A Semantic Security Model for Cyber-Physical Systems to Identify and Evaluate Potential Threats and Vulnerabilities

被引:0
作者
Aigner, Andreas [1 ]
Khelil, Abdelmajid [1 ]
机构
[1] Landshut Univ Appl Sci, Fac Comp Sci, Landshut, Germany
来源
PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS) | 2022年
关键词
Security; Security Model; Security Engineering; Cyber-Physical Systems; Threat Model; System Model; Model-based Engineering; Security Analysis; Security Scoring; Security Metric;
D O I
10.5220/0011086300003194
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Establishing and sustaining a sufficient level of security in Cyber-Physical Systems (CPS) proposes a major challenge for engineers. Key characteristics, like heterogeneity, unpredictability and safety-relevance have the potential to significantly impact the overall level of security. However, exploited security-related vulnerabilities may cause malfunction of critical components or result in loss of sensitive information. Therefore, a toolkit, which is capable to identify vulnerabilities regarding security in CPS, would provide great benefit. Although a variety of security analysis frameworks exist, they mainly do not address the challenges proposed by CPS, which limits their applicability or accuracy. We aim to elaborate a more effective solution for CPS by analysing security on a Systems-of-Systems level. Moreover, we focus on the semantic relationships between essential security information, like attackers and attacks, towards the actual specification of the CPS. Our elaborated approach produces a quantitative expression of security, based on a variety of evaluation criteria and -policies. Ultimately, the generated output provides a quick indication about potential security-related threats and vulnerabilities. We utilize a prototypical, but realistic car-sharing application as a prime example for CPS, to illustrate the benefits and ease-of-use of our proposed solution.
引用
收藏
页码:249 / 257
页数:9
相关论文
共 11 条
[1]   Cyber physical systems security: Analysis, challenges and solutions [J].
Ashibani, Yosef ;
Mahmoud, Qusay H. .
COMPUTERS & SECURITY, 2017, 68 :81-97
[2]  
Chandramouli R., 2006, IEEE SECUR PRIV, V4
[3]   AUTOSAR for Connected and Autonomous Vehicles The AUTOSAR Adaptive Platform [J].
Fuerst, Simon ;
Bechter, Markus .
2016 46TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2016, :215-217
[4]  
Khan R, 2017, IEEE PES INNOV SMART
[5]   An Attack Surface Metric [J].
Manadhata, Pratyusa K. ;
Wing, Jeannette M. .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2011, 37 (03) :371-386
[6]  
Mead N.R., 2018, A Hybrid Threat Modeling Method
[7]  
Nagaraju V., 2017, P INT S TECHNOLOGIES
[8]  
O'Neill M., 2016, ELSEVIER J ENG, V2
[9]   A Survey on Systems Security Metrics [J].
Pendleton, Marcus ;
Garcia-Lebron, Richard ;
Cho, Jin-Hee ;
Xu, Shouhuai .
ACM COMPUTING SURVEYS, 2017, 49 (04)
[10]   A Critical Survey of Security Indicator Approaches [J].
Rudolph, Manuel ;
Schwarz, Reinhard .
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, :291-300