An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity

被引:11
作者
Naik, Nitin [1 ]
Grace, Paul [1 ]
Jenkins, Paul [2 ]
Naik, Kshirasagar [3 ]
Song, Jingping [4 ]
机构
[1] Aston Univ, Sch Informat & Digital Engn, Birmingham, England
[2] Cardiff Metropolitan Univ, Cardiff Sch Technol, Cardiff, Wales
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON, Canada
[4] Northeastern Univ, Software Coll, Shenyang, Peoples R China
关键词
Attacktreemodel; Riskmatrixmodel; Digitalidentity; Self-sovereignidentity; SSI; Identitymanagementsystem; DecentralizedIDentifier; DID; Verifiablecredential; Distributedledgertechnology; Blockchain; Fakingidentity; Identitytheft; Distributeddenialofservice; LockheedMartin?scyberkillchain; MITREATT&CKframework; Diamondmodelofintrusionanalysis;
D O I
10.1016/j.cose.2022.102808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Self-Sovereign Identity (SSI) empowers users to govern their digital identity and personal data. This ap-proach has changed the identity paradigm where users become the central governor of their identity; hence the rapid growth of the SSI model. Utilizing the security and privacy properties of blockchain, to-gether with other security technologies, SSI purports to provide a robust security and privacy service. However, this governing power for users comes with a greater accountability and security risk, as not all users are capable or trained in its use and therefore in its efficient application. This trade-off requires a systematic evaluation of potential attacks on the SSI system and their security risks. Hitherto, there have been no noteworthy research studies performed to evaluate potential attacks on the SSI system and their security risks. This paper proposes an easy, efficient and economical approach to perform an evaluation of potential attacks on the SSI system and their security risks. This approach utilises a combination of an attack tree model and risk matrix model to perform this evaluation of potential attacks and their secu-rity risks, in addition to outlining a systematic approach including describing the system architecture and determining its assets in order to perform this evaluation of potential attacks and their security risks. This evaluation work has identified three potential attacks on the SSI system: faking identity, identity theft and distributed denial of service attacks, and performed their security risk evaluation utilising the proposed approach. Finally, this paper has proposed several mitigation strategies for the three evaluated attacks on the SSI system. This proposed evaluation approach is a systematic and generalised approach for evaluating attacks and their security risks, and can be applied to any other IT system.(c) 2022 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )
引用
收藏
页数:17
相关论文
共 48 条
  • [1] Allen C., 2016, PATH SELF SOVEREIGN
  • [2] Amenaza.com, 2021, SECURITREE ADV
  • [3] [Anonymous], 2021, WHAT IS DELTA E WHY
  • [4] Arnold F., 2014, INT C PRINCIPLES SEC, P285, DOI [DOI 10.1007/978-3-642-54792-8_16, 10.1007/978-3-642-54792-8_16, DOI 10.1007/978-3-642-54792-816]
  • [5] Caltagirone S., 2013, DIAMOND MODEL INTRUS
  • [6] Campanis N.A., 1997, PM NETW, V11, P46
  • [7] Modeling and detection of complex attacks
    Camtepe, Seyit Ahmet
    Yener, Buelent
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 234 - 243
  • [8] Cohen Z., 2019, SPOOOOOKY TYPES IDEN
  • [9] What's wrong with risk matrices?
    Cox, Louis Anthony , Jr.
    [J]. RISK ANALYSIS, 2008, 28 (02) : 497 - 512
  • [10] Cybotsai.com, 2021, INTR MITR ATT CK