Skip to main content

2024 | OriginalPaper | Buchkapitel

Hierarchical Model-Based Cybersecurity Risk Assessment During System Design

verfasst von : Tino Jungebloud, Nhung H. Nguyen, Dong Seong Kim, Armin Zimmermann

Erschienen in: ICT Systems Security and Privacy Protection

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cybersecurity risk assessment has become a critical priority in systems development and the operation of complex networked systems. However, current state-of-the-art approaches for detecting vulnerabilities, such as automated security testing or penetration testing, often result in late detections. Thus, there is a growing need for security by design, which involves conducting security-related analyses as early as possible in the system development life cycle. This paper proposes a novel hierarchical model-based security risk assessment approach that enables the early assessment of security risks during the system design process. The approach uses different OMG UML-based models, supplemented by a lightweight extension using profiles and stereotypes. Various security attributes, including vulnerability information and asset values, are then used by algorithms to compute relevant properties including threat space, possible attack paths, and selected network-based security metrics. A real-life industrial example is then used to demonstrate the approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cai, Z., Wang, A., Zhang, W.: 0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars (2019) Cai, Z., Wang, A., Zhang, W.: 0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars (2019)
2.
Zurück zum Zitat Enoch, S.Y., Ge, M., Hong, J.B., Kim, D.S.: Model-based cybersecurity analysis: past work and future directions. In: 2021 Annual Reliability and Maintainability Symposium (RAMS) (2021) Enoch, S.Y., Ge, M., Hong, J.B., Kim, D.S.: Model-based cybersecurity analysis: past work and future directions. In: 2021 Annual Reliability and Maintainability Symposium (RAMS) (2021)
3.
Zurück zum Zitat Enoch, S.Y., Hong, J.B., Ge, M., Kim, D.S.: Composite metrics for network security analysis (2020) Enoch, S.Y., Hong, J.B., Ge, M., Kim, D.S.: Composite metrics for network security analysis (2020)
4.
Zurück zum Zitat Enoch, S.Y., Lee, J.S., Kim, D.S.: Novel security models, metrics and security assessment for maritime vessel networks. Comput. Netw. 189, 107934 (2021)CrossRef Enoch, S.Y., Lee, J.S., Kim, D.S.: Novel security models, metrics and security assessment for maritime vessel networks. Comput. Netw. 189, 107934 (2021)CrossRef
5.
Zurück zum Zitat European Organisation for Civil Aviation Equipment: ED-202A - Airworthiness Security Process Specification (2014) European Organisation for Civil Aviation Equipment: ED-202A - Airworthiness Security Process Specification (2014)
6.
Zurück zum Zitat European Organisation for Civil Aviation Equipment: ED-203A - Airworthiness Security Methods and Considerations (2018) European Organisation for Civil Aviation Equipment: ED-203A - Airworthiness Security Methods and Considerations (2018)
7.
Zurück zum Zitat Ge, M., Cho, J.H., Kim, D., Dixit, G., Chen, I.R.: Proactive defense for internet-of-things: moving target defense with cyberdeception. ACM Trans. Internet Technol. 22, 1–31 (2021)CrossRef Ge, M., Cho, J.H., Kim, D., Dixit, G., Chen, I.R.: Proactive defense for internet-of-things: moving target defense with cyberdeception. ACM Trans. Internet Technol. 22, 1–31 (2021)CrossRef
8.
Zurück zum Zitat Ge, M., Hong, J.B., Guttmann, W., Kim, D.S.: A framework for automating security analysis of the Internet of Things. J. Netw. Comput. Appl. 83, 12–27 (2017)CrossRef Ge, M., Hong, J.B., Guttmann, W., Kim, D.S.: A framework for automating security analysis of the Internet of Things. J. Netw. Comput. Appl. 83, 12–27 (2017)CrossRef
9.
Zurück zum Zitat Hammer, M., Maschotta, R., Wichmann, A., Jungebloud, T., Bedini, F., Zimmermann, A.: A model-driven implementation of PSCs specification for C++. In: Proceedings of the 9th International Conference on Model-Driven Engineering and Software Development (2022) Hammer, M., Maschotta, R., Wichmann, A., Jungebloud, T., Bedini, F., Zimmermann, A.: A model-driven implementation of PSCs specification for C++. In: Proceedings of the 9th International Conference on Model-Driven Engineering and Software Development (2022)
10.
Zurück zum Zitat Hong, J.B., Kim, D.S.: HARMs: hierarchical attack representation models for network security analysis. In: 10th Australian Information Security Management Conference (2012) Hong, J.B., Kim, D.S.: HARMs: hierarchical attack representation models for network security analysis. In: 10th Australian Information Security Management Conference (2012)
11.
Zurück zum Zitat Hong, J.B., Kim, D.S.: Assessing the effectiveness of moving target defenses using security models. IEEE Trans. Dependable Secure Comput. 13, 163–177 (2016)CrossRef Hong, J.B., Kim, D.S.: Assessing the effectiveness of moving target defenses using security models. IEEE Trans. Dependable Secure Comput. 13, 163–177 (2016)CrossRef
14.
Zurück zum Zitat Monteuuis, J.P., Boudguiga, A., Zhang, J., Labiod, H., Servel, A., Urien, P.: SARA: security automotive risk analysis method. In: Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, pp. 3–14 (2018) Monteuuis, J.P., Boudguiga, A., Zhang, J., Labiod, H., Servel, A., Urien, P.: SARA: security automotive risk analysis method. In: Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, pp. 3–14 (2018)
15.
Zurück zum Zitat Nie, S., Liu, L., Du, Y.: Hacking Tesla From Wireless to CAN BUS (2017) Nie, S., Liu, L., Du, Y.: Hacking Tesla From Wireless to CAN BUS (2017)
17.
Zurück zum Zitat Object Management Group: Unified Modeling Language, Version 2.5.1 (2017) Object Management Group: Unified Modeling Language, Version 2.5.1 (2017)
18.
Zurück zum Zitat Object Management Group: Systems Modeling Language, Version 1.6 (2019) Object Management Group: Systems Modeling Language, Version 1.6 (2019)
20.
Zurück zum Zitat Pedroza, G., Mockly, G.: Method and framework for security risks analysis guided by safety criteria. In: 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (2020) Pedroza, G., Mockly, G.: Method and framework for security risks analysis guided by safety criteria. In: 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (2020)
21.
Zurück zum Zitat Roudier, Y., Apvrille, L.: SysML-Sec - a model driven approach for designing safe and secure systems. In: 2015 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD) (2015) Roudier, Y., Apvrille, L.: SysML-Sec - a model driven approach for designing safe and secure systems. In: 2015 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD) (2015)
22.
Zurück zum Zitat Shaked, A., Reich, Y.: Model-based threat and risk assessment for systems design. In: Proceedings of the 7th International Conference on Information Systems Security and Privacy (2021) Shaked, A., Reich, Y.: Model-based threat and risk assessment for systems design. In: Proceedings of the 7th International Conference on Information Systems Security and Privacy (2021)
Metadaten
Titel
Hierarchical Model-Based Cybersecurity Risk Assessment During System Design
verfasst von
Tino Jungebloud
Nhung H. Nguyen
Dong Seong Kim
Armin Zimmermann
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-56326-3_3

Premium Partner