| Literature DB >> 35009781 |
Christos Grigoriadis1, Romain Laborde2, Antonin Verdier2, Panayiotis Kotzanikolaou1.
Abstract
Maritime processes involve actors and systems that continuously change their underlying environment, location and threat exposure. Thus, risk mitigation requires a dynamic risk assessment process, coupled with an adaptive, event driven security enforcement mechanism, to efficiently deal with dynamically evolving risks in a cost efficient manner. In this paper, we propose an adaptive security framework that covers both situational risk assessment and situational driven security policy deployment. We extend MITIGATE, a maritime-specific risk assessment methodology, to capture situations in the risk assessment process and thus produce fine-grained and situation-specific, dynamic risk estimations. Then, we integrate DynSMAUG, a situation-driven security management system, to enforce adaptive security policies that dynamically implement security controls specific to each situation. To validate the proposed framework, we test it based on maritime cargo transfer service. We utilize various maritime specific and generic systems employed during cargo transfer, to produce dynamic risks for various situations. Our results show that the proposed framework can effectively assess dynamic risks per situation and automate the enforcement of adaptive security controls per situation. This is an important improvement in contrast to static and situation-agnostic risk assessment frameworks, where security controls always default to worst-case risks, with a consequent impact on the cost and the applicability of proper security controls.Entities:
Keywords: adaptive security; event management and analytics; situation-based risk assessment; situational policy elicitation and enforcement
Mesh:
Year: 2021 PMID: 35009781 PMCID: PMC8749908 DOI: 10.3390/s22010238
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1An overview of maritime information and communication systems.
Figure 2Maritime scenario: Security situations of the vessel.
Figure 3The proposed methodology.
Figure 4Maritime scenario: Decision tree based situation elicitation.
Figure 5Relations among risk related entities and relevant datasets.
Vulnerability level calculation matrix.
| AV | Local | Adjacent | Network | |||||||
|---|---|---|---|---|---|---|---|---|---|---|
| AC | Low | Medium | High | Low | Medium | High | Low | Medium | High | |
| AUTH | ||||||||||
| Multiple | VL | VL | L | L | L | M | M | M | H | |
| Single | VL | L | M | L | M | H | M | H | VH | |
| None | L | M | M | M | H | H | H | VH | VH | |
Impact level calculation matrix.
| C | None | Low | High | |||||||
|---|---|---|---|---|---|---|---|---|---|---|
| I | None | Low | High | None | Low | High | None | Low | High | |
| A | ||||||||||
| None | VL | VL | L | L | L | M | M | M | H | |
| Low | VL | L | M | L | M | H | M | H | VH | |
| High | L | M | M | M | H | H | H | VH | VH | |
Situational impact calculation.
| Initial Impact | Asset Criticality | ||
|---|---|---|---|
| Low | Medium | High | |
| Very Low | VL | L | L |
| Low | L | L | M |
| Medium | L | M | H |
| High | L | H | H |
| Very High | M | H | VH |
Active asset model per situation in the cargo transport service.
| Situations | ||||||||
|---|---|---|---|---|---|---|---|---|
| Assets | S1 | S2 | S3 | S4 | S5 | S6 | S7 | S8 |
| Admin Adobe Reader | X | X | X | |||||
| Admin FTP Client | X | X | X | |||||
| Admin Operating System | X | X | X | X | X | X | X | X |
| Admin SSH client | X | X | X | X | X | |||
| Admin Web Browser | X | X | X | X | X | X | ||
| Admin Wincc SCADA | X | X | X | X | X | X | ||
| Inmarsat AmosConnect | X | X | X | |||||
| GPS | X | X | X | |||||
| AIS Gateway | X | X | ||||||
| VTS | X | X | ||||||
| FTP (Manifest Storage) | X | X | ||||||
| Web Services | X | X | ||||||
Applicable threat agents per situation for the cargo transport service.
| Situations | ||||||||
|---|---|---|---|---|---|---|---|---|
| Threat Agents | S1 | S2 | S3 | S4 | S5 | S6 | S7 | S8 |
| Disgruntled Employee | X | X | X | X | X | X | X | X |
| Disgruntled Maritime Systems Administrator | X | X | X | X | X | X | X | X |
| Cyber Criminal Group (Mobster) | X | X | X | X | X | X | ||
| Cyber Terrorist | X | X | X | X | X | X | ||
| Nation State | X | X | X | X | X | X | ||
| Pirate | X | X | ||||||
| Corrupt Port Official | X | X | ||||||
Final results.
| Situations | Situational Risk Assessment | Situational Risk Mitigation | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Asset | Threat Agent | Threat | Vulnerability/ | Impact | Risk | High Level Security | Specific Mitigation | Risk after | |
| Admin Adobe Reader | Corrupt Port Official | CAPEC - 10 | CVE-2011-2440: VH | VH | VH | Software Update | Patch Software. | M | |
| Admin Operating System | Corrupt Port Official | CAPEC - 100 | CVE-2016-0145: VH | VH | VH | File Hashing | Employing file hash comparisons | M | |
| Admin FTP client | Internal Spy | CAPEC - 137 | CVE-2008-3734: VH | VH | VH | File Hashing | Employing file hash comparisons | M | |
| Admin Web Browser | Disgruntled Employee | CAPEC - 588 | CVE-2015-6144: VH | VL | M | (1) Resource access | (1) Monitor access to Admin | VL | |
| GPS | Nation State | CAPEC - 628 | CVE-2017-5239: VH | L | M | - | - | L | |
| GPS | Nation State | CAPEC - 628 | CVE-2017-5239: VH | L | M | Software Update | Applying a vendor-supplied | VL | |
| GPS | Pirate | CAPEC - 628 | CVE-2017-5239: VH | L | M | Message Encryption | Utilize the PKI system to | VL | |
| Admin Wincc SCADA | Disgruntled Maritime | CAPEC - 76 | CVE-2015-0016: VH | VH | VH | Mandatory Access Control | Remove TSWbPrxy from the | VL | |
| Inmarsat AmosConnect | Nation State | CAPEC - 167 | CVE-2017-3222: VH | VH | VH | Strong Password Policy | Delete all hard-coded credentials. | VL | |
| Inmarsat AmosConnect | Cyber Terrorist | CAPEC - 167 | CVE-2017-3222: VH | VH | VH | Strong Password Policy | Apply a strong password policy. | L | |
Figure 6Specification of situation S8 in EPL.
Figure 7Sample of the low level situation-based security policy.