DocumentCode :
1958325
Title :
Combining Misuse Cases with Attack Trees and Security Activity Models
Author :
Tndel, I.A. ; Jensen, Jostein ; Rstad, L.
Author_Institution :
Dept. of Software Eng., Safety & Security, SINTEF ICT, Trondheim, Norway
fYear :
2010
fDate :
15-18 Feb. 2010
Firstpage :
438
Lastpage :
445
Abstract :
Misuse cases and attack trees have been suggested for security requirements elicitation and threat modeling in software projects. Their use is believed to increase security awareness throughout the software development life cycle. Experiments have identified strengths and weaknesses of both model types. In this paper we present how misuse cases and attack trees can be linked to get a high-level view of the threats towards a system through misuse case diagrams and a more detailed view on each threat through attack trees. Further, we introduce links to security activity descriptions in the form of UML activity graphs. These can be used to describe mitigating security activities for each identified threat. The linking of different models makes most sense when security modeling is supported by tools, and we present the concept of a security repository that is being built to store models and relations such as those presented in this paper.
Keywords :
Unified Modeling Language; diagrams; security of data; software engineering; trees (mathematics); UML activity graphs; attack trees model; case diagrams; misuse cases; security activity descriptions; security activity model; security repository; security requirements elicitation; software development lifecycle; software projects; threat modeling; Best practices; Computer security; Data security; Information security; National security; Programming; Software safety; Statistics; Tree graphs; Unified modeling language; attack tree; misuse case; requirements; security; threat models;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability, and Security, 2010. ARES '10 International Conference on
Conference_Location :
Krakow
Print_ISBN :
978-1-4244-5879-0
Type :
conf
DOI :
10.1109/ARES.2010.101
Filename :
5438058
Link To Document :
بازگشت