A Model-Driven Framework for Early Analysis of Kill Chain Attacks

被引:0
作者
Shirazi, Syeda Samar Batool [1 ]
Rashid, Muhammad [2 ]
Azam, Farooque [1 ]
Rasheed, Yawar [1 ]
Anwar, Muhammad Waseem [1 ]
机构
[1] Natl Univ Sci & Technol NUST, Coll E&ME, Dept Comp & Software Engn, H-12, Islamabad, Pakistan
[2] Umm Al Qura Univ, Comp Engn Dept, Mecca, Saudi Arabia
来源
2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021) | 2021年
关键词
component; MQTT; Attacks; IoT; Model-Driven;
D O I
10.1109/NCCC49330.2021.9428877
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of things (IoT) is an integration of different devices including wearables, sensors, and different objects to communicate with each other. Although the IoT technology has evolved tremendously in recent years,, there are serious security risks inherent in this technology. It is particularly true for MQTT (Message Queuing Telemetry Transport) protocol which provides a platform for Users/Clients to publish and subscribe their required messages so that they can conveniently communicate with each other. As MQTT is frequently utilized in IoT, therefore, different attacks occur in this aspect. The methodologies have been proposed previously through a physical attack which is difficult to analyze at low-level implementation. On the other hand, the model-driven approach provides simplicity and early analysis on MQTT. In this paper, we have proposed a modeling framework for early analysis of kill chain and resource starvation attack. Primarily, a meta-model is proposed which gives an overall view of the attack model. Subsequently, a tree editor is generated. After generating the tree editor, a tool is created using Sirius workbench/tool which is employed to validate the proposed case study.
引用
收藏
页码:1068 / +
页数:5
相关论文
共 28 条
  • [1] Internet of Things security: A survey
    Alaba, Fadele Ayotunde
    Othman, Mazliza
    Hashem, Ibrahim Abaker Targio
    Alotaibi, Faiz
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 : 10 - 28
  • [2] UMLPACE for Modeling and Verification of Complex Business Requirements in Event-Driven Process Chain (EPC)
    Amjad, Anam
    Azam, Farooque
    Anwar, Muhammad Waseem
    Butt, Wasi Haider
    Rashid, Muhammad
    Naeem, Aamir
    [J]. IEEE ACCESS, 2018, 6 : 76198 - 76216
  • [3] Event-Driven Process Chain for Modeling and Verification of Business Requirements-A Systematic Literature Review
    Amjad, Anam
    Azam, Farooque
    Anwar, Muhammad Waseem
    butt, Wasi Haider
    Rashid, Muhammad
    [J]. IEEE ACCESS, 2018, 6 : 9027 - 9048
  • [4] Andrea I, 2015, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P180, DOI 10.1109/ISCC.2015.7405513
  • [5] Andy S, 2017, 2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), P571
  • [6] Anwar M. W., 2019, 13 C COMPL INT SOFTW 13 C COMPL INT SOFTW, V993, P368
  • [7] A Unified Model-Based Framework for the Simplified Execution of Static and Dynamic Assertion-Based Verification
    Anwar, Muhammad Waseem
    Rashid, Muhammad
    Azam, Farooque
    Naeem, Aamir
    Kashif, Muhammad
    Butt, Wasi Haider
    [J]. IEEE ACCESS, 2020, 8 : 104407 - 104431
  • [8] A model-driven framework for design and verification of embedded systems through SystemVerilog
    Anwar, Muhammad Waseem
    Rashid, Muhammad
    Azam, Farooque
    Kashif, Muhammad
    Butt, Wasi Haider
    [J]. DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2019, 23 (3-4) : 179 - 223
  • [9] Model-based design verification for embedded systems through SVOCL: an OCL extension for System Verilog
    Anwar, Muhammad Waseem
    Rashid, Muhammad
    Azam, Farooque
    Kashif, Muhammad
    [J]. DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2017, 21 (01) : 1 - 36
  • [10] Threat-based Security Analysis for the Internet of Things
    Atamli, Ahmad W.
    Martin, Andrew
    [J]. 2014 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2014, : 35 - 43