the presentation slides of Prof. Setola

Transcription

the presentation slides of Prof. Setola
Workshop
VULNERABILITY AND RESILIENCE OF CRITICAL
INFRASTRUCTURES: ISSUES, METHODS AND
APPLICATIONS
Interdependent systems
Prof. Roberto Setola
University Campus Bio-Medico of Rome
[email protected]
Complex Systems and Security Laboratory
Università Campus Bio-Medico di Roma - Via Álvaro del Portillo, 21 – 00128 Roma-Italia
25 February 2015
www.unicampus.it – www.coseritylab.it
Objectives of this lesson
•
•
•
What is the relevance of (inter-)dependencies?
How to model these phenomena?
Which are consequences if we neglect to capture
them?
[email protected]
25/02/2015
2
Dependency vs. interdependency
A
A
B
B
Dependency: is the capability of an infrastructure
to influence the state of an other infrastructure.
It is a unidirectional relationship.
Interdependency: is a bidirectional relationship
between two infrastructures through which the
state of each infrastructure is influenced or is
correlated to the state of the other.
Notice that in literature, with an abuse of notation,
the term “Interdependency” is used with a broad
meaning absorbing in part the “dependency”
meaning
25/02/2015
3
First and higher order dependency
A
B
A
B
•
• Second order dependency A -> C -> B
The concept can be easily generalized to the n-th
order dependency
C
A
B
C
First order dependency A -> B
When the sequence of influences creates a
loop, A -> C -> B -> A then ALL the involved
infrastructures are inter-dependent. Any event
is exacerbated.
In the presence of loops, there is no more a tree
structure (i.e. there is a root and the consequences go
only downstairs) but a graph structure (the
consequences have no more a preferential direction)
25/02/2015
4
Dimensions for describing infrastructure
interdependencies.
September 2011
January 2012
S. Rinaldi, J. Peerenboom, and T. Kelly, “Identifying Understanding and Analyzing Critical
Infrastructure Interdependencies,” IEEE Control System Magazine, pp. 11–25, 2001.
Dimensions for describing infrastructure interdependencies.
Physical Interd.: if the
operations of one
infrastructure depends on
the physical output(s) of
the other.
Cyber Interd.: if its state
depends on information
transmitted via cyberspace.
Geographical Interd.:
when elements are in close
spatial proximity.
Logical Interd.: any other
causes (e.g.
regulamentatory)
Sociologic Interd.: when coupling
effects are mediated by
(irrational) human behaviors
De Porcellinis, S., Setola, R., Panzieri, S., & Ulivi, G. (2008). Simulation of heterogeneous and
interdependent critical infrastructures. International Journal of Critical Infrastructures, 110-128.
Interdependency
Metrics
Complex Systems and Security Laboratory
Università Campus Bio-Medico di Roma - Via Álvaro del Portillo, 21 – 00128 Roma-Italy
www.unicampus.it – www.coseritylab.it
How to measure dependency
A cornerstone question is how to measure the degree
of (inter)dependency
existing among any two
infrastructure in order to qualify normal and
pathological situation
A general approach is those to evaluate the degree of
depency on a relative base, i.e. how much are amplified
the negative consequences
2/25/2015
8
Dependency Measurement
The dependency index is the ratio between the relative
increments of the inoperability in the depended
infrastructure with respect to those experienced in the
source Infrastructure :
Variation in the
«inoperability» of A due
the event occurred in B
Effect on B
Inter-Dependency Measurement
Complex Systems & Security Laboratory –
Interdependencie
s modelling
Complex Systems and Security Laboratory
Università Campus Bio-Medico di Roma - Via Álvaro del Portillo, 21 – 00128 Roma-Italy
www.unicampus.it – www.coseritylab.it
Modelling classification
Topological
based
approaches
Holistic
approaches
Simulation based
approaches
Implementation effort
Application Domain
High
Structural
Simulationbased
Operational
Holistic
Strategic
Functional
Low
Information elicitation
Input-output Models
Infrastructures are modeled as
black boxes
The emphasis is on interaction
(input and output )
•
Which inputs are needed ?
•
What is the effect of a lack
of resources?
Input-Output Inoperability Model
• Based on the economic equilibrium theory of
W. Leontief
• Each infrastructure has an inoperability q (% of
malfunctioning)
• The model considers constant external
perturbations and analyzes the domino effects
W. Leontief, Input-Output Economics, Oxford University Press, 1966.
Y. Haimes et al., Inoperability input-output model for interdependent infrastructure sectors
I: Theory and methodology, Journal of Infrastructure Systems, vol. 11(2), pp. 67-79, 2005.
IIM - Example
B
0,4
A
é 0 0 0.3 ù
é 0 ù
ú * ê
ú
* ê
A = ê 0.4 0 0 ú;c = ê 0 ú
ê 0.2 0.6 0 ú
ê 0.12 ú
ë
û
ë
û
0,6
0,2
0,3
Leontief coefficient
Leontief Matrix.
Coefficients are
the fraction of
transmitted
inoperability
C
0,12
Infrastructure
External perturbation
External
perturbation
q(k +1) =A q(k)+ c
*
*
IIM example (2)
Infrastructure #1 is
affected by a failure
of 12%
0.14
0.12
CI1
CI2
CI3
0.1
This induces
degradation in #2
and #3
0.08
0.06
0.04
0.02
0
0
2
4
6
8
10
12
14
16
18
20
é 0 0 0.3 ù
é 0 ù
é 0 ù
ê
ú
ê
ú
ê ú
A d = ê 0.4 0 0 ú;c d = ê 0 ú;q(0) = ê 0 ú
ê 0.2 0.6 0 ú
ê 0.12 ú
ê 0 ú
ë
û
ë
û
ë û
This exacerbates the
consequences on #
up to 14%
Impact of 10% IP
network failure
Modern Hospital
Traditional Hospital
R. Setola, “Availability of Healthcare services in a network-based
scenario”, Int. J. Networking and Virtual Organization (IJNVO) 4, n. 2, pp.
130-144, 2007.
Dependency index & Influnce gain
0

*

A
*

*
* * *

0 * *
* 0 *

* * 0
 j   aij
dependency index Is a measurement of
 i   aij
j
the robustness with
respect to the
transmitted
inoperability
Steady-state solution
i
influence gain
Is a measurement of
the influence that a
specific infrastructure
has on the global
system
If A is positive and stable, then
Overall depencey index and influence gain
Setola, R., De Porcellinis, S., & Sforna, M. (2009). Critical infrastructure dependency
assessment using the input–output inoperability model.International Journal of Critical
Infrastructure Protection, 170-178.
IIM with Technician point of view
Ask to experts the follow question
Which is the impact on your infrastructure of
the complete absence of services provided by
yyy Identify
infrastructure
for a time
of of
zzz
IIM parameters
on period
the base
operative technicians’ expertise
(operators’ perceptions)
In this way we try to acquire directly from their
expertise an estimation about the dependency
parameters to set-up a technical oriented IIM
R. Setola, S. De Porcellinis, and M. Sforna “Critical Infrastructure Dependency
Assessment Using Input-output Inoperability Model”, Int. J. Critical
Infrastructure Protection (IJCIP), pp. 170 - 178, 2009.
The scenario
In our case study we consider 11 critical sectors
Time dependencies
We asked to the expert to provide their estimation
considering an outage of
a) less than 1 h
b) from 1 to 6 h
c) from 6 to 12 h
d) from 12 to 24 h
e) from 24 to 48 h
Setola, R., Oliva, G., & Conte, F. (2012). Time-Varying Input-Output
Inoperability Model. Journal of Infrastructure Systems, 19(1), 47-57.
22
Time varying IIM
To manage the variation
of the Leontief coefficient
with the outage time, we
introduce the
«unavilibility time»
and, consequently, expand the
model
Time-outage coefficients
Coefficient behavior
Linear + Costant
The coefficient grows up to a limit
Single Knee
Initially a buffer limits the impact. After the
buffer is expired the dependency reaches its
maximum value.
Double Knee
The buffer is used in different moments for
instance some basic functions are granted (e.g.,
cooling for a nuclear power plant)
Time varying index
Normalised dependency index
Fuel &
Petroleum
0,25
0,2
Air
transportation
0,15
Naval Ports
0,1
0,05
Finance
0
<1h
1h-6h
Air Transportation
TLC Wired
Water Management
Finance
Fuel & Petroleum Grid
Satellite Communication & Navigation
6h-12h
12h-24h
24h-48h
Electricity
TLC Wireless
Rail Transportation
Naval Ports
Natural Gas
The curves cross each others, i.e. they
relevance/fragility varies with the outage time
How experts answer
The experts have to use
linguistic value extracted
from a predefined scale
They have also to express
a grade of confidence
(accuracy) about each
one of their estimation
Triangular Fuzzy Number
To manage the collected information, we adopt
Fuzzy Number using a triangular representation
Confidence Scale
Criticality Scale
Nothing
(Certain)
Circumscribed
Significant
Limited
Quite Catastrophic
(Relative Confidence) (Excellent Confidence) (Relative Confidence) (Excellent Confidence)
IIM Fuzzy System (difference inclusion system)
H is a nxn fuzzy-value matrix, i.e.
To solve, we have to translate the fuzzy-equation into a
family of discrete difference inclusions
Oliva, G., Panzieri, S., & Setola, R. (2011). Fuzzy dynamic input–
output inoperability model. International Journal of Critical
Infrastructure Protection,4(3), 165-175.
Results IIM Fuzzy
Consequences of a «severe
failure» in the electric grid
(c2=[0,5, 0,6, 0,7]) in
conjuction with a
«moderate failure» in the
wired TLC network (c3=[0,2,
0,3, 0,35])
Overall
dependency
index and
influence gain
Criticality map
To identify most critical
infrastructures (e.g. those on
which prioritarise the
resource)
dependency index
Oliva, G., Setola, R., & Barker, K. (2014). Fuzzy
Importance Measures for Ranking Key
Interdependent Sectors Under
Uncertainty. Reliability, IEEE Transactions
on, 42-57.
influence gain
Topological approaches
Coupled network
Electric grid
Rij
TLC
Coupling of heterogeneous networks
Flow model peculiar for each type of network
Electric Grid - DC Power Flow
Fkm=(θk-θm) / xkm
Pk = Σm Fkm = θk Σmxkm-1 - Σm θm / xkm
P=B θ
con Bkm = -1/xkm e Bkk=Σl 1/xkl
i Pi=0
With constraints on maxima
power flow on each link and
maxima angle shift
The network is perturbed
eliminating 1 or more links
The solution is calculating
considering also a reallocation of the load
min
TLC model
•
•
•
•
The network delivery paketes
At each time instant, each node generates a packet,
with probability λ, addressed to a random destination
node
The packet flow via adjacent nodes following static
routing table via random route
Any node can manage just a packet each time and all
the nodes have the same throughput
Complex network analysis
High-Voltage grid
GARR
Cascade effect
S. De Porcellinis, L. Issacharoff, S. Meloni, V. Rosato, R. Setola, F.Tiriticco,
“Modelling interdependent infrastructures using interacting dynamical models”,
Int. J. Critical Infrastructure (IJCI), pp. 63-79, 2008
Accoppiamento GARR-Rete elettrica
TLC
delivery
time
ξ=3
ξ=2
ξ=1
ξ=0
QoSTLC=
QoSEl.= 1-
m
M
<T>
<T0>
ΔPi
ΣPi0
Number of
faulted links
in the electric
network
Cyber-Physical Systems
Application level
Remote level
Field level
Malicious manipulations/faults may happen at all levels
Distributed detection
A single node, exploiting only local information
able to communicate only with its neighbors is able
to detect (and restore) faults in the network ?
Specifically we want to detect:
• Node(s) fault (how any all over the network)
• Link(s) fault (how many all over the network)
• Presence of cycle (and resolve them by links
swapping)
• System controllability (and restore it by link
swapping)
25 February 2015
39
Distributed detection
We develop an distributed approach where each node
performs a set of max-, min-, and average consensus to
locally calculate the information and to perform the
links’ swap needed to restore the nominal condition
The Consensus problem is to manipulate the inputs for ith
node provided only by its neighbors
In order to guarantee that ALL the noes converges to a
given function of the initial condition stored indipendently
by each single node
25 February 2015
40
Algorithm
We develop a set of
algorithm that in at
least n steps is able
to detect any faults,
detecting also the
presence of cycle
(and restoring it) so
as if the system is
controllable (and
eventually restore it)
25 February 2015
41
Case study: IEEE118 Bus Case
Faulted Network (2 generators and 7 links
faulted/swapped).
The system is no
more controllable
and there are some
cycles
G. Oliva, R. Setola, L. Glielmo and C. Hadjicostis, “Distributed Failure and Attack
Detection and Response in Cyber-Physical Systems”, Automatica, Submitted.
Distributed
detection
#2 nodes loss
#7 links loss
25 February 2015
43
Aciclycity & Controllability Restored
The swaps occur all over the network
The FACIES European Project
http://facies.dia.uniroma3.it/
With the financial support of the
“Prevention, Preparedness and
Consequence Management of
Terrorism and other Securityrelated Risks Programme”
European Commission
Directorate-General Home
Affairs
25 February 2015
3
How identify failures/attacks having a partial and limited vision of the
process in the presence of interdepenencies and taking into account
also the possible cyber-data manipulation and cyber failure?
IC #1
IC #4
IC #2
IC #3
FACIES Architecture
RISK
PREDICTOR
SWITCH
Sensors
FAULT
DETECTION
Pumps
PLC
SCADA (iFix)
HMI
IDS
EXPERT
SYSTEM
Valves
47
Physical, Cyber, Logic and Geographic dependenceis
Control
Service 2
Control
Service 1
Dam Water
Availability
SCADA
2
I.A. Water
Availability
SCADA
1
Pipe
4
Valve
2
Dam
Pump
1
Pump
2
Pipe
0
POWER
POVER
PLANT
CITY
DAM
Tank
2
NP Power
Availability
Pipe
5
PLC
1
Valve
4
Valve
1
SCADA
3
Pump
3
Pipe
4
Tank
1
Control
Service 3
Tank
3
Cooling
Towers
Valve
3
Pipe
2
Pipe
1
Pipe
3
Residential
2
Residential
1
Industrial
Plant
The FACIES Architecture
Physical
iFix
State of the System and Alarms
SCADA
CONTROL ROOM
Fault
Diagnosis
System
Possible
Faults
PLANT
IDS
Global Situation
Awareness and
Countermeasures
Diagnosed
Faults
Expert
System
Alarm Manager
Sender
Possible
Inoperabilities
Risk
Predictor
Alarm
Manager
Receiver
5 4 3 2 1
Cyber
Diagnosed
Faults
Operators
Interfaces
Countermeasures
25 February 2015
49
Critical Infrastructure Preparedness and
Resilience Research (NoE)
Network of Excellence, co-funded by FP7
Term: 1.3.2013–28.2.2017
Partners
1.Coordinator:
Fraunhofer IAIS, DE
2.ENEA, IT
3.TNO, NL
4.UIC, FR
5.CEA, FR
6.EC Joint Research Centre, EU
7. Deltares, NL
8. University of Cyprus, CY
9. University of Technology and Life
Sciences, PL
10.Università UCBM, IT
11.University of British Columbia, CA
12.ACRIS GmbH, CH
(Real-time) hazmat analysis
Direct impact analysis
First order impact analysis
CISIA (terminato)
0
200
400
600
800
1000
Residential 5 (FU)
Residential 1 (FU)
Minuto 10
Residential 4 (FU)
ctric
Residential 3 (FU)
Electricity
Ele
Electricity
Ele
ct
ric
ity
E
Electricity
Elect
ricity
ity
tio
n
icit
y
tricity
400
600
800
1000
1200
PS 2
r
Hospital 2 (FU)
Wa
te
Elec
Co
mm
un
ica
tio
n
ctr
ic
tion
nic
a
. ooo
y
Higher order impact analysis
Water Pump 2 (SAU)
Co
mm
u
200
icit
ctr
Ele
icity
Electr
Water Pump 1 (SAU)
SS8
y
Hospital 1 (FU)
Water
SS7
0
ity
r ic
ct
le
icit
Telco BTS 1 (PAU)
SS6
ctr
y
icit
ctr
Ele
SS5
Ele
Ele
Co
mm
un
ica
SS4
SS3
SS2
Ele
ctr
icit
y
SS1
Ele
ctr
PS 1
Livelli:
1200
Residential 6 (FU)
ity
Residential 2 (FU)
Telco BTS Master
(SAU)
Telco BTS 2 (PAU)
Communication
25 February 2015
51
Each geographical point is
associated with a “dynamical”
Threat Strength Matrix, containing
the predicted occurrence and the
strength expected for all the given
perturbation.
Each CI element is characterised by a
Vulnerability Matrix which indicates
the maximum perturbation strength
(originating from each considered
hazard) that it could sustain before
its physical failure.
FP7 NoE CIPRNet – GA N°312450 – Review 1
03/02/2015
52
Overlaying
the
Vulnerability and the
Threat
Strength
matrices will allow to
predict the level of
damage
that
the
predicted threat(s) will
produce on each CI
element present in the
different areas under
the DSS control.
Harm Scenario
Reported data are obtained through the collaboration with project RoMA
FP7 NoE CIPRNet – GA N°312450 – Review 1
03/02/2015
53
January 31, 2014
working
03/02/2015
In fault
54
ACEA
Rome
WP7 Questions & Answers
HT/MT/LT Control
Room
FP7 NoE CIPRNet – GA N°312450 – Review 1
03/02/2015
55
[email protected]
25/02/2015
56