A Novel Approach for Security Testing of Client Server Based Applications using Misuse Deployment Diagrams, Misuse Cases and Threat Trees
نویسندگان
چکیده
Security testing is one of the most important security practices today. To secure an application it’s important to go for a security testing phase during the development life cycle. Many useful enhancements are done using UML diagrams to model security like Misuse cases, Mis-sequence diagrams and Misuse deployment diagrams etc. Misuse deployment diagrams can be used to model a client server environment with security aspects. Since in client server environment it is important to know where to apply your security, it’s better to use Misuse Deployment diagrams which can give an overall view of the system in a single model. Based on this fact, an approach is proposed in this paper by combining Misuse deployment diagrams and Misuse Case diagrams with threat trees to generate security test cases. The approach is demonstrated with a case study where Misuse deployment diagrams, Misuse Cases are used to show that possible security defects can be identified using these diagrams and combined those with threat trees. Finally the threat trees are traversed to generate test sequences. This approach is suitable for detecting threats that need to be tested in location specific manner in client-server applications.
منابع مشابه
Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملMisuse Cases: Use Cases with Hostile Intent
Eliciting security requirements Security requirements exist because people and the negative agents that they create (such as computer viruses) pose real threats to systems. Security differs from all other specification areas in that someone is deliberately threatening to break the system. Employing use and misuse cases to model and analyze scenarios in systems under design can improve security ...
متن کاملMisuse and Abuse Cases: Getting Past the Positive
trend, most systems for designing software also tend to describe positive features. Savvy software practitioners are beginning to think beyond features, touching on emergent properties of software systems such as reliability, security , and performance. This is mostly because experienced customers are beginning to demand secure and reliable software; but in many situations, it's still up to the...
متن کاملMisuse of Artemisinin Combination Therapies by Clients of Medicine Retailers Suspected to Have Malaria Without Prior Parasitological Confirmation in Nigeria
Background Prompt and effective case detection and treatment are vital components of the malaria case management strategy as malaria-endemic countries implement the testing, treating and tracking policy. The implementation of this policy in public and formal private sectors continue to receive great attention while the informal private retail sector (mostly the patent and propriety medicine ven...
متن کاملراهکار ترکیبی نوین جهت تشخیص نفوذ در شبکههای کامپیوتری با استفاده از الگوریتم-های هوش محاسباتی
In this paper, a novel hybrid method is proposed for intrusion detection in computer networks using combination of misuse-based and anomaly-based detection models with the aim of performance improvement. In the proposed hybrid approach, a set of algorithms and models is employed. The selection of input features is performed using shuffled frog-leaping (SFL) algorithm. The misuse detection modul...
متن کامل