Threat modeling - A systematic literature review

被引:124
作者
Xiong, Wenjun [1 ]
Lagerstrom, Robert [1 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, Div Network & Syst Engn, Malvinas Vag 6, SE-10044 Stockholm, Sweden
关键词
Threat modeling; Literature review; Cyber security; Risk management; Cyber attacks; INFORMATION SECURITY; ENTERPRISE ARCHITECTURE; DATA-COLLECTION; FRAMEWORK; AWARENESS; PROTOCOL; LIBRARY; DESIGN; CLOUD;
D O I
10.1016/j.cose.2019.03.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber security is attracting worldwide attention. With attacks being more and more common and often successful, no one is spared today. Threat modeling is proposed as a solution for secure application development and system security evaluations. Its aim is to be more proactive and make it more difficult for attackers to accomplish their malicious intents. However, threat modeling is a domain that lacks common ground. What is threat modeling, and what is the state-of-the-art work in this field? To answer these questions, this article presents a review of threat modeling based on systematic queries in four leading scientific databases. This is the first systematic literature review on threat modeling to the best of our knowledge. 176 articles were assessed, and 54 of them were selected for further analysis. We identified three separate clusters: (1) articles making a contribution to threat modeling, e.g., introducing a new method, (2) articles using an existing threat modeling approach, and (3) introductory articles presenting work related to the threat modeling process. The three clusters were analyzed in terms of a set of criteria, for instance: Is the threat modeling approach graphical or formal? Is it focused on a specific attack type and application? Is the contribution validated empirically or theoretically? We observe from the results that, most threat modeling work remains to be done manually, and there is limited assurance of their validations. The results can be used for researchers and practitioners who want to know the state-of-the-art threat modeling methods, and future research directions are discussed. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:53 / 69
页数:17
相关论文
共 84 条
  • [51] A threat model-based approach to security testing
    Marback, Aaron
    Do, Hyunsook
    He, Ke
    Kondamarri, Samuel
    Xu, Dianxiang
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2013, 43 (02) : 241 - 258
  • [52] An adaptive threat model for security ceremonies
    Martina, Jean Everson
    dos Santos, Eduardo
    Carlos, Marcelo Carlomagno
    Price, Geraint
    Custodio, Ricardo Felipe
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (02) : 103 - 121
  • [53] A systematic review of security requirements engineering
    Mellado, Daniel
    Blanco, Carlos
    Sanchez, Luis E.
    Fernandez-Medina, Eduardo
    [J]. COMPUTER STANDARDS & INTERFACES, 2010, 32 (04) : 153 - 165
  • [54] Introducing OSSF: A framework for online service cybersecurity risk management
    Meszaros, Jan
    Buchalcevova, Alena
    [J]. COMPUTERS & SECURITY, 2017, 65 : 300 - 313
  • [55] Musman S., 2018, International journal of safety and security engineering, V8, P212, DOI [DOI 10.2495/SAFE-V8-N2-212-222, 10.2495/safe-v8-n2-212-222]
  • [56] Data Collection Prioritization for System Quality Analysis
    Narman, Per
    Johnson, Pontus
    Lagerstrom, Robert
    Franke, Ulrik
    Ekstedt, Mathias
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 233 : 29 - 42
  • [57] Okoli C, 2011, WORKING PAPERS INFOR, P1
  • [58] Olawumi O, 2017, INT J INF TECHNOL SE, V9, P31
  • [59] Providing User Security Guarantees in Public Infrastructure Clouds
    Paladi, Nicolae
    Gehrmann, Christian
    Michalas, Antonis
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (03) : 405 - 419
  • [60] Pan J, 2017, SECUR COMMUN NETW, V2017, P1