首页> 外文期刊>Journal of computer security >A catalogue associating security patterns and attack steps to design secure applications
【24h】

A catalogue associating security patterns and attack steps to design secure applications

机译:目录关联安全模式和攻击步骤以设计安全应用程序

获取原文
获取原文并翻译 | 示例

摘要

Design Patterns are now widely accepted and used in software engineering; they represent generic and reusable solutions to common problems in software design. Security patterns are specialised patterns whose purpose is to help design applications that should meet security requirements. The enthusiasm surrounding security patterns has made emerge several catalogues listing up to 180 different patterns at the moment. This growing number brings an increased difficulty in choosing the most appropriate patterns for a given design problem. We propose a security pattern classification to facilitate the security pattern choice and a classification method based on data integration. The classification exposes relationships among software attacks, security principles and security patterns. It expresses the pattern combinations that are countermeasures to a given attack. This classification is semi-automatically inferred by means of a data-store integrating disparate publicly available security data. The data-store is also used to generate Attack Defense Trees . In our context, these illustrate, for a given attack, its sub-attacks, steps, techniques and the related defenses given under the form of security pattern combinations. Such trees make the pattern classification more readable even for beginners in security patterns. Finally, we evaluate on human subjects the benefits of using a pattern classification established for Web applications, which covers 215 attacks, 66 security principles and 26 security patterns.
机译:现在广泛被广泛接受设计模式,用于软件工程;它们代表了软件设计中的常见问题的通用和可重复使用的解决方案。安全模式是专业模式,其目的是帮助设计应满足安全要求的应用程序。周围的热情模式使得在此目前的几个目录中列出了最多180种不同模式的目录。在为特定设计问题选择最合适的模式时,这种越来越多的数字会带来增加的困难。我们提出了一种安全模式分类,以便于基于数据集成的安全模式选择和分类方法。分类揭示了软件攻击,安全原则和安全模式之间的关系。它表达了对给定攻击的对策的模式组合。通过数据库集成不同公共可用安全数据的数据存储是半自动推断的。数据存储还用于生成攻击防御树。在我们的上下文中,对于给定的攻击,其子攻击,步骤,技术以及在安全模式组合形式下给出的子攻击,步骤,技术和相关防御。即使对于安全模式的初学者,这种树木也使模式分类更可读。最后,我们对人类受试者评估了使用为Web应用程序建立的模式分类的好处,其中涵盖了215次攻击,66个安全原则和26个安全模式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号