A Study on Threat Analysis and Risk Assessment Based on the "Asset Container " Method and CWSS

被引:2
|
作者
Kawanishi, Yasuyuki [1 ,2 ,3 ]
Nishihara, Hideaki [2 ]
Yoshida, Hirotaka [2 ]
Yamamoto, Hideki [1 ,2 ]
Inoue, Hiroyuki [2 ,3 ]
机构
[1] Sumitomo Elect Ind Ltd, Res & Dev Unit, Cyber Secur Res & Dev Off, Osaka 5540024, Japan
[2] Natl Inst Adv Ind Sci & Technol, Cyber Phys Secur Res Ctr, AIST Cyber Secur Cooperat Res Lab, SEI, Osaka 5638577, Japan
[3] Kyoto Sangyo Univ, Div Frontier Informat, Kyoto 6038555, Japan
关键词
In-vehicle security; security design; risk analysis; TARA; ISO/SAE; 21434; CWSS;
D O I
10.1109/ACCESS.2023.3246497
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, legislation and standardization of cyber security management for cyber-physical systems such as automotive systems have been progressing steadily. ISO/SAE 21434, published in 2021, addresses the management and analysis of electrical systems within road vehicles from a cybersecurity perspective. It also recommends some methods for the threat analysis and risk assessment (TARA) process. However, there are two problems in the evaluation methods derived from conventional security analysis approaches. One problem is related to the insufficient evaluation of attack feasibilities for cyber-physical systems by the CVSS-based approach. Another problem is the unclear relationship between damage factors in analyzing the impact of damage to each asset. In this paper, we focus on the TARA process, and apply an "asset container " method for threat classification, proposed by the authors at DECSoS 2017, and a CWSS-based risk quantification method. Moreover, we can also add some perspective to improve risk evaluation suitable for automotive systems. Following our past studies on methodologies to evaluate the risk of such special cyber-physical systems, we can quantify risks limited to some cyber-physical systems, such as direct access attacks to in-vehicle networks.
引用
收藏
页码:18148 / 18156
页数:9
相关论文
共 50 条
  • [1] Method of Unknown Target Risk Analysis and Threat Assessment for UUVs
    Yu, Dan
    Wang, Hongjian
    Yuan, Jianya
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 2888 - 2893
  • [2] A Security Risk Assessment Method of Website Based on Threat Analysis Combined with AHP and Entropy Weight
    Lai, Zhiquan
    Shen, Yongjun
    Zhang, Guidong
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 481 - 484
  • [3] Risk Assessment Method of High-Speed Railway Signal Systems Based on Threat Analysis
    Li H.
    Yan L.
    Chen J.
    Li S.
    Xu S.
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2022, 57 (06): : 1334 - 1341
  • [4] Research on Network Risk Situation Assessment Based on Threat Analysis
    Lv Huiying
    Cao Yuanda
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 2, 2008, : 252 - +
  • [5] HAZOP Analysis-Based Method on the Risk Assessment of the Main Engine of the 10000TEU Container Ship
    Zhan, Yulong
    Hao, Yitong
    Yu, Yao
    Wu, Di
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 2, 2012, 115 : 257 - 264
  • [6] HAZOP Analysis-Based Method on the Risk Assessment of the Main Engine of the 10000TEU Container Ship
    Zhan, Yulong
    Hao, Yitong
    Yu, Yao
    Wu, Di
    2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, : 411 - 414
  • [7] An information Security Risk Assessment Method Based on Conduct Effect and Dynamic Threat
    Qiao Hong
    Tian Jianwei
    Tian Zheng
    Qi Wenhui
    Li Xi
    Zhu Hongyu
    Chen Shengsheng
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 782 - 786
  • [8] A Risk-Based Multisensor Optimization Scheduling Method for Target Threat Assessment
    Zhang, Yunpu
    Shan, Ganlin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2019, 2019
  • [9] Risk Assessment of Work Accident in Container Terminals Using the Fault Tree Analysis Method
    Budiyanto, Muhammad Arif
    Fernanda, Haris
    JOURNAL OF MARINE SCIENCE AND ENGINEERING, 2020, 8 (06)
  • [10] C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving
    Abdelsalam, Mohamed
    Greiner, Simon
    Aktouf, Oum-El-Kheir
    Mercier, Annabelle
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 159 - 175