Netinfo Security ›› 2020, Vol. 20 ›› Issue (9): 72-76.doi: 10.3969/j.issn.1671-1122.2020.09.015

Previous Articles     Next Articles

Research and Application of 5G Cybersecurity Threat Modeling Based on STRIDE-LM

BI Qinbo, ZHAO Chengdong()   

  1. Beijing Venustech Information Security Technology Co.LTD, Beijing 100093, China
  • Received:2020-07-16 Online:2020-09-10 Published:2020-10-15
  • Contact: Chengdong ZHAO E-mail:Zhao_chengdong@venustech.com.cn

Abstract:

As a "network of networks", 5G has become the link of the IoT and the driving force for integration and innovation. It uses service-based architecture and open service capabilities to provide a full range of quality services for various types of users and industries. 5G network characteristics and business attributes determine the importance of its security. Threat modeling is the starting point and very important part of cyber security best practices in the face of complex cyberspace. This article first introduces the industry's mature threat modeling methods, then introduces the six major stages of the threat modeling methodology, and finally focuses on the 5G threat modeling process and examples of key output results.

Key words: 5G, cybersecurity threat, threat modeling, data flow, attack surface

CLC Number: