Observation-enhanced verification of operational processes

Operational processes are at the core of many organisations. The failure and misuse of these processes can cause significant economic losses to businesses or, in the worst cases, endanger human life. As a result, there has been significant research effort focused on the development of techniques and tools for the model-based analysis and verification of reliability, performance and quality-of-service properties of processes. Constructing models which accurately represent the behaviour of real-world systems is very challenging. The complexity and stochastic nature of real-world phenomena requires the use of modelling assumptions which introduce errors that can significantly impact the results of model-based analysis. Where inaccurate analyses are used as the basis of engineering or business decisions, the consequences can be catastrophic. Many operational processes are now routinely instrumented and capture information about component interactions and the behaviour of human operators. This thesis introduces a set of tool-supported techniques which exploit these logs in conjunction with tried and tested probabilistic model checking. This produces Markov models and formal analysis techniques which more accurately capture process behaviours and improve the quality of model-based analysis for operational processes. We show how observation data can be used to improve the modelling and analysis of continuous time systems by refining continuous-time Markov models (CTMCs) to more accurately reflect real-world behaviours. We apply the tools and techniques developed to real-world processes and demonstrate how we may avoid the invalid decisions which arise from traditional CTMC modelling and analysis techniques. We also show how observation-enhanced discrete time Markov models may be used to characterise the behaviour of users within an operational process. The self-adaptive role based access control approach we develop uses a formal definition of adaptation policies to identify potential threats in a real-world IT support system and mitigates risks to the system.

[1]  Radu Calinescu,et al.  Self-Adaptive Role-Based Access Control for Business Processes , 2017, 2017 IEEE/ACM 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).

[2]  Carsten Sinz,et al.  Probabilistic Model Checking of Constraints in a Supply Chain Business Process , 2011, BIS.

[3]  Radu Calinescu,et al.  Compositional Reverification of Probabilistic Safety Properties for Large-Scale Complex IT Systems , 2012, Monterey Workshop.

[4]  Philipp Reinecke,et al.  HyperStar: Phase-Type Fitting Made Easy , 2012, 2012 Ninth International Conference on Quantitative Evaluation of Systems.

[5]  N. Schenker,et al.  On Judging the Significance of Differences by Examining the Overlap Between Confidence Intervals , 2001 .

[6]  Lijun Zhang,et al.  Probabilistic reachability for parametric Markov models , 2010, International Journal on Software Tools for Technology Transfer.

[7]  Steffen Becker,et al.  Performance Prediction of Component-Based Systems - A Survey from an Engineering Perspective , 2004, Architecting Systems with Trustworthy Components.

[8]  Carlo Ghezzi,et al.  Mining behavior models from user-intensive web applications , 2014, ICSE.

[9]  Kirill Kireyev Applications of Topics Models to Analysis of Disaster-Related Twitter Data , 2009 .

[10]  David Garlan,et al.  Rainbow: architecture-based self-adaptation with reusable infrastructure , 2004 .

[11]  Damjan Skulj,et al.  Discrete time Markov chains with interval probabilities , 2009, Int. J. Approx. Reason..

[12]  Joseph Glaz,et al.  Simultaneous Confidence Intervals and Sample Size Determination for Multinomial Proportions , 1995 .

[13]  Dang Van Hung,et al.  Verification of an Air-Traffic Control System with Probabilistic Real-time Model-checking , 2007 .

[14]  Andrew P. Moore,et al.  Common Sense Guide to Mitigating Insider Threats 4th Edition , 2012 .

[15]  Amir Pnueli,et al.  In Transition From Global to Modular Temporal Reasoning about Programs , 1989, Logics and Models of Concurrent Systems.

[16]  Aldo Cumani,et al.  ML estimation of the parameters of a PH distribution in triangular canonical form , 2014 .

[17]  Joost-Pieter Katoen,et al.  The Ins and Outs of the Probabilistic Model Checker MRMC , 2009, 2009 Sixth International Conference on the Quantitative Evaluation of Systems.

[18]  David Barnes Understanding business : processes , 2001 .

[19]  Gethin Norman,et al.  Quantitative Verification: Formal Guarantees for Timeliness, Reliability and Performance , 2014 .

[20]  Claudia Keser,et al.  Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[21]  Robert Power,et al.  An Evidence Based Earthquake Detector using Twitter , 2013, LPCI@IJCNLP.

[22]  Orna Grumberg,et al.  Model checking and modular verification , 1994, TOPL.

[23]  Carlo Ghezzi,et al.  Engineering topology aware adaptive security: Preventing requirements violations at runtime , 2014, 2014 IEEE 22nd International Requirements Engineering Conference (RE).

[24]  Carlo Ghezzi,et al.  Formal Verification With Confidence Intervals to Establish Quality of Service Properties of Software Systems , 2016, IEEE Transactions on Reliability.

[25]  S. Creese,et al.  Caught in the act of an insider attack: detection and assessment of insider threat , 2015, 2015 IEEE International Symposium on Technologies for Homeland Security (HST).

[26]  Kamel Adi,et al.  Dynamic risk-based decision methods for access control systems , 2012, Comput. Secur..

[27]  Kishor S. Trivedi,et al.  Stochastic Modeling of Composite Web Services for Closed-Form Analysis of Their Performance and Reliability Bottlenecks , 2007, ICSOC.

[28]  Sadie Creese,et al.  Identifying attack patterns for insider threat detection , 2015 .

[29]  Miklós Telek,et al.  Matching More Than Three Moments with Acyclic Phase Type Distributions , 2007 .

[30]  William J. Stewart,et al.  Probability, Markov Chains, Queues, and Simulation: The Mathematical Basis of Performance Modeling , 2009 .

[31]  Souheib Baarir,et al.  The GreatSPN tool: recent enhancements , 2009, PERV.

[32]  Nathanael Chambers,et al.  Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security , 2018, NAACL.

[33]  David W. Chadwick,et al.  PERMIS: a modular authorization infrastructure , 2008 .

[34]  Edmund M. Clarke,et al.  Design and Synthesis of Synchronization Skeletons Using Branching-Time Temporal Logic , 1981, Logic of Programs.

[35]  Ravi S. Sandhu,et al.  A framework for risk-aware role based access control , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[36]  Jin Liu,et al.  Segment-based adaptive hyper-Erlang model for long-tailed network traffic approximation , 2008, The Journal of Supercomputing.

[37]  J. Neyman Outline of a Theory of Statistical Estimation Based on the Classical Theory of Probability , 1937 .

[38]  Sebastian Junges,et al.  A Storm is Coming: A Modern Probabilistic Model Checker , 2017, CAV.

[39]  Ward Whitt,et al.  CONTINUOUS-TIME MARKOV CHAINS , 2006 .

[40]  Lijun Zhang,et al.  Probabilistic CEGAR , 2008, CAV.

[41]  Chris Chatfield,et al.  Statistical Inference Regarding Markov Chain Models , 1973 .

[42]  Radu Calinescu,et al.  Implementation of a Generic Autonomic Framework , 2008, Fourth International Conference on Autonomic and Autonomous Systems (ICAS'08).

[43]  Heiko Koziolek,et al.  Performance evaluation of component-based software systems: A survey , 2010, Perform. Evaluation.

[44]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[45]  Sherif Abdelwahed,et al.  A Probabilistic Approach to Autonomic Security Management , 2016, 2016 IEEE International Conference on Autonomic Computing (ICAC).

[46]  Joost-Pieter Katoen,et al.  Simulation-Based CTMC Model Checking: An Empirical Evaluation , 2009, 2009 Sixth International Conference on the Quantitative Evaluation of Systems.

[47]  Thomas H. Davenport,et al.  Process Innovation: Reengineering Work Through Information Technology , 1992 .

[48]  Nils Jansen,et al.  Accelerating Parametric Probabilistic Verification , 2014, QEST.

[49]  Steffen Becker,et al.  The Palladio component model for model-driven performance prediction , 2009, J. Syst. Softw..

[50]  Christel Baier,et al.  Principles of model checking , 2008 .

[51]  Yuguang Fang,et al.  Teletraffic analysis and mobility modeling of PCS networks , 1999, IEEE Trans. Commun..

[52]  Christel Baier,et al.  Model-Checking Algorithms for Continuous-Time Markov Chains , 2002, IEEE Trans. Software Eng..

[53]  Lars Grunske,et al.  Software Architecture Optimization Methods: A Systematic Literature Review , 2013, IEEE Transactions on Software Engineering.

[54]  K. Kwong,et al.  On singular multivariate normal distribution and its applications , 1996 .

[55]  Adele H. Marshall,et al.  Simulating Coxian phase-type distributions for patient survival , 2009, Int. Trans. Oper. Res..

[56]  Radu Calinescu,et al.  Self-adaptive Software with Decentralised Control Loops , 2015, FASE.

[57]  Lijun Zhang,et al.  PARAM: A Model Checker for Parametric Markov Models , 2010, CAV.

[58]  Amir Pnueli,et al.  A compositional approach to CTL* verification , 2005, Theor. Comput. Sci..

[59]  Muffy Calder,et al.  Probabilistic Model Checking of DTMC Models of User Activity Patterns , 2014, QEST.

[60]  Sebastian Junges,et al.  PROPhESY: A PRObabilistic ParamEter SYnthesis Tool , 2015, CAV.

[61]  Murali Sitaraman,et al.  Foundations of component-based systems , 2000 .

[62]  Lev V. Utkin,et al.  Interval-Valued Finite Markov Chains , 2002, Reliab. Comput..

[63]  Edmund M. Clarke,et al.  Using Branching Time Temporal Logic to Synthesize Synchronization Skeletons , 1982, Sci. Comput. Program..

[64]  Peter Buchholz,et al.  A Novel Approach for Phase-Type Fitting with the EM Algorithm , 2006, IEEE Transactions on Dependable and Secure Computing.

[65]  Edmund M. Clarke,et al.  Counterexample-guided abstraction refinement , 2003, 10th International Symposium on Temporal Representation and Reasoning, 2003 and Fourth International Conference on Temporal Logic. Proceedings..

[66]  Gabriel Ciobanu,et al.  PHASE: A Stochastic Formalism for Phase-Type Distributions , 2014, ICFEM.

[67]  Axel Legay,et al.  Statistical Model Checking: An Overview , 2010, RV.

[68]  David W. Chadwick,et al.  Self-adaptive federated authorization infrastructures , 2014, J. Comput. Syst. Sci..

[69]  Philipp Reinecke,et al.  Phase-Type Fitting Using HyperStar , 2013, EPEW.

[70]  A. Horváth,et al.  Approximating heavy tailed behaviour with Phase type distributions , 2000 .

[71]  L. A. Goodman On Simultaneous Confidence Intervals for Multinomial Proportions , 1965 .

[72]  Robert K. Brayton,et al.  Verifying Continuous Time Markov Chains , 1996, CAV.

[73]  Kim G. Larsen,et al.  Testing Real-Time Systems Using UPPAAL , 2008, Formal Methods and Testing.

[74]  Malek Ben Salem,et al.  A Survey of Insider Attack Detection Research , 2008, Insider Attack and Cyber Security.

[75]  Carlo Ghezzi,et al.  Run-time efficient probabilistic model checking , 2011, 2011 33rd International Conference on Software Engineering (ICSE).

[76]  Holger Hermanns,et al.  Continuous-Time Markov Decisions based on Partial Exploration , 2018, ATVA.

[77]  Alberto L. Sangiovanni-Vincentelli,et al.  Polynomial-Time Verification of PCTL Properties of MDPs with Convex Uncertainties , 2013, CAV.

[78]  Carlo Ghezzi,et al.  Ariadne: Topology Aware Adaptive Security for Cyber-Physical Systems , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.

[79]  Wil M. P. van der Aalst,et al.  Process Flexibility: A Survey of Contemporary Approaches , 2008, CIAO! / EOMAS.

[80]  G. Cumming,et al.  The New Statistics , 2014, Psychological science.

[81]  Jeff Magee,et al.  Self-Managed Systems: an Architectural Challenge , 2007, Future of Software Engineering (FOSE '07).

[82]  K. Gopinath,et al.  Are Markov Models Effective for Storage Reliability Modelling? , 2015, ArXiv.

[83]  Raffaela Mirandola,et al.  QoS and energy management with Petri nets: A self-adaptive framework , 2012, J. Syst. Softw..

[84]  Dawn M. Cappelli,et al.  The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .

[85]  Helmut Veith,et al.  Progress on the State Explosion Problem in Model Checking , 2001, Informatics.

[86]  Edmund M. Clarke,et al.  Compositional model checking , 1989, [1989] Proceedings. Fourth Annual Symposium on Logic in Computer Science.

[87]  Song Zhi-gang Role Based Access Control in MIS , 2002 .

[88]  Radu Calinescu,et al.  Using observation ageing to improve markovian model learning in QoS engineering , 2011, ICPE '11.

[89]  Carlo Ghezzi,et al.  Change-point detection for black-box services , 2010, FSE '10.

[90]  Gul A. Agha,et al.  A Survey of Statistical Model Checking , 2018, ACM Trans. Model. Comput. Simul..

[91]  A. David,et al.  The least variable phase type distribution is Erlang , 1987 .

[92]  David S. Rosenblum,et al.  Asymptotic Bounds for Quantitative Verification of Perturbed Probabilistic Systems , 2013, ICFEM.

[93]  Yuguang Fang,et al.  Hyper-Erlang Distribution Model and its Application in Wireless Mobile Networks , 2001, Wirel. Networks.

[94]  Carlo Ghezzi,et al.  Topology aware adaptive security , 2014, SEAMS 2014.

[95]  Tadashi Dohi,et al.  Communications in Statistics-Simulation and Computation , 2014 .

[96]  Moshe Shaked,et al.  Phase Type Distributions , 2004 .

[97]  C. O'Cinneide Phase-type distributions: open problems and a few properties , 1999 .

[98]  Juan A. Carrasco Computationally Efficient and Numerically Stable Reliability Bounds for Repairable Fault-Tolerant Systems , 2002, IEEE Trans. Computers.

[99]  Raffaela Mirandola,et al.  Hybrid multi-attribute QoS optimization in component based software systems , 2013, J. Syst. Softw..

[100]  Carlo Ghezzi,et al.  Model evolution by run-time parameter adaptation , 2009, 2009 IEEE 31st International Conference on Software Engineering.

[101]  D. C. Hurst,et al.  Large Sample Simultaneous Confidence Intervals for Multinomial Proportions , 1964 .

[102]  Christel Baier,et al.  Approximate Symbolic Model Checking of Continuous-Time Markov Chains , 1999, CONCUR.

[103]  Håkan L. S. Younes Ymer: A Statistical Model Checker , 2005, CAV.

[104]  A. Prasad Sistla,et al.  Automatic verification of finite state concurrent system using temporal logic specifications: a practical approach , 1983, POPL '83.

[105]  Carlo Ghezzi,et al.  A formal approach to adaptive software: continuous assurance of non-functional requirements , 2011, Formal Aspects of Computing.

[106]  Ravi S. Sandhu,et al.  An Attribute Based Framework for Risk-Adaptive Access Control Models , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[107]  Radu Calinescu,et al.  Developing self-verifying service-based systems , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[108]  Gerard J. Holzmann,et al.  The Model Checker SPIN , 1997, IEEE Trans. Software Eng..

[109]  Marta Kwiatkowska,et al.  Advances and challenges of probabilistic model checking , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[110]  Joseph Sifakis,et al.  Specification and verification of concurrent systems in CESAR , 1982, Symposium on Programming.

[111]  Philipp Reinecke,et al.  Cluster-based fitting of phase-type distributions to empirical data , 2012, Comput. Math. Appl..

[112]  Muhammad Kumail Haider,et al.  Markovian Models for Electrical Load Prediction in Smart Buildings , 2012, ICONIP.

[113]  Tadashi Dohi,et al.  A Variational Bayesian Approach for Estimating Parameters of a Mixture of Erlang Distribution , 2010 .

[114]  Kathleen V. Diegert,et al.  Error and uncertainty in modeling and simulation , 2002, Reliab. Eng. Syst. Saf..

[115]  Bengt Jonsson,et al.  A logic for reasoning about time and reliability , 1990, Formal Aspects of Computing.

[116]  Radu Calinescu,et al.  Observation-Enhanced QoS Analysis of Component-Based Systems , 2018, IEEE Transactions on Software Engineering.

[117]  Ren Asmussen,et al.  Fitting Phase-type Distributions via the EM Algorithm , 1996 .

[118]  Conrado Daws Symbolic and Parametric Model Checking of Discrete-Time Markov Chains , 2004, ICTAC.

[119]  Hiroyuki Okamura,et al.  Fitting Phase-Type Distributions and Markovian Arrival Processes: Algorithms and Tools , 2016 .

[120]  Wang Yi,et al.  UPPAAL 4.0 , 2006, Third International Conference on the Quantitative Evaluation of Systems - (QEST'06).

[121]  Taolue Chen,et al.  On the complexity of model checking interval-valued discrete time Markov chains , 2013, Inf. Process. Lett..

[122]  Ramesh Bharadwaj,et al.  Applying the SCR Requirements Specification Method to Practical Systems: A Case Study , 1996 .

[123]  A. Horváth,et al.  Matching Three Moments with Minimal Acyclic Phase Type Distributions , 2005 .

[124]  Mark Fackrell,et al.  Modelling healthcare systems with phase-type distributions , 2009, Health care management science.

[125]  Marta Z. Kwiatkowska,et al.  Advances in Probabilistic Model Checking , 2012, Software Safety and Security.

[126]  Marin Litoiu,et al.  Performance Model Estimation and Tracking Using Optimal Filters , 2008, IEEE Transactions on Software Engineering.

[127]  Marco Ajmone Marsan,et al.  Modelling with Generalized Stochastic Petri Nets , 1995, PERV.

[128]  Vojtech Rehák,et al.  Dealing with Zero Density Using Piecewise Phase-Type Approximation , 2014, EPEW.

[129]  Radu Calinescu,et al.  Adaptive model learning for continual verification of non-functional properties , 2014, ICPE.

[130]  Eva Ishay,et al.  Fitting Phase-Type Distributions to Data from a Telephone Call Center , 2002 .

[131]  Carlo Ghezzi,et al.  Quality Prediction of Service Compositions through Probabilistic Model Checking , 2008, QoSA.

[132]  T. W. Anderson,et al.  Statistical Inference about Markov Chains , 1957 .

[133]  Joseph Sifakis,et al.  Model checking , 1996, Handbook of Automated Reasoning.

[134]  Radu Calinescu Model-Driven Autonomic Architecture , 2007, Fourth International Conference on Autonomic Computing (ICAC'07).

[135]  C. Murray Woodside,et al.  Enhanced Modeling and Solution of Layered Queueing Networks , 2009, IEEE Transactions on Software Engineering.

[136]  Petr Novotný,et al.  Optimizing Performance of Continuous-Time Stochastic Systems using Timeout Synthesis , 2014, QEST.

[137]  Radu Calinescu,et al.  FACT: A Probabilistic Model Checker for Formal Verification with Confidence Intervals , 2016, TACAS.

[138]  Radu Calinescu,et al.  Search-Based Synthesis of Probabilistic Models for Quality-of-Service Software Engineering (T) , 2015, 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[139]  Andrea Polini,et al.  Business Processes Verification for e-Government Service Delivery , 2010, Inf. Syst. Manag..

[140]  Marta Z. Kwiatkowska,et al.  Stochastic Model Checking , 2007, SFM.

[141]  Sadie Creese,et al.  Automated Insider Threat Detection System Using User and Role-Based Profile Assessment , 2017, IEEE Systems Journal.

[142]  Luis E. Mendoza Morales,et al.  Business process verification using a Formal Compositional Approach and Timed Automata , 2013, 2013 XXXIX Latin American Computing Conference (CLEI).

[143]  Lars Grunske,et al.  Evaluating probabilistic models with uncertain model parameters , 2012, Software & Systems Modeling.

[144]  Joost-Pieter Katoen,et al.  How Fast and Fat Is Your Probabilistic Model Checker? An Experimental Performance Comparison , 2007, Haifa Verification Conference.

[145]  Marta Z. Kwiatkowska,et al.  PRISM 4.0: Verification of Probabilistic Real-Time Systems , 2011, CAV.

[146]  Joost-Pieter Katoen,et al.  Beyond Memoryless Distributions: Model Checking Semi-Markov Chains , 2001, PAPM-PROBMIV.

[147]  Mahesh Viswanathan,et al.  Statistical Model Checking of Black-Box Probabilistic Systems , 2004, CAV.

[148]  Marta Z. Kwiatkowska,et al.  PRISM: Probabilistic Symbolic Model Checker , 2002, Computer Performance Evaluation / TOOLS.

[149]  Maria E. Orlowska,et al.  Pockets of Flexibility in Workflow Specification , 2001, ER.

[150]  Radu Calinescu,et al.  Efficient Parametric Model Checking Using Domain-Specific Modelling Patterns , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER).

[151]  Peter A. Lindsay,et al.  Formal analysis of human-computer interaction using model-checking , 2005, Third IEEE International Conference on Software Engineering and Formal Methods (SEFM'05).

[152]  Kenneth L. McMillan,et al.  The SMV System , 1993 .

[153]  Hongyang Qu,et al.  Assume-Guarantee Verification for Probabilistic Systems , 2010, TACAS.

[154]  Radu Calinescu,et al.  Accurate Analysis of Quality Properties of Software with Observation-Based Markov Chain Refinement , 2017, 2017 IEEE International Conference on Software Architecture (ICSA).