Run-time threat models for systematic and continuous risk assessment

被引:0
作者
Verreydt, Stef [1 ]
Van Landuyt, Dimitri [1 ,2 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, Dept Comp Sci, DistriNet, Celestijnenlaan 200A, B-3001 Heverlee, Belgium
[2] Katholieke Univ Leuven, Fac Econ & Business FEB, LIRIS, Naamsestr 69, B-3000 Leuven, Belgium
基金
欧盟地平线“2020”;
关键词
Threat modeling; risk assessment; digital twin; security-by-design; SOFTWARE SYSTEMS; SECURITY;
D O I
10.1007/s10270-024-01242-5
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Threat modeling involves systematically assessing the likelihood and potential impact of diverse security threat scenarios. Existing threat modeling approaches and tools act at the level of a software architecture or design (e.g., a data flow diagram), at the level of abstract system elements. These approaches, however, do not allow more in-depth analysis that takes into account concrete instances and configurations of these elements. This lack of expressiveness-as threats that require articulation at the level of instances cannot be expressed nor managed properly-hinders systematic risk calculation-as risks cannot be expressed and estimated in terms of instance-level properties. In this paper, we present a novel threat modeling approach that supports modeling complex systems at two distinct levels: (i) the design model defines the classes and entity types in the system, and (ii) the instance model specifies concrete instances and their properties. This innovation allows systematically calculating broader risk estimates at the design level, yet also performing more refined analysis in terms of more precise risk values at the instance level. Moreover, the ability to assess instance-level risks serves as an enabler for run-time continuous threat and risk (re-)assessment, and risk-adaptive security in general. We evaluate this approach in a prototype and through simulation of the dynamics of a realistic IoT-based system, a smart traffic application that involves vehicles and other infrastructural elements such as smart traffic lights. In these efforts, we demonstrate the practical feasibility of the approach, and we quantify the performance cost of maintaining a threat model at run-time, taking into account the time to perform risk assessment.
引用
收藏
页数:24
相关论文
共 50 条
  • [41] An Fusion Model for Network Threat Identification and Risk Assessment
    Ma, Jie
    Li, Zhi-tang
    Zhang, Hong-wu
    2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL I, PROCEEDINGS, 2009, : 314 - +
  • [42] Risk assessment as an evolved threat detection and analysis process
    Blanchard, D. Caroline
    Griebel, Guy
    Pobbe, Roger
    Blanchard, Robert J.
    NEUROSCIENCE AND BIOBEHAVIORAL REVIEWS, 2011, 35 (04) : 991 - 998
  • [43] Fuzzy risk assessment of information security threat scenario
    Ge, Hai-Hui
    Zheng, Shi-Hui
    Chen, Tian-Ping
    Yang, Yi-Xian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2013, 36 (06): : 89 - 92+107
  • [44] Antifouling biocides as a continuous threat to the aquatic environment: Sources, temporal trends and ecological risk assessment in an impacted region of Brazil
    Martins Viana, Jose Lucas
    Diniz, Marta dos Santos
    Viana dos Santos, Sara Raiane
    Verbinnen, Raphael Teixeira
    Pinheiro Almeida, Marcio Aurelio
    Rodrigues dos Santos Franco, Teresa Cristina
    SCIENCE OF THE TOTAL ENVIRONMENT, 2020, 730
  • [45] E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems
    Pardue, Harold
    Landry, Jeffrey
    Yasinsac, Alec
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2011, 5 (03) : 19 - 35
  • [46] Occupational health and safety risk assessment: A systematic literature review of models, methods, and applications
    Liu, Ran
    Liu, Hu-Chen
    Shi, Hua
    Gu, Xiuzhu
    SAFETY SCIENCE, 2023, 160
  • [47] Cybersecurity Risk Assessment for Medium-Risk Drones: A Systematic Literature Review
    Alexandre, Rui Carlos Josino
    Martins, Luiz Eduardo Galvao
    Gorschek, Tony
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2023, 38 (06) : 28 - 43
  • [48] ERP-SYSTEM RISK ASSESSMENT METHODS AND MODELS
    Kozhukhivskyi, A. D.
    Kozhukhivska, O. A.
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2020, (04) : 151 - 162
  • [49] Construction of information network vulnerability threat assessment model for CPS risk assessment
    Xiong, Juxia
    Wu, Jinzhao
    COMPUTER COMMUNICATIONS, 2020, 155 : 197 - 204
  • [50] Model-based Threat and Risk Assessment for Systems Design
    Shaked, Avi
    Reich, Yoram
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 331 - 338