信息网络安全 ›› 2020, Vol. 20 ›› Issue (9): 72-76.doi: 10.3969/j.issn.1671-1122.2020.09.015

• 入选论文 • 上一篇    下一篇

基于STRIDE-LM的5G网络安全威胁建模研究与应用

毕亲波, 赵呈东()   

  1. 北京启明星辰信息安全技术有限公司,北京 100093
  • 收稿日期:2020-07-16 出版日期:2020-09-10 发布日期:2020-10-15
  • 通讯作者: 赵呈东 E-mail:Zhao_chengdong@venustech.com.cn
  • 作者简介:毕亲波(1973—),男,山东,本科,主要研究方向为网络安全|赵呈东(1972—),男,江苏,高级工程师,博士,主要研究方向为密码学、网络安全

Research and Application of 5G Cybersecurity Threat Modeling Based on STRIDE-LM

BI Qinbo, ZHAO Chengdong()   

  1. Beijing Venustech Information Security Technology Co.LTD, Beijing 100093, China
  • Received:2020-07-16 Online:2020-09-10 Published:2020-10-15
  • Contact: Chengdong ZHAO E-mail:Zhao_chengdong@venustech.com.cn

摘要:

5G作为“网络的网络”,成为万物互联的纽带和融合创新的驱动力,利用面向服务的架构和开放的服务能力,为多类型用户提供全方位的优质服务。5G 网络特点和业务属性决定了其安全的重要性,而网络安全威胁建模是面对复杂网络进行网络安全最佳实践的起点和重要的一环。文章首先介绍业界成熟的威胁建模方法;然后介绍威胁建模方法论的6大阶段;最后重点阐述5G威胁建模的过程和关键输出结果的样例。

关键词: 5G, 网络安全威胁, 威胁建模, 业务数据流, 攻击面

Abstract:

As a "network of networks", 5G has become the link of the IoT and the driving force for integration and innovation. It uses service-based architecture and open service capabilities to provide a full range of quality services for various types of users and industries. 5G network characteristics and business attributes determine the importance of its security. Threat modeling is the starting point and very important part of cyber security best practices in the face of complex cyberspace. This article first introduces the industry's mature threat modeling methods, then introduces the six major stages of the threat modeling methodology, and finally focuses on the 5G threat modeling process and examples of key output results.

Key words: 5G, cybersecurity threat, threat modeling, data flow, attack surface

中图分类号: