WP5 – Methods and Tools for Auditing complex systems

 Coordinated by
 CNR (M04-M30)

Objective

This work package will focus on the development of techniques, methods and tools supporting the audit activity in the BIECO framework. Auditing includes retrieval of data from the field, such as data regarding the usage mode of an ICT system subject to runtime adaptation through the delivery of software updates. The main goal is to provide ecosystem trustworthiness’s evaluation leveraging executable simulation environments and runtime monitoring facilities. The monitoring results aim to provide useful feedback for setting up the simulation environment.

This work package has the following objectives:

  1. Definition of the executable simulation models and of the parameters against which the behavior of the ICT systems and their interacting actors within an ecosystem is judged as being trustworthy or not.
  2. Definition of monitoring methodologies and tools detecting malicious behaviors of ICT systems and interacting actors within the ecosystems and assessing the validity of the simulation models.
  3. Developing monitoring tools able to validate through real-time data of systems sensors and actuators the validity of simulation decisions.

Deliverables

Outcomes

Monitoring Tool

The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events.

Security Testing Tool

GdpR-based cOmbinatOrial Testing (GROOT) is a general combinatorial strategy for testing systems managing GDPR’s concepts (e.g., Data Subject, Personal Data or Controller).

Domain Specific Language

The domain specific language enables specification of digital twin behaviour in a manner that can enable a predicted evaluation of its trustworthy behaviour in a simulated environment

Fail-operation clock synchronization methodology

Synchronization loss can occur due to many reasons, either because of a device or link failure or due to a targeted attack on the reference node, which supplies the corrected time to the network’s nodes.

Time sensitive network simulation

Simulate the real time communication for the distributed based on the Time sensitive network simulation. Additionally, simulate the fail-operation clock synchronization methodology. This simulation will validate the communication stack.

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This