Model the System from Adversary Viewpoint: Threats Identification & Modeling

نویسندگان

  • Muhammad Sabir Idrees
  • Yves Roudier
  • Ludovic Apvrille
چکیده

Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain ”Why” (attack objective), ”What” (i.e., system assets, goals, etc.), and ”How” (attack method), adversary achieved his attack goals. We introduce in this paper a security attack meta-model for our SysML-Sec framework [17], developed to improve the threat identification and modeling through the explicit representation of security concerns with knowledge representation techniques. Our proposed metamodel enables the specification of these concerns through ontological concepts which define the semantics of the security artifacts and introduced using SysML-Sec diagrams. This meta-model also enables representing the relationships that tie several such concepts together. This representation is then used for reasoning about the knowledge introduced by system designers as well as security experts through the graphical environment of the SysML-Sec framework.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Model the System from Adversary Viewpoint: Threats Identification and Modeling

Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain Why (attack objective), What (i.e., system assets, goals, etc.), and How (attack method), adversary achieved his attack goals. We introduce in this paper a securit...

متن کامل

Identification of internal - external factors and strategic analysis for sustainable rangeland management of Kalaleh city from the viewpoint of institutional stakeholders using SWOT model

Background and objectives: Rangelands are considered as the most basic bed for sustainable development of the environment and ecological phenomena and in addition to a considerable role in production and sustainable rural development, play a key role in preventing soil degradation and erosion and groundwater storage. In recent years, rangelands of Iran have not proper condition due to destructi...

متن کامل

Adversarial Modeling in the Robotic Coverage Problem

The general problem of covering an area is a fundamental problem in robotics with applications in various domains. In a recently introduced version of the problem, adversarial coverage, the covering robot operates in an environment that contains threats that might stop it. Previous studies of this problem dealt with finding optimal strategies for the coverage, that minimize both the coverage ti...

متن کامل

239d Model Reduction, Estimation and Control of Multiscale Systems

Vinay Prasad Multiscale systems offer unique challenges in modeling and control. From a modeling viewpoint, these systems are of very high dimension. Most of the systems have a stochastic component, resulting in noisy outputs. Additionally, their models are usually not in standard state space form, meaning that the application of advanced control strategies is not straightforward. The small num...

متن کامل

Threat Modelling for Mobile Ad Hoc and Sensor Networks

This paper introduces a threat model for ad hoc networks. It indicates components that can be used to form an adversary model for sensor networks and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats to the systems assets including: threats to communications, threats to infrastructure services, threats to individual nodes, and threats conce...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014