Generating attacks in SysML activity diagrams by detecting attack surfaces

被引:7
|
作者
Ouchani, Samir [1 ]
Lenzini, Gabriele [1 ]
机构
[1] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust, Luxembourg, Luxembourg
关键词
Systems attacks; Attack patterns; Attack surfaces; SysML activity diagrams; Socio-technical security; SECURITY; SYSTEMS; DESIGN;
D O I
10.1007/s12652-015-0269-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the development process of a secure system is essential to detect as early as possible the system's vulnerable points, the so called attack surfaces, and to estimate how feasible it would be that known attacks breach through them. Even if attack surfaces can be sometimes detected automatically, mapping them against known attacks still is a step apart. Systems and attacks are not usually modelled in compatible formalisms. We develop a practical framework that automates the whole process. We formalize a system as SysML activity diagrams and in the same formalism we model libraries of patterns taken from standard catalogues of social engineering and technical attacks. An algorithm that we define, navigates the system's diagrams in search for its attack surfaces; then it evaluates the possibility and the probability that the detected weak points host attacks among those in the modelled library. We prove the correctness and the completeness of our approach and we show how it works on a use case scenario. It represents a very common situation in the domain of communication and data security for corporations.
引用
收藏
页码:361 / 373
页数:13
相关论文
共 45 条
  • [21] Towards a Call Behavior-Based Compositional Verification Framework for SysML Activity Diagrams
    Ouchani, Samir
    THEORETICAL ASPECTS OF COMPUTING - ICTAC 2019, 2019, 11884 : 216 - 234
  • [22] From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
    Polatidis, Nikolaos
    Pimenidis, Elias
    Pavlidis, Michalis
    Papastergiou, Spyridon
    Mouratidis, Haralambos
    EVOLVING SYSTEMS, 2020, 11 (03) : 479 - 490
  • [23] From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
    Nikolaos Polatidis
    Elias Pimenidis
    Michalis Pavlidis
    Spyridon Papastergiou
    Haralambos Mouratidis
    Evolving Systems, 2020, 11 : 479 - 490
  • [24] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns
    Herwono, Ian
    El-Moussa, Fadi Ali
    INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
  • [25] Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals
    Luo, Xiapu
    Chan, Edmond W. W.
    Chang, Rocky K. C.
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2009,
  • [26] Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals
    Xiapu Luo
    Edmond W. W. Chan
    Rocky K. C. Chang
    EURASIP Journal on Advances in Signal Processing, 2009
  • [27] Towards code generation for ARM Cortex-M MCUs from SysML activity diagrams
    AskariHemmat, MohammadHossein
    Mohamed, Otmane Ait
    Boukadoum, Mounir
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 970 - 973
  • [28] Mal-activity diagrams for capturing attacks on business processes
    Sindre, Guttorm
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, 2007, 4542 : 355 - 366
  • [29] Actively Detecting Multiscale Flooding Attacks & Attack Volumes in Resource-Constrained ICPS
    Zahid, Farzana
    Kuo, Matthew M. Y.
    Sinha, Roopak
    Funchal, Gustavo
    Pedrosa, Tiago
    Leitao, Paulo
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (07) : 9266 - 9274
  • [30] Enhancing IoT security: A competitive coevolutionary strategy for detecting RPL attacks in challenging attack environments
    Yilmaz, Selim
    COMPUTER NETWORKS, 2025, 262