{"id":195122,"date":"2024-09-10T10:54:06","date_gmt":"2024-09-10T08:54:06","guid":{"rendered":"https:\/\/www.rse-web.it\/rapporti\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/"},"modified":"2024-09-10T10:54:55","modified_gmt":"2024-09-10T08:54:55","slug":"models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy","status":"publish","type":"rapporti","link":"https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/","title":{"rendered":"Models and tools for the analysis of anomalies in ICT infrastructures based on AI techniques and analysis of the Cybersecurity of Fog\/Cloud and IoT platforms in the digitalization of the electrical system"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>The report describes the analysis of attack processes on computer systems by means of probabilistic graphic tools such as Bayesian networks. Various predictive and diagnostic analyses are presented for the identification of attacks in IT\/OT contexts and the defense of the system. The document also analyzes some of the cybersecurity aspects necessary to guarantee the resilience of IoT, Fog and Cloud infrastructures. The peculiarities of the different architectures have also been examined in terms of authentication, role management, securing the channel and the communication protocol.<\/p>\n","protected":false},"author":464,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"tags":[1315],"targets":[1317],"rapporti_tipologie":[762],"class_list":["post-195122","rapporti","type-rapporti","status-publish","hentry","tag-smart-grids-en","targets-research","rapporti_tipologie-report-en"],"acf":{"dont_show_hompage":true,"projects":{"ID":191051,"post_author":"464","post_date":"2024-07-10 16:51:29","post_date_gmt":"2024-07-10 14:51:29","post_content":"","post_title":"Application of Information Technology, Internet of Things, Peer-to-peer, to the electrical system in order to improve security and resilience","post_excerpt":"The project develops methods, tools, demonstrators and experiments to evaluate the application potential of the latest information and communication technologies for the benefit of the electro-energy system.","post_status":"publish","comment_status":"open","ping_status":"closed","post_password":"","post_name":"application-of-information-technology-internet-of-things-peer-to-peer-to-the-electrical-system-in-order-to-improve-security-and-resilience","to_ping":"","pinged":"","post_modified":"2024-08-09 15:59:29","post_modified_gmt":"2024-08-09 13:59:29","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.rse-web.it\/progetti\/application-of-information-technology-internet-of-things-peer-to-peer-to-the-electrical-system-in-order-to-improve-security-and-resilience\/","menu_order":0,"post_type":"progetti","post_mime_type":"","comment_count":"0","filter":"raw"},"order_posts":"","dont_show_search":false,"related_posts":false,"show_on_slider":false,"single_post_data":{"titolo_spot":"","post_content":"<p>An essential aspect for the correct functioning of electrical system control and monitoring applications is the ability to analyze and evaluate possible attack processes that target communications and components of the operational infrastructure. Often the attacker, starting from the corporate network (or in any case from an IT (Information Technology) host), is able to reach the OT (Operational Technology) systems through side movements and compromise of network nodes.<\/p>\n<p>Tools to study the evolution of attack processes are therefore needed in order to develop measures to intercept their intermediate steps and prevent their progress. The report presents an analysis methodology based on probabilistic graphic models such as Bayesian networks. The models allow preventive and diagnostic assessments to be performed in order to identify the criticality degree of each element of the system, the probability of compromise and the solutions to be implemented to improve the security of the infrastructure. Furthermore, if you know in advance the possible steps of the attacker in the attack process you can implement timely actions to deal with its effects.<\/p>\n<p>Regarding the measures needed to ensure the safety of the electricity and energy system, the cybersecurity aspects of emerging IoT (Internet of Things), Fog and Cloud Computing infrastructures are becoming increasingly important, as these paradigms are increasingly used by new architectures. However, along with clear advantages, these new technologies bring with them new vulnerabilities and pose new challenges in terms of cybersecurity.<\/p>\n<p>The following report lays the foundations for understanding the main features of the cybersecurity of these new paradigms, in order to identify which solutions can be applied in different environments, taking into account their peculiarities in terms of computational capacity, latency and number.<\/p>\n<p>In particular, in this report some solutions are analyzed to ensure the authorization aspects, in terms of role management, through attribute-based techniques, which are more suitable for emerging contexts than classic solutions. Solutions have also been evaluated to ensure secure communications, both by securing communication channels via VPN (Virtual Private Network), and by implementing security measures for communication protocols. The studies carried out in this line of activity represent the basis for new developments in the next two years of activity.<\/p>\n","link_estreno":false,"scarica_file":[{"download_option":"download","file_name":"Download Report","download":{"ID":105880,"id":105880,"title":"19012941-319135.pdf","filename":"19012941-319135.pdf","filesize":2224664,"url":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2021\/03\/19012941-319135.pdf","link":"https:\/\/www.rse-web.it\/en\/rapporti\/19012941\/19012941-319135\/","alt":"","author":"464","description":"19012941-319135.pdf","caption":"","name":"19012941-319135","status":"inherit","uploaded_to":132869,"date":"2021-12-31 00:00:00","modified":"2021-03-17 12:50:24","menu_order":0,"mime_type":"application\/pdf","type":"application","subtype":"pdf","icon":"https:\/\/www.rse-web.it\/wp-includes\/images\/media\/document.png"}}],"button":{"text":"","link":""},"referente_group":false,"data_emissione":"2019-12-31","autori":"F. Garrone, R. Terruggia","rapporto":"","rif_rse":"19012941"},"satellite_post_url":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Models and tools for the analysis of anomalies in ICT infrastructures based on AI techniques and analysis of the Cybersecurity of Fog\/Cloud and IoT platforms in the digitalization of the electrical system - RSE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Models and tools for the analysis of anomalies in ICT infrastructures based on AI techniques and analysis of the Cybersecurity of Fog\/Cloud and IoT platforms in the digitalization of the electrical system - RSE\" \/>\n<meta property=\"og:description\" content=\"The report describes the analysis of attack processes on computer systems by means of probabilistic graphic tools such as Bayesian networks. Various predictive and diagnostic analyses are presented for the identification of attacks in IT\/OT contexts and the defense of the system. The document also analyzes some of the cybersecurity aspects necessary to guarantee the resilience of IoT, Fog and Cloud infrastructures. The peculiarities of the different architectures have also been examined in terms of authentication, role management, securing the channel and the communication protocol.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/\" \/>\n<meta property=\"og:site_name\" content=\"RSE\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-10T08:54:55+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/\",\"url\":\"https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/\",\"name\":\"Models and tools for the analysis of anomalies in ICT infrastructures based on AI techniques and analysis of the Cybersecurity of Fog\/Cloud and IoT platforms in the digitalization of the electrical system - RSE\",\"isPartOf\":{\"@id\":\"https:\/\/www.rse-web.it\/#website\"},\"datePublished\":\"2024-09-10T08:54:06+00:00\",\"dateModified\":\"2024-09-10T08:54:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rse-web.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Models and tools for the analysis of anomalies in ICT infrastructures based on AI techniques and analysis of the Cybersecurity of Fog\/Cloud and IoT platforms in the digitalization of the electrical system\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rse-web.it\/#website\",\"url\":\"https:\/\/www.rse-web.it\/\",\"name\":\"RSE\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.rse-web.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rse-web.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rse-web.it\/#organization\",\"name\":\"RSE\",\"url\":\"https:\/\/www.rse-web.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png\",\"contentUrl\":\"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png\",\"width\":734,\"height\":164,\"caption\":\"RSE\"},\"image\":{\"@id\":\"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Models and tools for the analysis of anomalies in ICT infrastructures based on AI techniques and analysis of the Cybersecurity of Fog\/Cloud and IoT platforms in the digitalization of the electrical system - RSE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/","og_locale":"en_US","og_type":"article","og_title":"Models and tools for the analysis of anomalies in ICT infrastructures based on AI techniques and analysis of the Cybersecurity of Fog\/Cloud and IoT platforms in the digitalization of the electrical system - RSE","og_description":"The report describes the analysis of attack processes on computer systems by means of probabilistic graphic tools such as Bayesian networks. Various predictive and diagnostic analyses are presented for the identification of attacks in IT\/OT contexts and the defense of the system. The document also analyzes some of the cybersecurity aspects necessary to guarantee the resilience of IoT, Fog and Cloud infrastructures. The peculiarities of the different architectures have also been examined in terms of authentication, role management, securing the channel and the communication protocol.","og_url":"https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/","og_site_name":"RSE","article_modified_time":"2024-09-10T08:54:55+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/","url":"https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/","name":"Models and tools for the analysis of anomalies in ICT infrastructures based on AI techniques and analysis of the Cybersecurity of Fog\/Cloud and IoT platforms in the digitalization of the electrical system - RSE","isPartOf":{"@id":"https:\/\/www.rse-web.it\/#website"},"datePublished":"2024-09-10T08:54:06+00:00","dateModified":"2024-09-10T08:54:55+00:00","breadcrumb":{"@id":"https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rse-web.it\/en\/reports\/models-and-tools-for-the-analysis-of-anomalies-in-ict-infrastructures-based-on-ai-techniques-and-analysis-of-the-cybersecurity-of-fog-cloud-and-iot-platforms-in-the-digitalization-of-the-electrical-sy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rse-web.it\/en\/"},{"@type":"ListItem","position":2,"name":"Models and tools for the analysis of anomalies in ICT infrastructures based on AI techniques and analysis of the Cybersecurity of Fog\/Cloud and IoT platforms in the digitalization of the electrical system"}]},{"@type":"WebSite","@id":"https:\/\/www.rse-web.it\/#website","url":"https:\/\/www.rse-web.it\/","name":"RSE","description":"","publisher":{"@id":"https:\/\/www.rse-web.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rse-web.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rse-web.it\/#organization","name":"RSE","url":"https:\/\/www.rse-web.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/","url":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png","contentUrl":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png","width":734,"height":164,"caption":"RSE"},"image":{"@id":"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/"}}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/195122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti"}],"about":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/types\/rapporti"}],"author":[{"embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/users\/464"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/comments?post=195122"}],"version-history":[{"count":2,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/195122\/revisions"}],"predecessor-version":[{"id":195126,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/195122\/revisions\/195126"}],"wp:attachment":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/media?parent=195122"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/tags?post=195122"},{"taxonomy":"targets","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/targets?post=195122"},{"taxonomy":"rapporti_tipologie","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti_tipologie?post=195122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}