Skip to content

Commit

Permalink
update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
mitrailer committed Oct 6, 2020
1 parent 33e6ca9 commit 38b1353
Showing 1 changed file with 45 additions and 14 deletions.
59 changes: 45 additions & 14 deletions security/risk_assessment_framework/README.md
Original file line number Diff line number Diff line change
@@ -1,25 +1,56 @@
# Cyber-Security Risk Assessment Framework for Blockchains in Smart Mobility
Code of the paper Cyber-Security Risk Assessment Framework for Blockchains in Smart Mobility by Ranwa Al Malla, David
López and Bilal Farooq. For more information about how the risk assessment is performed please refer to the paper
Supplementary material of the paper _Cyber-Security Risk Assessment Framework for Blockchains in Smart Mobility_ by
Ranwa Al Malla, David López, and Bilal Farooq.

## Abstract
We propose a risk assessment framework for blockchain applications
Use of distributed ledger technologies like blockchain is becoming more common in transportation/mobility ecosystem.
However, cyber-security failures may occur at places where the blockchain system connects with the real world.
Although the majority of the vulnerabilities are based on strong assumptions, like infeasibility in cryptographic
primitives or in the technology development, it remains crucial to perform a risk analysis specific to the
transportation ecosystem. In this paper, we propose a novel risk assessment framework for blockchain applications
in smart mobility. As a case study, we carry out an analysis in terms of quantifying the risk associated to a
multi-layered Blockchain framework for Smart Mobility Data-markets (BSMD). We first construct an actor-based analysis
to determine the impact of the attacks. Then, a scenario-based analysis determines the probability of occurrence of
each threat. Finally, a combined analysis is developed to determine which attack outcomes have the highest risk.
In the case study of the public permissioned BSMD, the outcomes of the risk analysis highlight the highest risk
factors according to their impact on the victims in terms of monetary, privacy, integrity and trust.
The analysis uncovers specific blockchain technology security vulnerabilities in the transportation ecosystem by
exposing new attack vectors. The systematic risk analysis here can be used to develop possible countermeasures
against cybersecurity vulnerabilities in the smart mobility implementations of the blockchain technology.
each threat. Finally, a combined analysis is developed to determine which attack outcomes have the highest risk. In
the case study of the public permissioned BSMD, the outcomes of the risk analysis highlight the highest risk factors
according to their impact on the victims in terms of monetary, privacy, integrity and trust. The analysis uncovers
specific blockchain technology security vulnerabilities in the transportation ecosystem by exposing new attack vectors.
The systematic risk analysis here can be used to develop possible countermeasures against cybersecurity vulnerabilities
in the smart mobility implementations of the blockchain technology.

## Usage
The [impact analysis](impact_analysis.py) script has three main procedures:
1. On lines 18-24 there is simple calculator por computing the the probability of occurrence of threats
2. On line 30 is created the risk characterization table for all attack goals at all scenarios and impacts
## Pre-requisites
1. Python 2.7 or above

## Set-up
1. Install and run a python virtual environment. Please follow [this guide](https://docs.python-guide.org/dev/virtualenvs/#lower-level-virtualenv)
2. On the virtual environment run:
```console
pip install pandas
pip install numpy
pip install matplotlib
```

## Script
To run the [impact analysis](impact_analysis.py) script simply run on a virtual environment
```console
python impact_analysis.py
```
The script has three main procedures:
1. On lines 18-24 there is simple calculator por computing the the probability of occurrence of threats. See
the file [Detailed computation of probabilities of occurrence](supporting_files/Detailed_computation_of_probabilities_of_occurrence__sup__mat__.pdf)
or see page 8 on the paper
2. On line 30 is created the risk characterization table for all attack goals at all scenarios and impacts. See
the file [Detailed computation of the risk assessment](supporting_files/Detailed_computation_of_the_risk_assessment__sup__mat__.pdf)
or see page 9 on the paper
3. On lines 40-139 are shown the results of the actor-based risk analysis for all attack goals at its corresponded
scenario
scenario. The results are saved and can be consulted by opening the file [risk_assessment.png](supporting_files/risk_assessment.png)

## Databases
1. The rates assigned to the capacity, opportunity and motivation are located in the file [threats.csv](supporting_files/threats.csv).
See page 9 in the paper
2. The combined risk assessment table for all attack goals at the corresponding scenarios are located in the file [combined_risk_assessment_table](supporting_files/combined_risk_assessment_table.csv)


## Authors
* **Ranwa Al Mallah**
* **David López** [mitrailer](https://github.com/mitrailer)
Expand Down

0 comments on commit 38b1353

Please sign in to comment.