Dagstuhl Seminar on ”Randomized Timed and Hybrid Models for Critical Infrastructures” (Preliminary) Program
نویسندگان
چکیده
ion. We describe how we plan to apply the framework to security analysis. Furthermore, we apply our framework to holistic survivability analysis: We map the CIM on a survivability model to enable assessing design options with respect to the achieved survivability improvement. 12:00-14:00 Lunch 14:00-14:30 Erika Ábrahám Formal methods for hybrid systems We give an overview in a nutshell about modeling languages for hybrid systems and the most popular formal methods, techniques and tools for their reachability analysis. 14:30-15:00 Marc Bouissou Modeling stochastic hybrid systems in Modelica: Some results obtained in the MODRIO project Usually, Modelica models are deterministic; they are built to simulate the nominal behavior of the systems they represent. In order to challenge the functioning of these systems in diverse situations, or in the presence of a varying environment, a degree of randomness is sometimes added to the system inputs. But the kind of models we want to be able to build in the MODRIO project are quite different: here, the random behavior can be due to the system itself, mainly because of failures (and repairs) of components. The purpose of reliability, and more generally, of dependability studies is to calculate probabilities of undesirable events such as the failure of the mission of a system, or to estimate the probability distribution of some performances of the system: total production on a given time interval, maintenance cost, number of repairs etc. The presentation will show extensions of the Modelica language that were proposed in order to facilitate the construction of such models. Some intermediary implementations of these extensions will be demonstrated. 15:00-15:30 Coffee break 15:30-17:00 From research to application: Open problems, needs and wishes. Panel discussion lead by Boudewijn Haverkort Peter Langendörfer, Albert Molderink, William H. Sanders, Gerard Smit, N.N. 18:00-19:00 Dinner 19:30 Opening of the art exhibit Neun Minuten vor Vegas by the German artist Fabian Treiber Tuesday (January 14, 2014) 9:00-10:00 Christel Baier Introduction to Markov chains (preliminary title) 10:00-10:30 Coffee break 10:3011:00 Holger Hermanns Time-dependent analysis of attacks The success of a security attack crucially depends on time: the more time available to the attacker, the higher the probability of a successful attack; when given enough time, any system can be compromised. Insight in time-dependent behaviors of attacks and the evolution of the attacker’s success as time progresses is therefore a key for effective countermeasures in securing systems. This paper presents an effcient technique to analyze attack times for an extension of the prominent formalism of attack trees. If each basic attack step, i.e., each leaf in an attack tree, is annotated with a probability distribution of the time needed for this step to be successful, we show how this information can be propagated to an analysis of the entire tree. In this way, we obtain the probability distribution for the entire system to be attacked successfully as time progresses. For our approach to be effective, we take great care to always work with the best possible compression of the representations of the probability distributions arising. This is achieved by a calculus of acyclic phase type distributions, together with an effective compositional compression technique. We demonstrate the effectiveness of this approach on three case studies, exhibiting orders of magnitude of compression. 11:00-11:30 Luca Bortolussi Parameter identification and synthesis from qualitative data and behavioural constraints In many applications, it is not always feasible to obtain quantitative measures of the process, but it is generally easier to capture qualitative properties of the dynamics. These properties can be formalised in a suitable temporal logic, and their observations can be used to estimate parameter values, combining statistical model checking and machine learning tools in a Bayesian framework. A similar approach can be used to find a parametrisation forcing a system to satisfy robustly qualitative properties expressed in temporal logic. 11:30-12:00 Maria Prandini Randomized methods for design in the presence of uncertainty In this presentation, we shall describe randomized methods to solve optimization problems in presence of uncertainty, focusing on the scenario approach to robust and chance-constrained optimization. The effectiveness and versatility of the scenario approach will be pointed out through some examples in systems and control. 12:00-14:00 Lunch 14:00-14:30 Enrico Vicario Quantitative evaluation of non-Markovian models through the method of stochastic state classes and the Oris tool We address the analysis of models with a non-Markovian underlying stochastic process, as occurring when multiple timers with general distribution and possibly bounded support can be concurrently enabled. For this class of models, steady state and transient analysis can be performed by the method of Stochastic State Classes through the construction of a General State Space Markov Chain that characterizes the state of the process after each discrete event. We outline the salient traits of the method and discuss its application in conjunction with Markov Renewal Theory within a Probabilistic Model Checking formulation so as to cope with recurrent behaviors and to limit complexity in state space traversal. Applicability of the theory through the Oris tool is illustrated with reference to examples of the literature of non-Markovian stochastic models and to some recent contributions on the modeling of maintenance procedures for critical infrastructures. 14:30-15:00 Armando Tacchella Proving safety of complex control software: A review of three ”test tube” applications in robotics The control software of a modern robot is a complex implement, consisting of several interconnected modules distributed across different computers, some of which connected to the physical world by means of sensors and actuators, i.e., a so-called Cyber-Physical System (CPSs). As such, robot control software is an ideal ”test tube” to experiment with formal models and automated verification at various levels of a control architecture, from those closest to the hardware (e.g., feedback loops) to those performing cognitive tasks (e.g., task planning). In this talk I will review three applications of formal methods to robotics, namely safe reinforcement learning, identification of black-box middleware, and identification of physical systems for verification of software control loops. The goal of the talk is to give an engineering perspective of verification applied to CPSs, and stimulate discussion about research directions to address the current challenges in the practical application of verification techniques. 15:00-15:30 Coffee break 15:30-18:00 Break out session (coffee available) 18:00-19:00 Dinner Wednesday (January 15, 2014) 9:00-9:30 Laura Carnevali The theory of stochastic state classes: Tool support and applications Tools play a crucial role in supporting theoretical developments and in making them applicable. Oris implements the method of stochastic state classes, allowing formal design and quantitative analysis of models that include multiple non-Markovian timers with possibly bounded domain. These features fit a general class of safety-critical systems, providing support for their development and assessment. Applications of stochastic modeling and analysis through the Oris Tool are discussed referring to the evaluation of availability measures for maintenance procedures and gas distribution networks. 9:30-10:00 Anne Remke Analysis of a sewage treatment facility using hybrid Petri nets Waste water treatment facilities clean sewage water from households and industry in several cleaning steps. Such facilities are dimensioned to accomodate a maximum intake. However, in the case of very bad weather conditions or failures of system components the system might not suffice to accomodate all waste water. This talk shows the model of a real waste water treatment facility, situated in the city of Enschede, The Netherlands, as Hybrid Petri net with a single general one-shot transition and analyses under which circumstances the existing infrastructure will overflow. 10:00-10:30 Coffee break 10:30-11:00 Hermann de Meer Resilience of data networking and future power networks The intelligent power grid (”Smart Grid”) will replace our current rigid and hierarchical power grid in the near future. The Smart Grid is realized by a strong entanglement of the power grid and modern communication infrastructures. The arising challenges in this field cover two opposing directions, namely the energy efficiency as well as the security and safety of the Smart Grid infrastructure. The ResumeNet and HyRiM projects investigate ways to protect both the network part as well as the utility network infrastructures. To achieve this, system-wide approaches are developed that take into account the increased complexity of the Smart Grid as well as the diverse origins of possible failures, such as random or intentional faults or human errors at the operational as well as strategic corporate level. 11:00-11:30 Felicita Di Giandomenico Issues in modelling smart grid infrastructures to assess resilience-related indicators The evolution of electrical grids, both in terms of enhanced ICT functionalities to improve efficiency, reliability and economics, as well as the increasing penetration of renewable distributed energy resources to favor sustainability of the production and distribution of electricity, results in a more sophisticated electrical infrastructure which poses new challenges from several perspectives, including resilience and quality of service analysis. In addition, the presence of interdependencies, which more and more characterize critical infrastructures (including the power sector), exacerbates the need for advanced analysis approaches, to be possibly employed since the early phases of the system design, to identify vulnerabilities and appropriate countermeasures. In this presentation, we outline an approach to model and analyze smart grids and discuss the major challenges to be addressed in stochastic model-based analysis to account for the peculiarities of the involved system elements. Representation of dynamic and flexible behavior of generators and loads, as well as representation of the complex ICT control functions required to preserve and/or re-establish electrical equilibrium in presence of changes (both nominal ones, such as variable production by a photovoltaic energy source, and failures/disruptions both at electrical and ICT level) need to be faced to assess suitable indicators of the resilience and quality of service of the smart grid. 11:30-12:00 Gerard Smit Energy-autonomous smart micro-grids When enough (renewable) generation like PV panels, biomass installations and wind-turbines in combination with storage assets are installed, it may be possible to create a self-supplying (autonomous) neighbourhood in a so-called energy autonomous smart micro-grid. The main objective of our work is: to develop methods and techniques to support the development of energy-autonomous smart micro-grids. This broad main objective can be decomposed in a number of detailed research questions: – In an energy-autonomous smart micro-grid demand/supply matching (DSM) has to be done on a local level. How to find local balance of demand/supply/storage. A related research question is: how (and for how long) can a micro-grid continue autonomously without a connection to the main electricity grid? – What distributed energy management systems can be used for a local micro-grid and a cluster of micro-grids (systems of systems) attached to the smart grid. – Find and use the flexibility of appliances in a micro-grid e.g. storage, charging time of EV, starting time of dishwashers. – What kind of (wireless) communication networks will support reliable, real-time and efficient communication in a micro-grid? 12:00-14:00 Lunch 14:00-14:30 John Lygeros Cyber-security of SCADA systems: A case study on automatic generation control Cyber-security issues in SCADA systems have concentrated considerable attention, due in part to highly publicized security threats such as the STUXNET computer worm. The research presented in this talk is motivated by security issues for SCADA systems used to monitor and control the power transmission grid. We specifically concentrate on the implications and possible countermeasures of attacks on the Automatic Generation Control (AGC) system, one of the few control loops closed over such SCADA systems without the intervention of human operators. We show how an attacker who gains access to the AGC signal of the SCADA system in one control area can robustly destabilize the transmission system. We then proceed to design countermeasures against such attacks. To this end, we develop a novel fault detection/isolation filter applicable to high dimensional nonlinear systems, based on randomized optimization methods. 14:30-15:00 Sahra Sedighsarvestani Towards quantitative modeling of reliability for critical infrastructure systems: advances and challenges Critical infrastructure systems are increasingly reliant on cyber infrastructure that enables intelligent real-time control of physical components. This cyber infrastructure utilizes environmental and operational data to provide decision support intended to increase the efficacy and reliability of the system and facilitate mitigation of failure. Realistic imperfections, such as corrupt sensor data, software errors, or failed communication links can cause failure in a functional physical infrastructure, defying the purpose of intelligent control. As such, justifiable reliance on cyber-physical critical infrastructure is contingent on rigorous investigation of the effect of intelligent control, including modeling and simulation of failure propagation within the cyber-physical infrastructure. We present and invite discussion on challenges in and recent advances towards development of quantitative models and accurate simulation methods for cyber-physical critical infrastructure systems, with focus on smart grids and intelligent water distribution networks. 15:00-15:30 Coffee break 15:30-18:00 Break out session (coffee available) 18:00-19:00 Dinner Thursday (January 16, 2014) 9:00-9:30 Boudewijn Haverkort Systems of systems design challenges Over the last few years there has been an increased interest in so-called systems-of-systems. In the control and management of infrastructural systems, systems-of-systems are widespread. However, the size of these systems and their management challenges make it a formidable task to really design them such that performance and dependability properties can be guaranteed. In this talk I will address the background of systems-of-systems, and discuss the challenges associated with their design, especially in light of model-driven design approaches. 9:30-10:00 Aad van Moorsel Data collection strategies for model-based analysis We report on research conducted primarily in security models, but more widely applicable to any type of model, hybrid or otherwise. The issue we addressed is to determine how to invest in collecting data from various sources, so that it most improves the reliability of the outcome of a model. For instance, in the context of cyber-physical systems, should we collect data about user behaviour or about system aspects? We provide an approach that for the first time provides an end-to-end solution for this problem (from identifying data sources, to their impact on the model outcome and the resulting optimal data collection strategy). 10:00-10:30 Coffee break 10:30-11:00 Marco Gribaudo Multiformalism to support software rejuvenation modeling The study of software aging and rejuvenation is based on models that conjugate the complexity of architectural models with the problem of time dependence of parameters. Exploiting the metaphors of common performance-oriented modeling formalisms (such as Petri nets or queuing networks) with the support of proper solution techniques can help modelers in approaching the analysis of complex software-based systems. This paper shows how SIMTHESys (a multiformalism modeling framework) can be used to approach the modeling problem by implementing a new user-defined modeling formalisms and the related fluid-based solution engine. 11:00-11:30 Jeremy T. Bradley Rapid evaluation of time-critical service level objectives Recent developments in fluid analysis have shown that transient analysis of large stochastic timed systems is possible in reasonable time. We will show how critical passage-time-based service level objectives can be computed from such analysis and discuss how this can be applied to problems in the modelling of critical infrastructure. 11:30-12:00 Katinka Wolter Quantitative evaluation of smart grid control traffic The expected decentralised nature of the Smart Grid on the producer as well as on the consumer side requires a large amount of control in order to match supply and demand in an optimal way. Very likely the smart grid control traffic will not use dedicated communication lines but it will be transmitted using various communication channels, such as wireless or cellular networks or the public Internet. In consequence, Smart Grid control traffic will suffer from all kinds of disturbances and reliable transmission must be guaranteed using different kinds of redundancy mechanisms. I will present stochastic models for traffic flow that were developed in collaboration with Bell Labs Berlin and show the insights we gained from varying the network topology, configuration parameters as well as the background load. 12:00-14:00 Lunch 14:00-14:30 Joost-Pieter Katoen A rigorous approach towards reliable and dependable train and space systems 14:30-15:00 Dennis Guck Smart railroad maintenance engineering with stochastic model checking RAMS (Reliability, Availability, Maintenance, Safety) requirements are utmost important for safetycritical systems like railroad infrastructure and signalling systems, and often imposed by law or other government regulations. Fault tree analysis (FTA, for short) is a widely applied industry standard for RAMS analysis, and is often one of the techniques preferred by railways organisations. FTA yields system availability and reliability, and can be used for critical path analysis. It can however not yet deal with a pressing aspect of railroad engineering: maintenance. While railroad infrastructure providers are focusing more and more on managing cost/performance ratios, RAMS can be considered as the performance specification, and maintenance the main cost driver. Methods facilitating the management of this ratio are still very uncommon. Therefore we present a flexible and transparent technique to incorporate maintenance aspects in fault tree analysis, based on stochastic model checking. 15:00-15:30 Coffee break 15:30-16:00 Alessandro Abate Cascading events in probabilistic dynamical networks The assessment of cascading events over probabilistic dynamical neworks can be of interest in applications dealing with energy grids, computer networks, and banking systems. Small, abrupt events may lead to global cascades over such networks: the objective of this ongoing work is to propose a framework to characterise, assess, and possibly control such propagating events. In this talk, the occurrence of contagious bankruptcies over an interconnected banking system is studied by means of randomised approaches. We also investigate the related sensitivity of networks dynamics and topologies. 16:00-16:30 Martin Fränzle Symbolic analysis of complex systems 16:30-18:00 Break out session (coffee available)
منابع مشابه
Randomized Timed and Hybrid Models for Critical Infrastructures
This report documents the program and the outcomes of Dagstuhl Seminar 14031 “Randomized Timed and Hybrid Models for Critical Infrastructures”. Critical Infrastructures, such as power grid and water and gas distribution networks, are essential for the functioning of our society and economy. Randomized Timed and Hybrid Models appear as a natural choice for their modeling, and come with existing ...
متن کاملRandomized Timed and Hybrid Models for Critical Infrastructures (Dagstuhl Seminar 14031)
From 05.01.2014 to 10.01.2014, the Seminar 14021 in Symmetric Cryptography was held in Schloss Dagstuhl – Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this pa...
متن کاملNetwork Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures
This report documents the program and the outcomes of Dagstuhl Seminar 14292 “Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures”. The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It is the sequel of several previous Dagstuhl seminars: (1) the series “Network Attack Detection an...
متن کاملNetwork Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)
متن کامل
Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061)
The increasing dependence of human society on information technology (IT) systems requires appropriate measures to cope with their misuse. The growing potential of threats, which make these systems more and more vulnerable, is caused by the complexity of the technologies themselves. The potential of threats in networked systems will further grow as well as the number of individuals who are able...
متن کاملDistribution Infrastructures Dagstuhl Seminar
From 11.05.04 to 14.05.04, the Dagstuhl Seminar 04201 Content Distribution Infrastructures was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar resul...
متن کامل