Software and Attack Centric Integrated Threat Modeling for Quantitative Risk Assessment

被引:30
作者
Potteiger, Bradley [1 ]
Martins, Goncalo [2 ]
Koutsoukos, Xenofon [1 ]
机构
[1] Vanderbilt Univ, 2201 West End Ave, Nashville, TN 37235 USA
[2] Univ Denver, 2199 S Univ Blvd, Denver, CO 80208 USA
来源
SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY | 2016年
基金
美国国家科学基金会;
关键词
Quantitative risk assessment; threat modeling; cyber-physical systems;
D O I
10.1145/2898375.2898390
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One step involved in the security engineering process is threat modeling. Threat modeling involves understanding the complexity of the system and identifying all of the possible threats, regardless of whether or not they can be exploited. Proper identification of threats and appropriate selection of counter-measures reduces the ability of attackers to misuse the system. This paper presents a quantitative, integrated threat modeling approach that merges software and attack centric threat modeling techniques. The threat model is composed of a system model representing the physical and network infrastructure layout, as well as a component model illustrating component specific threats. Component attack trees allow for modeling specific component contained attack vectors, while system attack graphs illustrate multi-component, multi-step attack vectors across the system. The Common Vulnerability Scoring System (CVSS) is leveraged to provide a standardized method of quantifying the low level vulnerabilities in the attack trees. As a case study, a railway communication network is used, and the respective results using a threat modeling software tool are presented.
引用
收藏
页码:99 / 108
页数:10
相关论文
共 13 条
  • [1] [Anonymous], 2013, PREL CYB FRAM
  • [2] [Anonymous], 2005, P IEEE S REQ ENG INF
  • [3] Kordy Barbara, 2013, Quantitative Evaluation of Systems. 10th International Conference, QEST 2013. Proceedings: LNCS 8054, P173, DOI 10.1007/978-3-642-40196-1_15
  • [4] Ledeczi Akos., 2001, Workshop on Intelligent Signal Processing, Budapest, Hungary, V17, page, P1
  • [5] Martins Goncalo, 2015, 2015 Resilience Week (RWS). Proceedings, P1, DOI 10.1109/RWEEK.2015.7287428
  • [6] Mockel Caroline, 2010, 2010 Sixth International Conference on Information Assurance and Security (IAS 2010), P149, DOI 10.1109/ISIAS.2010.5604049
  • [7] Saitta P., 2005, TRIKE V 1 M IN PRESS
  • [8] SANS Institute, CRIT SEC CONTR
  • [9] Sheyner O., FORMAL METHODS COMPO, P344
  • [10] Shostack A, 2014, THREAT MODELING DESI