Óbudai Egyetem Digitális Archívum
    • magyar
    • English
  • English 
    • magyar
    • English
  • Login
View Item 
  •   DSpace Home
  • 5. Folyóiratcikkek
  • Acta Polytechnica Hungarica
  • View Item
  •   DSpace Home
  • 5. Folyóiratcikkek
  • Acta Polytechnica Hungarica
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Integrated Automation for Threat Analysis and Risk Assessment in Automotive Cybersecurity Through Attack Graphs

Thumbnail
View/Open
Saulaiman_Csilling_Kozlovszky_154.pdf (694.9Kb)
Metadata
Show full item record
URI
http://hdl.handle.net/20.500.14044/32127
Collections
  • Acta Polytechnica Hungarica [186]
Abstract
Attack graphs contribute to the evaluation of network security vulnerabilities, offering a visualization of possible attack paths. Despite their common use in IT security for analyzing system vulnerabilities, attack graphs are not commonly used in the automotive sector. As smart vehicles increasingly rely on 5G networks for high-bandwidth, low-latency communication – necessary for advanced vehicle-to-everything (V2X) services and sensor data processing – security concerns escalate. The complexity of 5G-enabled vehicles significantly expands a vehicle's attack surface. The ISO/SAE 21434 standard establishes a framework for securing road vehicle systems. The Threat Analysis and Risk Assessment (TARA) process, a vital part of this standard, helps identify and mitigate security risks. However, the current TARA process relies heavily on manual effort to identify potential attack vectors and assess risks. This can be time consuming, resource- intensive, and prone to human error. This paper discusses the concept of an automated attack graph generation tool specifically designed for automotive threat analysis. We propose a new Graph-based Attack Path Prioritization tool (GAPP), tailored for automotive networks. GAPP focuses on generating attack paths, assessing their feasibility, and identifying the most likely attack scenarios. This aims to enhance the efficiency, comprehensiveness, and accuracy of the TARA process in evaluating network security.
Title
Integrated Automation for Threat Analysis and Risk Assessment in Automotive Cybersecurity Through Attack Graphs
Author
Saulaiman, Nizam-Edden Mera
Csilling, Akos
Kozlovszky, Miklos
xmlui.dri2xhtml.METS-1.0.item-date-issued
2025
xmlui.dri2xhtml.METS-1.0.item-rights-access
Open access
xmlui.dri2xhtml.METS-1.0.item-identifier-issn
1785-8860
xmlui.dri2xhtml.METS-1.0.item-language
en
xmlui.dri2xhtml.METS-1.0.item-format-page
20 p.
xmlui.dri2xhtml.METS-1.0.item-subject-oszkar
automotive security, 5g, threat analysis and risk assessment, attack graph, ISO/SAE 21434
xmlui.dri2xhtml.METS-1.0.item-description-version
Kiadói változat
xmlui.dri2xhtml.METS-1.0.item-identifiers
DOI: 10.12700/APH.22.2.2025.2.8
xmlui.dri2xhtml.METS-1.0.item-other-containerTitle
Acta Polytechnica Hungarica
xmlui.dri2xhtml.METS-1.0.item-other-containerPeriodicalYear
2025
xmlui.dri2xhtml.METS-1.0.item-other-containerPeriodicalVolume
22. évf.
xmlui.dri2xhtml.METS-1.0.item-other-containerPeriodicalNumber
2. sz.
xmlui.dri2xhtml.METS-1.0.item-type-type
Tudományos cikk
xmlui.dri2xhtml.METS-1.0.item-subject-area
Műszaki tudományok - multidiszciplináris műszaki tudományok
xmlui.dri2xhtml.METS-1.0.item-publisher-university
Óbudai Egyetem

DSpace software copyright © 2002-2016  DuraSpace
Contact Us | Send Feedback
Theme by 
Atmire NV
 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

DSpace software copyright © 2002-2016  DuraSpace
Contact Us | Send Feedback
Theme by 
Atmire NV