Model the System from Adversary Viewpoint: Threats Identification & Modeling
نویسندگان
چکیده
Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain ”Why” (attack objective), ”What” (i.e., system assets, goals, etc.), and ”How” (attack method), adversary achieved his attack goals. We introduce in this paper a security attack meta-model for our SysML-Sec framework [17], developed to improve the threat identification and modeling through the explicit representation of security concerns with knowledge representation techniques. Our proposed metamodel enables the specification of these concerns through ontological concepts which define the semantics of the security artifacts and introduced using SysML-Sec diagrams. This meta-model also enables representing the relationships that tie several such concepts together. This representation is then used for reasoning about the knowledge introduced by system designers as well as security experts through the graphical environment of the SysML-Sec framework.
منابع مشابه
Model the System from Adversary Viewpoint: Threats Identification and Modeling
Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain Why (attack objective), What (i.e., system assets, goals, etc.), and How (attack method), adversary achieved his attack goals. We introduce in this paper a securit...
متن کاملIdentification of internal - external factors and strategic analysis for sustainable rangeland management of Kalaleh city from the viewpoint of institutional stakeholders using SWOT model
Background and objectives: Rangelands are considered as the most basic bed for sustainable development of the environment and ecological phenomena and in addition to a considerable role in production and sustainable rural development, play a key role in preventing soil degradation and erosion and groundwater storage. In recent years, rangelands of Iran have not proper condition due to destructi...
متن کاملAdversarial Modeling in the Robotic Coverage Problem
The general problem of covering an area is a fundamental problem in robotics with applications in various domains. In a recently introduced version of the problem, adversarial coverage, the covering robot operates in an environment that contains threats that might stop it. Previous studies of this problem dealt with finding optimal strategies for the coverage, that minimize both the coverage ti...
متن کامل239d Model Reduction, Estimation and Control of Multiscale Systems
Vinay Prasad Multiscale systems offer unique challenges in modeling and control. From a modeling viewpoint, these systems are of very high dimension. Most of the systems have a stochastic component, resulting in noisy outputs. Additionally, their models are usually not in standard state space form, meaning that the application of advanced control strategies is not straightforward. The small num...
متن کاملThreat Modelling for Mobile Ad Hoc and Sensor Networks
This paper introduces a threat model for ad hoc networks. It indicates components that can be used to form an adversary model for sensor networks and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats to the systems assets including: threats to communications, threats to infrastructure services, threats to individual nodes, and threats conce...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014