WP5 – Methods and Tools for Auditing complex systems

 Coordinated by
 CNR (M04-M30)

Objective

This work package will focus on the development of techniques, methods and tools supporting the audit activity in the BIECO framework. Auditing includes retrieval of data from the field, such as data regarding the usage mode of an ICT system subject to runtime adaptation through the delivery of software updates. The main goal is to provide ecosystem trustworthiness’s evaluation leveraging executable simulation environments and runtime monitoring facilities. The monitoring results aim to provide useful feedback for setting up the simulation environment.

This work package has the following objectives:

  1. Definition of the executable simulation models and of the parameters against which the behavior of the ICT systems and their interacting actors within an ecosystem is judged as being trustworthy or not.
  2. Definition of monitoring methodologies and tools detecting malicious behaviors of ICT systems and interacting actors within the ecosystems and assessing the validity of the simulation models.
  3. Developing monitoring tools able to validate through real-time data of systems sensors and actuators the validity of simulation decisions.

Deliverables

Outcomes

WP6 monthly meeting M13

WP6 monthly meeting M13

The 6th September took place the WP6 monthly meeting. During the meeting the WP6 partners discussed their input towards the BIECO-wide workshop and IESE presented the status of T6.3. In the meeting, the WP6 partners discussed their input towards the BIECO-wide...

WP6 monthly meeting M12

WP6 monthly meeting M12

The 2nd August took place the WP6 monthly meeting. During the meeting Resiltech updated the rest of the round regarding D6.2, the status of T6.3 and the roadmap towards D6.4 were also discussed. Furthermore, CNR presented their initial views regarding integration of...

WP6 monthly meeting M11

WP6 monthly meeting M11

The 5th July took place the WP6 monthly meeting. The meeting’s main focus has been on tasks T6.2 and T6.3. Fraunhofer IESE described the current plan for the definition of mitigation strategies, which will involve the ConSerts and the Intrusion Tolerance...

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This