A STRIDE Threat Model for 5G Core Slicing

Author(s):  
Danish Sattar ◽  
Alireza Hosseini Vasoukolaei ◽  
Pat Crysdale ◽  
Ashraf Matrawy
Keyword(s):  
Author(s):  
Yassine Mekdad ◽  
Giuseppe Bernieri ◽  
Mauro Conti ◽  
Abdeslam El Fergougui
Keyword(s):  

2019 ◽  
Vol 37 (3) ◽  
pp. 294-313 ◽  
Author(s):  
Marie Helweg-Larsen ◽  
Lia J. Sorgen ◽  
Charlotta Pisinger
Keyword(s):  

2021 ◽  
Vol 43 (4) ◽  
pp. 113-124
Author(s):  
D.V. Saveliev ◽  

The article defines the concept of threat model. Described a list of current security guidelines for the development and administration of web systems. Formed the list of cybersecurity threats, the consequences of their implementation are determined. Described the process of forming a model of cybersecurity threats of web systems. Defined the list of threats based on the recommendations and experience of authoritative organizations in the world and Ukraine. Defined the concepts of risk, risk index and risk status for the security of web systems. Defined the main principles of risk management in software development projects.


2013 ◽  
Vol 21 (4) ◽  
pp. 624-631
Author(s):  
Guillermo Horacio Ramirez Caceres ◽  
Yoshimi Teshigawara

MQTT protocol is publishing-subscribing model for IoT communication. In case of Quality of Services analysis, it is important to check the request and responses between publisher and subscriber. Any threat in communication channel is mostly leads to delay in operation. Hence, if we able to identify the delay parameter, we can suggest by means of QoS that there is a immediate need of security check for IoT system. As many IoT devices performed in unchecked, complicated, and often aggressive surroundings, safe-guarding IoT units present many different challenges. The key purpose for support quality degradation of IoT device interaction can be harmful attacks. Plenty of gadgets are often susceptible to port attacks/botnets hits, such as network attack events, which usually assessed by performing QoS Analysis. To start with factors affecting Quality of Services (QoS), in this paper we developed QoS evaluation algorithm “MQoS” for MQTT protocol and considered QoS-0 as an evaluation parameter. This paper refers the threat model which represents the flow of threats for proposed case study and can help to identify QoS by evaluating the possible communication threats. End–to-end device communication requests and responses are needed to be evaluated for large systems to get the actual QoS parameters for that system. For this reason the actual QoS tests will be conducted for third party applications.In this paper we presented results of MQTTv311 simulation for cooling sensor system.


Author(s):  
Gildas Avoine ◽  
Ioana Boureanu ◽  
David Gérault ◽  
Gerhard P. Hancke ◽  
Pascal Lafourcade ◽  
...  
Keyword(s):  

AbstractWe present the concept of relay attacks, and discuss distance-bounding schemes as the main countermeasure. We give details on relaying mechanisms, we review canonical distance-bounding protocols, as well as their threat-model (i.e., covering attacks beyond relaying) stemming from the authentication dimension in distance bounding. Advanced aspects of distance-bounding security are also covered. We conclude by presenting what we consider to be the most important challenges in distance bounding.


Sign in / Sign up

Export Citation Format

Share Document