【24h】

Visualizing Cyber Attacks with Misuse Case Maps

机译:用误用案例映射可视化网络攻击

获取原文

摘要

[Context and motivation] In the development of secure software, work on requirements and on architecture need to be closely intertwined, because possible threats and the chosen architecture depend on each other mutually. [Question/problem] Nevertheless, most security requirement techniques do not take architecture into account. The transition from security requirements to secure architectures is left to security experts and software developers, excluding domain experts and other groups of stakeholders from discussions of threats, vulnerabilities and mitigations in an architectural context. [Principal idea/results] The paper introduces misuse case maps, a new modelling technique that is the anti-behavioural complement to use case maps. The purpose of the new technique is to visualize how cyber attacks are performed in an architectural context. [Contribution] The paper investigates what a misuse case map notation might look like. A preliminary evaluation suggests that misuse case maps may indeed make it easier for less experienced stakeholders to gain an understanding of multi-stage intrusion scenarios.
机译:[语境和动机]在安全软件的开发中,对要求和架构的工作需要紧密地交织,因为可能的威胁和所选择的架构相互依赖于彼此。 [问题/问题]尽管如此,大多数安全要求技术都不考虑到架构。从安全要求到安全架构的过渡留给安全专家和软件开发人员,从建筑背景下讨论域名专家和其他利益相关者,讨论威胁,漏洞和减轻的域名专家。 [主要思想/结果]本文介绍了滥用案例地图,这是一种新的建模技术,即使用案例映射的反对行为补充。新技术的目的是可视化网络攻击在架构上下文中的执行方式。 [贡献]本文调查了误用案例地图符号可能看起来像什么。初步评估表明,误用案例地图可能确实使得不太有经验的利益相关者更容易获得对多阶段入侵情景的理解。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号