=Paper=
{{Paper
|id=Vol-1728/paper2
|storemode=property
|title=Extending GOReM Through the RAMSoS Method for Supporting Modeling and Virtual Evaluation of the Systemic Risk
|pdfUrl=https://ceur-ws.org/Vol-1728/paper2.pdf
|volume=Vol-1728
|authors=Simona Citrigno,Angelo Furfaro,Teresa Gallo,Alfredo Garro,Sabrina Graziano,Domenico Saccá,Andrea Tundis
|dblpUrl=https://dblp.org/rec/conf/ciise/CitrignoFGGGST16
}}
==Extending GOReM Through the RAMSoS Method for Supporting Modeling and Virtual Evaluation of the Systemic Risk==
Extending GOReM through the RAMSoS method for supporting modeling and virtual evaluation of the Systemic Risk Angelo Furfaro, Teresa Gallo, Alfredo Garro, Simona Citrigno, Sabrina Graziano Domenico Saccà, Andrea Tundis Centro di Competenza ICT-SUD, Department of Informatics, Modeling, Electronics and Piazza Vermicelli, Systems Engineering (DIMES), University of Calabria, 87036 Rende (CS), Italy Via Ponte P. Bucci 41C, Rende (CS), 87036 Italy simona.citrigno@cc-ict-sud.it, {a.furfaro, t.gallo, a.garro, sacca, a.tundis}@dimes.unical.it sabrina.graziano@cc-ict-sud.it Copyright © held by the authors. Abstract— Recently, due to the increasing complexity and remarkable entity. Its main features are: (i) small fragilities wider adoption of heterogeneous systems, the management of that combine to produce a more extensive failure; (ii) risk security properties, vulnerabilities and risks of systems by sharing or contagion, when a loss triggers a chain of other integrating and structuring existing components, is becoming losses; (iii) hysteresis, when the system is unable to recover more and more crucial. A particular aspect to be considered is after a shock. [10]. The causes that lead to systemic events the Risk Analysis and, specifically, the analysis of the Systemic reside primarily in the influence that the various actors in the Risk. This risk derives from the interdependence of the system network have with each other; furthermore the systemic under consideration, from services provided by other systems importance of the various actors is not determined by their and, in general, from the interactions among them. In fact, it may size, but from the correlation degree among them. Similarly, it happen that an adverse event, which occurs at a certain system that is not properly controlled, can cause dangerous effects that, is not always true that a negative event of large dimensions through its propagation to other interconnected systems, can be always defined as systemic. In fact, the propagation would/could compromise their operation. Thus, suitable mechanism can be realized not only through the direct engineering approaches need to be exploited to prevent and exposure to a negative event caused by the shock, but also manage the risks arising from the integration of system indirectly. In this context, it is interesting to understand how it components so as to increase the security of systems, data and is possible to modeling actors and factors arising from even human life. In this context, the paper proposes specific systemic risk in order to fully consider them in the different extensions of a Goal Oriented methodology for Requirement phases the of risk analysis. Modeling, called GOReM, through the RAMSoS method, natively conceived for supporting dependability analysis. Such In this context, the paper aims at investigating in such combination enables the modeling and the evaluation of the direction by exploiting engineering tools for representing Systemic Risk centered on agent-based simulation techniques. relationships among systems/services and observing their The combination of RAMSoS and GOReM is experimented on a behavior. Specifically, the adoption of the Systems case study concerning an online payment service, by evaluating Engineering approach combined with Modeling and the impact of the failure of a single component on the overall Simulation techniques are used to catch how and which system. entities of the overall system influence the operation of the entire system and, as a consequence, the evaluation of the Keywords— Cybersecurity, Modeling and Simulation, Systemic Risk. In particular, the combination of a Goal Requirement Engineering, Systemic Risk Analysis. Oriented methodology for Requirement Modeling, called GOReM [4], with the RAMSoS method [8], natively I. INTRODUCTION conceived for supporting systems dependability analysis, is In recent years, the global crisis has shown that the provided. Such combination enables the modeling and the benefits of globalization are increasingly accompanied by a evaluation of the Systemic Risk by exploiting an agent based growing interdependence and interconnection of systems and simulator that has been ad-hoc implemented. services, bringing out new vulnerabilities coming from The rest of the paper is structured as follows: Section II unexpected directions. Global risk can cause a significant presents the related work and highlights the main research negative impact on a number of countries and companies, challenges related to the systemic risk in the cyber-security showing a systemic nature [14]. In this view, it is important to domain; the combination of the GOReM and RAMSoS distinguish between the idiosyncratic shock which affects only methods are presented in Section III. A case study concerning a single institution or activity, respect to the systemic risk that an online payment service is described in Section IV, whereas can cause the rupture of an entire system (social, political, the simulation-based evaluation is presented in Section V. economic, technological, etc.), causing a damage of Finally conclusions are drawn in Section VI. II. A PANORAMA ON THE SYSTEMIC RISK affect the overall market trend, and influencing systemic risk growth): A. Overview on the Systemic Risk As mentioned above the Systemic Risk is intended as a Informational contamination. Rapid news propagation risk deriving from the interdependence between the main having influence on financial topics leading to considerable system, object of the analysis, and the services provided by mismatches on assets and liabilities maturities. A striking other systems and, in general, by the interactions between example of the materialization of such event is the failure of them. It is possible to define the systemic risk as “any set of Lehman Brothers, which led, from one side, Merrill Lynch to circumstances that threatens the stability of or the public trust merge with Bank of America, and, on the other side, Goldman in the system” [2]. In this way, there is a strong link between Sachs and Morgan Stanley to become ordinary banks, causing systemic risk and operational risk and it is interesting to in this way the collapse of US real estate stocks. The understand how it is possible to explicitly modeling factors involvement of important institutions in the crisis is relevant deriving from systemic risk in order to fully consider them in for the propagation of negative information. the different phases of operational risk analysis and treatment. Loss of specific and confidential information about the Companies inadvertently expose themselves to risks creditworthiness of the debtor. The failed credit bank outside of their structure, by outsourcing, interconnecting or customers will have greater difficulty in obtaining a credit to divulging their data to an increasingly complex and new banks. This is because new banks can apply more inscrutable networks’ system. Some risk factors have been restrictive policies for granting credit to new customers since identified and published on the “Zurich Cyber Risk Report”, there is scarce information about them. and, in particular, seven IT risks have been identified that Debt-Credit relations between banks. Credit institutions could threaten a systemic shock: internal corporate network, and financial intermediaries are inclined to work more closely outward counterparts and affiliates, supply chain and among themselves at commercial level. The risk of a crisis outsourcing contracts, disruptive technologies (IoT in the first spreading in the whole financial system can be increased by place), critical infrastructure and external shocks [15]. the interactions between banks and intermediaries, which can These seven risks can be grouped in three areas “Near, be related not only to the interbank market, but also to a large Everywhere and Distant”. The “near” area is related to the sector of derivatives markets, included CDS (Credit Default usage of contracts, SLAs, internal corporate controls and Swap), guarantees, brokerage services, etc. resiliency within a company. The “everywhere” area includes Liquidity spiral. This negative externality occurs when all those companies that may have contractual relationships financial market operators, instead of selling financial assets with other companies around the world, so the risks are not for gaining liquidity, use different strategies to restrict the new generally controlled by individual contracts, but by companies credit extension, that means, for example, making a credit and governments through standards, regulations, global and rationing having high-margin/cuts, or increasing the interest national governance. The “distant” area is then related to all rate for the grant allocation. These activities can reduce prices those external risks to which individuals or group of and outputs and, can increase the possibility of failure in companies may not have any influence. Risk control coming accessing the loan. This kind of problem is caused by an from external shocks is almost entirely in charge of extreme exposure to risk of the liquidity shortage by financial governments, intergovernmental organizations and institutions, which make use of high debt strategies. transnational organizations [15]. In the end, the negative propagation effects can be greater B. Systemic Risk in the Finalcial field when the failure is related to large institutions having different Systemic risk in the financial sector can be thought as the interconnections and in the presence of a not transparent probability that a failure of a significant portion of the market structure (OTC markets, not characterized by the financial sector can occur, which can lead to a reduction in typical requirements for regulated markets). Government credit availability. The materialization of such event is likely institutions implicitly support and foster financial institutions to generate negative effects on the real economy. Systemic to increase their size and interconnections, so that they can risk in the financial sector is essentially related to the risk of increase the possibility of being saved in time of crisis, since infection among financial institutions, which could generate a they are “too big to fail”. potential destabilization of the entire financial system. Some negative externalities, or inappropriate behaviors, generating C. Systemic Risk in the Information Technology field damaging effects on the financial market status, have great Microsoft has proposed the creation of a G20+20 Cyber impact on the increasing of the systemic risk. Several Stability Board, that means, 20 governments and 20 preventing approaches have been proposed: making use of companies, operating in the information and communication suitable financial stability or strength indicators; measuring technology, which should work in synergy to draw up a set of the existing correlations between financial institutions; usage basic principles ensuring, from one side, an 'acceptable of legislative bodies aiming at regulating the activities of the behavior' in cyberspace and, on the other side, some actors in the financial sector to minimize such kind of risks. “guidelines” to improve IT risk management. Four main reasons determining negative effects on a The following recommendations about potential systemic system have been identified (the focus is on negative risk impact in IT, can be useful for both large and small externalities, i.e. economic and financial behaviors which organizations to survive to a potential cyber shock, and can be considered as a kind of “shock absorber” that can potentially been incrementally improved through its actual exploitation reduce the magnitude of the shock: (i) improving the resilience for better supporting the requirements modeling aspects and it and incident response at system level; (ii) expanding security has been experimented in other real industrial research concepts aim at involving third-party suppliers as much as projects. Moreover, a set of lessons learned have found a possible; (iii) providing targeted subsidies; (iv) considering response in the current proposal. The full-fledged version of other measures, such as “Stability Board” and the “G-SIFIs” GOReM methodology is described in this section. The requirements. GOReM method is centered on the UML notation, which is easy to use and it simplifies concepts sharing with a wide For small business enterprises there are three categories of variety of stakeholders. The resulting requirements modeling recommendations: Basic, Advanced and Resilience. activity is recognized by the actual users to be easier and more Basic. The main 5 crucial recommendations of the 20 effective than their past requirements elicitation activities. Critical Security Controls SANS, are taken in consideration: GOReM consists of three main phases, each of which is (1) Whitelist application - organizations should enable devoted to modeling specific aspects of a requirement computers to perform only a limited set of pre-approved engineering process: Context Modeling, Scenario Modeling, programs; (2) Standard system configurations usage - Application Modeling; specifically: computers with a few standard configurations are less expensive and easier to defend; (3) Patch application software in the Context Modeling phase, the stakeholders are and (4) System software within 48 hours - large companies identified along with their objectives as well as the should check software on a regular basis looking for any bugs dependencies among softgoals; moreover, the rules and in order to drastically reduce the opportunities of regulations that govern the business context under vulnerabilities exploitation by hackers;(5) Reduction of the analysis are identified and documented. number of users having administrative privileges. in the Scenario Modeling phase, different business Advanced. Broadening risk horizon - taking in scenarios are derived from the Context model, in terms consideration counterparts, contracts and outsourcing of roles that are played by the stakeholders involved in agreements, and critical infrastructure, each part should be at the modeled scenario, their specific goals and their least partially controlled by contracts, agreements on service dependencies, and the rules and regulations that govern levels, in-depth site visits and audits; Cyber Insurance usage - each elicited business scenario. Furthermore specific to transfer IT risks, particularly risks associated with third- analyses that show the strengths, weaknesses, party data breaches or business interruption; Requiring opportunities and threats are also performed to guide and standard and more resilient and safe products to key suppliers; support strategic decisions at business level related to the Acquiring at management level a broader view on IT risks. future work. Resilience (the ability of large companies to recover from in the Application Modeling phase, one or more interruptions in the shortest time as possible): Redundancy - application scenarios are introduced in order to specify redundant power and telecommunications suppliers, ISP main functionalities which should be provided by a alternately connected to the peering point, work-around with single business scenario resulting from the previous little dependence on IT in order to provide some alternative phase. solutions when Internet access is off; well defined Response to incidents and business continuity planning - standard operating procedures, clear objectives based on metrics, quantification of the needed time to detect an accident or an intrusion in the system; Simulating scenarios and security training - analyzing the most likely and the most dangerous cyber risks and test their Security Response Team, together with the company management in order to build a historical memory for incident response. III. COMBINING GOREM AND RAMSOS METHODS FOR MODELING AND SIMULATING SYSTEMIC RISK A. GOReM Overview GOReM (Goal Oriented Requirements Methodology) is a lean, easy to master methodology for capturing and maintaining up-to-date requirements of large systems operating in complex application domains. GOReM first definition [4] was done in 2014, for supporting the Fig. 1. The GOReM process requirements engineering activities in an industrial research project [5, 6, 7] where numerous stakeholders, coming from several industrial and academic domains, with different goals, skills and languages had to cooperate. Since then, GOReM has Multiple scenarios are concurrently set down. A sketch of context history: does the current context state depend on the reference process for the GOReM method along with its a previous ones? main work-products is shown in Figure 1. Lesson 3: legal aspects. The specific context model and The lessons learned from the experience derived by the different business scenarios are handled by several Rules exploiting the GOReM method on important research projects and Regulations that might be in conflict. As a consequence, it by cooperating with industrial partners such as ACI is important for modeling a context and any specific business Informatica [1] and Poste Italiane [12], allowed to catch not scenario, to understand which laws are involved, which is a only strengths but also weaknesses of the method, which have policy as a “standard” or a best practice as a “guideline” that been considered to refine and improve GOReM. The most can be adopted or not, depending on the stakeholders needs. In interesting and relevant “lessons learned” are reported in the addition, there are stakeholders of specific customers that can following. have a set of internal policies which, in turn, should be considered and their eventual contrast with some laws or Lesson 1: human interactions and cooperation. It is requested best practices should be discovered and resolved. probably the most difficult task due to different skills, Finally, as a desired service can be used in different Nations, backgrounds and knowledge which lead to big the requirement model has to analyze and manage the legal misunderstandings, lethal for establishing system usability of a service for a given customer. Furthermore, requirements. It is likely to encounter mistakes when a new requirements engineering processes should manage legal application domain is being explored because of: (i) aspects by continually monitoring their changes over the time, misleading interpretation, due to the coexistence of different during the overall system lifecycle. interpretations of stakeholder goals and requirements, that usually happens when people have different skills and the Lesson 4: tracing evolution. Business context, scenarios same concepts are interpreted differently according to the and applications can evolve because of their dynamic nature. stakeholder’s background; (ii) conflicting specifications, when It is important to have some tracing mechanism that allows specific strategies, that could potentially create strong knowing which application model version from which disadvantages in other application scenarios are adopted in scenarios model version has been derived and this last one to order to reach a specific goals in a specific application which business context model version refers to. For big and context; (iii) late discovery of redundancy, when in advanced continuously evolving system engineering process, this is of development project stages the same concept is described and fundamental importance and especially for maintaining represented differently several time or different terminologies control and governing the system evolution along its life. is used for describing the same concepts (iv) fragmentation of efforts; (v) weak focus on objectives for achieving the desired Lesson 5: inter-scenarios dependencies and reuse. Quite goals and being competitive and effective; (vi) partner often, business scenarios evolve with a specific team of coordination, when there exist different partners having analyst/designer (sub)domain experts that have the objective different objectives to reach; (vii) work-product integration, to go ahead following their requirements engineering for when there is a need to integrate, harmonize and handle specific final services. This can lead to duplication of work deliverables, services and products coming from different and, worse, to services which do the same thing (same tasks. requirements) but in a different way. This is often difficult to discover and create customer dissatisfactions. This happen, for Lesson 2: cross-domain aspects. There are some recurrent example, when the same stakeholder has two different goals features that might be identified once for all as well as which belong to two different scenarios, but the two common characteristics for each domain of interest that have application models reaching the two goals, share many “what to be considered and properly represented, which in turn arise to do” but unawares. questions that need to be answered, such as: In the light of the above reported lessons learned during space: Is the considered context model influenced by the the method exploitation, starting from Lesson n.1, an updated location and the territorial extension (e.g. regional, and refined version of the GOReM method in [4] is provided. national, international, members states)? 1) The Context Modeling phase time: Is the considered context model influenced by The Context Modeling phase aims at clearly representing temporal aspects (e.g. a new law replaces partially or the reference business domain for the project under totally a previous one )? consideration. The work-products of this phase are: a Stakeholder Diagram, which shows a (hierarchical) Whereas there are some features that need to be identified specification of all the involved stakeholders, each of which is and analyzed according to the specific scenario, such as: in turn characterized by a set of Softgoals they intend to subject: who/what is the subject of the described context? pursue; a Softgoal Dependency Diagram, which shows the relationships among Softgoals, (i.e., contribute, hinder, user profile: are the user preferences/personal features include, extend, generalize); a Rules and Regulations report represented in the context model? Does the system shortly describing the rules and regulations governing the describe the user’s characteristics one by one or does it Context, distinguishing between Laws, which can be National provide a role-based model of user classes? or International, and known used Policies and Best practices. Table I shows symbols already used in the first version of The SWOT Analysis activity [11], represented in a matrix the methodology, while table II shows the identified and as showed in Table IV, provides an assessment of internal and considered types of rules and regulations. external factors that may affect the scenario and may support decisions whereas to continue with the next phase, that is the TABLE I. THE CONTEXT MODEL - MAIN CONCEPTS Application Modeling. For Goals and dependencies diagram, Concept Graphical Description symbols in Table I are used. Notation Stakeholder The UML Actor symbol TABLE IV. THE SCENARIO MODEL – SWOT ANALYSIS extended through a yellow- HELPFUL HARMFUL filled head stereotype Internal Strengths: what are Weaknesses: what are the Softgoal/Goal The SysML[16] Requirement Origin the strengths (i.e. weak points (i.e. native construct benefits controllable) disadvantages controllable) Contribute A UML Dependency symbol External Opportunities: possible Threats: potential threats Dependency extended with a “+” stereotype Origin opportunities (i.e. (i.e. disadvantages not Hinder A UML Dependency symbol advantages not controllable); Dependency extended with a “-” stereotype controllable) Include/Extend The UML native dependencies Dependencies applied among softgoals or Rules and Regulations selection activity considers which goals rules and regulations, identified in the Context Modeling phase, must be considered in the modelled scenario, by Generalize The UML Generalize identifying them with a structured ID, describing them, Dependency Dependency native symbol specifying if they are laws, policies and best practices, indicating the adopters, and warning possible dependencies TABLE II. THE CONTEXT MODEL – RULES AND REGULATIONS with other considered rules. In particular, GOReM uses the Type Description matrix formats, showed in table V. This is an improvement Best Practice Best practice is considered a business buzzword, introduced and allows to better manage the issues discussed in used to describe the process of developing and lesson 3 related to legal aspects. following a standard way of doing things that multiple organizations can use to maintain TABLE V. THE SCENARIO MODEL – RULES AND REGULATIONS quality. It is not mandatory and can be based on self-assessment or benchmarking. Identifier Rule/ Type Location / Warnings Policy A Policy is a deliberate system of principles to Regulation Adopter guide decisions and achieve rational outcomes. Structured Description Policy/ Best Locations List of It is a statement of intent, and it is implemented ID Practices/ and/or identifiers as a procedure or protocol. National names of of other National Laws National laws are valid and affect the State or Law/ known rules and Country that has enacted them. Internation adopters regulations International International laws are enacted by specific al Law which can Laws Authorities and they govern the behavior of the have Members States belonging to a specific influence community according to specific agreements. on its application 2) The Scenario Modeling phase The Scenario Modeling phase specializes the Context 3) The Application Modeling phase Model through the identification of evolutionary scenarios that Starting from the scenarios defined during the previous have to be modelled within the context of interest. Such phase, in the Application Modeling phase, a set of specific scenarios are identified through an analysis that takes into business scenarios might be identified. This phase defines account the roles played by stakeholders in each scenario, by application scenarios that are used to specify in detail the indicating the specific Goals related to some Softgoals in the capabilities to be provided in the specific scenarios identified context model and the Rules and Regulations that govern the in the previous phase, along with main use cases description, scenario. Table III shows symbols used for roles and for the actors and processes. In particular, each main use case may associations with the stakeholders. become a service to be developed as a research prototype and/or developed and engineered as part of a more complete TABLE III. THE SCENARIO MODEL – MAIN CONCEPTS industrial system. Concept Graphical Description In addition, some processes can be specified using UML or Notation BPMN notations [13]. Stakeholder's The UML actor symbol extended Role through a pink-filled head Table VI shows basic used symbols in modelling an stereotype application scenario. The Package is a Namespace of use Plays A UML Dependency symbol cases, which are not in the scope of the application which is Dependency extended with a “plays” stereotype modelled, but are assumed that they exist in some different Application model, even in an Application model obtained from a different Scenario Model, while in this Application A full description of RAMSoS can be found in [8]; Model they have to be identified and extended through the whereas Table VIII reports the main phases (Requirement standard “extend” UML relationship. Analysis, System Design, e System Risk Evaluation) that are identified by combing GOReM and RAMSoS for modeling TABLE VI. THE APPLICATION MODEL – MAIN CONCEPTS the systemic risk aspects and supporting its analysis through Concept Graphical Description agent-based simulation. Notation Application The UML actor symbol TABLE VII. PHASES, ACTIVITIES AND WORK-PRODUCTS OF RAMSOS Scenario’s extended through a blue-filled Phase Activity Work-product Actor head stereotype SoS - Organizational Organizational Model (MO) Use Case The UML Use Case native symbol. Structural Structure Modeling Architectural Model (AM) Modeling - Architectural Modeling SoS - Goal Modeling Goal Model (GM) Package The UML NameSpace for Use Behavioral - Role Modeling Role Model (RM) cases supposed already existent Modeling in another Application Model, SoS - Agent Modeling Multi-Agent Model (MAM) Simulation - Scenario Modeling Scenario Model (SM) Modeling Extend The UML <>and In particular, some phases are complementary, some others /Include < >native use the output produced from a method as input for the other dependencies among use cases one. The resulting method will be exemplified through a case This is how GOReM is now responding to lesson n.2 study in the next Section. cross-domain aspects and lesson n.5, Inter-scenarios TABLE VIII. GOREM EXTENSIONS THROUGH THE RAMSOS METHOD dependencies and reuse. The corresponding work-products should be more precise and should indicate exactly to which Phases GOReM RAMSoS Description use case of which scenario an extending use case refers to and the kind of needed extension. Requirement Context - Through GOReM it is Analisys Modeling possible to identify the Every UML based diagram can be enriched with the UML involved entities: Stakeholders, Goals, comment symbol which allows adding a description to all the Rules and Regulations, GOReM diagrams. However, a textual description and for the Systemic Risk complete information is located in the corresponding work- Analysis. product. System - SoS Starting from the entities Design Structural identified in the previous Finally, concerning lesson n.4, tracing evolution, some Modeling phase, RAMSoS enable shared existing policy of naming and versioning method/tool, their formal structural and organizational for every model (context, scenario, application) and each of its representation as peer-to- work-products, must be used. In addition, some configuration peer or hierarchical management tool should be of help in maintaining the entities. requirements evolution of the whole system [17]. This allows Scenario SoS GOReM is exploited for knowing exactly for each application model, which scenario Modeling Behavioral modeling the scenarios, model and context model refer to. In addition, whichever Modeling roles and rules that and characterize the scenario; refinement for a model created in one of the three GOReM the objectives to be phases must produce a new model referring the model it wants Use Case achieved, weaknesses to improve. Moreover, each application model, if implemented Modeling and strengths. By should refers to its development artefacts and releases in adopting RAMSoS, such Role Model can be operation. exploited for identifying and defining tasks for B. Combining RAMSoS and GOReM achieving the identified RAMSoS [8] is an agent-based method that aims at objectives. supporting the dependability analysis of Systems of Systems Systemic - SoS Starting from the (SoSs). It is conceived as an extension of RAMSAS [8], a Risk Simulation objectives defined in the Evaluation Modeling Use Case Modeling model-based method for the reliability analysis of systems phase of GOReM, the through simulation, based on UML/SysML for modeling the system is represented in system structure and behavior, and on well-known simulation terms of Simulation platforms, such as Mathworks Simulink and OpenModelica. Agents that are used to simulate and evaluate the The RAMSoS method defines three main phases, which in risk and its propagation turn are divided into activities (see Table VII). among the involved entities. IV. A CASE STUDY ON AN ONLINE PAYMENT SERVICE services. It is estimated in terms of success and failure, where The case study under consideration falls within the online Success = 1-Failure, therefore Success + Failure = 1. The payment services and in particular exemplifies the approach higher the percentage / value of the Success, the lower the based on combination of GOReM and RAMSoS, adopted for level of risk associated to it and as a consequence the lower systemic risk analysis applied to a service of Electronic the risk level of the PEOservice. Vice versa the lower the Payment Online (PEO) of Poste Italiane. The main objectives percentage of the Failure variable, the lower the level of risk of this study are: (i) The assessment of systemic risk, when associated to it, and then the lower the risk level of the PEO there is a dysfunctional behavior in one of the service service. In the following, the extended version of GOReM is components, in terms of the propagation of a disservice among employed for the modeling and evaluating the system above other components; (ii) impact of a service failure to the described. services. B. Context Modeling A. Service Description, Risk Factors and Involved Actors As described above, the context falls within the scope of The PEO service is based on two services: SMS online payment systems in which through a websites is Notifications and Payments and Transactions, both designed possible to make purchases, transfers of money etc. A to be used from smartphones and tablets. SMS Notifications particular important diagram of GOReM is the Dependency allows to receive SMS messages on transactions made on a diagram (Fig. 2) that at the same time allow to represents the bank account or by “PostePay” card; whereas Payments and stakeholders, the goals that they are meant to achieve and Transactions allows bank transfers, payment of bills, money dependencies (conflicts/extensions and so on among goals). transfer via MoneyGram, PostePay top up, or balance check and movements. In this context, the aim of this experience is the identification and the analysis of systemic risk factors linked to the PEO service. In particular, the risk of success or failure of the PEO service relies on two complementary services: SMS Notifications and Payments and Transactions, plus the IT Internal Infrastructure. A preliminary analysis shows that the SMS Notification service is linked to the Mobile Service Provider whose goal is to notify the user of the transaction (payment, charging, etc.). Whereas the Payments and Transactions is related both to the Web Service Provider that provides access to the Intranet / Internet and the Energy Provider that supports the entire infrastructure with the electrical service. An additional risk factor is related to the underlying IT infrastructure (hardware, servers, etc.). In this context, the following risk factors: IT Internal, Fig. 2. Dependency diagram Outsourcing and Contracts, Infrastructure Upstream, are identified and described along with the related actors. In C. Scenario Modeling particular: (i) the IT Internal risk relies on the reliability of the In this phase of the method, as it is shown in Figure 3, both Internal IT infrastructure; (ii) the Outsourcing and Contracts the roles played by the stakeholders in each specific scenario risk depends on the WebServiceProvider for supporting the are identified, and the goals related to each identified role are monetary transactions; (iii) whereas Infrastructure Upstream highlighted. Furthermore the dependencies among the Goals risk is related to the availability of both the mobile are shown in Table IX. notification service offers by the MobileServiceProvider and the electricity provided by the ElectricityProvider. Furthermore, since the approach requires the input of information related to potential risk groups (e.g. contract type, involved partner), for each actor, the following risk groups have been identified: - IT-Internal-Infrastructure: Good, Standard, Poor; - WebServiceProvider: High, Medium, Low; - Energy Provider: High, Standard; - MobileServiceProvider: HighLevelOfService, StandardLevelOfService; - SMS Notification: Good, Low; - Payments and Transactions: LowRisk, HighRisk. The output of this analysis is the risk level of the PEO service according to the different levels of risk of the other Fig. 3. Stakeholders, Roles and Goals TABLE IX. STAKEHOLDERS, ROLES, GOALS AND DEPENDENCIES V. SIMULATION-BASED EVALUATION Stakeholders Roles Goal Dependencies Once the model and relationships among actors and their goals are well described and defined, it is possible to use Customer PEO User G1 simulation to provide an assessment about what can happen into an application scenario according to specific inputs to the system. In the following, first a statistic based tool is exploited Service Web Service Provider G9 G9 contributes to G1 Provider for a static analysis and then a more dynamic is adopted. Electricy Service A. A statistics-centered approch Service Provider provider of GeNIe (Graphical Network Interface) is a development the customer Mobile Service Provider environment for the creation of decision models [9]. It is presented as a graphical user interface of SMILE, a platform- Poste PEO Services G2 G2 and G4 independent library that implements functions for the Personnnel Responsible contribute to G1 execution and analysis of probabilistic / decision models, such as Bayesian networks, used to make probabilistic reasoning in PEO Services decision-making situations under uncertainty. Continuity planner G3 Starting from different contractual terms of the services PEO Continuity Internal G4 described above, it is possible to obtain an assessment in terms Audit and Test of the level of success (and complementary to the failure level) of the PEO service, which in turn can be associated with Operator of PEO Continuity Internal G4 G4 contributes to G1 a level of risk. From the experience of the domain experts of Technological Audit and Test Poste Italiane, the following percentage range is used: infrastructures or networks PEO IT Infrastructure - Success>90% then LowRisk resilience G6 G6 contributes to G3 - 89%≥Success>70 then MediumRisk; PEO Disaster Recovery G5 G5 contributes to G1 - Success≤70 then HighRisk; Responsible A first example is shown in Figure 5. By considering a combination of services based on the percentages shown in Poste operator PEO Damage Impact G7 G7 includes G3 each block the probability of success is 99%, which means a Evaluator LowRisk. The diagram is also enriched with to additional PEO processes blocks: FinancialGain and InvestmentDecision, lead the definition responsible G8 G8 includes G3 decision maker to make decisions about the quality of the services to be subscribed. In this case, as shown by the “InvestmentDecision” and “Financial income” blocks, it is D. Application Modeling convenience to invest (with a gain of € 9850) by subscribing The application model allows describing, with more services with such quality parameters indicated, compared to details, a particular instance of the scenario under not invest (€ 6940). consideration. Specifically, Figure 4 represents the case of failure of a service to third parties necessary for the provision of online payment services, and the impact on the other users who use the service, possible costs (impact) for the failure to provide the service. Fig. 5. Low Risk of the PEO service Conversely, considering a low level quality of the SMS Notification service, and by also subscribing a low level quality of the WebServiceProvider service, the level of risk spreads systematically on the Payments and Transactions Fig. 4. Use Case diagram services by influencing drastically the PEO service. In fact, the success rate drops to 63%, which means “HighRisk” (Fig. 6). Fig. 6. High Risk of the PEO service B. An Agent-based approach This second approach is centered on a reference Fig. 7. Reference Model framework, called ReActor, an object oriented framework based on discrete-events simulation[3]. The reference model adopted for the definition and the development of the agent- based simulator for the analysis of the systemic risk is represented in Figure 7. In particular for each static blocks represented in Figure 6, a specific ReActor entity is defined. Then a behavior is associated to each of them, based on the follow four main actor models: ServiceModel: this model is employed for services belonging in the specific scenario to be analyzed; its aim is to provide the service associated to it; AttackModel: this model is adopted for modeling attack scenarios and related typologies of attacks respect to a specific ServiceModel; RecoveryModel: it aims to model policies and countermeasures in order to make more resilient a specific service when some anomalies occur; Fig. 8. ServiceAgent behavior ObserverModel: it is employed for monitoring specific properties of interest which are strictly In particular, when the simulation starts, the status of related to a specific service; it aims to collect ServiceAgent becomes Working. This means that the information of specific properties, locally at service ServiceAgent is doing its job/delivering the service level or globally at scenario level. correctly.When an anomaly occurs, the state Working can get two types of events: ServiceFailure and Such models have been implemented by extending the ServiceFailurePropagation. Such events change the status of above mentioned agent-based framework by mapping them as ServiceAgentinto NotWorking, which, in turn, is defined in agents, that is, autonomous entities each of which has its own terms of two sub-states DirectFailure and IndirectFailure. In behavior. In particular, the ServiceModel is mapped as particular, when the ServiceFailure event occurs, the status ServiceAgent; the AttackModel as an AttackAgent; the NotWorking declines into the state of DirectFailure. This RecoveryModel is mapped as a RecoveryAgent and the means that the failure of the service was due to internal factors ObserverModel as an ObserverAgent. of the service. This condition triggers the propagation of the failure by a ServiceFailurePropagation event to the services Such agents and their behaviors are achieved by that depend from the ServiceAgent; this means that a service implementing and extending the basic class ActorBehavior of of the system, could receive a ServiceFailurePropagation the Reactor framework, which in turn, has been also defined event, which turns its status into NotWorking and specifically as Observable. Consequently all agents that are introduced in into the IndirectFailurestatus. This implies that its failure was the system, and that extends ActorBehavior, are potentially due to a failure propagated by third parties on which it trackable. Whereas, the ObserverModel and as a consequence depends.Finally, from the NotWorking status, the ServiceAgent the ObserverAgent, has been marked as Observer, that is with can receive a ServiceRepearing event that brings it into the the ability to monitor other agents. Finally, the behavior of Repearing status. This allows to recover/restore the each agent is characterized by different types of Message, that ServiceAgent and propagate this information among the other can respectively transmit, receive and handle in order to services depending on it, so as to make them all Working enable the communication with the other agents. As an again. example, the diagram in Figure 8 shows the behavior of the ServiceAgent defined as a state machine. C. Discussion on the gathered results framework for the development of a simulation platform for From the analysis conducted on this case study, it is clear supporting the evolutionary assessment and dynamic behavior how the quality of services level and the involved system analysis of system has been exploited. infrastructure (internal or third-party), strongly influence the Finally, a first experimentation of such above mentioned success or the failure for the delivery of a service. In this case conceptual and technical tools has been conducted on a case the use of a low quality Notification service is a critical. As a study concerning the assessment and the impact of failures on consequence, the choice of a good MobileServiceProvider, an online payment service. combined to a Medium/High quality of the WebServiceProvider is essential for making the system more ACKNOWLEDGMENT resilient. Indeed, (i) in the first scenario, which involves the This work has been partially supported by the “National deployment of services with a high level of reliability, or in Operational Programme for Research and Competitiveness” the second scenario, which combines medium-quality 2007-2013, Technological District on Cyber Security services, the system operates to keep resilient in presence of permanent failures, or temporary blackout, of some involved (PON03PE 00032 2 02), funded by the Italian Ministry of entities; (ii) instead, the second scenario highlights the high Education, University and Research, and the Italian Ministry risk due to the strong dependence on entities that provide low of Economic Development. robust / reliable services. REFERENCES Whereas from the conducted study based software agents, [1] ACI Informatica – website http://www.informatica.aci.it/ other useful and more dynamic information are gathered from [2] M. Billio, M. Getmansky, A.W. Lo, and L. Pelizzon, “Econometric the simulation for each service involved (see Table X); for measures of connectedness and systemic risk in the finance and example: if a service is available (working) or unavailable (not insurance sectors”, February 2012. working), the time when the failure of a service happened [3] F. Cicirelli, A. Furfaro, L. Nigro,“A DEVS M&S framework based on (timestamps), if the cause of the failure is due to external Java and actors”, Proc. of 2nd European Modelling and Simulation Symposium, pp. 337-342, Barcelona (Spain), October 4-6, 2006. factors, the impact (e.g. in terms of money) per unit of time [4] S. Citrigno, A. Furfaro, T. Gallo, A. Garro, S. Graziano, and D. Saccà, (e.g. per hours). “Mastering concept exploration in large industrial research projects,” Proceedings of the INCOSE Italian Conference on Systems Engineering TABLE X. SIMULATION RESULTS RELATED TO THE PEO SERVICE (CIISE2014), Rome(Italy), November 24 – 25, 2014. Service Timestamp Service External Impact (€) [5] A. Furfaro, T. Gallo, and D. Saccà, “Modeling cyber systemic risk for the business continuity plan of a bank,” Proceedings of the International Name status causes of per Hour Cross Domain Conference and Workshop (CD-ARES’16), Salzburg failure (Austria), August 31-September 2, 2016. WebService 44 Not no 3 [6] A. Furfaro, T. Gallo, A. Garro, D. Saccà, and A. Tundis, Provider Working “Requirements specification of a Cloud Service for Cyber Security Payment & 44 Not yes 2 Compliance Analysis”, Proceedings of the 2nd International Conference Transaction Working on Cloud Computing Technologies and Applications (CloudTech'16), PEO 47 Not yes 5 IEEE, May 24-16, Marrakesh (Morocco), 2016. Working [7] A.Furfaro, T. Gallo, A. Garro, D. Saccà and A. Tundis, “ResDevOps: A Software Engineering Framework for Achieving Long-lasting Complex Systems”, Proceedings of the 24th WebService 56 Working - 3 IEEE International Requirements Engineering Conference, Beijing Provider (China), September 12-16, 2016. Payment & 58 Working - 2 [8] A. Garro, and A Tundis, “On the Reliability Analysis of Systems and Transaction SoS: the RAMSAS method and related extensions”, IEEE Systems PEO 64 Working - 5 Journal (IJS), vol. 9 (1), pp. 232-241, 2015. … … … … … [9] GeNIe & SMILE – http://www.openclinical.org/dld_genieSmile.html. [10] National Security – https://www.sicurezzanazionale.gov.it/sisr.nsf/ VI. CONCLUSION letture/prevenire-e-gestione-dei-rischi-globali.html. This paper presented a panorama on the concept of risk [11] B.Phadermrod, R.M. Crowder, and G.B. Wills, “Developing SWOT and, in particular, the systemic risk in the financial sector as Analysis from Customer Satisfaction Surveys”, Proc.of the 11th IEEE International Conference on e-Business Engineering (ICEBE), 2014. well as in the cyber-security field. Furthermore, some recent [12] Poste Italiane – website: https://www.poste.it/ research efforts about the modeling and assessment of [13] Unified Modeling Language (UML) – http://www.omg.org/spec/UML/ systemic risk are also presented. In particular, an extended [14] World Economic Forum - Global risks 2014. Ninth Edition. 2014. version of GOReM combined with the RAMSoS method has been employed. [15] Zurich Insurance Company - Risk Nexus . Beyond data breaches: global interconnections of cyber risk. April 2014. A statistical analysis tool for the assessment of systemic [16] SysML V1.4 Specification Release http://www.omgsysml.org/ risk based on a probabilistic approach, called GeNIe, has been [17] Meyer B, “Agile! The Good, the Hype and the Ugly”, Springer adopted; whereas an actor-based and agent-oriented International Publishing, 2014.