网络攻击:建模、分析和缓解

Sara Abbaspour Asadollah
{"title":"网络攻击:建模、分析和缓解","authors":"Sara Abbaspour Asadollah","doi":"10.1109/iccsm57214.2022.00021","DOIUrl":null,"url":null,"abstract":"Industrial cybersecurity has risen as an important topic of research nowadays. The heavy connectivity by the Internet of Things (IoT) and the growth of cyberattacks against industrial assets cause this risen and attract attention to the cybersecurity field. While fostering current software applications and use-cases, the ubiquitous access to the Internet has also exposed operational technologies to new and challenging security threats that need to be addressed. As the number of attacks increases, their visibility decreases. An attack can modify the Cyber-Physical Systems (CPSs) quality to avoid proper quality assessment. They can disrupt the system design process and adversely affect a product’s design purpose.This working progress paper presents our approach to modeling, analyzing, and mitigating cyberattacks in CPS. We model the normal behavior of the application as well as cyberattacks with the help of Microsoft Security Development Lifecycle (SDL) and threat modeling approach (STRIDE). Then verify the application and attacks model using a model checking tool and propose mitigation strategies to decrease the risk of vulnerabilities. The results can be used to improve the system design to overcome the vulnerabilities.","PeriodicalId":426673,"journal":{"name":"2022 6th International Conference on Computer, Software and Modeling (ICCSM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyberattacks: Modeling, Analysis, and Mitigation\",\"authors\":\"Sara Abbaspour Asadollah\",\"doi\":\"10.1109/iccsm57214.2022.00021\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Industrial cybersecurity has risen as an important topic of research nowadays. The heavy connectivity by the Internet of Things (IoT) and the growth of cyberattacks against industrial assets cause this risen and attract attention to the cybersecurity field. While fostering current software applications and use-cases, the ubiquitous access to the Internet has also exposed operational technologies to new and challenging security threats that need to be addressed. As the number of attacks increases, their visibility decreases. An attack can modify the Cyber-Physical Systems (CPSs) quality to avoid proper quality assessment. They can disrupt the system design process and adversely affect a product’s design purpose.This working progress paper presents our approach to modeling, analyzing, and mitigating cyberattacks in CPS. We model the normal behavior of the application as well as cyberattacks with the help of Microsoft Security Development Lifecycle (SDL) and threat modeling approach (STRIDE). Then verify the application and attacks model using a model checking tool and propose mitigation strategies to decrease the risk of vulnerabilities. The results can be used to improve the system design to overcome the vulnerabilities.\",\"PeriodicalId\":426673,\"journal\":{\"name\":\"2022 6th International Conference on Computer, Software and Modeling (ICCSM)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 6th International Conference on Computer, Software and Modeling (ICCSM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iccsm57214.2022.00021\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 6th International Conference on Computer, Software and Modeling (ICCSM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccsm57214.2022.00021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

工业网络安全已成为当今研究的一个重要课题。物联网(IoT)的大量连接和针对工业资产的网络攻击的增长导致这种情况上升,并引起了网络安全领域的关注。在促进当前软件应用程序和用例的同时,对Internet的无所不在的访问也使操作技术暴露于需要解决的新的和具有挑战性的安全威胁中。随着攻击数量的增加,它们的可见性会降低。攻击可以改变网络物理系统(cps)的质量,从而无法进行适当的质量评估。它们可以破坏系统设计过程,并对产品的设计目的产生不利影响。这篇工作进展论文介绍了我们在CPS中建模、分析和减轻网络攻击的方法。我们在Microsoft安全开发生命周期(SDL)和威胁建模方法(STRIDE)的帮助下,对应用程序的正常行为以及网络攻击进行建模。然后使用模型检查工具验证应用程序和攻击模型,并提出缓解策略以降低漏洞风险。研究结果可用于改进系统设计以克服这些漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cyberattacks: Modeling, Analysis, and Mitigation
Industrial cybersecurity has risen as an important topic of research nowadays. The heavy connectivity by the Internet of Things (IoT) and the growth of cyberattacks against industrial assets cause this risen and attract attention to the cybersecurity field. While fostering current software applications and use-cases, the ubiquitous access to the Internet has also exposed operational technologies to new and challenging security threats that need to be addressed. As the number of attacks increases, their visibility decreases. An attack can modify the Cyber-Physical Systems (CPSs) quality to avoid proper quality assessment. They can disrupt the system design process and adversely affect a product’s design purpose.This working progress paper presents our approach to modeling, analyzing, and mitigating cyberattacks in CPS. We model the normal behavior of the application as well as cyberattacks with the help of Microsoft Security Development Lifecycle (SDL) and threat modeling approach (STRIDE). Then verify the application and attacks model using a model checking tool and propose mitigation strategies to decrease the risk of vulnerabilities. The results can be used to improve the system design to overcome the vulnerabilities.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信