Cyberattacks: Modeling, Analysis, and Mitigation

Sara Abbaspour Asadollah
{"title":"Cyberattacks: Modeling, Analysis, and Mitigation","authors":"Sara Abbaspour Asadollah","doi":"10.1109/iccsm57214.2022.00021","DOIUrl":null,"url":null,"abstract":"Industrial cybersecurity has risen as an important topic of research nowadays. The heavy connectivity by the Internet of Things (IoT) and the growth of cyberattacks against industrial assets cause this risen and attract attention to the cybersecurity field. While fostering current software applications and use-cases, the ubiquitous access to the Internet has also exposed operational technologies to new and challenging security threats that need to be addressed. As the number of attacks increases, their visibility decreases. An attack can modify the Cyber-Physical Systems (CPSs) quality to avoid proper quality assessment. They can disrupt the system design process and adversely affect a product’s design purpose.This working progress paper presents our approach to modeling, analyzing, and mitigating cyberattacks in CPS. We model the normal behavior of the application as well as cyberattacks with the help of Microsoft Security Development Lifecycle (SDL) and threat modeling approach (STRIDE). Then verify the application and attacks model using a model checking tool and propose mitigation strategies to decrease the risk of vulnerabilities. The results can be used to improve the system design to overcome the vulnerabilities.","PeriodicalId":426673,"journal":{"name":"2022 6th International Conference on Computer, Software and Modeling (ICCSM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 6th International Conference on Computer, Software and Modeling (ICCSM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccsm57214.2022.00021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Industrial cybersecurity has risen as an important topic of research nowadays. The heavy connectivity by the Internet of Things (IoT) and the growth of cyberattacks against industrial assets cause this risen and attract attention to the cybersecurity field. While fostering current software applications and use-cases, the ubiquitous access to the Internet has also exposed operational technologies to new and challenging security threats that need to be addressed. As the number of attacks increases, their visibility decreases. An attack can modify the Cyber-Physical Systems (CPSs) quality to avoid proper quality assessment. They can disrupt the system design process and adversely affect a product’s design purpose.This working progress paper presents our approach to modeling, analyzing, and mitigating cyberattacks in CPS. We model the normal behavior of the application as well as cyberattacks with the help of Microsoft Security Development Lifecycle (SDL) and threat modeling approach (STRIDE). Then verify the application and attacks model using a model checking tool and propose mitigation strategies to decrease the risk of vulnerabilities. The results can be used to improve the system design to overcome the vulnerabilities.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络攻击:建模、分析和缓解
工业网络安全已成为当今研究的一个重要课题。物联网(IoT)的大量连接和针对工业资产的网络攻击的增长导致这种情况上升,并引起了网络安全领域的关注。在促进当前软件应用程序和用例的同时,对Internet的无所不在的访问也使操作技术暴露于需要解决的新的和具有挑战性的安全威胁中。随着攻击数量的增加,它们的可见性会降低。攻击可以改变网络物理系统(cps)的质量,从而无法进行适当的质量评估。它们可以破坏系统设计过程,并对产品的设计目的产生不利影响。这篇工作进展论文介绍了我们在CPS中建模、分析和减轻网络攻击的方法。我们在Microsoft安全开发生命周期(SDL)和威胁建模方法(STRIDE)的帮助下,对应用程序的正常行为以及网络攻击进行建模。然后使用模型检查工具验证应用程序和攻击模型,并提出缓解策略以降低漏洞风险。研究结果可用于改进系统设计以克服这些漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Using Dimensionality Reduction Techniques to Understand the Sources of Software Complexity Cyberattacks: Modeling, Analysis, and Mitigation Considering Multiple Stakeholders Perspectives for interval-based Goal Oriented Requirements Prioritization in agile development Parameter Test and Numerical Simulation of Dynamic Constitutive Model for 08F Steel Computer Geometric Modeling Approach of Weft Knitted fabric Structures
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1