RIoTS: Risk Analysis of IoT Supply Chain Threats

Securing the supply chain of information and communications technology (ICT) has recently emerged as a critical concern for national security and integrity. With the proliferation of Internet of Things (IoT) devices and their increasing role in controlling real world infrastructure, there is a need to analyze risks in networked systems beyond established security analyses. Existing methods in literature typically leverage attack and fault trees to analyze malicious activity and its impact. In this paper, we develop RIoTS, a security risk assessment framework borrowing from system reliability theory to incorporate the supply chain. We also analyze the impact of grouping within suppliers that may pose hidden risks to the systems from malicious supply chain actors. The results show that the proposed analysis is able to reveal hidden threats posed to the IoT ecosystem from potential supplier collusion.

[1]  Daniele Sgandurra,et al.  Hierarchical, model-based risk management of critical infrastructures , 2009, Reliab. Eng. Syst. Saf..

[2]  Dong Seong Kim,et al.  Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees , 2012, Secur. Commun. Networks.

[3]  Barbara Kordy,et al.  DAG-based attack and defense modeling: Don't miss the forest for the attack trees , 2013, Comput. Sci. Rev..

[4]  Sjouke Mauw,et al.  Foundations of Attack Trees , 2005, ICISC.

[5]  Nadya Bartol,et al.  Supply Chain Risk Management Practices for Federal Information Systems and Organizations , 2015 .

[6]  Vaidas Matuzas,et al.  Analysis of large fault trees based on functional decomposition , 2011, Reliab. Eng. Syst. Saf..

[7]  Xinming Ou,et al.  A scalable approach to attack graph generation , 2006, CCS '06.

[8]  Sushil Jajodia,et al.  An Attack Graph-Based Probabilistic Security Metric , 2008, DBSec.

[9]  Gary B. Wills,et al.  Towards Mapping the Security Challenges of the Internet of Things (IoT) Supply Chain , 2018, KES.

[10]  Somesh Jha,et al.  Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[11]  Marco Gribaudo,et al.  Exploiting Bayesian Networks for the Analysis of Combined Attack Trees , 2015, PASM.

[12]  David A. Schmidt,et al.  Aggregating vulnerability metrics in enterprise networks using attack graphs , 2013, J. Comput. Secur..

[13]  Somesh Jha,et al.  Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[14]  Eric R. Ziegel,et al.  System Reliability Theory: Models, Statistical Methods, and Applications , 2004, Technometrics.

[15]  Indrajit Ray,et al.  Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.

[16]  Edward G. Amoroso,et al.  Fundamentals of computer security technology , 1994 .

[17]  Robert Lagerström,et al.  Threat modeling - A systematic literature review , 2019, Comput. Secur..