Risk Assessment and Monitoring in Intelligent Data-Centric Systems

Abstract The cloud era is accelerating the long term growth of Data-Centric Systems in critical applications. In this chapter, we focus on the risk assessment methods of traditional large-scale, computer-based systems and on the necessity to extend such approaches to Data-Centric Systems. Hence, after a presentation of the main risk factors in traditional and future systems, an assessment methodology is presented showing how to use advanced formal modeling techniques as the multiformalism approach to evaluate security risk, based on two widespread formalisms: Bayesian Networks and Attack Trees.

[1]  Chunming Qiao,et al.  An incrementally deployable network architecture to support both data-centric and host-centric services , 2014, IEEE Network.

[2]  Samuel Kounev,et al.  Analysis of the Performance-Influencing Factors of Virtualization Platforms , 2010, OTM Conferences.

[3]  Andrea Bianco,et al.  Power comparison of cloud data center architectures , 2016, 2016 IEEE International Conference on Communications (ICC).

[4]  Albert Y. Zomaya,et al.  Performance and Energy Efficiency Metrics for Communication Systems of Cloud Computing Data Centers , 2017, IEEE Transactions on Cloud Computing.

[5]  Bedir Tekinerdogan,et al.  Obstacles in Data Distribution Service Middleware: A Systematic Review , 2017, Future Gener. Comput. Syst..

[6]  Hong Liu,et al.  Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google's Datacenter Network , 2015, Comput. Commun. Rev..

[7]  Alfredo De Santis,et al.  A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems , 2013, International Journal of Parallel Programming.

[8]  Antonio Puliafito,et al.  Information dependability in distributed systems: The dependable distributed storage system , 2014, Integr. Comput. Aided Eng..

[9]  Daniel A. Menascé,et al.  Virtualization: Concepts, Applications, and Performance Modeling , 2005, Int. CMG Conference.

[10]  Amin Vahdat,et al.  A scalable, commodity data center network architecture , 2008, SIGCOMM '08.

[11]  Iman Saleh,et al.  Specification and Verification of Data-Centric Web Services , 2010, 2010 6th World Congress on Services.

[12]  Mauro Iacono,et al.  Evaluating the impact of eDoS attacks to cloud facilities , 2016, EAI Endorsed Trans. Security Safety.

[13]  Mauro Iacono,et al.  Modeling Replication and Erasure Coding in Large Scale Distributed Storage Systems Based on CEPH , 2016 .

[14]  Kaliappa Nadar Ravindran Agent-based QoS negotiation in data-centric clouds , 2015, 2015 IEEE 4th International Conference on Cloud Networking (CloudNet).

[15]  Mauro Iacono,et al.  Exploiting mean field analysis to model performances of big data architectures , 2014, Future Gener. Comput. Syst..

[16]  Fereidoon Shams Aliee,et al.  Enterprise information security, a review of architectures and frameworks from interoperability perspective , 2011, WCIT.

[17]  Marco Gribaudo,et al.  Exploiting Bayesian Networks for the Analysis of Combined Attack Trees , 2015, PASM.

[18]  Miseon Han,et al.  Server system modeling for data-centric computing: In terms of server specifications, benchmarks, and simulators , 2016, 2016 International Conference on Electronics, Information, and Communications (ICEIC).

[19]  Shafique Ahmad Chaudhry,et al.  On implementation of DCTCP on three-tier and fat-tree data center network topologies , 2016, SpringerPlus.

[20]  Mauro Iacono,et al.  Improving reliability and performances in large scale distributed applications with erasure codes and replication , 2016, Future Gener. Comput. Syst..

[21]  Manish Marwah,et al.  Probabilistic performance modeling of virtualized resource allocation , 2010, ICAC '10.

[22]  Wei Chen,et al.  On the Impact of Replica Placement to the Reliability of Distributed Brick Storage Systems , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[23]  Shuaiwen Song,et al.  Fault-tolerant communication runtime support for data-centric programming models , 2010, 2010 International Conference on High Performance Computing.

[24]  N. C. Debnath,et al.  A Novel and Flexible Cloud Architecture for Data-Centric Applications , 2013, 2013 IEEE International Conference on Industrial Technology (ICIT).

[25]  Virgílio A. F. Almeida,et al.  Performance Models for Virtualized Applications , 2006, ISPA Workshops.

[26]  Jichuan Chang,et al.  (Re)Designing Data-Centric Data Centers , 2012, IEEE Micro.

[27]  Robert J. Stroud,et al.  Security-Informed Safety: If It's Not Secure, It's Not Safe , 2013, SERENE.

[28]  Albert G. Greenberg,et al.  VL2: a scalable and flexible data center network , 2009, SIGCOMM '09.

[29]  Stefano Marrone,et al.  Enabling the usage of UML in the verification of railway systems: The DAM-rail approach , 2013, Reliab. Eng. Syst. Saf..

[30]  Alastair R. Ruddle,et al.  Threat Analysis and Risk Assessment in Automotive Cyber Security , 2013 .

[31]  Iman Saleh,et al.  Formal Methods for Data-centric Web Services: From Model to Implementation , 2013, 2013 IEEE 20th International Conference on Web Services.

[32]  Parthasarathy Ranganathan,et al.  From Microprocessors to Nanostores: Rethinking Data-Centric Systems , 2011, Computer.

[33]  Marco Gribaudo,et al.  Performance evaluation of peering-agreements among autonomous systems subject to peer-to-peer traffic , 2014, Perform. Evaluation.

[34]  Alma Riska,et al.  Fast Eventual Consistency with Performance Guarantees for Distributed Storage , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[35]  Francesco Palmieri,et al.  GRASP-based resource re-optimization for effective big data access in federated clouds , 2016, Future Gener. Comput. Syst..

[36]  Saurabh Gupta,et al.  Best Practices and Lessons Learned from Deploying and Operating Large-Scale Data-Centric Parallel File Systems , 2014, SC14: International Conference for High Performance Computing, Networking, Storage and Analysis.

[37]  Andreas L. Opdahl,et al.  Enhancing CHASSIS: A Method for Combining Safety and Security , 2013, 2013 International Conference on Availability, Reliability and Security.

[38]  Eric Armengaud,et al.  Threat and Risk Assessment Methodologies in the Automotive Domain , 2016, ANT/SEIT.

[39]  Albert Y. Zomaya,et al.  Quantitative comparisons of the state‐of‐the‐art data center architectures , 2013, Concurr. Comput. Pract. Exp..

[40]  Mauro Iacono,et al.  An Introduction to Multiformalism Modeling , 2014 .

[41]  Valentin Cristea,et al.  Resource-aware hybrid scheduling algorithm in heterogeneous distributed computing , 2015, Future Gener. Comput. Syst..

[42]  Mauro Iacono,et al.  Performance Modeling of Big Data-Oriented Architectures , 2016, Resource Management for Big Data Platforms.

[43]  George Varghese,et al.  CONGA: distributed congestion-aware load balancing for datacenters , 2015, SIGCOMM.

[44]  Luigi Portinale,et al.  Improving the analysis of dependable systems by mapping fault trees into Bayesian networks , 2001, Reliab. Eng. Syst. Saf..

[45]  Mauro Iacono,et al.  Modeling performances of concurrent big data applications , 2015, Softw. Pract. Exp..

[46]  Mauro Iacono,et al.  Three Layers Network Influence On Cloud Data Center Performances , 2016, ECMS.

[47]  Mauro Iacono,et al.  Power Consumption Analysis of Replicated Virtual Applications in Heterogeneous Architectures , 2016 .

[48]  Zhou Huachun,et al.  Topology-based data dissemination approaches for large scale data centric networking architecture , 2013, China Communications.

[49]  Naoaki Yamanaka,et al.  Energy efficient Data-centric Network on the optical network virtualization platform , 2014, 2014 12th International Conference on Optical Internet 2014 (COIN).

[50]  Mauro Iacono,et al.  Modeling and Evaluating the Effects of Big Data Storage Resource Allocation in Global Scale Cloud Architectures , 2016, Int. J. Data Warehous. Min..

[51]  Peng Liu,et al.  Using Bayesian networks for cyber security analysis , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[52]  Florin Pop,et al.  Asymptotic scheduling for many task computing in Big Data platforms , 2015, Inf. Sci..

[53]  B. Kosko Fuzzy Thinking: The New Science of Fuzzy Logic , 1993 .

[54]  Joobin Choobineh,et al.  Enterprise information security strategies , 2008, Comput. Secur..

[55]  Kaliappa Nadar Ravindran,et al.  SLA evaluation in cloud-based data-centric distributed services , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).

[56]  Roberto Nardone,et al.  Vulnerability modeling and analysis for critical infrastructure protection applications , 2013, Int. J. Crit. Infrastructure Prot..

[57]  Philippe Robert,et al.  Scattering and Placing Data Replicas to Enhance Long-Term Durability , 2015, 2015 IEEE 14th International Symposium on Network Computing and Applications.

[58]  Daniel Deutch,et al.  Analyzing data-centric applications: Why, what-if, and how-to , 2016, 2016 IEEE 32nd International Conference on Data Engineering (ICDE).

[59]  Christian E. Hopps,et al.  Analysis of an Equal-Cost Multi-Path Algorithm , 2000, RFC.

[60]  Ahmad Khonsari,et al.  A flexible and high-performance data center network topology , 2017, The Journal of Supercomputing.

[61]  Pietro Piazzolla,et al.  Consolidation and Replication of VMs Matching Performance Objectives , 2012, ASMTA.

[62]  Ahmed Karmouch,et al.  Mobile software agents: an overview , 1998, IEEE Commun. Mag..

[63]  Iman Saleh,et al.  Demystifying Data-Centric Web Services , 2009, IEEE Internet Computing.

[64]  Stefano Secci,et al.  Reliability and Survivability Analysis of Data Center Network Topologies , 2015, Journal of Network and Systems Management.

[65]  Gregory R. Ganger,et al.  Agility and Performance in Elastic Distributed Storage , 2014, TOS.