Model the System from Adversary Viewpoint: Threats Identification and Modeling

نویسندگان

  • Muhammad Sabir Idrees
  • Yves Roudier
  • Ludovic Apvrille
چکیده

Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain Why (attack objective), What (i.e., system assets, goals, etc.), and How (attack method), adversary achieved his attack goals. We introduce in this paper a security attack meta-model for our SysML-Sec framework [18], developed to improve the threat identification and modeling through the explicit representation of security concerns with knowledge representation techniques. Our proposed meta-model enables the specification of these concerns through ontological concepts which define the semantics of the security artifacts and introduced using SysML-Sec diagrams. This meta-model also enables representing the relationships that tie several such concepts together. This representation is then used for reasoning about the knowledge introduced by system designers as well as security experts through the graphical environment of the SysML-Sec framework.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Model the System from Adversary Viewpoint: Threats Identification & Modeling

Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain ”Why” (attack objective), ”What” (i.e., system assets, goals, etc.), and ”How” (attack method), adversary achieved his attack goals. We introduce in this paper a s...

متن کامل

Identification of internal - external factors and strategic analysis for sustainable rangeland management of Kalaleh city from the viewpoint of institutional stakeholders using SWOT model

Background and objectives: Rangelands are considered as the most basic bed for sustainable development of the environment and ecological phenomena and in addition to a considerable role in production and sustainable rural development, play a key role in preventing soil degradation and erosion and groundwater storage. In recent years, rangelands of Iran have not proper condition due to destructi...

متن کامل

Identification and Prioritization of Hazards and Threats Based on the Risk Matrix Model (Case Study: Assalouyeh region)

Background and objective: The most important step in disaster management is recognizing the correct, accurate and wise of the potential risks and threats that may occur. Rationally, the distribution of limited resources among a lot of hazards and threats is neither feasible nor possible; therefore, at the first the hazards and threats of each region should be identify and prioritize through a r...

متن کامل

Experimental Identification and Hybrid PID-Fuzzy Position Control of Continuum Robotic Arms

Continuum robotic arms that are inspired from nature, have many advantages compared to traditional robots, which motivate researchers in this field. Dynamic modeling and controlling these robots are challenging subjects due to complicated nonlinearities and considerable uncertainties existing in these structures. In this paper, first a dynamic three-dimensional model of the continuum robotic ar...

متن کامل

Measurement and identification of areas susceptible to flood spreading from the viewpoint of geological formations in Birjand watershed using RS / GIS

Rivers are the natural flow of surface waters that flow in a certain bed seasonal or permanently. Rivers include a vast range of narrow waterways and with mountainous high steep to low steep and wide beds flowing in plains. However, rivers have had an effective role in urban development and human civilization, therefore, identification of flood prone areas and flood part in the potent lower fie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014