Cyber-Physical Threat Intelligence for Critical Infrastructures Security
Total Page:16
File Type:pdf, Size:1020Kb
CYBER-PHYSICAL THREAT INTELLIGENCE FOR CRITICAL INFRASTRUCTURES SECURITY AGUIDE TO INTEGRATED CYBER-PHYSICAL PROTECTION OF MODERN CRITICAL INFRASTRUCTURES JOHN SOLDATOS,JAMES PHILPOT AND GABRIELE GIUNTA (Editors) Published, sold and distributed by: now Publishers Inc. PO Box 1024 Hanover, MA 02339 United States Tel. +1-781-985-4510 www.nowpublishers.com [email protected] Outside North America: now Publishers Inc. PO Box 179 2600 AD Delft The Netherlands Tel. +31-6-51115274 ISBN: 978-1-68083-686-8 E-ISBN: 978-1-68083-687-5 DOI: 10.1561/9781680836875 Copyright © 2020 John Soldatos, James Philpot and Gabriele Giunta Suggested citation: John Soldatos, James Philpot and Gabriele Giunta (eds.). (2020). Cyber-Physical Threat Intelligence for Critical Infrastructures Security. Boston–Delft: Now Publishers The work will be available online open access and governed by the Creative Commons “Attribution-Non Commercial” License (CC BY-NC), according to https://creativecommons.org/ licenses/by-nc/4.0/ Table of Contents Foreword xv Preface xvii Glossary xxvi Part I Securing Critical Infrastructures of the Financial Sector Chapter 1 Security Challenges for the Critical Infrastructures of the Financial Sector 2 By Ernesto Troiano, Maurizio Ferraris and John Soldatos 1.1 Introduction..............................................2 1.2 Financial Sector Security Challenges..........................4 1.2.1 Limited Integration Between Physical Security and Cybersecurity.........................................4 1.2.2 Poor Stakeholders’ Collaboration in Securing Financial Services.5 1.2.3 Compliance to Stringent Regulatory Requirements and Directives............................................5 1.2.4 The Need for Continuous Monitoring of Transaction and Limited Automation...................................6 1.2.5 Lack of Flexibility in Coping with a Proliferating and Dynamic Number of Threats...........................7 1.2.6 Digital Culture and Education..............................7 1.3 Solution Guidelines........................................8 1.3.1 Structuring and Developing Integrated Security Systems........8 1.3.2 Integrated Security Knowledge Modeling.....................9 1.3.3 Automation and Flexibility.................................9 iii iv Table of Contents 1.3.4 Information Sharing and Collaboration Across the Financial Services Supply Chain......................... 10 1.3.5 Regulatory Compliance Technologies........................ 11 1.3.6 Security-by-Design and Privacy-by-Design.................... 11 1.3.7 Security Education and Training............................ 11 1.4 Conclusions............................................... 12 Acknowledgments............................................... 12 References...................................................... 13 Chapter 2 A Reference Architecture for Securing Infrastructures in the Finance Sector 14 By Ernesto Troiano, John Soldatos, Ariana Polyviou, Alessandro Mamelli and Ilesh Dattani 2.1 Securing Finance Sector Infrastructures: The Challenges........ 15 2.2 A Reference Architecture for Securing Critical Infrastructures of the Financial Sector........................................ 16 2.2.1 FINSEC RA: Background and Rationale..................... 16 2.2.2 FINSEC RA: Accounting for ENISA’s Recommendations...... 17 2.2.3 Logical Design............................................ 18 2.2.3.1 Tiered Approach.................................. 18 2.2.3.2 The Service Tier.................................. 22 2.2.3.3 The Data Tier.................................... 22 2.2.3.4 The Service Tier.................................. 23 2.2.4 Main Services and Building Blocks of the RA................. 23 2.2.5 FINSTIX: The FINSEC Reference Data Model............... 26 2.3 Security Use Cases for Financial Institutions................... 28 2.3.1 SWIFT Network Attacks................................... 28 2.3.2 ATM Network Protection.................................. 29 2.3.3 Regulatory Compliance.................................... 29 2.3.4 Insider Threats............................................ 30 2.3.5 IoT Devices Security....................................... 31 2.3.6 Managed Security......................................... 31 2.4 Conclusions............................................... 32 References...................................................... 33 Chapter 3 FINSTIX: A Security Data Model for the Financial Sector 34 By Giorgia Gazzarata, Ernesto Troiano, Enrico Cambiaso, Ivan Vaccari, Ariana Polyviou, Alessio Merlo and Luca Verderame 3.1 Introduction.............................................. 34 3.2 Background............................................... 36 Table of Contents v 3.2.1 Cyber Threat Intelligence.................................. 36 3.2.2 Structured Threat Information eXpression (STIX)............. 37 3.2.3 Knowledge Base Technology................................ 39 3.3 The FINSEC Security Knowledge Base....................... 39 3.3.1 The Security Knowledge Base Data Model.................... 40 3.3.1.1 From STIX to FINSTIX........................... 41 3.3.2 The Security Knowledge Base Architecture................... 44 3.3.3 The Security Knowledge Base Visual Interface................ 46 3.4 Interaction with the Dashboard and the Collaborative Risk Management Module...................................... 46 3.5 Conclusion............................................... 49 References...................................................... 49 Chapter 4 Artificial Intelligence Gateway for Cyber-physical Security in Critical Infrastructure and Finance 53 By Marian Ghenescu, Serban Carata, Roxana Mihaescu and Sabin Floares 4.1 Overview................................................. 54 4.2 Classical vs Smart Security Controllers........................ 54 4.2.1 Classical Cyber-physical Systems............................ 55 4.2.2 Need of Improvement..................................... 58 4.2.3 SMART Cyber-physical Systems............................ 59 4.2.4 Applications of Cyber-physical Systems...................... 61 4.3 Data Fusion (Physical and Cyber Events)...................... 63 4.3.1 Theoretical Aspects........................................ 63 4.3.2 Necessity of Data Fusion for Cyber-physical Security........... 65 4.3.3 Implementation........................................... 66 4.4 Integration Layer FINSTIX Data Model Implementation....... 67 4.5 Conclusion............................................... 73 Acknowledgments............................................... 74 References...................................................... 74 Chapter 5 Information Sharing and Stakeholders’ Collaboration for Stronger Security in Financial Sector Supply Chains: A Blockchain Approach 76 By Ioannis Karagiannis, Konstantinos Mavrogiannis, John Soldatos, Dimitris Drakoulis, Ernesto Troiano and Ariana Polyviou 5.1 Introduction.............................................. 77 5.2 Related Work.............................................. 77 5.3 Collaborative Risk Assessment............................... 78 5.3.1 Services.................................................. 79 5.3.2 Threats.................................................. 79 5.3.3 Events................................................... 80 vi Table of Contents 5.3.4 Triggers.................................................. 80 5.3.5 Risk Calculations......................................... 81 5.4 Information Sharing Architecture............................ 82 5.4.1 FINSEC Platform Overview................................ 82 5.5 Implementation........................................... 85 5.5.1 CRUD Operations—User Interface......................... 85 5.6 Demonstrator............................................. 86 5.6.1 Initialization.............................................. 86 5.7 Conclusions............................................... 92 Acknowledgments............................................... 92 References...................................................... 92 Chapter 6 Automated Assistance to the Security Assessment of API for Financial Services 94 By Andrea Bisegna, Roberto Carbone, Mariano Ceccato, Salvatore Manfredi, Silvio Ranise, Giada Sciarretta, Alessandro Tomasi and Emanuele Viglianisi The Regulatory Landscape........................................ 95 Open Banking API Security Recommendations...................... 95 Automated Analysis of TLS....................................... 97 RESTful API Security Testing..................................... 98 Summary....................................................... 100 Acknowledgments............................................... 101 References...................................................... 101 Chapter 7 Adaptive and Intelligent Data Collection and Analytics for Securing Critical Financial Infrastructure 104 By Habtamu Abie, Svetlana Boudko, Omri Soceanu, Lev Greenberg, Aidan Shribman, Beatriz Gallego-Nicasio, Enrico Cambiaso, Ivan Vaccari and Maurizio Aiello 7.1 Introduction.............................................. 105 7.2 Related Work.............................................. 106 7.3 Data Collection and Analytics............................... 108 7.3.1 Requirements............................................. 108 7.3.1.1 Data collection requirements....................... 108 7.3.1.2 Quality attributes for data analytics.................. 109 7.3.2 Data Sources............................................. 110 7.3.3 Data Collection Categories................................. 110