A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats
Abstract
:1. Introduction
- -
- Analyze publications related to information systems;
- -
- Select suitable publications;
- -
- Formulate questions that are answered in the reviews of the reviewed publications;
- -
- Analyze the sources of the selected publications;
- -
- Carry out statistical processing of the selected publications (% of articles that answer the questions posed; % of articles that match the topic).
2. Research Methodology
2.1. Brief Overview of Used Articles
2.2. Overview of Articles Related to the Description of Protected Objects
2.3. Overview of Articles Related to Threat Classification Techniques
- Are used separately from everyone;
- Are used in combination with others;
- Are examples for combining different methods.
3. Research Questions and Assessment Criteria
4. Selection of Articles
- -
- Articles related to the description of protected objects;
- -
- Articles related to the description of threat and attack modeling. This aspect only includes methods (models) for describing the classification of threats, that is, only how threats can be described;
- -
- Articles related to linking formal system models and formal threat models. These articles include a description of the object of protection, as well as threats that are described for this object of protection, that is, a short list of threats for this object of information protection.
4.1. Complete Overview of Articles Related to Protected Objects
- -
- Identification of elements that affect security;
- -
- Identification of critical components;
- -
- Measurement of the security system.
4.2. Overview of Articles Related to Threat Classification Methods
4.3. Overview of Articles Related to Threat Classification Techniques
5. Discussion
- -
- Articles describing attacks;
- -
- Articles describing incomplete systems (only some parts of it);
- -
- Articles describing the objects of protection in various ways;
- -
- Articles describing methods of threat classification;
- -
- Articles that formally link the description of models with threats directed at them, but without methods of protection against them.
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- ICT Facts and Figures 2017. Available online: https://www.itu.int/en/ITUD/Statistics/Pages/facts/default.aspx (accessed on 13 November 2021).
- Craigen, D.; Diakun-Thibault, N.; Purse, R. Defining cybersecurity. Technol. Innov. Manag. Rev. 2014, 4, 13–21. [Google Scholar] [CrossRef]
- Romashkina, N.P.; Zagorskii, A.V. Information Security Threats during Crises and Conflicts of the XXI Century; IMEMO: Moskow, Russia, 2016; p. 133. [Google Scholar]
- Uzunov, A.V.; Fernandez, E.B. An extensible pattern-based library and taxonomy of security threats for distributed systems. Comput. Stand. Interfaces 2014, 36, 734–747. [Google Scholar] [CrossRef]
- Bryant, B.D.; Saiedian, H. A novel kill-chain framework for remote security log analysis with SIEM software. Comput. Stand. Interfaces 2017, 67, 198–210. [Google Scholar] [CrossRef]
- Zhu, Y.; Fu, X.; Graham, B.; Bettati, R.; Zhao, W. Correlation-Based Traffic Analysis Attacks on Anonymity Networks. IEEE Trans. Parallel Distrib. Syst. 2010, 7, 954–967. [Google Scholar] [CrossRef]
- Dahbul, R.N.; Lim, C.; Purnama, J. Enhancing Honeypot Deception Capability Through Network Service Fingerprinting. J. Phys. Conf. Ser. 2017, 801, 012057. [Google Scholar] [CrossRef] [Green Version]
- Sandro, G.; Hutinski, Z. Information System Security Threats Classifications. J. Inf. Organ. Sci. 2007, 31, 51–61. [Google Scholar]
- Albakri, A.; Boiten, E.; de Lemos, R. Risks of Sharing Cyber Incident Information. In Proceedings of the ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, 27–30 August 2018; Volume 58, pp. 1–10. [Google Scholar]
- Messe, N.; Chiprianov, V.; Belloir, N.; El-Hachem, J.; Fleurquin, R.; Sadou, S. Asset-Oriented Threat Modeling. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December–1 January 2021; pp. 1–11. [Google Scholar]
- Meszaros, J.; Buchalcevova, A. Introducing OSSF: A framework for online service cybersecurity risk management. Comput. Stand. Interfaces 2017, 65, 300–313. [Google Scholar] [CrossRef]
- Sion, L.; Yskout, K.; van den Berghe, A.; Scandariato, R.; Joosen, W. MASC: Modelling Architectural Security Concerns. In Proceedings of the 2015 IEEE/ACM 7th International Workshop on Modeling in Software Engineering, Florence, Italy, 16–17 May 2015; pp. 1425–1432. [Google Scholar]
- Barrowclough, J.P.; Asif, R. Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Secur. Commun. Netw. 2018, 2018, 1681908. [Google Scholar] [CrossRef] [Green Version]
- Farahmand, F.; Navathe, S.B.; Enslow, P.H.; Sharp, G.P. Managing vulnerabilities of information systems to security incidents. J. Manag. Inf. Syst. 2008, 25, 241–280. [Google Scholar]
- Ambalavanan, V. Cyber Threats Detection and Mitigation Using Machine Learning. In Handbook of Research on Machine and Deep Learning Applications for Cyber Security; IGI Global: Hershey, PA, USA, 2020; pp. 1–18. [Google Scholar]
- Shah, N.F.; Kumar, P. A comparative analysis of various spam classifications. In Progress in Intelligent Computing Techniques: Theory, Practice, and Applications; Springer: Singapore, 2017; pp. 265–271. [Google Scholar]
- Chandrasekar, C.; Priyatharsini, P. Classification techniques using spam filtering email. Int. J. Adv. Res. Comput. Sci. 2018, 9, 402–410. [Google Scholar] [CrossRef]
- Shafi, M.A.; Latiff, M.S.A.; Chiroma, H.; Osho, O.; Abdul-Salaam, G.; Abubakar, A.I.; Herawan, T. A review on mobile SMS spam filtering techniques. IEEE Access 2017, 5, 15650–15666. [Google Scholar]
- Chen, C.; Zhang, J.; Xie, Y.; Xiang, Y.; Zhou, W.; Hassan, M.M.; AlElaiwi, A.; Alrubaian, M. A performance evaluation of machine learning-based streaming spam tweets detection. IEEE Trans. Comput. Soc. Syst. 2015, 2, 65–76. [Google Scholar] [CrossRef]
- Biggio, B.; Fumera, G.; Pillai, I.; Roli, F. A survey and experimental evaluation of image spam filtering techniques. Pattern Recognit. Lett. 2011, 32, 1436–1446. [Google Scholar] [CrossRef]
- Kumar, A.D.; Vinayakumar, R.; Soman, K. DeepImageSpam: Deep Learning based Image Spam Detection. Available online: https://www.researchgate.net/publication/328189401_DeepImageSpam_Deep_Learning_based_Image_Spam_Detection (accessed on 17 November 2021).
- Jusas, V.; Japertas, S.; Baksys, T.; Bhandari, S. Logical filter approach for early stage cyber-attack detection. Comput. Sci. Inf. Syst. 2019, 16, 491–514. [Google Scholar] [CrossRef] [Green Version]
- Xin, Y.; Kong, L.; Liu, Z.; Chen, Y.; Li, Y.; Zhu, H.; Gao, M.; Hou, H.; Wang, C. Machine learning and deep learning methods for cybersecurity. IEEE Access 2018, 6, 35365–35381. [Google Scholar] [CrossRef]
- Gandotra, E.; Bansal, D.; Sofat, S. Malware analysis and classification: A survey. J. Inf. Secur. 2014, 5, 56–64. [Google Scholar] [CrossRef] [Green Version]
- Dharamkar, B.; Singh, R. A review of cyber-attack classification technique based on data mining and neural network approach. Int. J. Comput. Trends Technol. (IJCTT) 2014, 7, 100–105. [Google Scholar] [CrossRef]
- Hodo, E.; Bellekens, X.; Hamilton, A.; Tachtatzis, C.; Atkinson, R. Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey. Available online: https://www.researchgate.net/publication/312170608_Shallow_and_Deep_Networks_Intrusion_Detection_System_A_Taxonomy_and_Survey (accessed on 17 November 2021).
- Eder-Neuhauser, P.; Zseby, T.; Fabini, J. Malware propagation in smart grid networks: Metrics, simulation and comparison of three malware types. J. Comput. Virol. Hacking Tech. 2019, 15, 109–125. [Google Scholar] [CrossRef] [Green Version]
- Ndibanje, B.; Kim, K.H.; Kang, Y.J.; Kim, H.H.; Kim, T.Y.; Lee, H.J. Cross-method-based analysis and classification of malicious behavior by api calls extraction. Appl. Sci. 2019, 9, 239. [Google Scholar] [CrossRef] [Green Version]
- White, R.; Boult, T.; Chow, E. A computational asset vulnerability model for the strategic protection of the critical infrastructure. Int. J. Crit. Infrastruct. Prot. 2014, 7, 167–177. [Google Scholar] [CrossRef]
- Yampolskiy, M.; Horvath, P.; Koutsoukos, X.D.; Xue, Y.; Sztipanovits, J. A language for describing attacks on cyber-physical systems. Int. J. Crit. Infrastruct. Prot. 2015, 8, 40–52. [Google Scholar] [CrossRef]
- Lebek, B.; Uffen, J.; Neumann, M.; Hohler, B.; Breitner, M.H. Information security awareness and behavior: A theory-based literature review. Manag. Res. Rev. 2014, 37, 1049–1092. [Google Scholar] [CrossRef] [Green Version]
- Ruiz, G.; Heymann, E.; Cesar, E.; Miller, B.P. Automating Threat Modeling through the Software Development Life-Cycle. Available online: https://research.cs.wisc.edu/mist/papers/Guifre-sep2012.pdf (accessed on 17 November 2021).
- Braendeland, G.; Refsdal, A.; Stolen, K. Modular analysis and modelling of risk scenarios with dependencies. J. Syst. Softw. 2010, 83, 1995–2013. [Google Scholar] [CrossRef]
- Gupta, B.; Agrawal, D.P.; Yamaguchi, S. Threats Classification: State of the Art. In Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security; IGI Global: Hershey, PA, USA, 2016; pp. 368–392. [Google Scholar]
- Jouini, M.; Rabai, L.B.A. A Scalable Threats Classification Model in Information Systems. In Proceedings of the SIN ’16: Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, 20–22 July 2016; Association for Computing Machinery: New York City, NY, USA, 2016; pp. 141–144. [Google Scholar]
- Khristolyubova, A.A.; Konev, A.A.; Shelupanov, A.A.; Solovev, M.L. Modeling threats to information security using IDEF0 methodology. In Proceedings of the IOP Conference Series Materials Science and Engineering, Tomsk, Russia, 23–26 April 2019; pp. 1–6. [Google Scholar]
- Lindqvist, U.; Jonsson, E. How to systematically classify computer security intrusions. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 4–7 May 1997; pp. 1–10. [Google Scholar]
- Gruschka, N.; Jensen, M. Attack surfaces: A taxonomy for attacks on cloud services. In Proceedings of the IEEE 3rd International Conference on Cloud Computing, Miami, FL, USA, 5–10 July 2010. [Google Scholar]
- Sommer, F.; Durrwang, J.; Kriesten, R. Survey and Classification of Automotive Security Attacks. Information 2019, 10, 148. [Google Scholar] [CrossRef] [Green Version]
- Koltays, A.; Konev, A.; Shelupanov, A. Mathematical Model for Choosing Counterparty When Assessing Information Security Risks. Risks 2021, 9, 133. [Google Scholar] [CrossRef]
- Ashibani, Y.; Mahmoud, Q.H. Cyber physical systems security: Analysis, challenges and solutions. Comput. Stand. Interfaces 2017, 68, 81–97. [Google Scholar] [CrossRef]
- James, K.I.A.; Prabakaran, R. Threat Modeling Framework for Electrical Distribution Scada Networks. Middle-East J. Sci. Res. 2015, 23, 2318–2325. [Google Scholar]
- Zawoad, S.; Dutta, A.K.; Hasan, R. Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service. IEEE Trans. Dependable Secur. Comput. 2016, 13, 148–162. [Google Scholar] [CrossRef]
- Kalinin, M.O.; Konoplev, A.S. Formalization of Objectives of Grid Systems Resources Protection against Unauthorized Access. Nonlinear Phenom. Complex Syst. 2014, 17, 272–277. [Google Scholar]
- Olayemi, O. Security issues in smart homes and mobile health system: Threat analysis, possible countermeasures and lessons learned. Int. J. Inf. Technol. Secur. 2017, 9, 31–52. [Google Scholar]
- Rimsha, A.S.; Rimsha, K.S. The Problem of Selecting APCS’ Information Security Tools. In Cyber-Physical Systems: Industry 4.0 Challenges; Springer: Cham, Switzerland, 2019; pp. 211–223. [Google Scholar]
- STRIDE Threat Modeling: What You Need to Know. Available online: https://www.softwaresecured.com/stride-threat-modeling/ (accessed on 4 January 2022).
- Real World Threat Modeling Using the PASTA Methodology. Available online: https://owasp.org/www-pdf-archive/AppSecEU2012_PASTA.pdf (accessed on 4 January 2022).
- LINDDUN Privacy Engineering. Available online: https://www.linddun.org/ (accessed on 4 January 2022).
- Common Vulnerability Scoring System. Available online: https://en.wikipedia.org/wiki/Common_Vulnerability_Scoring_System (accessed on 4 January 2022).
- Attack Tree. Available online: https://en.wikipedia.org/wiki/Attack_tree (accessed on 4 January 2022).
- How Well Do You Know Your Personae Non Gratae. Available online: https://www.infoq.com/articles/personae-non-gratae/ (accessed on 4 January 2022).
- Denning, T.A.; Friedman, B.; Kohno, T. The Security Cards. Available online: https://securitycards.cs.washington.edu/ (accessed on 10 December 2021).
- The Hybrid Threat Modeling Method. Available online: https://insights.sei.cmu.edu/blog/the-hybrid-threat-modeling-method/ (accessed on 4 January 2022).
- What is Threat Modeling: Process and Methodologies? Available online: https://www.simplilearn.com/what-is-threat-modeling-article (accessed on 4 January 2022).
- Stride, VAST, Trike, & More: Which Threat Modeling Methodology is Right for Your Organization? Available online: https://threatmodeler.com/threat-modeling-methodologies-overview-for-your-business/ (accessed on 4 January 2022).
- Octave Method of Security Assessment. Available online: https://technology.ku.edu/octave-method-security-assessment (accessed on 4 January 2022).
- Threat Modeling: 12 Available Methods. Available online: https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/ (accessed on 4 January 2022).
- Sion, L.; Wuyts, K.; Yskout, K.; van Landuyt, D.; Joosen, W. Interaction-based Privacy Threat Elicitation. In Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), London, UK, 23–27 April 2018; pp. 1–8. [Google Scholar]
- Ingalsbe, J.A.; Shoemaker, D.; Mead, N.R. Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise—An overview of considerations. AMCIS Proc. 2011, 359. Available online: https://aisel.aisnet.org/amcis2011_submissions/359/ (accessed on 4 January 2022).
- Khamparia, A.; Pandey, B. Threat driven modeling framework using petri nets for e-learning system. SpringerPlus 2016, 5, 446. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Torkura, K.; Sukmana, M.; Meinig, M.; Kayem, A.; Cheng, F.; Graupner, H.; Meinel, C. Securing Cloud Storage Brokerage Systems Through Threat Models. In Proceedings of the IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Krakow, Poland, 16–18 May 2018. [Google Scholar]
- Wolf, A.; Simopoulos, D.; D’Avino, L.; Schwaiger, P. The PASTA threat model implementation in the IoT development life cycle. INFORMATIK 2020, 2021, 1195–1204. [Google Scholar]
- Seifert, D.; Reza, H. A Security Analysis of Cyber-Physical Systems Architecture for Healthcare. Computers 2016, 5, 27. [Google Scholar] [CrossRef] [Green Version]
- Zhi-Wei, T. OCTAVE-Based Risk Evaluation for E-Government Information Systems. J. Univ. Electron. Sci. Technol. China 2009, 38, 130–133. [Google Scholar]
- Affia, A.O.; Matulevicius, R.; Tonisson, R. Security Risk Estimation and Management in Autonomous Driving Vehicles. In International Conference on Advanced Information Systems Engineering; Springer: Cham, Switzerland, 2021; pp. 11–19. [Google Scholar]
- Robles-Gonzalez, A.; Parra-Arnau, J.; Forne, J. A LINDDUN-Based Framework for Privacy Threat Analysis on Identification and Authentication Processes. Comput. Secur. 2020, 94, 101755. [Google Scholar] [CrossRef]
- Riva, G.M.; Vasenev, A.; Zannone, N. SoK: Engineering privacy-aware high-tech systems. In Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020), Dublin, Ireland, 25–28 August 2020; Volume 19, pp. 1–10. [Google Scholar]
- Yin, X.C.; Liu, Z.G.; Nkenyereye, L.; Ndibanje, B. Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach. Sensors 2019, 19, 4952. [Google Scholar] [CrossRef] [Green Version]
- Basin David, A.; Jurgen, D.; Torsten, L. Model driven security for process-oriented systems. In Proceedings of the SACMAT ’03: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, Villa Gallia, Como, Italy, 2–3 June 2003; Association for Computing Machinery: New York, NY, USA, 2003; pp. 100–109. [Google Scholar]
- Ahmed, U.; Raza, I.; Hussain, S.A.; Ali, A.; Iqbal, M.; Wang, X. Modelling Cyber Security for Software-Defined Networks Those Grow Strong When Exposed to Threats; Springer International Publishing: Cham, Switzerland, 2015; Volume 1, pp. 123–146. [Google Scholar]
- Aissa, A.B.; Mohamed, I.A.; Hussein, L.F.; Elhadad, A. A Novel Stochastic Model for Cybersecurity Metric Inspired by Markov Chain Model and Attack Graphs. Int. J. Sci. Technol. Res. 2020, 9, 6329–6335. [Google Scholar]
- Jiang, H.; Nagra, J.; Ahammad, P. Sok: Applying Machine Learning in Security. Available online: https://www.researchgate.net/publication/309854646_SoK_Applying_Machine_Learning_in_Security_-_A_Survey (accessed on 17 November 2021).
- Apruzzese, G.; Colajanni, M.; Ferretti, L.; Guido, A.; Marchetti, M. On the effectiveness of machine and deep learning for cyber security. In Proceedings of the International Conference on Cyber Conflict (ICCC), 10th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, 30 May–1 June 2018; pp. 1–16. [Google Scholar]
- Ucci, D.; Aniello, L.; Baldoni, R. Survey of machine learning techniques for malware analysis. Comput. Secur. 2019, 81, 123–147. [Google Scholar] [CrossRef] [Green Version]
- Bhuyan, S.S.; Kabir, U.Y.; Escareno, J.M.; Ector, K.; Palakodeti, S.; Wyant, D.; Kumar, S.; Levy, M.; Kedia, S.; Dasgupta, D.; et al. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations. J. Med. Syst. 2018, 44, 98. [Google Scholar] [CrossRef]
- Ford, V.; Siraj, A. Applications of machine learning in cyber security. In Proceedings of the 27th International Conference on Computer Applications in Industry and Engineering 2014, Kota Kinabalu, Malaysia, 13 October 2014; pp. 1–6. [Google Scholar]
- Ding, Q.; Zhu, R.; Liu, H.; Ma, M. An Overview of Machine Learning-Based Energy-Efficient Routing Algorithms in Wireless Sensor Networks. Electronics 2021, 1539, 1539. [Google Scholar] [CrossRef]
- Cardenas, A.A.; Roosta, T.; Sastry, S. Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems. Ad Hoc Netw. 2009, 7, 1434–1447. [Google Scholar] [CrossRef]
- Yan, S.; Malaney, R.; Nevat, I.; Peters, G.W. Optimal Information-Theoretic Wireless Location Verification. IEEE Trans. Veh. Technol. 2014, 63, 3410–3422. [Google Scholar] [CrossRef] [Green Version]
- Churcher, A.; Ullah, R.; Ahmad, J.; Rehman, S.U.; Masood, F.; Gogate, M.; Alqahtani, F.; Nour, B.; Buchanan, W.J. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks. Sensors 2021, 21, 446. [Google Scholar] [CrossRef] [PubMed]
- Chmiel, M.; Korona, M.; Kozioł, F.; Szczypiorski, K.; Rawski, M. Discussion on IoT Security Recommendations against the State-of-the-Art Solutions. Electronics 2021, 10, 1814. [Google Scholar] [CrossRef]
- Arseni, S.; Chifor, B.; Coca, M.; Medvei, M.; Bica, I.; Matei, I. RESFIT: A Reputation and Security Monitoring Platform for IoT Applications. Electronics 2021, 10, 1840. [Google Scholar] [CrossRef]
- Apostol, I.; Preda, M.; Nila, C.; Bica, I. IoT Botnet Anomaly Detection Using Unsupervised Deep Learning. Electronics 2021, 10, 1876. [Google Scholar] [CrossRef]
- Thaseen, I.S.; Mohanraj, V.; Ramachandran, S.; Sanapala, K.; Yeo, S. A Hadoop Based Framework Integrating Machine Learning Classifiers for Anomaly Detection in the Internet of Things. Electronics 2021, 10, 1955. [Google Scholar] [CrossRef]
- Lagerstrom, R.; Baldwin, C.; MacCormack, A.; Dreyfus, D. Visualizing and Measuring Enterprise Architecture: An Exploratory BioPharma Case. In IFIP Working Conference on The Practice of Enterprise Modeling; Springer: Berlin/Heidelberg, Germany, 2013; pp. 9–23. [Google Scholar]
- Latif, R.; Abbas, H.; Assar, S.; Ali, Q. Cloud Computing Risk Assessment: A Systematic Literature Review. Lect. Notes Electr. Eng. 2014, 276, 285–295. [Google Scholar]
- Razaque, A.; Frej, M.B.H.; Alotaibi, B.; Alotaibi, M. Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey. Electronics 2021, 10, 2721. [Google Scholar] [CrossRef]
- Belapurkar, A.; Chakrabarti, A.; Ponnapalli, H.; Varadarajan, N.; Padmanabhuni, S.; Sundarrajan, S. Distributed Systems Security: Issues, Processes and Solutions; John Wiley & Sons: Hoboken, NJ, USA, 2009; p. 334. [Google Scholar]
- Uzunov, A.V.; Fernandez, E.B.; Falkner, K. Engineering security into distributed systems: A survey of methodologies. J. Univers. Comput. Sci. 2012, 18, 2920–3006. [Google Scholar]
- Uzunov, A.V.; Falkner, K.; Fernandez, E.B. A Comprehensive Pattern-Oriented Approach to Engineering Security Methodologies. Inf. Softw. Technol. 2015, 57, 217–247. [Google Scholar] [CrossRef]
- Khan, R.; McLaughlin, K.; Laverty, D.; Sezer, S. STRIDE-based Threat Modeling for Cyber-Physical Systems. In Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference Europe, Turin, Italy, 26–29 September 2017. [Google Scholar]
- Scandariato, R.; Wuyts, K.; Joosen, W. A descriptive study of Microsoft’s threat modeling technique. Requir. Eng. 2015, 20, 163–180. [Google Scholar] [CrossRef] [Green Version]
- Sion, L.; Yskout, K.; van Landuyt, D.; Joosen, W. Solution-aware data flow diagrams for security threat modeling. In Proceedings of the 33rd Annual ACM Symposium on Applied Computing, Pau, France, 9–13 April 2018; pp. 1425–1432. [Google Scholar]
- Honkaranta, A.; Leppanen, T.; Costin, A. Towards Practical Cybersecurity Mapping of STRIDE and CWE—A Multi-Perspective Approach. In Proceedings of the 29th Conference of Open Innovations Association (FRUCT), Tampere, Finland, 12–14 May 2021. [Google Scholar]
- Karahasanovic, A.; Kleberger, P.; Almgren, M. Adapting Threat Modeling Methods for the Automotive Industry. In Proceedings of the 15th ESCAR Conference, Berlin, Germany, 7–8 November 2017. [Google Scholar]
- Pell, R.; Moschoyiannis, S.; Panaousis, E. Multi-Stage Threat Modelling and Security Monitoring in 5GCN. In Cybersecurity Issues in Emerging Technologies; CRC Press: Boca Raton, FL, USA, 2021; pp. 59–76. [Google Scholar]
- Lee, C.C.; Tan, T.G.; Sharma, V.; Zhou, J. Quantum Computing Threat Modelling on a Generic CPS Setup. In International Conference on Applied Cryptography and Network Security; Springer: Cham, Switzerland, 2021; pp. 171–190. [Google Scholar]
- van Landuyt, D.; Joosen, W. A descriptive study of assumptions made in LINDDUN privacy threat elicitation. In Proceedings of the 35th Annual ACM Symposium on Applied Computing, Brno, Czech Republic, 30 March–3 April 2020; pp. 1–8. [Google Scholar]
- Deng, M.; Wuyts, K.; Scandariato, R.; Preneel, B.; Joosen, W. A Privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 2011, 16, 3–32. [Google Scholar] [CrossRef]
- Li, E.; Kang, C.; Huang, D.; Hu, M.; Chang, F.; He, L.; Li, X. Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees. Information 2019, 10, 251. [Google Scholar] [CrossRef] [Green Version]
- Johnson, P.; Lagerstrom, R.; Ekstedt, M.; Franke, U. Can the Common Vulnerability Scoring System Be Trusted? A Bayesian Analysis. IEEE Trans. Dependable Secur. Comput. 2016, 15, 1002–1015. [Google Scholar] [CrossRef]
- Mantha, B.; Jung, Y.; Garcia, B. Implementation of the Common Vulnerability Scoring System to Assess the Cyber Vulnerability in Construction Projects. In Proceedings of the Creative Construction Conference, Opatija, Croatia, 28 June–1 July 2020; pp. 117–124. [Google Scholar]
- Czekster, R.M.; Morisset, C. BDMPathfinder: A tool for exploring attack paths in models defined by Boolean Logic Driven Markov Processes. In Proceedings of the European Dependable Computing Conference, Munich, Germany, 13–16 September 2021; pp. 83–86. [Google Scholar]
- Falco, G.; Viswanathan, A.; Santangelo, A. CubeSat Security Attack Tree Analysis. In Proceedings of the 8th IEEE International Conference on Space Mission Challenges for Information Technology, Pasadena, CA, USA, 26–30 July 2021; pp. 1–9. [Google Scholar]
- Mead, N.; Shull, F.; Spears, J.; Heibl, S.; Weber, S.; Cleland-Huang, J. Crowd Sourcing the Creation of Personae Non Gratae for Requirements-Phase Threat Modeling. In Proceedings of the IEEE 25th International Requirements Engineering Conference, Lisbon, Portugal, 4–8 September 2017; pp. 404–409. [Google Scholar]
- Omotunde, H.; Ibrahim, R. A Hybrid Threat Model for Software Security Requirement Specification. In Proceedings of the International Conference on Information Science and Security, Pattaya, Thailand, 19–22 December 2016; pp. 1–4. [Google Scholar]
- Luna, J.; Suri, N.; Krontiris, I. Privacy-by-design based on quantitative threat modeling. In Proceedings of the Risk and Security of Internet and Systems, Cork, Ireland, 10–12 October 2012; pp. 1–8. [Google Scholar]
- Alberts, C.; Dorofee, A.; Stevens, J.; Woody, C. Introduction to the OCTAVE Approach. In Introduction to the OCTAVE Approach; Software Engineering Institute, Carnegie Mellon University: Pittsburgh, PA, USA, 2003. [Google Scholar]
- Saitta, P.; Larcom, B.; Eddington, M. Trike v.1 Methodology Document. 2005. Available online: https://www.octotrike.org/papers/Trike_v1_Methodology_Document-draft.pdf (accessed on 4 January 2022).
- Nhlabatsi, A.; Hussein, A.; Fetais, N.; Khan, K.M. Design and Implementation of a Threat-Specific Security Risk Assessment Tool. In Proceedings of the IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), Doha, Qatar, 2–5 February 2020. [Google Scholar]
- Falah, B.; Akour, M.; Oukemeni, S. An Alternative Threat Model-based Approach for Security Testing. Int. J. Secur. Softw. Eng. 2015, 6, 50–64. [Google Scholar] [CrossRef]
- Aydin, M.M. Engineering Threat Modelling Tools for Cloud Computing; University of York, Computer Science: York, UK, 2016; p. 138. [Google Scholar]
- Lenzini, G.; Mauw, S.; Ouchani, S. Security Analysis of Socio-Technical Physical Systems. In Proceedings of the STM 2016: Security and Trust Management, Heraklion, Crete, Greece, 26–27 September 2016; pp. 170–178. [Google Scholar]
- Huang, Y.; Cardenas, A.A.; Aminb, S.; Linc, Z.; Tsai, H.; Sastry, S. Understanding the physical and economic consequences of attacks on control systems. Int. J. Crit. Infrastruct. Prot. 2009, 2, 73–83. [Google Scholar] [CrossRef]
- Burmester, M.; Magkos, E.; Chrissikopoulos, V. Modeling Security in Cyber-Physical Systems. Int. J. Crit. Infrastruct. Prot. 2012, 5, 118–126. [Google Scholar] [CrossRef]
- Baquero, A.O.; Kornecki, A.J.; Zalewski, J. Threat Modeling for Aviation Computer Security. In Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 31 August–2 September 2016. [Google Scholar]
- Pan, J.; Zhuang, Y. PMCAP: A Threat Model of Process Memory Data on the Windows Operating System. Secur. Commun. Netw. 2017, 2017, 1–16. [Google Scholar] [CrossRef] [Green Version]
- Abrams, M.D. NIMS Information Security Threat Methodology; MITRE Corporation: Bedford, MA, USA, 1998; pp. 1–35. [Google Scholar]
- Novokhrestov, A.; Konev, A. Mathematical Model of Threats to Information Systems. In AIP Conference Proceedings; AIP Publishing LLC: Melville, NY, USA, 2016; pp. 1–4. [Google Scholar]
- Alvaro, A.C.; Amin, S.; Sinopoli, B.; Perrig, A.; Sastry, S. Challenges for securing cyber physical systems. Electr. Eng. Comput. Sci. 2009, 5, 1–4. [Google Scholar]
- Gaddam, N.; Kumar, G.S.A.; Somani, A.K. Securing Physical Processes against Cyber Attacks in Cyber-Physical Systems. In Proceedings of the National Workshop for Research on High-Confidence Transportation Cyber-Physical Systems: Automotive, Aviation & Rail, Tyson’s Corner, VA, USA, 18–20 November 2008; pp. 1–3. [Google Scholar]
- Myagmar, S.; Lee, A.J.; Yurcik, W. Threat modeling as a basis for security requirements. Symposium on Requirements Engineering for Information Security (SREIS). 2005, pp. 1–8. Available online: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.703.8462&rep=rep1&type=pdf (accessed on 4 January 2022).
- Igure, V.M.; Laughter, S.A.; Williams, R.D. Security issues in SCADA networks. Comput. Secur. 2006, 25, 498–506. [Google Scholar] [CrossRef]
- Shostack, A. Threat Modeling; John Wiley & Sons, Inc.: Indianapolis, Indiana; Toronto, ON, Canada, 2014; p. 626. [Google Scholar]
- Novokhrestov, A.; Konev, A.; Shelupanov, A.; Buymov, A. Computer network threat modelling. J. Phys. Conf. Ser. 2020, 1488, 1–6. [Google Scholar] [CrossRef]
- Barrere, M.; Hankin, C.; Nicolaou, N.; Eliades, D.G.; Parisini, T. Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies. J. Inf. Secur. Appl. 2020, 52, 102471. [Google Scholar] [CrossRef]
- Novokhrestov, A.; Konev, A.; Shelupanov, A. Model of Threats to Computer Network Software. Symmetry 2019, 11, 1506. [Google Scholar] [CrossRef] [Green Version]
- Egoshin, N.S.; Konev, A.A.; Shelupanov, A.A. A Model of Threats to the Confidentiality of Information Processed in Cyberspace Based on the Information Flows Model. Symmetry 2020, 12, 1840. [Google Scholar]
- Pendergrass, J.C.; Heart, K.; Ranganathan, C.; Venkatakrishnan, V.N. A Threat Table Based Approach to Telemedicine Security; Western Michigan University: Kalamazoo, MI, USA, 2013; Volume 2, pp. 104–111. [Google Scholar]
- Jiang, R.; Lu, R.; Wang, Y.; Luo, J.; Shen, C.; Shen, X. Energy-Theft Detection Issues for Advanced Metering Infrastructure in Smart Grid. Tsinghua Sci. Technol. 2014, 19, 105–120. [Google Scholar] [CrossRef]
- IEEE Std 1471-2000. IEEE Recommended Practice for Architecture Description of Software-Intensive Systems. Available online: https://ieeexplore.ieee.org/document/875998 (accessed on 4 January 2022).
- ISO/IEC/IEEE 15288:2015; Systems and Software Engineering–System Life Cycle Processes. International Organisation for Standardisation/International Electrotechnical Commissions/Institute of Electrical and Electronics Engineers: Geneva, Switzerland, 2015.
Threat-Modeling Method | Features |
---|---|
STRIDE |
|
PASTA |
|
LINDDUN |
|
CVSS |
|
Attack trees |
|
Persona non Grata |
|
Security Cards |
|
hTMM |
|
Quantitative TMM |
|
Trike |
|
OCTAVE |
|
VAST modeling |
|
Name of the Property | Publication | A Brief Description |
---|---|---|
Smart grid | [69] | The authors proposed a new method for solving cybersecurity problems to detect malicious activity directed at the levels of the distributed network protocol (DNP3) in dispatch control and data acquisition (SCADA) systems. In this paper, a system model was built for the proposed solution, which includes a data entry system, a data analysis system and a classification as well as detection system. Additionally, the authors in this article described some attacks on the smart grid, but the experiments were not successful. The authors pointed out that it was necessary to refine their method, and that in the future it will be possible to use it. The constructed model is asymmetric and hierarchical, since one object is nested in another, and then the general structure passes into the next structure. |
Process-oriented systems | [70] | Model-based architecture is an approach to improving the quality of complex software systems based on the creation of high-level systems and the automatic creation of system architectures from models. The authors showed how this paradigm can be adapted to what is called model-driven security. In this work, several models were formed: the structure and control of the flow of the order process, a meta-model, a model for designing processes and an access control policy model for the order process. All these models are asymmetric, as they have a step-by-step structure until the first action is performed, the second is not performed, etc. Ultimately, the authors proposed a design model (process models) and a security model that can be used in process-oriented systems. |
Computer networks | [71] | The structure of software-defined networks (SDNs) is subject to serious threats. The authors reflected the need to introduce a new approach to the consideration of cybersecurity in the framework of SDNs. They also presented a model for protecting information from cyber threats in the SDN global network connected to the Internet. |
[72] | The authors proposed a new stochastic model for quantifying cybersecurity by combining time and probability. The proposed model is based on the indicators of «Markov Chains» and «Attack Graphs». Since the authors used Markov chains, their proposed model is symmetric. The authors described all the elements that can be included in their stochastic model, and also calculated the probability of some threats to their model, but they did not describe these threats. | |
[73] | The authors systematically studied methods, algorithms and system designs that used machine learning (ML) in the fields of security. We studied generalized system designs, underlying assumptions and measurements, and gave examples of their use in active research. The researchers built a matrix showing the intersection of ML paradigms and three different taxonomy structures for classifying security areas, providing tables describing protocols, system components and possible vulnerabilities, as well as which ML methods can be used in a certain attack on a computer network. | |
Computer networks | [74] | In this article, the authors analyzed machine learning methods used to detect intrusions, malware and spam. We set ourselves the following tasks: to assess the current maturity of these solutions and identify their main limitations that prevent the immediate implementation of machine learning cyber distribution schemes. The authors’ results indicate that existing machine learning methods are still subject to a number of disadvantages that reduce their effectiveness in the field of cybersecurity. All approaches are vulnerable to enemy attacks and require constant retraining as well as the careful adjustment of parameters, which cannot be automated. |
[75] | This review aimed to provide a description of how machine learning has been used so far in the context of malware analysis in Windows environments, that is, to analyze portable executable files. The authors presented a new concept of the economics of malware analysis, concerning the study of existing trade-offs between key indicators, such as the accuracy of analysis and economic costs. | |
Healthcare (medical institutions) | [76] | Very few studies have systematically examined cybersecurity threats in healthcare. The authors investigated the main types of cybersecurity threats to healthcare organizations and explained the roles of four main players (cyberattacks, cyber defenders, developers and end users) in cybersecurity. As a result, the authors proposed recommendations for healthcare organizations to strengthen cybersecurity in their organizations. |
Executable files | [77] | This publication discussed and highlighted various applications of machine learning in cybersecurity. This research covers: detection of phishing, network intrusions and spam in social networks; authentication with keystroke dynamics; cryptography; and evidence of human interaction. |
Wireless sensor networks | [78] | In this article, the authors investigated and proposed a theoretical hypothetical model of wireless sensor networks as an effective method for creating an energy-efficient green routing model that can overcome the limitations of traditional green routing methods. For comparison, the authors built several wireless sensor networks and tested attacks on them, after which they applied machine learning to determine the probability of attacks. |
[79] | The authors proposed a taxonomy consisting of the security properties of a sensor network, a threat model and a security design space. An attempt was made to understand the purpose of the sensor network at the application level. In this article, only the taxonomy for the security of sensor networks was considered, but the authors claimed that in the future they will conduct a systematic analysis of the threat model and link it to security. | |
Network intelligent transport systems | [80] | The authors developed a threat model for an attack scenario, and also investigated LVS performance in terms of mutual input/output information. The practical advantages of the new information-theoretic scheme in comparison with more traditional verification systems are discussed. The authors have constructed a symmetric information-theoretic LVS model using mutual information between the input and output LVS data as an objective optimization criterion. |
IoT | [81] | This article highlights several machine learning (ML) methods, such as k-nearest neighbors (KNN), support vector machines (SVM), decision trees (DT), naive Bayes (NB), random forests (RF), artificial neural networks (ANN) and logistic regression (LR), which can be used in IDS. This article compares ML algorithms for both binary and multiclass classification in both Internet of things datasets. |
[82] | This document provides an overview of the Internet of things security recommendations proposed by various organizations, in addition to an assessment of some existing technologies used to ensure the security of the Internet of things in accordance with these recommendations. | |
[83] | In this article, the authors proposed a platform that implements a reputation-based trust mechanism and an extended application-level firewall to solve the security problems of Internet of things applications. The proposed platform provides minimal resource consumption at the node level, as well as an integrated overview and control of the system status using a cloud component and a smartphone management application. | |
[84] | This article proposes a solution for anomaly detection based on the use of unsupervised deep learning methods to detect the actions of an Internet of things botnet. | |
[85] | This article proposes a Hadoop-based framework for detecting malicious Internet of things traffic using a modified Tomek switchable channel, resampling, integrated with auto-coupled hyper parameters setting-up machine learning classifiers. The novelty of this article is the use of a big data platform for benchmarking IoT datasets to minimize computation time. | |
Enterprise applications | [86] | The authors of this article tested the method of the visualization and measurement of the architecture of corporate applications. The method was developed to reveal the hidden internal architectural structure of software applications. To achieve this goal, a test was carried out to see if this method could reveal new facts about applications and their relationships in the enterprise architecture, that is, whether the method could reveal a hidden external structure between applications. |
Cloud storage | [87] | The article presents a systematic review of the literature in the field of cloud computing, with an emphasis on risk assessment. This will help future researchers and cloud computing users/business organizations gain an understanding of the risk factors in the cloud environment. |
[88] | In this article, the authors presented the current state of the privacy preservation (PPM) models of cloud computing based on TPA. Moreover, TPA privacy models were comprehensively analyzed and divided into different classes, with an emphasis on their dynamism. Finally, the limitations of the models were discussed. | |
Distributed systems | [89] | This source describes more fully the lifecycle processes of the secure development of distributed systems. An overview of typical security development processes is given, and important recommendations for the development of the security of distributed systems are given. |
[90] | The authors investigated and critically analyzed modern security methodologies based on some form of abstract modeling for distributed systems. A number of criteria were proposed that reflected the characteristics that security methodologies should have, which should be adopted in real industry scenarios. The authors’ results help to assess risks and indicate the direction of future research. | |
[91] | The authors proposed a comprehensive approach to engineering safety methodologies. This approach is embodied in three interrelated parts: the structure of interrelated models of security processes; a security-specific meta-model; and a meta-methodology that will help engineers use the model in stages. The article proposes a new template-oriented approach to the modeling, construction, adaptation and integration of security methodologies, which is the very first and currently the only such approach in the literature. |
Method Name | Publication | Brief Description |
---|---|---|
STRIDE | [92] | In this paper, the authors used STRIDE to identify vulnerabilities in a cyber–physical system and decide which appropriate component-level security measures to use at the stage of system design, because it is a light and efficient methodology of threat modeling. |
[93] | This article evaluates STRIDE, namely, the number of suitable threats usually created per hour, the correctness of the analysis results by considering the average number of false positives, i.e., invalid threats, and the fullness of the assay results by considering the average number of missed threats. | |
[94] | In this paper, the authors added security solution elements to data flow diagrams (DFD) and used them together for more accurate threat detection. Their approach is confirmed on the example of a STRIDE analysis of an industrial solution for video conferences. The DFD additions presented are a key element for the development of the continuous and dynamic modeling of threats. | |
[95] | The paper examines three different approaches for connecting the CWE weakness database and STRIDE, and discusses the results. | |
[96] | In this paper, the authors investigated the threat-modeling method STRIDE, which is often used in the IT industry, and assessed its applicability for a connected car. The authors used STRIDE for investigating the software architecture of the system. | |
PASTA | [97] | The authors identified suitable security monitoring within the 5GCN through threat identification and decomposition in line with the threat analysis step of the PASTA framework. |
[98] | The authors used PASTA to model threats for a generic cyber–physical system (CPS) to prove its efficiency and report results. They also included strategies for mitigation that were identified in the process of modeling threats for CPS owners to apply. | |
LINDDUN | [99] | The authors presented a study based on the real application of LINDDUN. This study includes a total of 122 home automation system threat models. This study’s main focus is explaining the role of assumption making in the process of modeling threats, dividing the information types into categories and matching them to the threat categories of LINDDUN. |
[100] | This paper proposes a systemic approach for using LINDDUN to determine the privacy requirements of systems that are software-intensive and select technologies for enhancing privacy accordingly. | |
CVSS | [101] | In this paper, the authors used the CVSS to quantitatively estimate the attack sequence, which is the attack tree leaf host in distribution automation systems. |
[102] | The authors of this paper evaluated the reliability of the CVSS scoring data found in five leading databases: CERT-VN, Cisco, OSVDB, NVD and X-Force. It was concluded that the CVSS is quite reliable, except for a few dimensions. | |
[103] | The main focus of this paper was to explore the application of the CVSS to quantitatively assess and estimate the project participants’ vulnerability, in addition to the application of this information as the groundwork for finding vulnerabilities in the security of construction networks. | |
Attack trees | [104] | Attack trees are a technique for security modeling that use logic gates to predict the chances of malicious actions. However, they do not consider attack progression over time. To solve this issue, one can use the formalism of Boolean-logic-driven Markov processes (BDMP) to extend AT where triggered transitions connect the subtrees pertaining to the hierarchy. |
[105] | This paper’s focus was the application of attack tree analysis to assess the vulnerabilities of a CubeSat. The authors built an architectural model of an operational CubeSat. Then, they created a series of attack trees for the abstracted architecture to illustrate a series of potential attack vectors for small satellites. | |
Persona non Grata | [106] | The authors of this paper wrote about crowdsourcing the creation of Persona non Grata, which can model the actions and goals of potentially malicious unwanted users. In their research they took a collection of various potentially redundant Persona non Grata and formed a single set out of it. This approach is a combination of visualization and machine learning techniques. |
hTMM | [107] | This paper is about threat modeling using a hybrid techniques framework designed to help secure software against SQL injection attacks. By focusing on the most exploited vulnerabilities, security experts can determine the best methods through which to make software invulnerable to SQL injection attacks. |
Quantitative TMM | [108] | In this paper the authors proposed a quantitative threat-modeling methodology (QTMM) that can help to determine privacy-related attacks that might be a threat to a service. This methodology has been successfully tested in the context of the EU project ABC4Trust, which required the end users to elicit the security and privacy requirements of the privacy attribute-based credentials. |
OCTAVE | [109] | The authors of this paper described the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE), an approach for dealing with information security risks. This document is an overview of the OCTAVE approach and a brief description of two OCTAVE-consistent methods developed by the Software Engineering Institute. |
Trike | [110] | This document is a sufficiently detailed report on the current version of the Trike methodology. It can be used by a security auditing team for a complete and accurate depiction of the high- and low-level security characteristics of a system. |
VAST modeling | [111] | The authors of this paper described the structure and implementation of a tool for assessing security risks. The tool supports a security risk evaluation method VAST which is specific threat. This method allows cloud providers the opportunity to estimate the security risk of their tenants based on threats specific to them. |
Publication | Brief Description |
---|---|
[112] | The authors described the need for software security testing in the lifecycle of a web application before it enters the market. The method of threat modeling used in security testing is defined. The proposed method lists threats that are interesting, highlights operations and areas that need to be protected and generates test measures used to test security checks in web applications. |
[113] | This article presents the basic theory of Cloud-COVER (tools for managing and ordering vulnerabilities and risks), a threat-modeling tool developed to identify threats to cloud computing systems. Cloud-COVER simulates the observed system and determines the priority of threats using a system of relative preferences provided by the user of the instrument. The Cloud-COVER model is abstracted in such a way that it is extensible, which allows users to change the perspective of the model according to their own circumstances. |
[114] | The authors proposed a model that can detect and quantify attacks. It has a rich set of agent actions with appropriate probability and cost. A threat model is also presented. The actions of the attacker have an appropriate cost and are forced to be realistic. Comparison of a model with a probabilistic means of checking symbolic models and expression of patterns of security properties in the logic of the probabilistic computing tree. |
[115] | This paper describes an approach to developing threat models for attacks on control systems. These models are useful for analyzing the actions taken by an attacker who gains access to the assets of the management system, and for assessing the impact of the attacker’s actions on the controlled physical process. Models of integrity attacks and denial-of-service (DoS) attacks are proposed, and the physical and economic consequences of attacks on the chemical reactor system are evaluated. |
[116] | The authors described a structure for modeling the security of a cyber–physical system, in which the attacker’s behavior is controlled by a threat model that covers cyber aspects (with discrete values) and physical aspects (with continuous values) of a cyber–physical system. The framework identifies cyber–physical features defined by security policies that need to be protected, and can be used to formally prove the security of cyber–physical systems. |
[117] | The article discusses security issues in aviation and presents the application of a realistic cyber–physical system for the introduction of a threat-modeling method with the support of tools that can be used to analyze the security of unmanned aerial vehicles. |
[118] | The authors proposed a new threat model called Process Memory Captor (PMCAP) in the Windows operating system, which threatens the data of the energy-dependent memory of a real process. Compared to existing technologies, PMCAP can extract valuable data at a lower cost; some methods in the model are also suitable for memory analysis and malware analysis. |
[119] | This report presents a methodology for assessing threats to the information security of the National Airspace Management System (NAS) and Infrastructure Management System (NIMS). Specific vulnerabilities are discussed in the accompanying Legacy NIMS Vulnerability Study (FOTO) report. This report is an improved version of MITRE. |
[120] | The article proposes an integrity threat model for an information system model based on the attributive nesting of metagraph three. This threat model includes threats at the level of software, operating system and network. The model can be used within the framework of the methodology for assessing the quality of computer network security, and can be used to develop a model of the system and threats of an automated system for commercial accounting of energy consumption. |
[121] | The authors of this publication discussed three key security issues of cyber–physical systems: (1) understanding the threats and possible consequences of attacks, (2) identifying the unique properties of cyber–physical systems and their differences from traditional IT security and (3) analyzing the security mechanisms applicable to cyber–physical systems. In particular, we analyze security mechanisms for the prevention, detection and recovery, resilience and deterrence of attacks. |
[122] | Creating a secure cyber–physical system is a very difficult task, since it involves the comprehensive elimination of vulnerabilities in cyber systems and their impact on physical systems. The general approach to solving this problem is to analyze the spread from cyber vulnerabilities to corresponding impacts on the physical system, or vice versa. |
[123] | The authors investigated how threat modeling can be used as a basis for the specification of security requirements. They explained the differences between modeling software products and complex systems, and described an approach to identifying threats to network systems. Three case studies of threat modeling were presented: software-defined radio, a network traffic monitoring tool (VisFlowConnect) and a cluster security monitoring tool (NVisionCC). |
[124] | This review examines all the most important research issues related to strengthening the cybersecurity of SCADA networks. The general architecture of SCADA networks and the properties of some widely used SCADA communication protocols are described. Common security threats and vulnerabilities in these networks are discussed, followed by a review of the research challenges facing SCADA networks. The authors discussed current work in several areas of SCADA security: improving access control, firewalls and intrusion detection systems, analysis of SCADA protocols, cryptography and key management and the security of devices and operating systems. |
[125] | The author described in detail how to ensure security from the very beginning when designing systems, software or services. The book describes various approaches to threat modeling. Additionally, how you can test a system for threats and find out effective ways to eliminate threats that have been tested in Microsoft and other leading companies. |
[126] | The article discusses methods for constructing threat models of information systems and computer networks. The disadvantages of existing approaches are highlighted. The authors propose an approach to the construction of a computer network model, as well as to the description of information and system threats. The proposed approach takes into account the identified shortcomings of existing solutions, and is aimed at reducing the influence of subjective expert opinion when compiling lists of threats. |
[127] | In this article, the authors presented a new ICS security metric based on graphs and/or hypergraphs, which can effectively identify a set of critical ICS components and security measures that should be compromised, with minimal cost (effort) for an attacker, in order to disrupt the operation of vital assets of the automated process control system. |
[128] | The article highlights the problem of identifying threats to the information security of computer networks. The analysis of computer network models used to identify threats, as well as approaches to the construction of such models, was carried out. The shortcomings that need to be corrected are highlighted. Based on the mathematical apparatus of attributive metagraphs, a computer network model has been developed that allows for describing the software components of computer networks and all possible connections between them. Based on elementary operations on metagraphs, a model of threats to the security of computer network software has been developed, which makes it possible to compile lists of threats to the integrity and confidentiality of computer network software. The proposed constructed model is symmetric with respect to the server. |
[129] | This article discusses one of the fundamental problems of information security—building a threat model. The article discusses a new method for identifying typical threats to information confidentiality based on the information flow model. The above description was based on the formulation of the system. A review of the subject area revealed several approaches used to describe the system in terms of circulating information flows. The information flow model proposed in this paper reduces the description of any information system to an eight-digit alphabet. The analysis of the structure of the elementary information flow revealed four typical threats to privacy; the Cartesian product of a set of threats and a set of flows is a complete model of typical threats to the confidentiality of information processed in cyberspace. |
[130] | This article analyzes telemedicine applications to assess security threats. This research focuses on identifying and presenting significant security threats in telemedicine. The study shows that in a strictly controlled environment, the security risks created by telemedicine applications are significant, and that using the threat table approach provides an easy-to-use and effective method of managing these threats. |
[131] | With the spread of research in the field of intelligent networks, Advanced Metering Infrastructure (AMI) has become the first ubiquitous and fixed computing platform. However, due to the unique characteristics of the AMI, such as a complex network structure, smart meters with limited resources and sensitive security data, it is particularly challenging. To solve this problem, the authors have identified the basic security requirements that the AMI must meet. The authors proposed a developed accounting infrastructure, which is a hierarchical structure. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Konev, A.; Shelupanov, A.; Kataev, M.; Ageeva, V.; Nabieva, A. A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats. Symmetry 2022, 14, 549. https://doi.org/10.3390/sym14030549
Konev A, Shelupanov A, Kataev M, Ageeva V, Nabieva A. A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats. Symmetry. 2022; 14(3):549. https://doi.org/10.3390/sym14030549
Chicago/Turabian StyleKonev, Anton, Alexander Shelupanov, Mikhail Kataev, Valeriya Ageeva, and Alina Nabieva. 2022. "A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats" Symmetry 14, no. 3: 549. https://doi.org/10.3390/sym14030549
APA StyleKonev, A., Shelupanov, A., Kataev, M., Ageeva, V., & Nabieva, A. (2022). A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats. Symmetry, 14(3), 549. https://doi.org/10.3390/sym14030549