Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/sbaresearch/amlsec
Automated Security Risk Identification Using AutomationML-based Engineering Data
https://github.com/sbaresearch/amlsec
automationml cyber-physical-systems industrial-automation research risk-assessment security semantic-web
Last synced: 21 days ago
JSON representation
Automated Security Risk Identification Using AutomationML-based Engineering Data
- Host: GitHub
- URL: https://github.com/sbaresearch/amlsec
- Owner: sbaresearch
- Created: 2020-02-05T13:37:52.000Z (almost 5 years ago)
- Default Branch: master
- Last Pushed: 2022-07-24T19:23:10.000Z (over 2 years ago)
- Last Synced: 2024-08-05T17:42:53.020Z (4 months ago)
- Topics: automationml, cyber-physical-systems, industrial-automation, research, risk-assessment, security, semantic-web
- Language: Scala
- Homepage:
- Size: 2.05 MB
- Stars: 28
- Watchers: 6
- Forks: 9
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - sbaresearch/amlsec - Automated Security Risk Identification Using AutomationML-based Engineering Data (Scala)
README
# Automated Security Risk Identification in Cyber-Physical Production Systems Using AutomationML-Based Engineering Data
This prototype implements the methods presented in the following two publications:
1. [Eckhart, M., Ekelhart, A., & Weippl, E. R. (2020). Automated Security Risk Identification Using AutomationML-Based Engineering Data. IEEE Transactions on Dependable and Secure Computing.](https://doi.org/10.1109/TDSC.2020.3033150)
2. [Eckhart, M., Ekelhart, A., Biffl S., Lüder A., & Weippl, E. R. (2022). QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems. IEEE Transactions on Industrial Informatics.](https://doi.org/10.1109/tii.2022.3193119)In essence, it identifies security risk sources (i.e., threats and vulnerabilities) and types of attack consequences based on AutomationML (AML) artifacts.
The results of the risk identification process can be used to generate cyber-physical attack graphs, which model multistage cyber-attacks that potentially lead to physical damage.
Moreover, cascading effects and consequences of attacks affecting product quality are identified.## Installation
1. Build AML2OWL
This prototype depends on a forked version of the [implementation of the bidirectional translation between AML and OWL](https://github.com/sbaresearch/ETFA2019) for the ETFA 2019 paper ["Interpreting OWL Complex Classes in AutomationML based on Bidirectional Translation"](https://arxiv.org/abs/1906.04240) by Hua and Hein.
Clone the [repository](https://github.com/sbaresearch/ETFA2019), compile the projects, and assemble an application bundle of `aml_owl`:
```
$ cd aml_models
$ mvn clean compile install
$ cd ../aml_io
$ mvn clean compile install
$ cd ../aml_owl
$ mvn clean compile install assembly:single
```2. Setup the AMLsec Base Directory
Clone this repository, create the application base directory (usually located in the user's home directory), and place the files located in [amlsec-base-dir](https://github.com/sbaresearch/amlsec/blob/master/amlsec-base-dir) and the assembled AML2OWL JAR (located in `aml_owl/target/`) there.
The AMLsec base directory and the path to the AML2OWL JAR must be set in the [configuration file](https://github.com/sbaresearch/amlsec/blob/master/amlsec/src/main/resources/application.conf) using the keys `baseDir` and `amlToOwlProgram`, respectively.3. Setup Apache Jena Fuseki
Install and start [Apache Jena Fuseki](https://jena.apache.org/documentation/fuseki2/):
```
$ java -jar /fuseki-server.jar --update
```4. Install LoLA 2 (only applies to QualSec)
If you want to run QualSec, you need to install [LoLA - A Low Level Petri Net Analyzer](https://theo.informatik.uni-rostock.de/theo-forschung/tools/lola/).
5. Build and Run the Application
Finally, build and start the app by using [sbt](https://www.scala-sbt.org/).
```
$ sbt "runMain org.sba_research.worker.Main -q"
```Use the flags `-s` and `-q` to run AMLsec and QualSec, respectively.
## Usage
The implemented methods utilize a semantic information mapping mechanism realized by means of AML libraries.
These [AML security extension libraries](https://github.com/sbaresearch/amlsec/tree/master/aml-libs/amlsec) and [AML quality extension libraries](https://github.com/sbaresearch/amlsec/tree/master/aml-libs/amlqual) can be easily reused in engineering projects by importing them into AML files.Again, if you want to execute the prototype of the method presented in the IEEE TDSC paper, use the `-s` flag.
The `-q` flag, on the other hand, corresponds to the method presented in the IEEE TII paper.The capabilities of this prototype are demonstrated in case studies ([AMLsec](https://github.com/sbaresearch/amlsec/blob/master/amlsec-base-dir/case-study/CaseStudy_A.aml), [QualSec](https://github.com/sbaresearch/amlsec/blob/master/amlsec-base-dir/quality-case-study/A/CaseStudy_A.aml)).
Running this prototype as is will yield the knowledge base (can be accessed via Fuseki), which also includes the results of the risk identification process, and the results of the case study.Furthermore, if you run the prototype with the [default case study]((https://github.com/sbaresearch/amlsec/blob/master/amlsec-base-dir/case-study/CaseStudy_A.aml)) and `-s` flag, the following pruned cyber-physical attack graph will be created:
![Cyber-Physical Attack Graph](https://github.com/sbaresearch/amlsec/blob/master/amlsec-base-dir/pruned_ag.svg?sanitize=true)
### Cluster
The prototype utilizes the [Akka](https://akka.io/) framework and is able to distribute the risk identification workload among multiple nodes. The [Akka distributed workers sample](https://github.com/akka/akka-samples/tree/2.6/akka-sample-distributed-workers-scala) was used as a template.
To run the cluster with multiple nodes (examples with `-q` flag):
1. Start Cassandra:
```
$ sbt "runMain org.sba_research.worker.Main cassandra -q"
```2. Start the first seed node:
```
$ sbt "runMain org.sba_research.worker.Main 2551 -q"
```3. Start a front-end node:
```
$ sbt "runMain org.sba_research.worker.Main 3001 -q"
```4. Start a worker node (the second parameter denotes the number of worker actors, e.g., 3):
```
$ sbt "runMain org.sba_research.worker.Main 5001 3 -q"
```If you run the nodes on separate machines, you will have to adapt the Akka settings in the [configuration file](https://github.com/sbaresearch/amlsec/blob/master/amlsec/src/main/resources/application.conf).
## Performance Assessment
The measurements and log files obtained during the performance assessment are available upon request.
## How to Cite
If you use this prototype in your research, please consider citing our [IEEE TDSC 2020](https://doi.org/10.1109/TDSC.2020.3033150) or [IEEE TII 2022](https://doi.org/10.1109/tii.2022.3193119) publication. Feel free to use the papers' BibTeX entries ([TDSC](https://github.com/sbaresearch/amlsec/tree/master/bib/Eckhart2022.bib), [TII](https://github.com/sbaresearch/amlsec/tree/master/bib/Eckhart2022a.bib)).
## Acknowledgment
The authors would like to thank Yameng An for providing the initial version of [OntoPLC](https://doi.org/10.1109/TII.2020.2997360).