Published July 21, 2022 | Version v1
Conference paper Open

Defining the Threat Manufacturer Usage Description Model for Sharing Mitigation Actions

  • 1. University of Murcia

Description

While the growing development of paradigms such as the 5G or the Internet of Things (IoT) enlarges the attack surface due to its high inter-connectivity, an effective prompt response to discovered vulnerabilities arises as a crucial need to guarantee the security of these systems throughout their lifecycle. Based on the threat signalling mechanism proposed by NIST and the Manufacturer Usage Description (MUD) standard, this article defines the threat MUD model, its architecture and usage to share security information about threats, compromised domains and possible mitigation actions in terms of security policies.

Files

IEEE_Conference_INSPIRE5g (1).pdf

Files (204.1 kB)

Name Size Download all
md5:0817d6088be9943b5d9ff1f391d0ca99
204.1 kB Preview Download

Additional details

Funding

European Commission
BIECO – Building Trust in Ecosystems and Ecosystem Components 952702
European Commission
INSPIRE-5Gplus – INtelligent Security and PervasIve tRust for 5G and Beyond 871808