Panel Abstract: Intrusion Scenarios for Security Requirements Engineering
نویسندگان
چکیده
Engineers have long relied on public feedback of engineering failures to improve their designs. Consider the result if bridge builders had ignored the lessons learned from the torsional oscillations that caused the Tacoma Narrows Bridge to collapse. Consider the result if ship builders had ignored the lessons learned from the inadequate lifeboat space and manning that allowed the great loss of life from the sinking of the Titanic. Engineering success requires that we learn from the less famous disasters as well. The flying community, for example, has institutionalized a means for learning from air traffic accidents that has resulted in very low risk of death due to air travel, despite its inherent hazards.
منابع مشابه
Security Requirements Engineering through Iterative Intrusion-Aware Design
Fundamental to the Survivable Network Analysis (SNA) method, developed at the SEI [2], is the use of intrusion scenarios to improve the survivability of system designs. This position statement describes some relevant insights gained from applying SNA to several significant real-world systems. These insights help understand what is needed to use intrusion scenarios for security requirements engi...
متن کاملA New Method for Intrusion Detection Using Genetic Algorithm and Neural network
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
متن کاملA Case Study in Requirements for Survivable Systems
Increasing societal dependency on critical infrastructure systems is driving emergence of a new category of requirements engineering that addresses survivability objectives. This paper presents a case study in survivability requirements analysis. Survivability is the capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents. The Surviv...
متن کاملAnomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors
Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...
متن کاملAdapting Safety Requirements Analysis to Intrusion Detection
Several requirements analysis techniques widely used in safety-critical systems are being adapted to support the analysis of secure systems. Perhaps the most relevant system safety technique for Intrusion Detection Systems is hazard analysis. Hazard analysis identi es and analyzes hazards (states that can lead to an accident) in terms of their severity of e ects and likelihood of occurrence. As...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001