Using Bayesian Networks for a Cyberattacks Propagation Analysis in Systems-of-Systems

被引:6
作者
El Hachem, Jamal [1 ]
Sedaghatbaf, Ali [2 ]
Lisova, Elena [2 ]
Causevic, Aida [2 ]
机构
[1] Univ Pau & Pays Adour, LIUPPA, Pau, France
[2] Malardalen Univ, Vasteras, Sweden
来源
2019 26TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC) | 2019年
关键词
Systems-of-Systems; Service Oriented Architectures; Bayesian Networks; Cyberattacks; SECURITY;
D O I
10.1109/APSEC48747.2019.00056
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
System of Systems (SoS) represent a set of independent Constituent Systems (CS) that collaborate in order to provide functionalities that they are unable to achieve independently. We consider SoS as a set of connected services that needs to be adequately protected. The integration of these independent, evolutionary and distributed systems, intensifies SoS complexity and emphasizes the behavior uncertainty, which makes an SoS security analysis a critical challenge. One of the major priorities when designing SoS, is to analyze the unknown dependencies among CS services and vulnerabilities leading to potential cyberattacks. The aim of this work is to investigate how Software Engineering approaches could be leveraged to analyze the cyberattack propagation problem within an SoS. Such analysis is essential for an efficient SoS risk assessment performed early at the SoS design phase and required to protect the SoS from possibly high impact attacks affecting its safety and security. In order to achieve our objective, we present a model-driven analysis approach, based on Bayesian Networks, a sensitivity analysis and Common Vulnerability Scoring System (CVSS) with aim to discover potential cyberattacks propagation and estimate the probability of a security failure and its impact on SoS services. We illustrate this approach in an autonomous quarry example.
引用
收藏
页码:363 / 370
页数:8
相关论文
共 35 条
[31]  
Nicklas J., 2016, 2016 11 SYST SYST EN, P1, DOI DOI 10.1109/SYSOSE.2016.7542908
[32]  
OWASP, 2019, OP WEB APPL SEC PROJ
[33]   Dawn of autonomous vehicles: review and challenges ahead [J].
Sousa, Nuno ;
Almeida, Arminda ;
Coutinho-Rodrigues, Joao ;
Natividade-Jesus, Eduardo .
PROCEEDINGS OF THE INSTITUTION OF CIVIL ENGINEERS-MUNICIPAL ENGINEER, 2018, 171 (01) :3-14
[34]   Security and privacy for innovative automotive applications: A survey [J].
Van Huynh Le ;
den Hartog, Jerry ;
Zannone, Nicola .
COMPUTER COMMUNICATIONS, 2018, 132 :17-41
[35]   Cyber Security Inference Based on a Two-level Bayesian Network Framework [J].
Wang, Peichao ;
Zhou, Yun ;
Zhu, Cheng ;
Tang, Luohao ;
Zhang, Weiming .
2018 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2018, :3932-3937