Abstract
In connection with problems such as difficulty in the objective and accurate calculation of the index weight in the security risk assessment of an airborne network, as well as a unitary assessment result and poor descriptiveness, a risk assessment method for airborne network security based on an improved fuzzy analytic hierarchy process (FAHP)-cloud model has been proposed. First, the particularity of the airborne network is taken into account to establish an index system for the risk assessment of airborne network security. the traditional FAHP, information entropy is introduced to calculate the comprehensive weight, which is subsequently combined with the cloud model theory to construct an actual integrated cloud model. By calculating the degree of similarity between the actual integrated cloud model and the standard cloud model, the risk levels of airborne network security are determined. The simulation experiments show that this method can reflect the objectivity of the index weight, make the assessment results more visual and reliable, and fully reflect the fuzziness and randomness in the assessment.
Keywords
Introduction
With the rapid development of information technology and networks, airborne electronic equipment is widely used in the aviation field, and airborne networks will become an important factor affecting flight safety. In order to improve the efficiency of airline maintenance and the level of passenger information services, the avionics full-duplex switched Ethernet (AFDX) is used in the aviation network of the new generation aircraft such as B787, Airbus A380 and A350 [1]. AFDX has an advanced integrated modular system architecture. It has the characteristics of high information fusion, open system structure and high-speed data exchange. In addition, it also provides access to the airborne WiFi, and establishes the connection between the airborne passenger entertainment domain and the Internet, thus breaking the physical isolation among the flight control network domain, the airline information service domain, and the airborne entertainment domain in traditional aircraft models; this break greatly increases the possibility that the flight control network domain may be affected through external networks or equipment. The original relatively closed networks will inevitably face unintentional or malicious attacks in unknown areas.
In 2015, the U.S. Government Accountability Office pointed out in a report that the Internet connection in the cabin of passenger aircraft should be regarded as a direct link between the aircraft and the outside world, which also includes potential malicious attackers. Boeing 787 and Airbus A350 and A380 passenger aircrafts are all equipped with Wi-Fi networks, and the passenger network is interconnected with the aircraft’s airborne avionics network, which means that it is possible for hackers to seize the aircraft’s navigation system through the airborne network, and even control the entire aircraft.
At the CyberSat Summit held on November 8, 2017, an official from the U.S. Department of Homeland Security (DHS) indicated that a group of DHS scholars and industry experts had remotely attacked a Boeing 757 aircraft parked at the Atlantic City Airport in New Jersey.
Such incidents are still happening from time to time. Therefore, it is vital to study airborne network security for the new generation of civil aviation [1, 2]. Moreover, most security incidents have occurred due to neglect of risks or inaccurate assessments; therefore, assessing the risks of airborne network security to identify the risks is the primary task [3].
When the U.S. Federal Aviation Administration (FAA) and the European Joint Aviation Authorities (JAA) reviewed airborne information systems, they also put the network security of the airborne information system in a very important position. In 2014, the FAA established the Aircraft Systems Information Security/Protection (ASISP) Working Group to be responsible for the formulation of relevant regulations, policies, and guidelines to determine the vulnerabilities of airborne networks and to avoid the harmful effects caused by network security incidents to flight safety. Among them, in the RTCADO-356/356A (Airworthiness Security Methods and Considerations) standard, the assessment of security risks of the airborne network is the most important part of the specification [4, 5]. Europe has also considered the recommendations of the ASISP Working Group, and European nations have coordinated to formulate the ED-203 standard, which is consistent with RTCADO-356/356A.
However, the above standards mainly give a recommended risk assessment process and a general framework. A risk assessment model and method related to the particularity of the airborne network environment and the possible threats it may face are still lacking. Due to the closed nature of the airborne network environment, very few people have targeted it for research. The current research results mainly put forward the safety protection risk assessment process for the airborne system, but did not carry out specific calculations in connection with the risks to obtain quantitative assessment results.
Due to different actual application areas, the network security risk assessment methods proposed by scholars at home and abroad are not the same, but they are all in accordance with the established risk assessment process and adopt qualitative analysis and quantitative calculation methods. The risk assessment methods of qualitative analysis, such as the Delphi Method (DM), the logic analysis method, and the Common Criteria (CC) assessment method, mainly rely on subjective experience. The quantitative risk assessment methods mainly consist of the cluster analysis method and the analysis methods based on the Markov chain and the Markov process. In general, quantitative indicators are used to capture risk values and represent the size of a risk. In complex assessment scenarios, qualitative and quantitative analysis methods are usually used. Among them, the quantitative analysis method is used to solve the problem of strong system structure, and the qualitative method is used to solve the problem that is difficult to quantify. The combination of qualitative and quantitative analysis methods can more scientifically and accurately assess the network security risk status. Typical research methods and models include the Analytical Hierarchy Process (AHP) [7, 8], the cloud model theory [9, 10], the gray theory model [11], the fuzzy mathematical model [12], the neural network model [13], and Fault Tree Analysis (FTA) [14]. Among these methods, AHP is easy to operate but does not take into account the relationship between risks, and the assessment results are comparatively unitary and cannot show the qualitative factors in the assessment process. A method that combines AHP with gray clustering can only obtain the risk value, the result is unitary, and it cannot reflect the assessment process. The calculations for the index weight of fuzzy comprehensive evaluation methods based on the cloud model rely too much on the subjective experience of experts, and accurately calculating these weights is difficult.
These methods were all proposed in connection with different application areas. Their risks and scales are not completely applicable to the airborne network environment. For this reason, and in connection with the particularity of the airborne network and the threats it may face, a risk assessment method with an improved fuzzy analytic hierarchy process (FAHP)-cloud model is proposed. First, an index system is established according to the characteristics of the airborne network architecture. Then, FAHP and information entropy are combined to solve the problems of objectivity and accuracy in the comprehensive weight. Second, the cloud model theory is introduced to determine the risk levels and solve the problems of unitary assessment results and poor descriptiveness while showing the qualitative and quantitative assessment results and fully reflecting the randomness and fuzziness of the assessment at the same time.
The main contributions of this paper are the following:
The main threats that three important assets of software, data and services is facing in the airborne network are analyzed. Based on the three security attributes of onboard assets, a three-layer index system for airborne network security risk assessment was established. The new index system makes up for RTCA DO-356/356A (Airworthiness Security Methods and Considerations) standard and the lack of specific indicators for airborne network security risk assessment in the current related research. Based on the traditional fuzzy analytic hierarchy process, the concept of information entropy is introduced to calculate the comprehensive weight, so as to make up for the difficulty of objective and accurate calculation of the relevant index weight caused by the complexity and closeness of the new generation airborne network, and eliminate the influence of randomness. The cloud model theory is introduced to determine the security risk level of airborne network. While the results are expressed quantitatively, the fuzziness and randomness of the evaluation process are displayed qualitatively, avoiding the result representation of single threshold classification.
FAHP and information entropy
FAHP is a multicriteria decision-making analysis method that combines qualitative and quantitative analyses. Fuzzy weights are calculated using triangular fuzzy numbers or trapezoidal numbers to solve problems when there are more evaluation indicators at a certain level and using the traditional AHP to guarantee consistency in thinking is difficult [8]. The definition of the triangular fuzzy number is given below:
For any
When there are
Cloud model theory
The cloud is mapped from the universe to the interval [0,1], and it is composed of many cloud drops. A single cloud drop has no realistic meaning. Only when the cloud drops from a cloud and the entire cloud manifests the numerical features (Ex, En, He) can the features of the qualitative concept be reflected. Here, Ex represents the expected value, En represents entropy, and He represents hyper entropy. The expected value Ex represents the distribution center of the cloud model and is the most probable value. The entropy En reflects the uncertainty of the distribution; the larger the entropy, the harder it is to fix and quantify the value; that is, the fuzziness and randomness are also greater. The hyper entropy He is the uncertainty measure of entropy; the greater the hyper entropy is, the greater the randomness of the membership degree.
Risk assessment model with improved FAHP cloud model
In this paper, the risk assessment model is divided into three main parts: the module that establishes the assessment index system, the module that calculates the comprehensive weight, and the module that constructs the actual integrated cloud model. The main task of the module that establishes the assessment index system is to use the traditional AHP to establish a three-tier index system suitable for use in the security risk assessment of airborne networks. The task of the module that calculates the comprehensive weight is to first use the traditional FAHP to calculate the relative weight
Schematic diagram of risk assessment based on the improved FAHP-cloud model.
In this paper, the traditional AHP is used to establish the assessment index system for an airborne network. Due to the particularity of the airborne network, consideration must be given to the network architecture of the integrated modular avionics system that is widely used by civil aircraft at present when establishing the index system. This architecture breaks the physical isolation between the flight control network domain, the airline information service domain, and the airborne entertainment domain and has even increased the related functions of Internet access to the airborne passenger entertainment domain. While it supports interactions between more network domains, it also poses great risks to network security.According to the general process of the Risk Assessment Specification for Information Security [19], it is necessary to identify assets, threats and vulnerabilities of airborne networks. For aircraft, the assets that need to be protected include hardware, software, data, services and personnel. This paper focuses on three possible threats to software, data and services, among which software refers to onboard system software, application software, data refers to all kinds of database data, documents, stored in onboard storage devices and other information media, service refers to information service and network connection service provided by onboard system. The main threats it may face are: illegally acquiring or tampering with the airborne network information, using the onboard information or network services to threaten the avionics core system, network bandwidth attack or continuous service attack leading to the denial of service of the core system, illegally upgrading the authority to operate the airborne network illegally, etc. In order to assess the risk of airborne network security, based on the possible threats to the assets on board,a three-tier index system of target-criteria-attribute is established (Fig. 2) in whichãthe target level
Index system for the security risk assessment of airborne networks.
The task of the module that calculates the comprehensive weight is divided into three parts. First, a fuzzy judgment matrix is constructed, and
Experts carry out fuzzy scoring of the indicators at level
Then, according to the operation rule for triangular fuzzy number comparison,
The judgment matrix
where The comprehensive weight
The module for constructing the actual integrated cloud model is divided into four main parts. First, the numerical features of an attribute cloud (Ex
Assuming that the security risk level of the airborne network is divided into According to Eqs (6)–(8), the numerical features of the actual integrated cloud model (Ex
where According to Eqs (9)–(11), the numerical features of
where The degree of similarity between the actual integrated cloud model and the standard cloud model is calculated according to the algorithm for the degree of similarity for membership clouds, and then the security risk level of the airborne network is determined.
The experimental environment of this study included one PC computer with an Intel(R) Core(TM)2 Quad CPU, 4G RAM, and a 64-bit operating system, and R2016a version of MATLAB.
Experimental data
Five industry experts were invited to analyze and score the security risk status of a certain airborne network, and the improved FAHP-cloud model algorithm put forward in this paper was used to assess the risk level. The experimental data used in this paper include two main parts:
Module for calculating the comprehensive weight Based on the Fuzzy Linguistic Scale in Table 1, the five experts were invited to score the importance of three indicators Fuzzy linguistic scales
For example, for the degree of importance of indicators
Fuzzy scoring of
Using the same method, triangular fuzzy number scoring was carried out for the degree of pairwise importance for
Module for Constructing the Actual Integrated Cloud Model
When dividing the risk level of the airborne network security, the 10-point system was used. The scores ranged from high to low, representing the risks from large to small. In this paper, according to the Baseline for Classified Protection of Information System Security [20] and Classification Guide [21] and expert opinions, the risk level
Expert assessment data
The specific process for using the experimental data in Section 4. A to carry out simulation experiments was divided into two main parts: calculating the comprehensive weight and constructing the actual integrated cloud model.
According to process 1) in Section 3.2, the initial fuzzy weight of level
Then, according to the comparison principle of triangular fuzzy number, the initial fuzzy weight is de fuzzified, and the result is (0.37,1,0.6). The weight value is standardized, and the final weight of each index of level
Second, judgment matrix
From Process 2) in Section 3.2, the relative weights
According to Process 3) in Section 3.2, the comprehensive weight vector of the five indicators at level
Constructing the actual integrated cloud model
There were three main steps in the construction of the actual integrated cloud model: generating the actual integrated cloud model, generating the standard cloud model, and calculating the degree of similarity.
According to the expert assessment data in Table 3, the reverse cloud generation algorithm was used on the assessment data of each expert to calculate and obtain the numerical features of an attribute cloud. Here, there were numerical features for a total of five attribute clouds (Ex
Numerical features of the attribute cloud
From Process 2) in Section 3.3, the numerical features of the actual integrated cloud (Ex
The five risk levels, divided according to Section 4.1, and the numerical features of the five standard cloud models calculated by Process 3) in 2.3 (Ex
The actual integrated cloud model and the standard cloud model that were generated are shown in Fig. 3. The continuous cloud drop pattern composed of “
Comparison between the actual comprehensive cloud model based on the algorithm in this paper and the standard cloud model.
According to Process 4) in Section 3.3, the degree of similarity between the actual integrated cloud model and the standard cloud model in Fig. 3 was calculated, and the results are shown in Fig. 4.
The similarity between the actual comprehensive cloud model based on the algorithm in this paper and the standard cloud model.
It can be seen from the figure that the “comparatively low risk cloud” is the greatest degree of similarity between the actual integrated cloud model and the standard cloud model, thereby determining that the security risk of this airborne network is at the “comparatively low” level of
To verify that the algorithm of the improved FAHP-cloud model proposed inthis paper is able to effectively solve problems such as difficulty in the objective and accurate calculation of the index weight, a unitary assessment result, and poor descriptiveness, the model was compared with existing risk assessment methods for network security, such as the AHP-gray clustering algorithm and the AHP-cloud model algorithm.
Using the experimental data of this paper, the risk value calculated using the AHP-gray clustering algorithm is
Comparison map of the actual integrated cloud models generated from the AHP-cloud model algorithm and the algorithm of this paper.
Using the experimental data of this paper, the numerical features of the actual integrated cloud model obtained using the AHP-cloud model algorithm for calculation are (3.74, 1.86, 1.05), and the numerical features of the actual integrated cloud model obtained by the improved FAHP-cloud model algorithm proposed in this paper are (3.34, 1.32, 0.64). The expected value Ex represents the distribution center of the cloud model, and it can be seenthat the distribution centers of the two actual integrated cloud models are closer to the “comparatively low risk cloud.” The entropy En reflects the fuzziness of the assessment index, and the hyper entropy He represents the uncertainty of the assessment index. The En and He values calculated by the algorithm of this paper are smaller, so the fuzziness and uncertainty of the index are also lower.
The corresponding actual integrated cloud models generated from these two numerical features are shown in Fig. 5. The pattern composed of the blue“
A comparison of the degree of similarity between the actual integrated cloud model results of the algorithm of this paper, the AHP-cloud model algorithm, and the standard attribute cloud is shown in Fig. 6.
Degree of similarity between the actual integrated cloud model of the AHP-cloud model algorithm and the standard cloud model.
It can be seen from the figure that the degree of similarity results are close to the “comparatively low risk cloud” and “moderate risk cloud” levels, and it may be impossible to accurately judge the risk level.
The comprehensive weight vector calculated by using the improved FAHP-cloud model algorithm of this paper is (
In this paper, in connection with the particularity of airborne network security, an index system applicable to the security risk assessment of airborne networks was established, and a risk assessment method with an improved FAHP-cloud model was proposed. On the basis of the traditional FAHP, this method introduces the concept of information entropy to calculate the comprehensive weight of the indicators, giving full consideration to the proportion of each indicator in the assessment, eliminating the effect of randomness, and improving the reliability and scientific nature of the assessment. Furthermore, the cloud model was introduced to the risk assessment of airborne network security, which shows the fuzziness and uncertainty in the assessment while obtaining quantitative results at the same time; avoids the representation of the results by a single threshold classification or overreliance on a certain mathematical model that requires accurate calculation; makes the assessment results more visual and reliable; and improves the usability of the model. However, the analysis of the indicators is still mainly established on the subjective experience of experts, and when the indicators increase or change, it is necessary to reconstruct the assessment index system for calculations. In subsequent work, different airborne networks will be analyzed, and the assessment model will be optimized.
Footnotes
Acknowledgments
This work is supported by the Fundamental Research Funds for the Central Universities (3122019124).
