首页> 外文期刊>Software and systems modeling >From misuse cases to mal-activity diagrams: bridging the gap between functional security analysis and design
【24h】

From misuse cases to mal-activity diagrams: bridging the gap between functional security analysis and design

机译:从滥用案例到恶意活动图:弥合功能安全性分析与设计之间的鸿沟

获取原文
获取原文并翻译 | 示例

摘要

Secure software engineering is concerned with developing software systems that will continue delivering its intended functionality despite a multitude of harmful software technologies that can attack these systems from anywhere and at anytime. Misuse cases and mal-activity diagrams are two techniques to model functional security requirements address security concerns early in the development life cycle. This allows system designers to equip their systems with security mechanisms built within system design rather than relying on external defensive mechanisms. In a model-driven engineering process, misuse cases are expected to drive the construction of mal-activity diagrams. However, a systematic approach to transform misuse cases into mal-activity diagrams is missing. Therefore, this process remains dependent on human skill and judgment, which raises the risk of developing mal-activity diagrams that are inconsistent with the security requirements described in misuse cases, leading to the development of an insecure system. This paper presents an authoring structure for misuse cases and a transformation technique to systematically perform this desired model transformation. A study was conducted to evaluate the proposed technique using 46 attack stories outlined in a book by a former well-known hacker (Mitnick and Simon in The art of deception: controlling the human element of security, Wiley, Indianapolis, 2002). The results indicate that applying the proposed technique produces correct mal-activity diagrams from misuse cases.
机译:安全软件工程涉及开发软件系统,尽管有许多有害的软件技术可以随时随地攻击这些系统,但它们仍将继续提供其预期的功能。滥用案例和不良活动图是对功能安全需求建模的两种技术,可在开发生命周期的早期阶段解决安全问题。这使系统设计人员可以为他们的系统配备在系统设计内建立的安全机制,而不是依赖于外部防御机制。在模型驱动的工程过程中,滥用案例将推动不良活动图的构建。但是,缺少将滥用案例转换为不良活动图的系统方法。因此,此过程仍然依赖于人类的技能和判断力,这增加了开发不良活动图表的风险,该图表与在滥用案例中描述的安全要求不一致,从而导致开发了不安全的系统。本文介绍了滥用案例的创作结构,以及一种系统地执行此所需模型转换的转换技术。进行了一项研究,以评估该提议的技术,该技术使用了前著名黑客在书中概述的46个攻击故事(Mitnick和Simon在“欺骗的艺术:控制安全的人为因素”中,印第安纳州,威利,2002年)。结果表明,应用所提出的技术可以从滥用案例中得出正确的恶意活动图。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号