Generating attacks in SysML activity diagrams by detecting attack surfaces

被引:7
|
作者
Ouchani, Samir [1 ]
Lenzini, Gabriele [1 ]
机构
[1] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust, Luxembourg, Luxembourg
关键词
Systems attacks; Attack patterns; Attack surfaces; SysML activity diagrams; Socio-technical security; SECURITY; SYSTEMS; DESIGN;
D O I
10.1007/s12652-015-0269-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the development process of a secure system is essential to detect as early as possible the system's vulnerable points, the so called attack surfaces, and to estimate how feasible it would be that known attacks breach through them. Even if attack surfaces can be sometimes detected automatically, mapping them against known attacks still is a step apart. Systems and attacks are not usually modelled in compatible formalisms. We develop a practical framework that automates the whole process. We formalize a system as SysML activity diagrams and in the same formalism we model libraries of patterns taken from standard catalogues of social engineering and technical attacks. An algorithm that we define, navigates the system's diagrams in search for its attack surfaces; then it evaluates the possibility and the probability that the detected weak points host attacks among those in the modelled library. We prove the correctness and the completeness of our approach and we show how it works on a use case scenario. It represents a very common situation in the domain of communication and data security for corporations.
引用
收藏
页码:361 / 373
页数:13
相关论文
共 45 条
  • [1] Generating attacks in SysML activity diagrams by detecting attack surfaces
    Samir Ouchani
    Gabriele Lenzini
    Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 361 - 373
  • [2] Attacks Generation By Detecting Attack Surfaces
    Ouchani, Samir
    Lenzini, Gabriele
    5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 529 - 536
  • [3] On the Meaning of SysML Activity Diagrams
    Jarraya, Yosr
    Debbabi, Mourad
    Bentahar, Jamal
    16TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER BASED SYSTEMS, PROCEEDINGS, 2009, : 95 - 105
  • [4] Quantitative and qualitative analysis of SysML activity diagrams
    Jarraya, Yosr
    Debbabi, Mourad
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2014, 16 (04) : 399 - 419
  • [5] A Probabilistic Verification Framework for SysML Activity Diagrams
    Ouchani, Samir
    Ait'Mohamed, Otmane
    Debbabi, Mourad
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2012, 246 : 108 - 123
  • [6] Quantitative and qualitative analysis of SysML activity diagrams
    Yosr Jarraya
    Mourad Debbabi
    International Journal on Software Tools for Technology Transfer, 2014, 16 : 399 - 419
  • [7] A formal verification framework for SysML activity diagrams
    Ouchani, Samir
    Mohamed, Otmane Ait
    Debbabi, Mourad
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (06) : 2713 - 2728
  • [8] SysML-Sec Attack Graphs: Compact Representations for Complex Attacks
    Apvrille, Ludovic
    Roudier, Yves
    GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2015, 2016, 9390 : 35 - 49
  • [9] A Security Risk Assessment Framework for SysML Activity Diagrams
    Ouchani, Samir
    Mohamed, Otmane Ait
    Debbabi, Mourad
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (SERE), 2013, : 227 - 236
  • [10] A methodology for verifying SysML requirements using activity diagrams
    Rahim M.
    Hammad A.
    Ioualalen M.
    Innovations in Systems and Software Engineering, 2017, 13 (1) : 19 - 33