论文标题
评估飞机系统的安全性
Evaluating the Security of Aircraft Systems
论文作者
论文摘要
近年来,网络攻击的复杂性和复杂性以及各种目标平台的种类繁多。各种对手正在滥用越来越多的平台,例如企业平台,手机,PC,运输系统和工业控制系统。近年来,我们目睹了对运输系统的各种网络攻击,包括对港口,机场和火车的攻击。运输系统成为网络攻击者的更常见目标只是时间问题。由于攻击载有许多乘客的攻击车辆固有的巨大潜在损害以及在传统空中系统中采用的安全措施缺乏安全措施,因此飞机系统的脆弱性是车辆安全域中最令人关注的主题之一。本文对飞机系统和组件及其各种网络进行了全面的审查,强调了它们所面临的网络威胁以及网络攻击对这些组件和网络的影响以及飞机的基本功能。此外,我们提出了一种全面而深入的分类法,从对手的角度来看,在航空电子领域中对网络安全的知识和理解标准化。分类法将技术划分为相关类别(策略),反映了对抗性攻击生命周期的各个阶段,并根据MITER ATT&CK方法论映射现有的攻击。此外,我们根据潜在的威胁行为者分析了各种系统之间的安全风险,并根据步幅威胁模型对威胁进行分类。未来的工作指导将作为行业和学术界的指南提出。
The sophistication and complexity of cyber attacks and the variety of targeted platforms have been growing in recent years. Various adversaries are abusing an increasing range of platforms, e.g., enterprise platforms, mobile phones, PCs, transportation systems, and industrial control systems. In recent years, we have witnessed various cyber attacks on transportation systems, including attacks on ports, airports, and trains. It is only a matter of time before transportation systems become a more common target of cyber attackers. Due to the enormous potential damage inherent in attacking vehicles carrying many passengers and the lack of security measures applied in traditional airborne systems, the vulnerability of aircraft systems is one of the most concerning topics in the vehicle security domain. This paper provides a comprehensive review of aircraft systems and components and their various networks, emphasizing the cyber threats they are exposed to and the impact of a cyber attack on these components and networks and the essential capabilities of the aircraft. In addition, we present a comprehensive and in-depth taxonomy that standardizes the knowledge and understanding of cyber security in the avionics field from an adversary's perspective. The taxonomy divides techniques into relevant categories (tactics) reflecting the various phases of the adversarial attack lifecycle and maps existing attacks according to the MITRE ATT&CK methodology. Furthermore, we analyze the security risks among the various systems according to the potential threat actors and categorize the threats based on STRIDE threat model. Future work directions are presented as guidelines for industry and academia.