2016 11th International Conference on Availability, Reliability and Security (ARES) 2016
DOI: 10.1109/ares.2016.63
|View full text |Cite
|
Sign up to set email alerts
|

A Model-Based Approach for Aviation Cyber Security Risk Assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Adhikari and Davis [76] discussed the applicability of blockchain with aviation cybersecurity framework and authors argued that blockchain can provide the needed digital data security for aviation operations. Kiesling et al [50] gave a modelbased approach for aviation cybersecurity risk assessment.…”
Section: Aviation Security Framework and Solutionsmentioning
confidence: 99%
“…Adhikari and Davis [76] discussed the applicability of blockchain with aviation cybersecurity framework and authors argued that blockchain can provide the needed digital data security for aviation operations. Kiesling et al [50] gave a modelbased approach for aviation cybersecurity risk assessment.…”
Section: Aviation Security Framework and Solutionsmentioning
confidence: 99%
“…Kure and Islam [20] introduced a risk assessment approach for critical infrastructure based on Cyber Threat Intelligence (CTI) leveraging the concepts of ISO 27005 and NIST SP 800-30. [22] and [18] used a similar approach to identify security metrics describing threats and their countermeasures. Haji et al [12] proposed a risk management module that uses threat modelling to identify threats using NIST SP 800-30 and OWASP threat scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…However, there are no publicly available numbers of incidents in the Air Traffic Network (ATN) per operational hour, thus we required another method. Regarding qualitative measurement methods, there are many examples in literature [28,29] on how to do it .We decided to mix approaches, develop a new and more fine-grained rating system and apply that onto our threat catalogue. For that purpose we defined seven factors all connected to either motivation or technical difficulty and rate them from zero to five (Table 3), average the score and receive a likelihood rating for a certain attack.…”
Section: Likelihoodmentioning
confidence: 99%