首页> 外文OA文献 >Generating attacks in SysML activity diagrams by detecting attack surfaces
【2h】

Generating attacks in SysML activity diagrams by detecting attack surfaces

机译:通过检测攻击面在SysML活动图中生成攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

In the development process of a secure system is essential to detect as early as possible the system’s vulnerable points, the so called attack surfaces, and to estimate how feasible it would be that known attacks breach through them. Even if attack surfaces can be sometimes detected automatically, mapping them against known attacks still is a step apart. Systems and attacks are not usually modelled in compatible formalisms. We develop a practical framework that automates the whole process. We formalize a system as SysML activity diagrams and in the same formalism we model libraries of patterns taken from standard catalogues of social engineering and technical attacks. An algorithm that we define, navigates the system’s diagrams in search for its attack surfaces; then it evaluates the possibility and the probability that the detected weak points host attacks among those in the modelled library. We prove the correctness and the completeness of our approach and we show how it works on a use case scenario. It represents a very common situation in the domain of communication and data security for corporations.
机译:在安全系统的开发过程中,至关重要的是尽早检测系统的易受攻击点(即所谓的攻击面),并估计已知攻击突破它们的可行性。即使有时可以自动检测到攻击面,将其与已知攻击进行映射仍然相距仅一步之遥。系统和攻击通常不以兼容的形式主义为模型。我们开发了一个使整个过程自动化的实用框架。我们将系统形式化为SysML活动图,并以同样的形式对来自社会工程学和技术攻击的标准目录中的模式库进行建模。我们定义了一种算法,可以在系统图上导航以搜索其攻击面;然后它评估在模型库中检测到的弱点发起攻击的可能性和可能性。我们证明了我们方法的正确性和完整性,并展示了它在用例场景中的工作方式。它代表了企业在通信和数据安全领域中的一种非常普遍的情况。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号