A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats

Author:

Konev AntonORCID,Shelupanov Alexander,Kataev MikhailORCID,Ageeva Valeriya,Nabieva Alina

Abstract

Information security is one of the most important attributes of distributed systems that often operate on unreliable networks. Enabling security features during the development of a distributed system requires the careful analysis of potential attacks or threats in different contexts, a process often referred to as «threat modeling». Information protection should be comprehensive, but it is also necessary to take into account the possibility of the emergence of threats specific to a certain information system. Many public and private organizations are still trying to implement system models and the threats directed at them on their own. The main reason for this is the lack of useful and high-quality methodologies that can help developers design system models. This review explores a variety of the literature on confidentiality- and integrity-aware system design methodologies, as well as threat classification methods, and identifies key issues that may be referenced by organizations to make design system processes easier. In particular, this article takes a look at the extent to which existing methodologies cover objects of protection and methods of classifying threats, as well as whether there are such models of systems in which the object itself and the threats directed at it are described. This includes whether the compiled models exhibit symmetry or asymmetry. This literature research shows that methodologies appear to be heterogeneous and versatile, since existing methodologies often only focus on one object of protection (a system). Based on the given analysis, it can be concluded that the existing methodologies only relate superficially to the description of system models and threats, and it is necessary to develop a more complete abstract model of the protected object and threats aimed at it in order to make this model suitable for any organization and protect it against most threats.

Funder

Ministry of Science and Higher Education of Russia

Publisher

MDPI AG

Subject

Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)

Reference133 articles.

1. ICT Facts and Figures 2017https://www.itu.int/en/ITUD/Statistics/Pages/facts/default.aspx

2. Defining Cybersecurity

3. Information Security Threats during Crises and Conflicts of the XXI Century;Romashkina,2016

4. An extensible pattern-based library and taxonomy of security threats for distributed systems

5. A novel kill-chain framework for remote security log analysis with SIEM software

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Ontological analysis in the problems of container applications threat modelling;Informatics;2023-12-29

2. Cybersecurity Threats and Attacks in IoE Networks;Internet of Things;2023-12-01

3. Designing an Ethical and Secure Pain Estimation System Using AI Sandbox for Contactless Healthcare;International Journal of Online and Biomedical Engineering (iJOE);2023-10-25

4. Models of Applied Privacy (MAP): A Persona Based Approach to Threat Modeling;Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems;2023-04-19

5. Architecting threat hunting system based on the DODAF framework;The Journal of Supercomputing;2022-09-23

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3