Conceptual Systems Security Requirements Analysis: Aerial Refueling Case Study

被引:14
|
作者
Span, Martin, III [1 ]
Mailloux, Logan O. [2 ]
Mills, Robert F. [2 ]
Young, William, Jr. [3 ]
机构
[1] US Air Force Acad, Colorado Springs, CO 80841 USA
[2] Air Force Inst Technol, Wright Patterson AFB, OH 45433 USA
[3] 53rd Elect Warfare Grp, Eglin AFB, FL 32542 USA
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Cybersecurity; requirements engineering; security; security engineering; systems engineering; systems security engineering;
D O I
10.1109/ACCESS.2018.2865736
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's highly interconnected and technology-reliant environment, cybersecurity is no longer limited to traditional computer systems and IT networks, as a number of highly publicized attacks have occurred against complex cyber-physical systems such as automobiles and airplanes. While numerous vulnerability analysis and architecture analysis approaches are in use, these approaches are often focused on realized systems with limited solution space. A more effective approach for understanding security and resiliency requirements early in the system development is needed. One such approach, system-theoretic process analysis for security (STPA-Sec), addresses the cyber-physical security problem from a systems viewpoint at the conceptual stage when the solution trade-space is largest rather than merely examining components and adding protections during production, operation, or sustainment. This paper uniquely provides a detailed and independent evaluation of STPA-Sec's utility for eliciting, defining, and understanding security and resiliency requirements for a notional next generation aerial refueling platform.
引用
收藏
页码:46668 / 46682
页数:15
相关论文
共 50 条
  • [31] Security Concept for Unoccupied Aerial Systems
    Perner, Cora
    Schmittt, Corinna
    2020 AIAA/IEEE 39TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC) PROCEEDINGS, 2020,
  • [32] A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems
    Span, Martin Trae
    Mailloux, Logan O.
    Grimaila, Michael R.
    Young, William Bill
    2018 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2018,
  • [33] Network Security Systems Log Analysis for Trends and Insights: A Case Study
    Meena, Amit Kumar
    Hubballi, Neminath
    Singh, Yogendra
    Bhatia, Vimal
    Franke, Katrin
    2020 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2020,
  • [34] A Modest Security Analysis of Cyber-Physical Systems: A Case Study
    Lanotte, Ruggero
    Merro, Massimo
    Munteanu, Andrei
    FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS, FORTE 2018, 2018, 10854 : 58 - 78
  • [35] Elastodynamic analysis of aerial refueling hose using curved beam element
    Zhu, Z.H.
    Meguid, S.A.
    AIAA Journal, 2006, 44 (06): : 1317 - 1324
  • [36] Elastodynamic analysis of aerial refueling hose using curved beam element
    Zhu, ZH
    Meguid, SA
    AIAA JOURNAL, 2006, 44 (06) : 1317 - 1324
  • [37] Assessing Security Risk and Requirements for Systems of Systems
    Ki-Aries, Duncan
    2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 454 - 459
  • [38] Uncertainty analysis on binding force of hose-drogue aerial refueling
    Zhang G.
    Zhang Q.
    Feng Z.
    Chen Q.
    Yang T.
    Hangkong Xuebao/Acta Aeronautica et Astronautica Sinica, 2021, 42 (09):
  • [39] Flight data analysis and simulation of wind effects during aerial refueling
    Dogan, Atilla
    Lewis, Timothy A.
    Blake, William
    Journal of Aircraft, 1600, 45 (06): : 2036 - 2048
  • [40] Water Security or Security of Water? A Conceptual Analysis
    Thapliyal, Sangeeta
    INDIA QUARTERLY-A JOURNAL OF INTERNATIONAL AFFAIRS, 2011, 67 (01): : 19 - 35