Using Bayesian Networks for a Cyberattacks Propagation Analysis in Systems-of-Systems

被引:6
作者
El Hachem, Jamal [1 ]
Sedaghatbaf, Ali [2 ]
Lisova, Elena [2 ]
Causevic, Aida [2 ]
机构
[1] Univ Pau & Pays Adour, LIUPPA, Pau, France
[2] Malardalen Univ, Vasteras, Sweden
来源
2019 26TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC) | 2019年
关键词
Systems-of-Systems; Service Oriented Architectures; Bayesian Networks; Cyberattacks; SECURITY;
D O I
10.1109/APSEC48747.2019.00056
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
System of Systems (SoS) represent a set of independent Constituent Systems (CS) that collaborate in order to provide functionalities that they are unable to achieve independently. We consider SoS as a set of connected services that needs to be adequately protected. The integration of these independent, evolutionary and distributed systems, intensifies SoS complexity and emphasizes the behavior uncertainty, which makes an SoS security analysis a critical challenge. One of the major priorities when designing SoS, is to analyze the unknown dependencies among CS services and vulnerabilities leading to potential cyberattacks. The aim of this work is to investigate how Software Engineering approaches could be leveraged to analyze the cyberattack propagation problem within an SoS. Such analysis is essential for an efficient SoS risk assessment performed early at the SoS design phase and required to protect the SoS from possibly high impact attacks affecting its safety and security. In order to achieve our objective, we present a model-driven analysis approach, based on Bayesian Networks, a sensitivity analysis and Common Vulnerability Scoring System (CVSS) with aim to discover potential cyberattacks propagation and estimate the probability of a security failure and its impact on SoS services. We illustrate this approach in an autonomous quarry example.
引用
收藏
页码:363 / 370
页数:8
相关论文
共 35 条
[1]  
Abercrombie RK, 2015, 2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), P455, DOI 10.1109/SSCI.2015.74
[2]  
[Anonymous], 2014, PROBABILISTIC REASON
[3]  
[Anonymous], 2013, P 18 IEEE C EM TECHN
[4]  
[Anonymous], 2019, IEEE SPECTRUM, V56, P30
[5]  
[Anonymous], 2016, INCOSE SYST ENG BOD
[6]  
Axelsson J, 2017, SAC, P1803, DOI [10.1145/3019612.3028252, DOI 10.1145/3019612.3028252]
[7]  
Chang Y. S., 2016, FUTURE GENER COMP SY, V43, P87
[8]   Bayesian Network Models in Cyber Security: A Systematic Review [J].
Chockalingam, Sabarathinam ;
Pieters, Wolter ;
Teixeira, Andre ;
van Gelder, Pieter .
SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 :105-122
[9]  
Dahmann J., 2013, IEEE SYST C
[10]  
Dahmann J., 2014, INCOSE International Symposium, V24, P108, DOI [DOI 10.1002/J.2334-5837.2014.TB03138.X, 10.1002/j.2334-5837.2014.tb03138.x]