presentation of project proposals and feedback from customers

32
Presentation of project proposals and feedback from customers Welcome to session III

Upload: others

Post on 11-Feb-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Presentation of project proposals and feedback from customers

Presentation of project proposals and

feedback from customers

Welcome to session III

Page 2: Presentation of project proposals and feedback from customers

DTIDSDigital Twin-based Intrusion Detection Systems

ITEA Cyber Security Day 2021

Emre Ege Smekal

Page 3: Presentation of project proposals and feedback from customers

3

PROJECT PROPOSAL:

DTIDSProblem Statement

▪ Eliminating all security vulnerabilities at the design time is infeasible

given the complexity of IoT systems

▪ Real-world IoT systems are heterogeneous, composed of devices

from different vendors

▪ Small-scale IoT devices have low security budget

▪ Specialized countermeasures usually protect against a particular type

of attacks only

Intrusion detection can be performed by an edge-like device, either at host or at the network level. As any reasonable attack will cause an anomalous behavior, the security breach will be

detected regardless of what specific vulnerability was exploited.

Page 4: Presentation of project proposals and feedback from customers

4

PROJECT PROPOSAL:

DTIDSChallenges for Intrusion Detection

Ever-increasing system complexity

Heterogeneous, multi-vendor components

System evolution, e.g., due to software updates

Distributed and decentralized architectures

In future systems, rule-based IDS solutions will struggle with high complexity, low transparency and evolutionary nature of software-driven, heterogeneous IoT products

Page 5: Presentation of project proposals and feedback from customers

5

PROJECT PROPOSAL:

DTIDSProject proposal description

Actual System Digital Twin

Data

𝐵′ == 𝐵?

Behavior 𝐵′ Behavior 𝐵

High precision & scalability

Low maintenance

Seamless integration

Continuous operation

Digital Twin – a virtual representation of the actual system throughout the entire system’s life cycle – enables a precise, low-maintenance, scalable intrusion detection for seamless &

continuous resilience

Page 6: Presentation of project proposals and feedback from customers

6

PROJECT PROPOSAL:

DTIDSKey selling pointsIn

novatio

n

Busi

ness

Impact•Digital Twin-based IDS

•High-precision intrusion

detection

•Low false positives rate

•Ease of maintenance

•Low maintenance cost &

ease of update

scalability

•Seamless integration into

existing monitoring systems

Page 7: Presentation of project proposals and feedback from customers

7

PROJECT PROPOSAL:

DTIDSPartners & expertise

▪ Partners involved

▪ Canada: iSecurity*, StreamWorx.AI Inc.

▪ Germany: Eclipse Foundation Europe GmbH, isb innovative software

businesses GmbH, NXP Semiconductors Germany GmbH, Robert

Bosch GmbH*, TWT GmbH Science & Innovation, University of Lubeck

▪ Portugal: Instituto Superior de Engenharia do Porto (ISEP)*,

SISTRADE Software Consulting, S.A., VIZELPAS - COMERCIO DE

ARTIGOS PLASTICOS LDA

▪ Turkey: Arcelik, ARD GROUP*, Bewell Technology San.Tic.A.S.,

ERARGE, Panasonic Life Solutions Elektrik San. ve Tic. A.S.

Page 8: Presentation of project proposals and feedback from customers

8

PROJECT PROPOSAL:

DTIDSContact details

▪ Yusuf Kursat TUNCEL

ARD Group

[email protected]

+90 (533) 964 81 44

▪ Ilay KURT

ARD Group

[email protected]

+90 (532) 280 50 76

Page 9: Presentation of project proposals and feedback from customers

ENTAEncrypted Network Analysis for Cyber Security

ITEA Cyber Security Day 2021

Dr. Biswajit Nandy

CTO, Solana Networks

Page 10: Presentation of project proposals and feedback from customers

10

PROJECT PROPOSAL:

ENTAMotivation

ENTA project explores solution based on encrypted network traffic characteristics analysis

▪ Key techniques will be based on AI

▪ Preserve end user privacy by avoiding payload data examination

▪ Solution will be scalable and in near real-time

HTTPS encryption on the web (Source: Google Transparency Report)

Nearly 90% of Internet traffic is encrypted

➢ Deep Packet Inspection is failing (TLS 1.3 has made it more difficult)

➢ Harder to distinguish between legitimate and illegitimate traffic

➢ Operators are unable

• to block illegal traffic

• to detect encrypted data exfiltration

• to detect rogue IoT devices with encrypted communication

Page 11: Presentation of project proposals and feedback from customers

11

PROJECT PROPOSAL:

ENTAState of the Art

Encrypted Application Visibility

▪ Academic research on ML based encrypted traffic classification exists since 2007

- It has not reached sufficient maturity to bridge into industrial solutions -- some major challenges exist

▪ More recently researchers are addressing some of these problems (DL, real-time etc.)

▪ Industry: Some DPI vendors got statistical analysis based detection

Rogue IoT device detection

▪ Academic research is underway since 2015 for IoT device discovery and rogue IoT detection

▪ IoT device discovery and tracking using ML is also proposed in 2018

▪ Industry: Very few vendors: Zvelo and Armis

Encrypted data exfiltration

▪ Encrypted threat detection – active academic research area

▪ Very recently researchers are focusing to address this problem DNS side channels – data exfiltration

▪ Industry: Malware detection or other threat detection – Cisco Stealthwatch, Gigamon ThreatINSIGHT, IronNet,

Darktrace etc.

Page 12: Presentation of project proposals and feedback from customers

12

PROJECT PROPOSAL:

ENTAENTA: Use Cases

➢ Encrypted application visibility

➢ Rogue IoT device detection

➢ Cyber threat detection (data exfiltration on encrypted side channels)

Encrypted Network Traffic Analytics

Privacy Protection

Data Science

Machine Learning

Deep LearningTLS

Fingerprinting

Rouge IoTDevice

Detection

Encrypted Application

Visibility

CyberThreat

Detection

Encrypted Network Traffic

Page 13: Presentation of project proposals and feedback from customers

13

PROJECT PROPOSAL:

ENTAProposed Solution

Page 14: Presentation of project proposals and feedback from customers

14

PROJECT PROPOSAL:

ENTAExpected Project Outcome

➢ The ENTA project will deliver an encrypted traffic analysis service platform for cyber

security. The platform will support a number of basic building blocks necessary for any

ML/DL based traffic analysis.

➢ Three use cases that are highlighted for the ENTA project will be demonstrated with

near product quality prototypes with following attributes:

▪ Highly scalability

▪ Near real-time performance

▪ Support traffic rate higher than 10Gbps

➢ Any of these use case can be brought to market as a standalone solution or tool:

1. Encrypted traffic classification

2. Rogue IoT device detection and tracking

3. Detection of data exfiltration on encrypted side channels

Page 15: Presentation of project proposals and feedback from customers

15

PROJECT PROPOSAL:

ENTAPartners

Company Country

Metodos y Technologia Spain

IDavinci Spain

APARA Creadores de Mercapus S.L Spain

KKB Kredi Kayit Burosu A.S. Turkey

Migros T.A.S. Turkey

Labris Networks Turkey

Ruag MRO Switzerland

IGS Hawkesbury Inc. Canada

Dalhousie University Canada

Solana Networks Canada

Page 16: Presentation of project proposals and feedback from customers

16

PROJECT PROPOSAL:

ENTAContact details

Dr. Biswajit Nandy

Solana Networks

[email protected]

Thank You!

Page 17: Presentation of project proposals and feedback from customers

CONTRASTCONtinuous engineering and TRustworthy operation

of Ai-enabled SysTems

ITEA Cyber Security Day 2021

Marc Zeller, Siemens AG

Page 18: Presentation of project proposals and feedback from customers

18

PROJECT PROPOSAL:

CONTRAST

Motivation

Engineering of systems incorporating AI

▪ Economic Drivers for using AI in Cyber-Physical Systems (CPS)

- Enabling new applications and services

- Reducing cost of doing business

- Increase speed of innovation

- Enabling continuous availability of products by reducing system downtimes

- Providing costumer trust in automated, AI-enabled systems

▪ Challenge: Engineering of systems incorporating AI and ensuring the

appropriate trust in operation for such systems poses new challenges

Page 19: Presentation of project proposals and feedback from customers

19

PROJECT PROPOSAL:

CONTRASTTrustworthiness *

*) VDE application rule VDE-AR-E 2842-61 “Development and Trustworthiness of autonomous/cognitive Systems”

Page 20: Presentation of project proposals and feedback from customers

20

PROJECT PROPOSAL:

CONTRASTSolution Concept

Engineering of AI-based CPS / systems-of-systems and guarantee trustworthy operation

▪ Specification and verification of system capabilities and trustworthiness properties

▪ Monitoring and analysis of capabilities and trustworthiness during operation

▪ Dynamic assessment of risks due to changing Operational Design Domain (ODD)

▪ Feedback loop based on filed observation to enable continuous improvement

Application to use cases in the transportation, industrial automation, and healthcare domain

Page 21: Presentation of project proposals and feedback from customers

21

PROJECT PROPOSAL:

CONTRASTAI-based CPS = new Security Challenges

▪ AI/ML is target to new kinds of attack- Data poising, model poising, Ml models with backdoors, etc.

- Exploitation of the physical environment

▪ Security threats are hazardous events- Safety concepts must take security issues into account

▪ AI/ML-based systems are developed iteratively and need to deal with uncertainty- Frequent updates require automated security and safety assessment

▪ AI/ML-based systems are developed by different vendors/suppliers and need to be integrated- Often AI/ML components are back-boxes supplied by different companies

- Security assurance cases can capture the security-related information and enable a (semi-)automated integration

▪ Cyber-physical Systems (-of-Systems) are heterogeneous and permanently connected to the Inter (IIoT)- Integration of newly deployed systems/components and legacy devices in manufacturing cindering security aspect

- Efficient key exchange/distribution mechanism in intelligent transportation

- End-to-end security design required

https://portswigger.net/daily-swig/trojannet-a-simple-yet-effective-attack-on-machine-learning-models

Page 22: Presentation of project proposals and feedback from customers

22

PROJECT PROPOSAL:

CONTRASTKey selling points

▪ Innovation- A well-defined semantic foundation for capability specifications as well as

specification models for engineers

- Generation of trustworthiness monitors from capabilities

- Reference architectures that support the envisioned runtime monitoring and adaption in various application domains

- Integration of the CONTRAST methods and tools into coherent engineering frameworks and development platforms that cover the whole engineering life-cycle

▪ Business Impact- Competitive products on the world stage

▪ USP for European products: quality made in Europe (Trustworthy AI)

- Having the right product at the right time and the right place▪ Being flexible, adaptable and configurable

- Reducing risk of rollout of systems (especially with embedded AI-elements)

- Convince certification/homologation authorities of autonomous, AI-based systems

Page 23: Presentation of project proposals and feedback from customers

23

PROJECT PROPOSAL:

CONTRASTPartners & expertise

▪ Partners involved

- Austria: Road Venture Innovation, TU Graz, University Graz

- Belgium: Siemens Industry Software

- Germany: Siemens, Fraunhofer, Bosch, SICK, DFKI, OFFIS, TU Ilmenau,

Arrival, Modelwise, AI4UandI

- Ireland: LERO/DKIT, Malone Group, iQuTech

- Netherlands: TNO-ESI, CANON, Philips, Thunderbyte.AI, Ratio Computer

Aided Systems Engineering

- Sweden: KTH, Scania, Zenseact, Syntell, Veoneer, Safety Integrity

- Turkey: AVL Turkey, Enforma, Bigtri, İSBAK

Page 24: Presentation of project proposals and feedback from customers

24

PROJECT PROPOSAL:

CONTRASTContact details

▪ Marc Zeller

Siemens AG

[email protected]

+49 (172) 103 60 65

Page 25: Presentation of project proposals and feedback from customers

NGASTNext Generation Automated Security Testing

ITEA Cyber Security Day 2021

Yusuf Kurşat Tuncel

Page 26: Presentation of project proposals and feedback from customers

26

PROJECT PROPOSAL:

NGASTProblem Statement

▪ Continuously increasing complexity combined with connectivity

results in a massive increase of IoT devices' attack surface

▪ But: resources for protecting IoT devices and IT systems don’t grow

at the same pace for economic reasons

▪ IoT device manufacturers and operators face the challenge of

defending a vastly larger attack surface with essentially the same

resources

To close this gap, methods and tools for automated security testing are needed to eliminate security weaknesses in software or APIs early in the development process.

Page 27: Presentation of project proposals and feedback from customers

27

PROJECT PROPOSAL:

NGASTChallenges for Automated Security Testing

Traditionally, manually operated tools

Large & fast changing software

Binary software components from 3rd parties

Distributed systems that rely on APIs

Comprehensive, IoT-scale automated security testing is difficult to implement using existing tools and methods.

Page 28: Presentation of project proposals and feedback from customers

28

PROJECT PROPOSAL:

NGASTProject proposal description

High degree of automation (CI/CD-ready)

Covers source code, binaries & APIs

Few to none false positives

Developer-friendly

Next generation CI/CD-capable automated security testing solution for source code, binaries, and distributed systems in the Internet of Things (IoT)

Page 29: Presentation of project proposals and feedback from customers

29

PROJECT PROPOSAL:

NGASTKey selling pointsIn

novatio

n

Business

Impact

▪ A u t o m a t e d s e c u r i t y t e s t i n g

▪ C o v e r s s o u r c e c o d e , b i n a r i e s a n d A P I s

▪ F e w t o n o n e f a l s e p o s i t i v e s

▪ E a s e o f u s e

▪ R e d u c t i o n o f v u l n e r a b i l i t y

d e t e c t i o n c o s t t h r o u g h

a u t o m a t i o n

▪ C o s t s a v i n g s t h r o u g h

e a r l y v u l n e r a b i l i t y

i d e n t i f i c a t i o n

▪ S e a m l e s s i n t e g r a t i o n i n t o

e x i s t i n g C I / C D p i p e l i n e s

Page 30: Presentation of project proposals and feedback from customers

30

PROJECT PROPOSAL:

NGASTPartners & expertise

▪ Partners involved

- Germany: AKKA DSO GmbH, Expleo Germany GmbH, Fraunhofer, Institut

für Automation und Kommunikation (IFAK), itemis AG, let's dev GmbH &

Co. KG, NXP Semiconductors Germany GmbH, Robert Bosch GmbH*,

Ruhr- Universität Bochum, TWT GmbH Science & Innovation, University of

Paderborn

- Sweden: Ericsson, Mälardalen University*

- Turkey: ARD GROUP*, Ericsson, SoftTech, Turkcell Teknoloji, UNIT

Information Technologies R&D Ltd.

Page 31: Presentation of project proposals and feedback from customers

31

PROJECT PROPOSAL:

NGASTContact details

▪ Yusuf Kursat TUNCEL

ARD Group

[email protected]

+90 (533) 964 81 44

▪ Ilay KURT

ARD Group

[email protected]

+90 (532) 280 50 76

Page 32: Presentation of project proposals and feedback from customers

Thank you for your attention