<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Modeling Information Security Threats for the Terrestrial Segment of Space Communications</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Makhabbat Bakyt</string-name>
          <email>bakyt.makhabbat@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Khuralay Moldamurat</string-name>
          <email>moldamurat@yandex.kz</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dina Zh. Satybaldina</string-name>
          <email>satybaldina_dzh@enu.kz</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nikolay K. Yurkov</string-name>
          <email>yurkov_nk@mail.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Almaty, Kazakhstan</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>L.N. Gumilyov Eurasian National University</institution>
          ,
          <addr-line>Astana, 010000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This article discusses the modeling of information security threats for the ground segment of space communications. A theoretical analysis of threat modeling is given, including the protection of terrestrial satellite systems. The practical part describes the threat modeling for the ground segment, the organization and evaluation of the seminar on threat modeling. Cyber security, space communications, information security, encryption, aircraft Since the launch of Sputnik in October 1957, space technology has played a critical role in the advent of the information age. Today there are many more satellites than mere scientific demonstrations, instead supporting the essential services that define our lives. As the satellite industry experiences a market renaissance, by miniaturizing and lowering launch costs while protecting these systems from cyberattacks, the value of cyberattacks will only increase.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>2022 Copyright for this paper by its authors.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Theoretical part</title>
      <p>
        Unlike space platforms, which suffer from esoteric equipment and limited access, ground-based systems
benefit from a lot of general cybersecurity knowledge. As a rule, satellite ground stations are no different
from any other terrestrial network computing systems, and where they differ, remain similar to terrestrial
communications systems. Despite the variety of implementations, all ground stations at least consist of
radio equipment and a computer that controls the equipment [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Usually, the computer runs traditional
operating systems with specialized software for satellite communications.
      </p>
      <p>This article used the results of the work of ENU students and teachers on the development and modeling
of an intelligent cruise missile control system based on fuzzy logic, the development of a software simulator
for controlling a swarm of small satellites, the development and implementation of automated UAV flight
algorithms for inertial navigation systems, the coordination of the movement of multi-agent robotic
systems, navigation system based on Bluetooth beacons: implementation and experimental evaluation.</p>
      <p>
        On rare occasions, this specialized software has been targeted. For example, in 2000, hackers stole
copies of the Exigent software for controlling reverse engineering satellites. Typically, attacks are the
byproducts of non-targeted intrusions (such as in 1999 when a curious teenage hacker accidentally gained
access to NASA's flight control systems). Because of this, very little academic literature has been devoted
to the safety of ground stations [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. However, some unique aspects are worth considering.
      </p>
      <p>First, satellite terrestrial systems almost always represent the last line of defense against payload
exploitation. Satellite software and hardware typically follow an "open trust" model, in which the ground
station is trusted by all devices on board the space platform. Thus, ground systems represent a single point
of failure for missions. In light of this problem, Llanso and Pearson propose the development of redundant
stations so that control can be restored if compromised or lost. This is one possible application of the new
ground station as a service offering.</p>
      <p>
        Second, satellite terrestrial systems may be located in remote areas with limited access to physical
security controls. This is because the main placement considerations are related to signal coverage and
access to a particular orbit [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Often, few employees will have a regular physical presence on site. Instead,
day-to-day operations will be highly automated and controlled remotely from a centralized operations
center.
      </p>
      <p>This increases the threat of physical access attacks and is in contrast to many other important information
systems.</p>
      <p>A backdoor in signal processing
equipment hides important data
(for example, photos of a certain
region, edge).</p>
      <p>Heavy use of proprietary protocols and
hardware components. A lone point of failure
means only attackers need to manipulate data
ingestion, not transmission.</p>
      <p>Finally, satellite earth stations are usually the main "bridge" between the terrestrial Internet and
satellites. Due to heavy use of remote access, it is difficult for ground stations to completely "air gap".
Previous security research has identified numerous exploitable vulnerabilities in ground station software
and demonstrated that ground terminals can be easily identified using IOT search engines such as Shodan.
Moreover, the relative normality of the ground station equipment means that entry barriers are low
compared to other segments.</p>
      <p>
        Typically, traditional corporate security practices are prescribed to protect terrestrial systems. For
example, it is possible to conduct a malware audit at a ground station using traditional forensic tools [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
There are some systems that are unique to the satellite environment and may require a special security
regime, such as long range radio equipment. However, our historical analysis has not found a public
example of attacks on this equipment and limited academic research into these factors.
      </p>
      <p>Therefore, ground station security is generally considered an extension of traditional IT security. The
critical difference often lies in the severity of the potential harm rather than the attack and defense
mechanisms. However, this maxim is far from universal. Future offensive security efforts will focus on
unique satellite control hardware and software can detect previously overlooked vulnerabilities. A few
demonstrative examples of directions for studying these dynamics are given in Table 1.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Practical part</title>
      <p>The threat modeling procedure had to be tested in a real scenario. Ever since Huld has been developing
ground segment software to provide a secure ground segment as a service solution for space projects, it has
been chosen as a test shop.</p>
      <p>The ground segment as a service solution for Orbitcon was under development.</p>
      <p>The goal of the project was to create a Mission Control System (MCS) to meet the needs of new space
projects launching and operating small satellites throughout the mission life cycle. The service was based
on the cloud. The system supports the Space Link Extension Protocol (SLE) to connect existing ground
stations, in addition, its design covered VHF, UHF and S-BAND [7].</p>
      <p>The method chosen for the evaluation was action research. Action research aims to solve problems while
developing knowledge focused on collaboration and change.</p>
      <p>Organization of a Threat Modeling Workshop</p>
      <p>The decision to organize the workshop was made instantly after the proposal was received and submitted
internally to management. All parties agreed that ground segment threat modeling is beneficial and essential
to the success of the project. In addition, the threat modeling procedure can be adapted for other segments
of the space industry and offered to customers in the future.</p>
      <p>The first step was to draw up a list of participants. People with the following roles were invited:
• product manager;
• developers, three people;
• cybersecurity specialists, 3 persons;
• space specialist; as well as
• managers, three people.</p>
      <p>The second step was to choose the date and time of the seminar. The invitation included the scope and
purpose of the meeting and the agenda. With so many people involved, it was not easy to find a suitable
date, but after the postponement, the event was immediately rescheduled to a new date, which suited all the
invitees.</p>
      <p>The first problem with the organization of the event arose when the format of the seminar became a
subject of discussion. Seminars traditionally work best when all participants meet in person in a conference
room with whiteboard access. This helps the general drawing and understanding of the system diagram,
and also helps the emergence of new ideas. However, being physically in the same room helps the facilitator
to read participants' body language and gestures and understand if someone is losing interest or strongly
disagreeing with something without phrasing it.</p>
      <p>Since the team was in different countries and there were international travel restrictions in place during
the workshop, it was not possible to meet the participants in person. It was decided to organize the seminar
in the format of an online conference.</p>
      <p>The choice of platform for the online seminar was a matter that was not considered for long [8]. Since
the company used Microsoft (MS) Teams as its internal communication tool, it was chosen as the default
option. In addition to choosing a tool for communication, I needed a tool for drawing on a white board or
diagrams. For this, the Draw.io tool of the target was chosen as it was free, had a standalone, non-cloud
version that included threat modeling diagramming tools. Although it lacked joint functions, but this was
not considered critical for the workshop, as some basic collaborative functionality was included in
Microsoft Teams.</p>
      <p>The duration of the workshop was set at two hours. Shostak's recommendation for small systems was a
total of 3–40 hours, the volume of the workshop did not threaten to model the entire system, only part of it.
As a basis for the workshop there was an intensive preparation together with the product manager and the
system diagram created. This took a significant amount of time and several iterations.</p>
      <p>The reason for this was to save time during the workshop.</p>
      <p>Workshop</p>
      <p>The seminar was divided into two sections. The first part was an introductory presentation of the Threat
Modeling Workshop. The method, process, rules and subjects of threats were presented. This was followed
by an overview of the system diagram and a brief introduction to the system. This first section took thirty
minutes. The second section was reserved for the creative threat discovery and brainstorming phase, which
was only interrupted for a five-minute break.</p>
      <p>Participants were asked to turn on their webcams so that they could see each other during the workshop.</p>
      <p>After the introductory presentation, the system data flow diagram shown in Fig. 1 was introduced
through screen sharing and explained by the product manager.</p>
      <p>Then came the brainstorming phase. Participants received support handouts as they were not able to use
the whiteboard and the size of the shared screen was limited. The step-per-element method was applied
starting with the outer layers, focusing primarily on the width. Under the guidance of the facilitator, the
team began to discuss threats using the STRIDE mnemonic for each element of the diagram.</p>
      <p>Several problems arose during the creative threat discovery phase. Many participants turned off their
webcams, and it became impossible to see if they were focused on the meeting or if their attention had
shifted to something else. Active members experienced internet connection failures that impacted voice
quality and overall user experience [9]. Some participants with experience in threat modeling recommended
a different approach. As new ideas were encouraged during the brainstorming phase, these ideas were also
noted, but diverted the attention of the contestants from the original track.</p>
      <p>As a result of the collective brainstorming, twelve threats were identified. Since no time was reserved
at the end of the workshop to triage bugs, these findings were not evaluated further, and no remedial action
was suggested, nor recorded in Jira. It is important to note that during the workshop, one participant who
did not actively participate in the brainstorming independently compiled a list of threats from 54
conclusions.</p>
      <p>Workshop evaluation</p>
      <p>At the end of the workshop, unstructured interviews were conducted with key workshop participants. In
addition, the analysis was performed with reflection and abstraction as suggested by Vaishnavi et al. Several
areas for improvement were found. Some of them refer to the preparation phase, while others refer to the
workshop phase. Table 2 includes an assessment and suggested areas for improvement in preparation for
the workshop.</p>
      <sec id="sec-3-1">
        <title>The number and skill set of</title>
        <p>people invited to the seminar
was consistent with the theory.</p>
      </sec>
      <sec id="sec-3-2">
        <title>The management was overrepresented.</title>
      </sec>
      <sec id="sec-3-3">
        <title>It did its job well.</title>
      </sec>
      <sec id="sec-3-4">
        <title>The format of the online seminar was not ideal for brainstorming.</title>
      </sec>
      <sec id="sec-3-5">
        <title>It's hard to keep members.</title>
      </sec>
      <sec id="sec-3-6">
        <title>Difficulty reading body language</title>
        <p>and non-verbal communication.</p>
      </sec>
      <sec id="sec-3-7">
        <title>Whenever possible, online brainstorming workshops should be avoided.</title>
      </sec>
      <sec id="sec-3-8">
        <title>Recommendations for Consideration and</title>
      </sec>
      <sec id="sec-3-9">
        <title>Improvement</title>
        <p>During the creative phase of threat detection, the
presence of management can prevent some
employees from having their say. Since management
does not make decisions during the brainstorming
phase, attendance should be optional. The presence
of leadership is helpful during the bug triage phase
when decisions about priorities and mitigation
strategies need to be made.</p>
      </sec>
      <sec id="sec-3-10">
        <title>The use of brief reference material and small</title>
        <p>individual assignments could better guide
participants' preparation efforts.</p>
      </sec>
      <sec id="sec-3-11">
        <title>Otherwise, the number of participants must be</title>
        <p>reduced. The use of a webcam should be mandatory.</p>
      </sec>
      <sec id="sec-3-12">
        <title>Motivational tools for active participation should be</title>
        <p>considered. for example, gamification.</p>
      </sec>
      <sec id="sec-3-13">
        <title>Create a data flow diagram of the system in advance to save time during the meeting.</title>
      </sec>
      <sec id="sec-3-14">
        <title>Company policy or best practices may affect which platform can be used.</title>
      </sec>
      <sec id="sec-3-15">
        <title>The features available in online conferencing tools</title>
        <p>are evolving rapidly, so it's a good idea to explore
and experiment with them regularly.</p>
      </sec>
      <sec id="sec-3-16">
        <title>Key points to consider: whether the tool is cloud</title>
        <p>based or standalone; supports online collaboration
or not; has a threat modeling diagram library or not.</p>
      </sec>
      <sec id="sec-3-17">
        <title>The price may also influence the decision.</title>
      </sec>
      <sec id="sec-3-18">
        <title>The workshop can be aimed at exploring threats</title>
        <p>with a creative brainstorming method or sorting
errors with the involvement of decision makers.</p>
      </sec>
      <sec id="sec-3-19">
        <title>Hybrid cases may not work as intended.</title>
      </sec>
      <sec id="sec-3-20">
        <title>However, this lessened the positive effect of collaborative charting.</title>
      </sec>
      <sec id="sec-3-21">
        <title>Charting the data flow together can be a good tool to break the ice for the group and help improve the overall understanding of the system. Also, it can help clarify issues or priorities for everyone.</title>
        <p>A key takeaway from the preparation phase is that it is critical to assemble the right team based on the
purpose of the meeting (brainstorming or sorting out bugs) and to clearly state goals and expectations [10].</p>
        <p>The evaluation of the workshop and the main conclusions are shown in Table 3.</p>
        <p>In addition, recommendations for review and improvement are provided for each finding [11].</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>during the online brainstorming
session.</p>
      <sec id="sec-4-1">
        <title>Didn't work at all.</title>
      </sec>
      <sec id="sec-4-2">
        <title>Although high-speed Internet access was widely available, there were some interruptions in the connection.</title>
      </sec>
      <sec id="sec-4-3">
        <title>Speakers and microphones have</title>
        <p>greatly impacted the user
experience.
preventive iteration with them before the
workshop. This helps confirm that everyone is in
agreement with the method.</p>
      </sec>
      <sec id="sec-4-4">
        <title>If people choose to turn off their webcams, relevant motivational tools should be considered to change this behavior.</title>
      </sec>
      <sec id="sec-4-5">
        <title>Another disadvantage of online brainstorming is</title>
        <p>that unexpected events may occur.</p>
      </sec>
      <sec id="sec-4-6">
        <title>Participants cannot join, the internet connection may become unstable, or someone's speakers may generate echoes. This is difficult to prevent or plan for.</title>
        <p>During the workshop phase, it should be decided in advance whether the team can work more effectively
through brainstorming or brainwriting [12]. As discussed above, this is a matter of culture and company
culture, much like using a webcam all the time [13]. In addition, a structured brainwriting session can also
help you avoid the inconvenience of potential technical issues.</p>
        <p>This article discusses the modeling of information security threats for the terrestrial segment of space
communications. A theoretical analysis of threat modeling is given, including the protection of terrestrial
satellite systems. In the practical part, the threat modeling for the ground segment was described, the
organization and evaluation of the seminar on threat modeling.</p>
        <p>As a result of the work presented in this article, you should decide in advance whether the team can
work more efficiently through brainstorming or brainwriting. It is a matter of culture and corporate culture,
as well as the constant use of a webcam. In addition, a structured brainwriting session can also help you
avoid the inconvenience of potential technical issues.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. References</title>
      <p>[7] B. P. Bela, Cyber Security in the Space Domain, JAMK University of Applied Sciences, 2021.
[8] A. Kyzyrkanov, S. Atanov, S. Aljawarneh, Coordination of movement of multiagent robotic systems,
in: Proceedings of the 16th International Conference on Electronics Computer and Computation,
ICECCO, 2021
[9] P. James, Securing New Space: On Satellite Cyber-Security, Wolfson College, 2021.
[10] A. K. Kereyev, S. K. Atanov, K. P. Aman, Z. K. Kulmagambetova, B. T. Kulzhagarova, Navigation
system based on bluetooth beacons: Implementation and experimental estimation, Journal of
Theoretical and Applied Information Technology, 98.8 (2020) 1187-1200.
[11] D. Yergaliyev, A. Tulegulov, A. Zhumabayeva, A. Yussupov, A. Zhauyt, Study of stress-strain state
of the roller conveyor, Metalurgija 61.2 (2022) 347–350.
[12] A. Melnichuk, E.A. Kuzina, N.K. Yurkov, Methods and means for countering unmanned aerial
vehicles, in: Proceedings of the International Conference on Industrial Engineering, Applications and
Manufacturing, ICIEAM, 2020, 9112082.
[13] Kh. Moldamurat, S. Akhmejanov, K. Kariyeva, Zh. Omarov, D. Kalibekov, N. Sayasat, Design and
optimization of the parameters of a hybrid unmanned aerial vehicle in the SolidWorks complex, in:
Proceedings of the International Conference on Smart Information Systems and Technologies, 2022.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Manulis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. P.</given-names>
            <surname>Bridges</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Harrison</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sekar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Davis</surname>
          </string-name>
          , Cyber Security in New Space:
          <article-title>Analysis of threats, key enabling technologies and challenges, Survey Centre for Cyber Security</article-title>
          , University of Surrey, Guildford, UK,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Utegen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Moldamurat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ainur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Amandykuly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Brimzhanova</surname>
          </string-name>
          ,
          <article-title>Development and modeling of intelligent control system of cruise missile based on fuzzy logic</article-title>
          ,
          <source>in: Proceedings of the 16th International Conference on Electronics Computer and Computation</source>
          , ICECCO,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Manulis</surname>
          </string-name>
          et al., Cyber security in New Space,
          <source>International Journal of Information Security</source>
          <volume>20</volume>
          (
          <year>2021</year>
          )
          <fpage>287</fpage>
          -
          <lpage>311</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>K.</given-names>
            <surname>Moldamurat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Utegen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Brimzhanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Kalmanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. G.</given-names>
            <surname>Yryskeldi</surname>
          </string-name>
          ,
          <article-title>Development of a software simulator for small satellite swarm control</article-title>
          ,
          <source>in: Proceedings of the 16th International Conference on Electronics Computer and Computation</source>
          , ICECCO,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>N.</given-names>
            <surname>Hillevi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Linnea</surname>
          </string-name>
          ,
          <article-title>A multidisciplinary Analysis of Cyber Security in the Swedish Space Industry</article-title>
          , Uppsala Universitet,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Yemelyev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Moldamurat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. B.</given-names>
            <surname>Seksenbaeva</surname>
          </string-name>
          ,
          <source>Development and Implementation of Automated UAV Flight Algorithms for Inertial Navigation Systems, in: Proceedings of the IEEE International Conference on Smart Information Systems and Technologies, SIST</source>
          ,
          <year>2021</year>
          ,
          <volume>9465965</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>