian; De Turck, Filip; Chemouil, Prosper; Esposito, Flavio; Festor, Olivier; Cerroni, Walter; Secci, Stefano; CIBERSEC&DLTPower grid is a major part of modern Critical Infrastructure (CIN). The rapid evolution of Information and Communication Technologies (ICT) enables traditional power grids to encompass advanced technologies that allow them to monitor their state, increase their reliability, save costs and provide ICT services to end customers, thus converting them into smart grids. However, smart grid is exposed to several security threats, as hackers might try to exploit vulnerabilities of the industrial infrastructure and cause disruption to national electricity system with severe consequences to citizens and commerce. This paper investigates and compares honey-x technologies that could be applied to smart grid in order to distract intruders, obtain attack strategies, protect the real infrastructure and form forensic evidence to be used in court.Item Towards an anonymous incident communication channel for electric smart grids(Association for Computing Machinery, 2018-11-29) Triantafyllou, Anna; Sarigiannidis, Panagiotis; Sarigiannidis, Antonios; Rios, Erkuden; Iturbe, Eider; Mamalis, Basilis; Karanikolas, Nikitas N.; CIBERSEC&DLTThe Electric Smart Grid (ESG) is an intelligent critical infrastructure aiming to create an automated and distributed advanced energy delivery network, while preserving information privacy. This study proposes the implementation of an Anonymous Incident Communication Channel (AICC) amongst smart grids across Europe to improve situational awareness and enhance security of the new electric intelligent infrastructures. All participating organizations will have the ability to broadcast sensitive information, stored anonymously in a repository, without exposing the reputation of the organisation. This work focuses on the requirements of establishment, the possible obstacles and proposed data protection techniques to be applied in the AICC. Furthermore, a discussion is conducted regarding the documentation of cyber-incidents. Last but not least, the benefits and the potential risks of this AICC concept are also provided.Item Towards Self-Protective Multi-Cloud Applications: MUSA – a Holistic Framework to Support the Security-Intelligent Lifecycle Management of Multi-Cloud Applications: MUSA-A holistic framework to support the security-intelligent lifecycle management of multi-cloud applications(SCITEPRESS Digital Library, 2015) Rios, Erkuden; Iturbe, Eider; Orue-Echevarria, Leire; Rak, Massimiliano; Casola, Valentina; Helfert, Markus; Ferguson, Donald; Mendez Munoz, Victor; CIBERSEC&DLT; Tecnalia Research & InnovationThe most challenging applications in heterogeneous cloud ecosystems are those that are able to maximise the benefits of the combination of the cloud resources in use: multi-cloud applications. They have to deal with the security of the individual components as well as with the overall application security including the communications and the data flow between the components. In this paper we present a novel approach currently in progress, the MUSA framework. The MUSA framework aims to support the security-intelligent lifecycle management of distributed applications over heterogeneous cloud resources. The framework includes security-by-design mechanisms to allow application self-protection at runtime, as well as methods and tools for the integrated security assurance in both the engineering and operation of multi-cloud applications. The MUSA framework leverages security-by-design, agile and DevOps approaches to enable the security-aware development and operation of multi-cloud applications.