攻击图在汽车领域威胁分析和风险评估中的应用

Mera Saulaiman, M. Kozlovszky, Anna Bánáti, Á. Csilling
{"title":"攻击图在汽车领域威胁分析和风险评估中的应用","authors":"Mera Saulaiman, M. Kozlovszky, Anna Bánáti, Á. Csilling","doi":"10.1109/CogMob55547.2022.10118297","DOIUrl":null,"url":null,"abstract":"Attack graph is a commonly used methodology in IT security to represent all paths in the system that can lead to a successful attack. It is used to visually represent and automatically analyze security vulnerabilities in the system, as well as to analyze potential defense strategies. Nevertheless, attack graphs are not widely used in the automotive domain. Cognitive mobility systems rely on autonomous decision making by its participants. In order to enable trust in vehicles to make correct decisions, we must ensure that they are immune to failure and malicious manipulation. This trust requires a high level of safety and security. For a smart car, with multiple external connections, the complexity of the attack surface increases dramatically. Ensuring the security of the vehicle depends on a large number of interrelated factors. Thus we need methods, tools and know-how for evaluating the security postures of vehicles. The new ISO/SAE 21434 standard specifies the technical requirements for cyber-security management of road vehicles. It defines the Threat Analysis and Risk Assessment (TARA) for the analysis and assessment of cyber-security risks to a given automotive system. We propose a generic model to automate the attack path generation and analysis in the TARA. We also discuss several use cases for this model, including the enumeration of possible attack paths, the automatic evaluation of the feasibility and risk of each path, and the construction of a defence graph to ensure the security of the system.","PeriodicalId":430975,"journal":{"name":"2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Use Cases of Attack Graph in Threat Analysis And Risk Assessment for The Automotive Domain\",\"authors\":\"Mera Saulaiman, M. Kozlovszky, Anna Bánáti, Á. Csilling\",\"doi\":\"10.1109/CogMob55547.2022.10118297\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Attack graph is a commonly used methodology in IT security to represent all paths in the system that can lead to a successful attack. It is used to visually represent and automatically analyze security vulnerabilities in the system, as well as to analyze potential defense strategies. Nevertheless, attack graphs are not widely used in the automotive domain. Cognitive mobility systems rely on autonomous decision making by its participants. In order to enable trust in vehicles to make correct decisions, we must ensure that they are immune to failure and malicious manipulation. This trust requires a high level of safety and security. For a smart car, with multiple external connections, the complexity of the attack surface increases dramatically. Ensuring the security of the vehicle depends on a large number of interrelated factors. Thus we need methods, tools and know-how for evaluating the security postures of vehicles. The new ISO/SAE 21434 standard specifies the technical requirements for cyber-security management of road vehicles. It defines the Threat Analysis and Risk Assessment (TARA) for the analysis and assessment of cyber-security risks to a given automotive system. We propose a generic model to automate the attack path generation and analysis in the TARA. We also discuss several use cases for this model, including the enumeration of possible attack paths, the automatic evaluation of the feasibility and risk of each path, and the construction of a defence graph to ensure the security of the system.\",\"PeriodicalId\":430975,\"journal\":{\"name\":\"2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)\",\"volume\":\"117 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CogMob55547.2022.10118297\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CogMob55547.2022.10118297","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

攻击图是IT安全中常用的方法,用于表示系统中可能导致成功攻击的所有路径。它用于可视化地表示和自动分析系统中的安全漏洞,以及分析潜在的防御策略。然而,攻击图在汽车领域的应用并不广泛。认知移动系统依赖于参与者的自主决策。为了让人们相信车辆能够做出正确的决定,我们必须确保它们不受故障和恶意操纵的影响。这种信任需要高度的安全和保障。对于拥有多个外部连接的智能汽车来说,攻击面复杂性急剧增加。确保车辆的安全性取决于大量相互关联的因素。因此,我们需要评估车辆安全状态的方法、工具和专有技术。新的ISO/SAE 21434标准规定了道路车辆网络安全管理的技术要求。它定义了威胁分析和风险评估(TARA),用于分析和评估给定汽车系统的网络安全风险。我们提出了一个通用的模型来自动生成和分析攻击路径。我们还讨论了该模型的几个用例,包括枚举可能的攻击路径,自动评估每个路径的可行性和风险,以及构建防御图以确保系统的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Use Cases of Attack Graph in Threat Analysis And Risk Assessment for The Automotive Domain
Attack graph is a commonly used methodology in IT security to represent all paths in the system that can lead to a successful attack. It is used to visually represent and automatically analyze security vulnerabilities in the system, as well as to analyze potential defense strategies. Nevertheless, attack graphs are not widely used in the automotive domain. Cognitive mobility systems rely on autonomous decision making by its participants. In order to enable trust in vehicles to make correct decisions, we must ensure that they are immune to failure and malicious manipulation. This trust requires a high level of safety and security. For a smart car, with multiple external connections, the complexity of the attack surface increases dramatically. Ensuring the security of the vehicle depends on a large number of interrelated factors. Thus we need methods, tools and know-how for evaluating the security postures of vehicles. The new ISO/SAE 21434 standard specifies the technical requirements for cyber-security management of road vehicles. It defines the Threat Analysis and Risk Assessment (TARA) for the analysis and assessment of cyber-security risks to a given automotive system. We propose a generic model to automate the attack path generation and analysis in the TARA. We also discuss several use cases for this model, including the enumeration of possible attack paths, the automatic evaluation of the feasibility and risk of each path, and the construction of a defence graph to ensure the security of the system.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信