Enhancing C4I Security using Threat Modeling

被引:3
|
作者
Alghamdi, Abdullah Sharaf [1 ]
Hussain, Tazar [1 ]
Khan, Gul Faraz [1 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh 11543, Saudi Arabia
关键词
C4I system; security; threat modeling; vulnerabilities; NetCentric;
D O I
10.1109/UKSIM.2010.31
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
C4I (command, control, communications, computer and intelligence) system is a complex system of systems that enables the military commander to achieve decision superiority by affecting adversary's information and information based processes while protecting one's own information systems. Owing to the sensitivity of military information the security threats to C4I systems are real and growing therefore security is a major challenge in order to maintain integrity, confidentiality, availability and accountability. Different Models and architectures frameworks e. g. DODAF, CDSA have been proposed which decompose the detail structure of C4I systems however these models and frameworks do not provide mechanism to capture associated security risks and issues. Threat modeling is the process to understand different ways system can be attacked which helps towards secure system design and implement countermeasures. This paper suggests that using threat modeling could help to eradicate or reduce the effect of advancing threats to C4I systems. In this paper we also identify how security can be modeled in top down manner e. g. from architecture level to lower level of modeling so that countermeasures can be incorporated on system level rather than on bit by bit basis.
引用
收藏
页码:131 / 136
页数:6
相关论文
共 50 条
  • [1] Security Requirements for Cloud-based C4I Security Architecture
    Koo, Jahoon
    Kim, Young-Gab
    Lee, Sang-Hoon
    [J]. 2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2019, : 131 - 134
  • [2] Improving Security of Cloud Based C4I Systems: A Data Confidentiality Approach for C4I Test-Bed
    Fazal-e-Amin
    Ahmad, Iftikhar
    Alghamdi, Abdullah S.
    [J]. JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2017, 7 (03) : 720 - 728
  • [3] Cloud Based C4I Systems: Security Requirements and Concerns
    Fazal-e-Amin
    Alghamdi, Abdullah S.
    Ahmad, Iftikhar
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, : 75 - 80
  • [5] Airborne C4I: Moving data
    Rockwell, David L.
    [J]. AEROSPACE AMERICA, 2007, 45 (08) : 28 - 31
  • [6] C4I System Security Architecture: A Perspective on Big Data Lifecycle in a Military Environment
    Baek, Seungjin
    Kim, Young-Gab
    [J]. SUSTAINABILITY, 2021, 13 (24)
  • [7] Open systems architecture C4I template
    Madaio, J
    Hillers, BJ
    Vasilakos, J
    [J]. NAVAL ENGINEERS JOURNAL, 2001, 113 (01) : 71 - 80
  • [8] Big Data Analytics in C4I Systems
    Shukla, Vandana
    Singh, Bhawna
    Kumar, Mohit
    Negi, Kinnari
    [J]. 2018 INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTATIONAL ENGINEERING (ICACE), 2018, : 102 - 106
  • [9] Study on C4I embedded simulation system
    Fan, SY
    Zhu, YC
    Quan, HD
    [J]. ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 9152 - 9155
  • [10] Designing Framework for the Interoperability of C4I Systems
    Hussain, Tazar
    Mehmood, Raja Majid
    ul Haq, Aman
    Alnafjan, Khalid Abdulaziz
    Alghamdi, Abdullah Sharaf
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, : 102 - 106