首页> 外文会议>IEEE International Symposium on Technologies for Homeland Security >A Method of Threat Analysis for Cyber-Physical System using Vulnerability Databases
【24h】

A Method of Threat Analysis for Cyber-Physical System using Vulnerability Databases

机译:利用漏洞数据库的网络物理系统威胁分析方法

获取原文

摘要

Safety and security are major issues for cyber-physical systems. We propose a threat analysis method effective for the design stage of a safety-critical cyber-physical system, utilizing the fact that similar systems tend to have co-occurrence in the way of their chain in vulnerability. We first utilize a vulnerability database to express known cyber-attack cases on the Fault Tree- Attack Tree (FT-AT). Second, the method uses FT-AT as a kind of teacher data for similar system threat analysis and uses it to find new attacks in similar systems. This makes it possible to efficiently support system design that tries to implement safety and security. The usefulness of the approach is demonstrated by example applications to previously reported attacks on Tesla and Cherokee.
机译:安全性是网络物理系统的主要问题。我们提出了一种威胁分析方法,该方法对于安全性至关重要的物理网络系统的设计阶段有效,它利用了这样一个事实,即类似系统在其脆弱性链中往往同时存在。我们首先利用漏洞数据库在故障树-攻击树(FT-AT)上表达已知的网络攻击案例。其次,该方法将FT-AT作为一种教师数据用于相似系统威胁分析,并使用它来查找相似系统中的新攻击。这使得可以有效地支持试图实现安全性的系统设计。通过示例应用程序对先前报道的对特斯拉和切诺基的攻击进行了演示,证明了该方法的实用性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号