Attack Analysis Methodologies

dc.contributor.authorReza Esmaeili, Seyed
dc.contributor.authorSoltani Esterabadi, Afshin
dc.contributor.departmentChalmers tekniska högskola / Institutionen för data och informationstekniksv
dc.contributor.examinerOlovsson, Tomas
dc.date.accessioned2019-12-19T09:28:00Z
dc.date.available2019-12-19T09:28:00Z
dc.date.issued2019sv
dc.date.submitted2019
dc.description.abstractnew, hi-tech, automated devices entered our lives, a tendency of moving from the disjointed nature of objects to a more interconnected world has emerged. Although such need of interconnection was originated in the IT industry and with the Internet of Things (IoT), automotive industry was also affected by such a trend. Connected, electric, highly-automated and autonomous vehicles are making their way into our lives. As a result of this paradigm shift, new security challenges are introduced in the automotive industry. Vehicles are comprised of tens or sometimes a hundred of computers, also known as Electronic Control Units (ECUs) that need to communicate and be interconnected in order for the vehicle to function properly. Protecting vehicles from potential threats and attacks that may compromise the security and consequently the safety of both the vehicle and the passenger is of great importance. Hence, a comprehensible attack analysis methodology is needed to model the possible attacks in vehicles. Attack analysis is part of the risk assessment process. To have an accurate risk analysis, two factors are needed: first, the impact of an attack vector, which is not the subject of this thesis, and second, the feasibility of an attack path which is what we address as a part of our thesis using the nominated attack analysis methodology. In this thesis, we investigate existing methodologies for modelling attacks and try to nominate one that is most suitable for the automotive industry. This judgement is based on a list of criteria that are collected either through surveying previous related works or through interviewing industrial and academic experts. Once the methodology is nominated, we introduce a method for calculating the feasibility of different possible attack paths using the proposed methodology. Finally, we use some use cases by means of which we demonstrate how our nominated method can be used to model attacks against some assets and how the feasibility of each attack vector can be calculated for the use cases.sv
dc.identifier.coursecodeDATX05sv
dc.identifier.urihttps://hdl.handle.net/20.500.12380/300610
dc.language.isoengsv
dc.setspec.uppsokTechnology
dc.subjectAutomotivesv
dc.subjectCybersecuritysv
dc.subjectCyberattacksv
dc.subjectAttack surfacesv
dc.subjectAttack analysissv
dc.subjectRisk assessmentsv
dc.subjectThreat analysissv
dc.subjectAttack feasibilitysv
dc.subjectAttack potentials.sv
dc.titleAttack Analysis Methodologiessv
dc.type.degreeExamensarbete för masterexamensv
dc.type.uppsokH
Ladda ner
Original bundle
Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
CSE 19-103 ODR Esmaeili Esterabadi.pdf
Storlek:
3.17 MB
Format:
Adobe Portable Document Format
Beskrivning:
CSE 19-103 Esmaeili Esterabadi
License bundle
Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
license.txt
Storlek:
1.14 KB
Format:
Item-specific license agreed upon to submission
Beskrivning: