论文标题
与STPA-SEC,大步和Coras对网络系统的比较风险分析
A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS
论文作者
论文摘要
在诸如船舶(网络职位)等关键基础设施中,在关键基础设施中广泛使用软件密集型网络系统带来了巨大的好处,但它还为网络攻击开辟了新的途径,以破坏潜在的操作。网络风险评估在确定可以利用的网络威胁和脆弱性方面起着至关重要的作用,这些威胁和漏洞可利用损害网络系统。已经提出了许多方法来进行这些分析。本文评估并比较了三种风险评估方法的应用:系统理论过程分析(STPA-SEC),大步和coras在网络系统中识别威胁和脆弱性。我们专门选择了这三种方法,因为它们不仅在组件级别上确定威胁,而且还因为组件之间的相互作用而造成的威胁或危害,从而导致了与每种方法和相关差异确定的一系列威胁。此外,STPA是STPA的变体的STPA-SEC被广泛用于网络物理系统(CPS)的安全和安全分析; Coras提供了一个框架,以与STPA-SEC保持一致的自上而下的方法进行网络风险评估;大步前进(欺骗,篡改,否定,信息披露,拒绝服务,特权提升)考虑了组件级别以及与STPA-SEC相似的互动期间的威胁。由于本分析的结果,本文强调了这些方法的利弊,说明了特殊适用性的领域,并建议将它们作为通过大步识别的威胁的互补用途用作对Coras和STPA-SEC的输入,以使这些方法更加结构化。
The widespread use of software-intensive cyber systems in critical infrastructures such as ships (CyberShips) has brought huge benefits, yet it has also opened new avenues for cyber attacks to potentially disrupt operations. Cyber risk assessment plays a vital role in identifying cyber threats and vulnerabilities that can be exploited to compromise cyber systems. A number of methodologies have been proposed to carry out these analyses. This paper evaluates and compares the application of three risk assessment methodologies: system theoretic process analysis (STPA-Sec), STRIDE and CORAS for identifying threats and vulnerabilities in a CyberShip system. We specifically selected these three methodologies because they identify threats not only at the component level, but also threats or hazards caused due to the interaction between components, resulting in sets of threats identified with each methodology and relevant differences. Moreover, STPA-Sec which is a variant of the STPA is widely used for safety and security analysis of cyber physical systems (CPS); CORAS offers a framework to perform cyber risk assessment in a top-down approach that aligns with STPA-Sec; and STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, Elevation of Privilege) considers threat at the component level as well as during the interaction that is similar to STPA-Sec. As a result of this analysis, this paper highlights the pros and cons of these methodologies, illustrates areas of special applicability, and suggests that their complementary use as threats identified through STRIDE can be used as an input to CORAS and STPA-Sec to make these methods more structured.