Examination of the Interplay of Reliability and Security using System Modeling Language (SysML). By Venkateswara Reddy Tallapu.

Slides:



Advertisements
Similar presentations
Integration of MBSE and Virtual Engineering for Detailed Design
Advertisements

Ch:8 Design Concepts S.W Design should have following quality attribute: Functionality Usability Reliability Performance Supportability (extensibility,
Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
OMG Systems Modeling Language (OMG SysML™) Matthew Hause ARTiSAN Software Tools Some slides reused from the OMG SysML™ Tutorial with permission.
Lecture 1: Overview modified from slides of Lawrie Brown.
Object-Oriented Analysis and Design
Systems Analysis and Design in a Changing World, Fourth Edition
Chapter 14 Requirements and Specifications. Copyright © 2005 Pearson Addison-Wesley. All rights reserved Software Engineering The implementation.
1 COST G9 - Work group 2 meeting Székesfehérvár, Hu Modeling real property transactions Radoš Šumrada Faculty of Civil and Geodetic.
COST G9 - Work group 2 Cadastral science meeting Aalborg, Dk Modeling methodology for real estate transactions Radoš Šumrada Faculty.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 1: Introduction to Decision Support Systems Decision Support.
Info1409 De Montfort University1 Requirements Modelling Systems Analysis & Design Academic Year 2008/9 Info 1409 Lecture 7.
© Copyright Eliyahu Brutman Programming Techniques Course.
System Analysis and Design
Chapter 7: The Object-Oriented Approach to Requirements
Model-Driven User Requirements Specification using SysML Authors: Michel dos Santos Soares, Jos Vrancken Source: Journal of Software(JSW), Vol. 3, No.
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
Overview of the Database Development Process
UML Unified Markup Language Ziya Karakaya Atılım University, Computer Engineering
Free Mini Course: Applying SysML with MagicDraw
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
Understand Application Lifecycle Management
The complementary use of IDEF and UML modelling approaches 第四組 M 莊承勳 M 陳德熙 M 吳炳煌 M 吳自晟.
Introduction to UML By: Prof. Aiman Hanna Department of Computer Science, Concordia University, Montreal, Canada.
1 SYS366 Lecture Visual Modeling and Business Use Case Diagrams.
Programming in Java Unit 3. Learning outcome:  LO2:Be able to design Java solutions  LO3:Be able to implement Java solutions Assessment criteria: 
Odyssey A Reuse Environment based on Domain Models Prepared By: Mahmud Gabareen Eliad Cohen.
Object Management Group (OMG) Specifies open standards for every aspect of distributed computing Multiplatform Model Driven Architecture (MDA)
1 UML Basic Training. UML Basic training2 Agenda  Definitions: requirements, design  Basics of Unified Modeling Language 1.4  SysML.
Conceptual Modelling – Behaviour
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Requirements as Usecases Capturing the REQUIREMENT ANALYSIS DESIGN IMPLEMENTATION TEST.
Information Systems Engineering. Lecture Outline Information Systems Architecture Information System Architecture components Information Engineering Phases.
Building Dependable Distributed Systems Chapter 1 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Software Engineering Prof. Ing. Ivo Vondrak, CSc. Dept. of Computer Science Technical University of Ostrava
UML diagrams What is UML UML diagrams –Static modeoing –Dynamic modeling 1.
UML Use Case Diagramming Guidelines. What is UML? The Unified Modeling Language (UML) is a standard language for specifying, visualizing, constructing,
An Introduction to the Unified Modeling Language
 What is Modeling What is Modeling  Why do we Model Why do we Model  Models in OMT Models in OMT  Principles of Modeling Principles of Modeling 
1 System Analysis and Design Using UML INSTRUCTOR: Jesmin Akhter Lecturer, IIT, JU.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
Introduction to UML CS A470. What is UML? Unified Modeling Language –OMG Standard, Object Management Group –Based on work from Booch, Rumbaugh, Jacobson.
Requirements Engineering-Based Conceptual Modelling From: Requirements Engineering E. Insfran, O. Pastor and R. Wieringa Presented by Chin-Yi Tsai.
Data Structures Using C++ 2E
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Describe the potential of IT to improve internal and external communications By Jim Green.
UML Course Instructor: Rizwana Noor. Overview  Modeling  What is UML?  Why UML?  UML Diagrams  Use Case  Components  Relationships  Notations.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 12 Exploring Information System Development.
5. 2Object-Oriented Analysis and Design with the Unified Process Objectives  Describe the activities of the requirements discipline  Describe the difference.
1 SYS366 Week 2 - Lecture 2 Visual Modeling & UML.
7 Systems Analysis – ITEC 3155 The Object Oriented Approach – Use Cases.
Unified Modeling Language. What is UML? Standard language for specifying, visualizing, constructing, and documenting the artifacts of software systems,
SWE 214 (071) Introduction to UML Slide 1 Introduction to UML.
Architectural Complexity  A useful technique for assessing the overall complexity of a proposed architecture is to consider dependencies between components.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
UML (Unified Modeling Language)
Informatics for Scientific Data Bio-informatics and Medical Informatics Week 9 Lecture notes INF 380E: Perspectives on Information.
Evolution of UML.
Object-Oriented Analysis and Design
Unified Modeling Language
System Design and Modeling
Introduction to Unified Modeling Language (UML)
Software Requirements
Chapter 2 – Software Processes
Introduction to UML.
UML profiles.
Introduction to Systems Analysis and Design Stefano Moshi Memorial University College System Analysis & Design BIT
Week 10 Systems Development
Presentation transcript:

Examination of the Interplay of Reliability and Security using System Modeling Language (SysML). By Venkateswara Reddy Tallapu

Agenda.. 1.Introduction to terms (Reliability, Security, Interplay) 2.Brief discussion about SysML 3.Modeling Reliability and Security in the SysML 4.Example for the Interplay of Reliability and Security using the SysML 5.Conclusion 6.References 7.Queries..??

1.Introduction to terms (Reliability, Security, Interplay) a)Reliability: The term reliability refers to the ability of a computer-related hardware or software component to consistently perform according to its specifications. b)Security: Security includes many different techniques and methods which ensure security from threats and attacks. c)Interplay: The way in which the reliability and security have an effect on each other in this discussion.

2.Brief discussion about SysML  System Modeling Language (OMG SysML) is a graphical modeling language that has been developed to describe complex systems.  It provides semantics and notations to describe complex systems independent of engineering tools and methodologies.  It is largely specified by the members of INCOSE working in conjunction with the OMG.  It supports the specification, verification, design, analysis, and validation of systems that include hardware, software, data, personnel, procedures and facilities.  SysML is not a methodology.  SysML is not a process.  SysML is not a tool.

Contd.. Relationship between SysML and UML Example Fig: 1

3. Modeling Reliability and Security in the SysML  To model Reliability and Security in the SysML a) The definition of failure and the SysML Use Case b) Reliability and Security as Single Coherent Concept c) Embedding Reliability and Security in SysML  Motivation: a) Growing use of SysML b) Significant potential benefits for Tightly integrating Depending analysis into system engineering.

Contd.. a) The definition of failure and the SysML Use Case  The SysML Use Case diagram identifies high-level system functionality in terms of the goals of external actors. This then seems to be a natural construct for identifying definitions of failure.  For a given actor, the Use Case defines a functional demand. Loss of a function would be perceived as a system failure by those actors dependent on the associated Use Case.

Contd.. Fig 1: Use Case Diagram for Legitimate System Users

Contd.. Fig 2: Use Case Diagram for Illegal users

Contd.. b) Reliability and Security as s Single Coherent Concept  The definition of reliability presented earlier casts reliability as a probabilistic characteristic dependent on the elements within a system and the context of their usage. Security has now been handed a very similar definition. This particular definition of security suggests that reliability and security may exhibit coherence.  This is to say that they share a fundamental similarity but are contextually separated.

Contd.. c) Embedding Reliability and Security in SysML  The flexibility of SysML and the cross- cutting nature of reliability and security, mostly any SysML diagrams may possess some salient parameter for the enumeration of reliability or security.  Regardless of where the individual details may reside, the model for enumerating reliability or security from these parameters will be documented in a parametric diagram.

4. Example for the Interplay of Reliability and Security using the SysML  In this example we are going to discuss about “how we can protect a pigeon (a bird) from threats and attacks.  To demonstrate this we need the following four activities: a) System Activity Flow b) Attack case- Shoot Pigeon c) Attack case- Poison seed d) Attack case- Intercept Pigeon

Contd.. a) System Activity Flow  The triggers that control the enabling of individual reliability and security parametric diagrams will depend on the activity flows within the system. Each flow is modeled by a set of SysML Activity Diagrams that will associate with a series of parametric models such as the example shown in Figure 3.  There are three major activity flows considered in the example system (Figure 4). The flow of the pigeon begins with training of the pigeon to program its homing instinct. The pigeon then enters a continuous cycle of being cooped at headquarters, deployed, and finally sent back to headquarters with an attached message.

Contd.. Fig 3: Example of parametric Diagram for the cumulative damage weibull Reliability function

Contd.. Fig 4: Multiple flow of items through activities describe operation of the conceptual system.

Contd.. Fig 5: Activities of illegitimate actors attempt to alter or disrupt normal flows.

b) Attack case- Shoot Pigeon b) Attack case- Shoot Pigeon  The Shoot Pigeon attack is the crudest form of attack being considered. The intent of the illegitimate actor is to simply stop the delivery of a sent message by killing the pigeon.  For this attack, the prepared attacker relies on having the opportunity to observe the in-flight pigeon. The resulting activity flow for the attack is to observe then shoot a message carrying pigeon.  In this cohesive case reliability and security directly interact but the characteristic of the interaction depends on the constraining parameters.

c) Attack case- Poison seed c) Attack case- Poison seed  The intent of the Poison Seed attack is to target the food supply to kill all pigeons. In this attack the activity flow begins with the attacker introducing poison to the food supply. The attack then relies on the system’s own functions to distribute the infected feed.  The more reliably the infected seed gets distributed the greater the potential damage done by an unseen attack. Because the attack relies on nominal system flows many of the same models get applied to simultaneously consider both reliability and security.

d) Attack case- Intercept Pigeon  The Intercept Pigeon attack contains the possibility that a successful attack might go unnoticed by the system operators. In this case the intent of the attacker is to intercept and read a sent message and then substitute a false message into the system.  The activity flow is to intercept a message carrying pigeon, detach and decode the attached message, encode and attach the false message, and then release the pigeon.

5. Conclusion  Various forms of attacks on a hypothetical communication system were reviewed to describe some of the reliability-security interactions that have been observed. In general the coherence between reliability and security is found to depend on the objective of the attack and the knowledge of the attacker. Security from attacks directed directly at an activity flow tended to correlate positively with reliability.  In contrast, security from attacks that rely on the system flows correlate negatively with reliability but require a more knowledgeable adversary. The cohesion between reliability and security for some attacks is found to depend on both the knowledge of the attacker and the robustness of the system.

6. References OMG Systems Modeling Language (OMG SysML™) Specification.

7. Queries..??