Professional Documents
Culture Documents
christophe.feltus@tudor.lu
Table of contents
Introduction
ArchiMate
Policy concept and trust value
Case study presentation
Simulations
Conclusions
October 2013
Table of contents
Introduction
ArchiMate
Policy concept and trust value
Case study presentation
Simulations
Conclusions
October 2013
Introduction
-
4 statements:
- CI are monitored and secured by SCADA systems
- SCADA are deployed using agents whish are governed by
policies
- Agents behave based on their own perception of the evolving
environment and according the perceived trust
- SCADA operates at different abstraction levels of the CI
October 2013
Introduction
Additionally:
- No integrated approach for designing, managing and
monitoring SCADA systems policies
- No consideration of the trust and reputation existing amongst
the agents
Our goal:
Agents modelling framework based on ArchiMate
Integration of Trust based policy
October 2013
Table of contents
Introduction
ArchiMate
Policy concept and trust value
Case study presentation
Simulations
Conclusions
October 2013
http://pubs.opengroup.org/architecture/archimate2-doc/
October 2013
ArchiMate
metamodel
6/16/2014
Presentation Tudor
Table of contents
Introduction
ArchiMate
Policy concept and trust value
Policy definition
Conclusions
October 2013
Organizational Policy
Application Policy
October 2013
10
Organisational policy
ArchiMate
metamodel
for MAS
Application policy
Allows defining:
1. Organizational policy
2. Application policy
Policy is defined as a
behavioral rule which is
associated to a concept
from the architecture
October 2013
11
13
Table of contents
Introduction
ArchiMate
Policy concept and trust value
Case study presentation
Simulations
Conclusions
October 2013
14
The ACE Agents collects, aggregates and analyses network information and
confirms alerts are sent to the PIE
The PIE Agents receives a confirmed alert from the ACE, set the severity level
and the extent of the network response (depending on the alert layer). The high
level alert messages are transferred to the RDP.
Septembre 2013
FARES workshop
15
Example of
ArchiMate
Instanciation of the ACE agent
16
Example of
ArchiMate
Policies
17
Table of contents
Introduction
ArchiMate
Policy concept and trust value
Case study presentation
Simulations
Conclusions
October 2013
18
Simulation / Environment
We have simulated a heterogeneous network of ACE and PIE
agents running the reputation model.
The framework used for the test environment has been developed
in JAVA and simulate MAS network in a graphical environment.
Each created agent is deployed and is only connected to a central
supervisor (Composed of an Agent Manager and a Graph
Supervisor) that gives him the list of his neighbors depending
of his location on the network with a maximum edge size
between agents.
19
Simulation Protocole
The protocol used asks ACE agents to send a message containing
the collected data from the probe to the nearest PIE every five
seconds.
Test environment represents a city of 50x50km with a maximum of
5 kilometers connection distance between agents.
Simulations have been running several times during 120 seconds
with different load of malicious agents, respectively 10%, 50%
and 90%.
20
Simulation results
For each load of malicious agents in the network we have collected
the trust table of the same PIE agent, representing his perception
of his neighbors ACE
10%
ACE
A73
A71
A80
A45
A55
A56
A66
A32
A35
A0
Rep
0.8
0.86
0.69
0.72
0.91
0.93
0.82
0.8
0.84
0.73
Malicious percentage
50%
ACE
Rep
A73
0.75
A71
0.87
A80
0.55
A45
0.98
A55
0.93
A56
0.0
A66
0.85
A32
0.81
A35
0.92
A0
0.71
90%
ACE
A73
A71
A80
A45
A55
A56
A66
A32
A35
A0
Rep
0.62
0.81
0.15
0.76
0.9
0.36
0.72
0.44
0.99
0.66
21
Table of contents
Introduction
ArchiMate
Policy concept and trust value
Case study presentation
Simulations
Conclusions
October 2013
22
Conclusions
We have elaborated a specialisation of ArchiMate for MAS
purpose to enrich the agents society collaborations
An trust based policy has been introduced and described to
enhance the modelling of the agent evolution in its
environment
Finally, we have simulated a heterogeneous network of ACE and
PIE agents running the reputation model with different load of
malicious agents.
As future works, additional validations are expected in the next
months on larger scale infrastructures. In parallel, a supporting
tool is being developed.
October 2013
23
Acknowledgments
The research described in this paper is funded by the
CockpitCI research project within the 7th framework
Programme (FP7) of the European Union (EU) (topic SEC2011.2.5-1 Cyber-attacks against critical infrastructures
Capability Project).