期刊文献+

Threat Modeling-Oriented Attack Path Evaluating Algorithm

Threat Modeling-Oriented Attack Path Evaluating Algorithm
下载PDF
导出
摘要 In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in two ways including threat occurring possibility and the degree of damage.Besides,an algorithm of searching attack path was also obtained in accordence with its definition.Finally,an attack path evaluation system was implemented which can output the threat coefficients of the leaf nodes in a target threat tree,the weight distribution information,and the attack paths.An example threat tree is given to verify the effectiveness of the algorithms. In order to evaluate all attack paths in a threat tree, based on threat modeling theory, a weight distribution algorithm of the root node in a threat tree is designed, which computes threat coefficients of leaf nodes in two ways including threat occurring possibility and the degree of damage. Besides, an algorithm of searching attack path was also obtained in accordence with its definition. Finally, an attack path evaluation system was implemented which can output the threat coefficients of the leaf nodes in a target threat tree, the weight distribution information, and the attack paths. An example threat tree is given to verify the effectiveness of the algorithms.
出处 《Transactions of Tianjin University》 EI CAS 2009年第3期162-167,共6页 天津大学学报(英文版)
基金 Supported by National Natural Science Foundation of China (No.90718023) National High-Tech Research and Development Program of China (No.2007AA01Z130)
关键词 攻击路径 分配算法 威胁树 建模理论 评价制度 导向 分布信息 重量 attack tree attack path threat modeling threat coefficient attack path evaluation
  • 相关文献

参考文献10

  • 1Amenaza Technologies Limited.Hostile Risk Decisions and Capability-based Analysis. http://www.amenaza.com . 2005
  • 2Microsoft ACE Team.Microsoft Threat Analysis and Modeling. http://msdn.microsoft.com/en-us/security/default.aspx . 2006
  • 3Li X H,He K.A unified threat model for assessing threat in web application[].Proceedings of the Second In-ternational Conference on Information Security and As-surance.2008
  • 4Viega J,Messier M.Security is harder than you think[].ACM Queue.2004
  • 5Redwine S T.Workshop on secure software engineering education and training[].Proceedings of Software Engineering Education and Training.2006
  • 6Peine H.Rules of thumb for secure software engineering[].Proceedings of theth International Conference on Software Engineering.2005
  • 7Davis N.Secure Software Development Life Cycle Processes:A Technology Scouting Report[]..2005
  • 8Bruce Sehneier.Attack Trees: Modeling Security Threats[].Dr Dobbs Journal.1999
  • 9Moore A P,Ellison R J,Linger R C.Attack Modeling for Information Security and Survivability. CMU/SEI-2001-TN-001 . 2001
  • 10Michael Howard,David LeBlanc.Writing Secure Code[]..2002

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部