Model the System from Adversary Viewpoint: Threats Identification and Modeling
نویسندگان
چکیده
Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain Why (attack objective), What (i.e., system assets, goals, etc.), and How (attack method), adversary achieved his attack goals. We introduce in this paper a security attack meta-model for our SysML-Sec framework [18], developed to improve the threat identification and modeling through the explicit representation of security concerns with knowledge representation techniques. Our proposed meta-model enables the specification of these concerns through ontological concepts which define the semantics of the security artifacts and introduced using SysML-Sec diagrams. This meta-model also enables representing the relationships that tie several such concepts together. This representation is then used for reasoning about the knowledge introduced by system designers as well as security experts through the graphical environment of the SysML-Sec framework.
منابع مشابه
Model the System from Adversary Viewpoint: Threats Identification & Modeling
Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain ”Why” (attack objective), ”What” (i.e., system assets, goals, etc.), and ”How” (attack method), adversary achieved his attack goals. We introduce in this paper a s...
متن کاملIdentification of internal - external factors and strategic analysis for sustainable rangeland management of Kalaleh city from the viewpoint of institutional stakeholders using SWOT model
Background and objectives: Rangelands are considered as the most basic bed for sustainable development of the environment and ecological phenomena and in addition to a considerable role in production and sustainable rural development, play a key role in preventing soil degradation and erosion and groundwater storage. In recent years, rangelands of Iran have not proper condition due to destructi...
متن کاملIdentification and Prioritization of Hazards and Threats Based on the Risk Matrix Model (Case Study: Assalouyeh region)
Background and objective: The most important step in disaster management is recognizing the correct, accurate and wise of the potential risks and threats that may occur. Rationally, the distribution of limited resources among a lot of hazards and threats is neither feasible nor possible; therefore, at the first the hazards and threats of each region should be identify and prioritize through a r...
متن کاملExperimental Identification and Hybrid PID-Fuzzy Position Control of Continuum Robotic Arms
Continuum robotic arms that are inspired from nature, have many advantages compared to traditional robots, which motivate researchers in this field. Dynamic modeling and controlling these robots are challenging subjects due to complicated nonlinearities and considerable uncertainties existing in these structures. In this paper, first a dynamic three-dimensional model of the continuum robotic ar...
متن کاملMeasurement and identification of areas susceptible to flood spreading from the viewpoint of geological formations in Birjand watershed using RS / GIS
Rivers are the natural flow of surface waters that flow in a certain bed seasonal or permanently. Rivers include a vast range of narrow waterways and with mountainous high steep to low steep and wide beds flowing in plains. However, rivers have had an effective role in urban development and human civilization, therefore, identification of flood prone areas and flood part in the potent lower fie...
متن کامل