期刊文献+

一种安全需求分析中的用例漏洞检测方法 被引量:1

Method to detect leaks of use case in security requirement analysis
下载PDF
导出
摘要 提出一种基于攻击模式的用例漏洞检测方法,用于对需求分析人员设计的用例图进行漏洞检测。该方法以形式化用例作为基础,把误用例作为安全攸关信息的载体、设置为用例的特殊属性。通过与用户的交互完成误用例相关属性的信息采集,并进一步运用这些信息计算出用例的误用例指数。将此指数与预定义的攻击模式相关指数进行对比,以此来判断该用例是否与某个特定误用例、某些特定攻击模式相关。从而检测到用例图中的用例漏洞,并在此基础上提出可行建议。 A method based on attack patterns is proposed to help software designers to detect the leaks of use cases in the original designed use case diagram.Then some feasible mitigations can be expected.The method,based on the formulation of use cases,takes misuse cases as the special attributes of use case which are concerned to security.The information involved potential misuse case is supposed to be got from the interaction with customer.On this basis,the misuse-point can be calculated.The comparison between the misuse-point of target use case and the ones of defined attack patterns can justify whether the target use case is related to certain misuse cases or attack patterns.Thus the possible leaks of use cases will be exposed.Further,the feasible mitigations turn to be available.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第5期51-54,65,共5页 Computer Engineering and Applications
基金 国家自然科学基金No.90718023 国家高技术研究发展计划(863)No.2007AA01Z130~~
关键词 安全需求分析 误用例 攻击模式 security requirement analysis misuse case attack pattern
  • 相关文献

参考文献5

  • 1Wing J M.A specifier's introduction to formal methods[J].IEEE JNL,1990,23(9):10-22.
  • 2Salas P A P,Krishnan P,Ross K J.Model-based security vulnerability testing[C] //Proeeedings of the 2007 Australian Software Englneering Conference,Australia.Washington DC,USA:IEEE Computer Society,ASWEC,2007:284-296.
  • 3Hallberg N,Hallberg J.The Usage-centric Security Requirements engineering(USeR)method[C] //Information Assurance Workshop,2006:34-41.
  • 4Pauli J J,Xu Dian-xiang.Misuse case-based design and analysis of secure software architecture[C] //Intemational Conference on Information Technology Ceding and Computing(ITCC'05),Las Vegas.Washington DC,USA:IEEE Computer Society,2005,2:398-403.
  • 5Sindre G,Opdahl A L.Templates for misuse case description[C] //Proc 7th International Workshop on Requirements Engineering:Foundation of Software Quality(REFSQ'2001),2001.

同被引文献12

  • 1Gunther Gediga, Kai Christoph Hamhorg, Ivo Duntsch. Evaluation of software system [J]. Encyclopedia of Computer Science, 2001, (2010-8-30), http: //wenku. baidu, com/view/51f9ba03a6c30c2259019eed, html.
  • 2Michael Pagels. DAML: The DARPA agent marku language [Z/OL]. BBN Rosslyn Office, (2011-09-09), http: //www. daml. org/2006-01-13.
  • 3李晓红,冯志勇,王祥宇.基于安全缺陷的软件可信性评价方法[C]//2010CCF中国计算机大会论文集.杭州,中国:中国计算机学会,2010.
  • 4ISO/IEC 15408. Information technology-security techniques-evaluation criteria for IT security [R]. (2010-05-07), http.- //www. iso. org/iso/catalogue_detail. htm?csnumber = 40612. 2010.
  • 5LI Xiaohong, MENG Guozhu, FENG Zhiyong, LI Xu, PAN Dong. A framework based security-knowledge database for vulnerabilities detection of business logic [C]// Proceedings of the 2010 International Conference on Optics, Photonics and Energy Engineering (OPEE). Wuhan, China: Institute of Electrical and Electronics Engineers, Inc., 2010: 292 - 297.
  • 6XING Jinliang, LI Xiaohong, CAO Yan, FENG Zhiyong, LIU Ran. Information Flow Analysis of Web Service Net [C]// Proceedings of the 10th IEEE International Conference on Computer and Information Technology (CIT2010). Bradford, West Yorkshire, UK: IEEE Computer Socity, 2010- 1622-1626.
  • 7LI Xiaohong, CAO Yan, FENG Zhiyong, LIU Ran. Web service security analysis model based on program slicing [C]// Proceedings of the 10th International Conference on Quality Software, (QSBS10). Zhangjiajie, China: Conference Publishing Service, 2010: 4 - 22 - 428. (EI20104313329114).
  • 8LI Xiaohong, HU Chang, FENG Zhiyong. An approach to obtain software security vulnerabilities based on vertical search [C]// 2011 3rd International Conference on Mechanical and Electronics Engineering, vol. 4. Hong Kong, China:Science Technology Press, 2011: 310-313.
  • 9LI Xiaohong, LIU Fengxu, FENG Zhiyong, XING Jinliang. A knowledge based threat analysis in trustworthy software engineering [C]// 2011 3rd International Conference on Mechanical and Electronics Engineering g, vol. 4. Hong Kong, China: Science & Technology Press, 2011: 314-317.
  • 10何可,李晓红,冯志勇.活动图模型驱动的Web应用程序测试方法[J].计算机应用,2010,30(9):2365-2369. 被引量:6

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部