Generating attacks in SysML activity diagrams by detecting attack surfaces

被引:7
|
作者
Ouchani, Samir [1 ]
Lenzini, Gabriele [1 ]
机构
[1] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust, Luxembourg, Luxembourg
关键词
Systems attacks; Attack patterns; Attack surfaces; SysML activity diagrams; Socio-technical security; SECURITY; SYSTEMS; DESIGN;
D O I
10.1007/s12652-015-0269-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the development process of a secure system is essential to detect as early as possible the system's vulnerable points, the so called attack surfaces, and to estimate how feasible it would be that known attacks breach through them. Even if attack surfaces can be sometimes detected automatically, mapping them against known attacks still is a step apart. Systems and attacks are not usually modelled in compatible formalisms. We develop a practical framework that automates the whole process. We formalize a system as SysML activity diagrams and in the same formalism we model libraries of patterns taken from standard catalogues of social engineering and technical attacks. An algorithm that we define, navigates the system's diagrams in search for its attack surfaces; then it evaluates the possibility and the probability that the detected weak points host attacks among those in the modelled library. We prove the correctness and the completeness of our approach and we show how it works on a use case scenario. It represents a very common situation in the domain of communication and data security for corporations.
引用
收藏
页码:361 / 373
页数:13
相关论文
共 45 条
  • [31] Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD)
    Singh, Gulshan Kumar
    Somani, Gaurav
    INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 169 - 185
  • [32] Detecting APT attacks using an attack intent-driven and sequence-based learning approach
    Yue, Hao
    Li, Tong
    Wu, Di
    Zhang, Runzi
    Yang, Zhen
    COMPUTERS & SECURITY, 2024, 140
  • [33] Generating Automatic Unit Tests of JavaScript Code from UML Class and Activity Diagrams
    Malanowska, Agnieszka
    Malkiewicz-Blotniak, Adrianna
    International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE - Proceedings, 2021, 2021-April : 189 - 196
  • [34] LActDet: An Automatic Network Attack Activity Detection Framework for Multi-step Attacks
    Yang, Huiran
    Kang, Jiaqi
    Dai, Yueyue
    Sun, Jiyan
    Zhang, Yan
    Cui, Huajun
    Ma, Can
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 676 - 685
  • [35] Generating Automatic Unit Tests of Java']JavaScript Code from UML Class and Activity Diagrams
    Malanowska, Agnieszka
    Malkiewicz-Blotniak, Adrianna
    ENASE: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2021, : 189 - 196
  • [36] B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows
    Putra, Muhammad Aidiel Rachman
    Ahmad, Tohari
    Hostiadi, Dandy Pramana
    JOURNAL OF BIG DATA, 2024, 11 (01)
  • [37] AD2US: An automated approach to generating usage scenarios from UML activity diagrams
    Chandler, R
    Lam, CP
    Li, HZ
    12TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2005, : 9 - 16
  • [38] Cyber-Security Problems in Smart Grid Cyber Attacks Detecting Methods and Modelling Attack Scenarios on Electric Power Systems
    Sharafeev, T. R.
    Osokin, V. Ju
    Kulikov, A. L.
    2018 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, APPLICATIONS AND MANUFACTURING (ICIEAM), 2018,
  • [39] Detecting Volumetric Attacks on IoT Devices via SDN-Based Monitoring of MUD Activity
    Hamza, Ayyoob
    Gharakheili, Hassan Habibi
    Benson, Theophilus A.
    Sivaraman, Vijay
    SOSR '19: PROCEEDINGS OF THE 2019 ACM SYMPOSIUM ON SDN RESEARCH, 2019, : 36 - 48
  • [40] UMLTGF: A tool for generating test cases from UML activity diagrams based on grey-box method
    Yuan, Jiesong
    Wang, Linzhang
    Li, Xuandong
    Zheng, Guoliang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (01): : 46 - 53