A Multi-level Cyber-Security Reference Model in Support of Vulnerability Analysis

被引:1
|
作者
Hacks, Simon [1 ]
Kaczmarek-Hess, Monika [2 ]
de Kinderen, Sybren [3 ]
Toepel, Daniel [2 ]
机构
[1] Univ Southern Denmark, Odense, Denmark
[2] Univ Duisburg Essen, Essen, Germany
[3] Eindhoven Univ Technol, Eindhoven, Netherlands
关键词
Vulnerability analysis; Multi-level reference model; Cyber-security by design; ATTACK; REQUIREMENTS; ARCHITECTURE; EXTENSION; FRAMEWORK; NETWORKS;
D O I
10.1007/978-3-031-17604-3_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper reports on the second engineering cycle of a reference model for end-to-end cyber-security by design in the electricity sector. In our previous work, we proposed a reference model that relies on the integrated consideration of two fragmented, but complementary, reference models: NISTIR 7628 and powerLang. To align these reference models, we rely on multi-level modeling, specifically on the Flexible Meta Modeling and Execution Language (FMMLx), and integrated modeling and programming Within this paper, we strengthen the bottom-up design of the reference model's application by integrating a semi-automated threat analysis. This enables the identification of possible points of improvement in the actual architecture design, as well as a future analysis of business-level impact of different threats. To demonstrate our approach, we rely on the well-studied Ukraine scenario from 2016.
引用
收藏
页码:19 / 35
页数:17
相关论文
共 50 条
  • [1] Simulation platform for cyber-security and vulnerability analysis of critical infrastructures
    Ficco, Massimo
    Choras, Michal
    Kozik, Rafal
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2017, 22 : 179 - 186
  • [2] First cyber-security vulnerability database for control systems
    不详
    [J]. HYDROCARBON PROCESSING, 2008, 87 (06): : 35 - 35
  • [3] Antecedents for enhanced level of cyber-security in organisations
    Kumar, Saurabh
    Biswas, Baidyanath
    Bhatia, Manjot Singh
    Dora, Manoj
    [J]. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2021, 34 (06) : 1597 - 1629
  • [4] Cyber-Security Threats Origins and their Analysis
    Cerget, Maros
    Hudec, Jan
    [J]. ACTA POLYTECHNICA HUNGARICA, 2023, 20 (09) : 23 - 41
  • [5] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    [J]. JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [6] Bayesian Stackelberg games for cyber-security decision support
    Zhang, Yunxiao
    Malacaria, Pasquale
    [J]. DECISION SUPPORT SYSTEMS, 2021, 148
  • [7] Beyond the Castle Model of cyber-risk and cyber-security
    Leuprecht, Christian
    Skillicorn, David B.
    Tait, Victoria E.
    [J]. GOVERNMENT INFORMATION QUARTERLY, 2016, 33 (02) : 250 - 257
  • [8] Analysis and Improvement of BLP Model for Multi-level Security Database
    Zhao Hai-yan
    Liu Xiangyang
    Zhao Jing
    [J]. ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY III, PTS 1-4, 2013, 397-400 : 2536 - 2539
  • [9] The Influence of Governmental Support on Cyber-Security Adoption and Performance: The Mediation of Cyber Security and Technological Readiness
    Al-Sharhan, Aleyah
    Alsaber, Ahmad
    Al Khasham, Yousef
    Al Kandari, Anwaar
    Nafea, Rania
    Setiya, Parul
    [J]. INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2024, 19 (01)
  • [10] Cyber-Security Analysis of Transactive Energy Systems
    Krishnan, V. V. G.
    Zhang, Y.
    Kaur, K.
    Hahn, A.
    Srivastava, A.
    Sindhu, S.
    [J]. 2018 IEEE/PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2018,