THE DEVELOPMENT METHOD OF ASSESSMENT OF CYBERSECURITY VEHICLES

Евгений Витальевич Брежнев, Владислав Вячеславович Бородавка, Ренат Витальевич Салахов

Abstract


Proposed cyber security risk assessment method for vehicles, which is based on the use of multi-level fuzzy output (Multi Fuzzy Inference System - MFIS), which allows to reduce the requirements to the completeness of statistical data characterizing the individual elements of the model (threats, risks, assets, etc.) and get fuzzy evaluation cyber security risks of vehicles, to predict the effects of the mutual influence of the system components, as well as to form a plurality of countermeasures aimed at increasing cyber security. The method is based on the model of threats and risks, taking into account the interaction between risk assets and countermeasures, as well as between the vehicle nodes and risk factors

Keywords


cyber security; vehicle; risk analysis; threat

References


Kolodochkin, M. Vzlom bez loma: legko li vskryt' mashinu so smartfona? [Hacking without scrap: is it easy to open a car from a smartphone?]. Access mode: http://www.zr.ru/content/articles/783458-vzlom-bez-loma-legko-li-vskryt-mashinu-so-smartfona. (Аccessed 08.10.2016).

Miller, C., Valasek, C. A Survey of Remote Automotive Attack Surfaces. In BlackHat USA, 2014. 94 p.

Ebert, C. Webinar: Automotive Cyber Security, Vector Cyber Security Symposium, Stuttgart, Vector Consulting Services GmbH, 2016. 52 p.

Onishi, H. Paradigm Change of Vehicle Cyber Security, New York, NATO CCD COE, 2012, pp. 381-391.

Onishi, H. Guidelines for Vehicle Cyber Security, Alpine Electronics, Inc., 2013, Access mode: http://s3.amazonaws.com/sdieee/1737-Hiro+SDIEEE+ PACE+20140429_CyberSecurity_K_legal.pdf (Accessed 08.10.2016).

Ruddle, A. Security risk analysis approach for on-board vehicle networks. The Fully Networked Car, Geneva, Geneva International Motor Show Publ., 2011. 25 p.

Hank, P., Suermann, T., Müller, S. Automotive Ethernet, a holistic approach for a next-generation in-vehicle networking standard, NXP Semiconductors Germany, 2012, Access mode: http://itersnews.com/?p=10541 (Accessed 08.10.2016).

Clare, D., Cooper, G., Handschuh, H., and etc. Automotive Security Best Practices, Santa Clara, McAfee. Part of Intel Security Publ., 2015. 19 p.

Checkoway, S., Koscher, K., Czeskis, A., and etc. Comprehensive Experimental Analyses of Automotive Attack Surfaces, Washington, USENIX Security Publ., 2011. 16 p.

Van Roermund, T. Secure connected cars for a smarter world. Security Architect, BU Automotive, Eindhoven, NXP Semiconductors, 2015. 30 p.

Sallam, H. Cyber Security Risk Assessment Using Multi Fuzzy Inference System. International Journal of Engineering and Innovative Technology (IJEIT), 2015, no. 8, pp. 13-19.

Glushenko, S. Primenenie sistemy MATLAB dlja ocenki riskov informacionnoj bezopasnosti organizacii [Application of MATLAB to evaluate the risks of the organization of information security]. Biznes-Informatika, 2013, no. 4 (26), pp. 35-42.

Kuksa, P. Metody obuchenija nechetkih system [Methods of teaching fuzzy systems], BMSTU Press, 2004. Access mode: http://pkuksa.org/~pkuksa/ Publications.htm. (Accessed 08.10.2016).




DOI: https://doi.org/10.32620/reks.2017.1.03

Refbacks

  • There are currently no refbacks.