<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Netcompany-Intrasoft, Author at IoTAC</title>
	<atom:link href="https://iotac.eu/author/nikos-kefalakisintrasoft-intl-com/feed/" rel="self" type="application/rss+xml" />
	<link>https://iotac.eu/author/nikos-kefalakisintrasoft-intl-com/</link>
	<description>Internet of Things Access Control</description>
	<lastBuildDate>Tue, 07 Feb 2023 10:16:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2.9</generator>

<image>
	<url>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon-32x32.jpg</url>
	<title>Netcompany-Intrasoft, Author at IoTAC</title>
	<link>https://iotac.eu/author/nikos-kefalakisintrasoft-intl-com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>IOTAC Runtime Monitoring System</title>
		<link>https://iotac.eu/iotac-runtime-monitoring-system-2/</link>
					<comments>https://iotac.eu/iotac-runtime-monitoring-system-2/#respond</comments>
		
		<dc:creator><![CDATA[Netcompany-Intrasoft]]></dc:creator>
		<pubDate>Fri, 03 Feb 2023 09:42:55 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[IoT architecture]]></category>
		<category><![CDATA[IoT security]]></category>
		<category><![CDATA[security by design]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=11397</guid>

					<description><![CDATA[<p>The Internet of Things (IoT) has revolutionized the way we live and work. With the increasing number of connected devices, systems, and services, the IoT has become an integral part of our daily lives. However, this increased connectivity also brings increased security risks. Cybersecurity attacks on IoT devices can result...</p>
<p>The post <a href="https://iotac.eu/iotac-runtime-monitoring-system-2/">IOTAC Runtime Monitoring System</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Internet of Things (IoT) has revolutionized the way we live and work. With the increasing number of connected devices, systems, and services, the IoT has become an integral part of our daily lives. However, this increased connectivity also brings increased security risks. Cybersecurity attacks on IoT devices can result in the loss of sensitive data, financial losses, and even physical harm. Therefore, it is crucial to have a monitoring system in place to discover abnormal behaviours related to cybersecurity attacks.</p>
<p>To address this need, we propose the Runtime Monitoring System (RMS). RMS is a monitoring system designed specifically for the IoT environment. Its primary functionalities are security monitoring and abnormal behaviour discovery. RMS is based on monitoring, analysis, and action workflows, which allows for the effective and integrated monitoring of the various devices, systems, and services that make up an IoT system.</p>
<p>RMS is designed to monitor IoT devices and systems at runtime, which means that it can detect abnormal behaviours and security threats in real time. This is important because most IoT devices and systems are always on and connected, so the ability to detect security threats in real time is crucial. RMS uses a variety of monitoring techniques such as network traffic analysis, system logs analysis, and behavioural analysis to detect abnormal behaviours.</p>
<p>More specifically, RMS is a Data collection framework which provides the specifications and relevant implementation to enable a real-time data collection, transformation, filtering, and management service to facilitate data consumers (i.e., analytics algorithms like attack detection providing real time or historical data and other third party applications for reporting abnormal behaviour). The framework can be applied in IoT environments supporting solutions in various domains (e.g., Industrial, Cybersecurity, etc.). For example, the solution may be used to collect security-related data (e.g., network, system, solution proprietary, etch.) from monitored IoT systems and store them to detect patterns of abnormal behaviour by applying simple (i.e., filtering and pre-processing) mechanisms. The design of the framework is driven by configurability, extensibility, dynamic setup, and stream handling capabilities. One of the key features of the framework is that it is detached from the underlying infrastructure by employing a specialized data model for modelling the solution’s Data Sources, Processors and Results which facilitates the data interoperability discoverability and configurability of the offered solution.</p>
<p>The system features lightweight monitoring probs that can be used for the data collection and publishing to the monitoring platform. The RMS provides appropriate configuration and management mechanism over the monitoring probes as well as appropriate data models and data transformation engines that enable the discoverability and reusability of the collected data. The figure below illustrates a functional diagram of the main system components.</p>
<p>The core system runs on the cloud as a service and connects with the Kaspersky (KSS) gateway to confirm the validity and trustworthiness of the deployed probes that deliver monitored data to it. The RMS differentiates from the KSS gateway abnormal behaviour detection on the fact that it is capable of monitoring user data except for the network data that the KSS gateway monitors. The high-level KSS gateway integration is also depicted in the Figure below.<img decoding="async" loading="lazy" class="aligncenter wp-image-11394 size-full" src="https://iotac.eu/wp-content/uploads/2023/02/RMS-high-level-overview.png" alt="" width="2887" height="729" srcset="https://iotac.eu/wp-content/uploads/2023/02/RMS-high-level-overview.png 2887w, https://iotac.eu/wp-content/uploads/2023/02/RMS-high-level-overview-300x76.png 300w, https://iotac.eu/wp-content/uploads/2023/02/RMS-high-level-overview-1024x259.png 1024w, https://iotac.eu/wp-content/uploads/2023/02/RMS-high-level-overview-768x194.png 768w, https://iotac.eu/wp-content/uploads/2023/02/RMS-high-level-overview-1536x388.png 1536w, https://iotac.eu/wp-content/uploads/2023/02/RMS-high-level-overview-2048x517.png 2048w" sizes="(max-width: 2887px) 100vw, 2887px" /></p>
<p style="text-align: center;">Figure: RMS high-level overview</p>
<p>The Figure below provides a collective Data Flow diagram of the RMS implementation which includes the primitive function of the Data Processing Engine (DPE). The DPE provides a wrapper for data processing instances (such as an algorithm or a data persistence service) that allows them to be managed and data compatible (input/output) with the Runtime Monitoring System. The RMS data models like, Processor Definition (an entity containing the characteristics of a processor such as description, vendor, availability, supported attributes, and so on), Processor Manifest (an entity containing the instantiation of a processor based on the processor description), and Processor Orchestrator (an entity containing a list of processor manifests capable of describing a complex processing flow) are all used by Processing Engine.<br />
<img decoding="async" loading="lazy" class="aligncenter wp-image-11391 size-full" src="https://iotac.eu/wp-content/uploads/2023/02/RMS-impl-data-flow-diagram.png" alt="" width="2412" height="823" srcset="https://iotac.eu/wp-content/uploads/2023/02/RMS-impl-data-flow-diagram.png 2412w, https://iotac.eu/wp-content/uploads/2023/02/RMS-impl-data-flow-diagram-300x102.png 300w, https://iotac.eu/wp-content/uploads/2023/02/RMS-impl-data-flow-diagram-1024x349.png 1024w, https://iotac.eu/wp-content/uploads/2023/02/RMS-impl-data-flow-diagram-768x262.png 768w, https://iotac.eu/wp-content/uploads/2023/02/RMS-impl-data-flow-diagram-1536x524.png 1536w, https://iotac.eu/wp-content/uploads/2023/02/RMS-impl-data-flow-diagram-2048x699.png 2048w" sizes="(max-width: 2412px) 100vw, 2412px" /></p>
<p style="text-align: center;">Figure: RMS Implementation Data Flow Diagram</p>
<p>For the IoTAC implementation RMS supports core functionalities based on the pilot requirements. The main functionalities implemented are:</p>
<ul>
<li>Data Routing: The component enables the transformation, annotation, and routing of incoming data streams from data probes, HTTP polling and Data Bus to various outputs. The messages are transformed to Observations using the Threat Reporting structure.</li>
<li>Data Filtering: The component enables the filtering of incoming data streams based on the user (threat reporting) requirements.</li>
<li>Data Persistence: The component enables the persistence of incoming messages to temporary (i.e., Data Bus) or permanent (i.e., Observation repository) data storages.</li>
</ul>
<p>Threat Report visualization: The component enables the visualisation of captured Threat Reports providing charts, graphs, and data discovery for creating custom dashboards for the IoTAC pilots.</p>
<p>For RMS Data Collection and Processing implementation the core elements utilized for the infrastructure are Apache Kafka<a href="#_ftn1" name="_ftnref1">[1]</a> and Elastic Stack<a href="#_ftn2" name="_ftnref2">[2]</a> with the following roles:</p>
<ul>
<li>MetricBeats: to collect monitored data (i.e. CPU utilization data) by using Elastic MetricBeats deployed to the Smart Home Backend Server.</li>
<li>Logstash: Raw monitored Data are transformed and filtered to match the used Data Model (i.e., Observations) and identified rules (i.e., report only values above 80%)</li>
<li>Kafka &amp; ElasticSearch: the collected pre-processed data are published to the Data Bus (Kafka) in order to be accessed by the Security Policies Manager &amp; ElasticSearch for permeate persistence, visualization and monitoring.</li>
<li>Kibana: for persisted data visualization</li>
</ul>
<p><a href="#_ftnref1" name="_ftn1"><img decoding="async" loading="lazy" class="aligncenter wp-image-11388 size-full" src="https://iotac.eu/wp-content/uploads/2023/02/Elastic-infrastr-flow.png" alt="" width="1171" height="320" srcset="https://iotac.eu/wp-content/uploads/2023/02/Elastic-infrastr-flow.png 1171w, https://iotac.eu/wp-content/uploads/2023/02/Elastic-infrastr-flow-300x82.png 300w, https://iotac.eu/wp-content/uploads/2023/02/Elastic-infrastr-flow-1024x280.png 1024w, https://iotac.eu/wp-content/uploads/2023/02/Elastic-infrastr-flow-768x210.png 768w" sizes="(max-width: 1171px) 100vw, 1171px" /></a></p>
<p style="text-align: center;">Figure: Elastic Infrastructure flow (Smart Home Example)</p>
<p>In conclusion, the Runtime Monitoring System (RMS) is a highly effective and integrated system that can be used to monitor the various devices, systems, and services that make up an IoT system. By using monitoring, analysis, and action workflows, RMS can identify, assess, and potential security threats in real time. This makes RMS a foundation for securing IoT systems and ensuring the safety and security of the data and systems that make up the IoT. RMS is partially reusing and extends existent designs and implementations from a relative system offered in the context of H2020 SecureIoT project [1].</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> https://kafka.apache.org/<br />
<a href="#_ftnref2" name="_ftn2">[2]</a> https://www.elastic.co/elastic-stack/</p>
<p>References:<br />
[1] Aikaterini Roukounaki, Sofoklis Efremidis, John Soldatos, Jürgen Neises, Thomas Walloschke, Nikos Kefalakis: Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data: Towards End-to-End Security in IoT Systems. GIoTS 2019: 1-6</p>
<p>&nbsp;</p>
<p>The post <a href="https://iotac.eu/iotac-runtime-monitoring-system-2/">IOTAC Runtime Monitoring System</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/iotac-runtime-monitoring-system-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>IoTAC Runtime Monitoring System</title>
		<link>https://iotac.eu/iotac-runtime-monitoring-system/</link>
					<comments>https://iotac.eu/iotac-runtime-monitoring-system/#respond</comments>
		
		<dc:creator><![CDATA[Netcompany-Intrasoft]]></dc:creator>
		<pubDate>Thu, 11 Mar 2021 11:22:11 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[IoT security]]></category>
		<category><![CDATA[monitoring system]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=7590</guid>

					<description><![CDATA[<p>In recent years the rapid proliferation of Internet-connected devices is driving an unprecedented growth of Internet of Things (IoT) systems and applications. This enables the evolving of the functionalities that they provide to end-users, but also in terms of the technologies that they comprise. Specifically, non-trivial state-of-the-art IoT systems comprise...</p>
<p>The post <a href="https://iotac.eu/iotac-runtime-monitoring-system/">IoTAC Runtime Monitoring System</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In recent years the rapid proliferation of Internet-connected devices is driving an unprecedented growth of Internet of Things (IoT) systems and applications. This enables the evolving of the functionalities that they provide to end-users, but also in terms of the technologies that they comprise. Specifically, non-trivial state-of-the-art IoT systems comprise numerous devices, including not only conventional sensors and passive devices, but also smart objects and cyber-physical systems. Additionally, IoT systems are deployed in scalable edge/cloud computing infrastructures, which comprise broadband networks, edge gateways and devices, as well as cloud data centres. The rising sophistication of IoT systems provides the means for developing and deploying novel IoT applications, yet it also introduces significant cyber-security challenges. These challenges are evident in the scope of recent cyber-security incidents against IoT infrastructures and services which include:</p>
<ul>
<li>The emergence of new types of large-scale security attacks against IoT systems.</li>
<li>Vulnerabilities in Cyber-Physical Systems (CPS), which are associated with the cyber resilience challenges of CPS systems.</li>
<li>Security threats associated with the interplay between Information Technology (IT) and Operational Technology (OT) infrastructures.</li>
<li>Complex Regulatory Compliance requirements in a demanding and volatile landscape.</li>
</ul>
<p>To come up against these challenges there is a need for end-to-end solutions and tools that can protect IoT assets from the many different types of attacks. Security monitoring and security data analytics is one of the primary functionalities in this direction. Based on monitoring, analysis, and action workflows it is possible to monitor the various devices, systems and services that comprise an IoT system in effective and integrated ways. Accordingly, monitoring can then be a foundation for the identification, assessment, and mitigation of risks. Such a solution is the Runtime Monitoring System (RMS) that is going to be offered from IOTAC project. RMS will partially reuse and extend existent designs and implementations from a related system offered in the context of H2020 SecureIoT project [1].</p>
<p>IoTAC Runtime Monitoring System (RMS) will provide the specifications and relevant framework implementation to enable a real-time service which will collect security-related data from monitored IoT system components or application and store them for further processing. The collected data will be used to drive analytics algorithms that detect patterns of abnormal behaviour.</p>
<p>The system will feature lightweight monitoring probs that will be responsible for the data collection and publishing to the monitoring platform. The RMS will provide appropriate configuration and management mechanism over the monitoring probes as well as appropriate data models and data transformation engines that will enable the discoverability and reusability of the collected data. The probe management will be facilitated by an internal probe registry that will maintain the probe information along with their status and will enable the probe creation, reconfiguration, and discovery. The figure below illustrates a functional diagram of the main system components that is going to be offered.</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-7593 " src="https://iotac.eu/wp-content/uploads/2021/03/RMS-Intra-1024x632.png" alt="" width="883" height="513" /></p>
<p>The different components along their interactions are:</p>
<ul>
<li><strong>Data bus:</strong> which is a communications channel through which all real-time data are routed. Platform components may subscribe to the data bus to receive data of specific interest to them.</li>
<li><strong>Deployed probes</strong>: which collects data from the target IoT system or application and stream them to the IoT platform through the data routing component.</li>
<li><strong>Probe Management and Configuration</strong>: which is responsible for managing and configuring the deployed probes. The Probe Management and Configuration will enable the reception of automatic probe configuration commands and correspondingly configures the managed probes. Manual probe configuration commands may also be received by the dashboard. The Management and Configuration dashboard provides a user interface to the Probe Management and Configuration component.</li>
<li><strong>Probe Registry</strong>: which maintains a record of the deployed probes. Probe deployment data, as well as state and configuration data, are maintained by the registry. The registry provides probe creation, reconfiguration, and search capabilities. It facilitates the automatic deployment of probes and their dynamic discovery.</li>
<li><strong>Automatic Reconfiguration</strong>: which receives abnormal behaviour reports for the monitored system and sends automatic probe re-configuration commands based on a predefined scenario.</li>
<li><strong>Data Storage</strong>: which contains historic security data that have been collected by the deployed probes. These data can be used by the Data Analytics to train itself and produce a set of security templates that will be used subsequently for identifying security issues on the target IoT system.</li>
<li><strong>CMDB (part of the Data Storage)</strong>: which contains information about all assets of the Runtime Monitoring System related to the monitored System along with their attributes and configuration parameters.</li>
</ul>
<p>The system will run on the cloud as a service and is going to connect with the KSS gateway to confirm the validity and trustworthiness of the deployed probes that deliver monitored data to it. The RMS will enhance the KSS gateway abnormal behaviour detection by enabling user data monitoring other than the network data that the KSS gateway monitors.</p>
[1] Aikaterini Roukounaki, Sofoklis Efremidis, John Soldatos, Jürgen Neises, Thomas Walloschke, Nikos Kefalakis: Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data: Towards End-to-End Security in IoT Systems. GIoTS 2019: 1-6</p>
<p>The post <a href="https://iotac.eu/iotac-runtime-monitoring-system/">IoTAC Runtime Monitoring System</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/iotac-runtime-monitoring-system/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
