2009
DOI: 10.1007/978-3-642-04840-1_10
|View full text |Cite
|
Sign up to set email alerts
|

A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations

Abstract: Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-centric modeling ontology, which aims to integrate empirical knowledge of vulnerabilities into the system development process. In particular, we identify the basic concepts for modeling and analyzing vulnerabilities and their effects on the system. These concepts drive the definition of criteria that make it possible to compare and evalu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(22 citation statements)
references
References 22 publications
(33 reference statements)
0
21
0
1
Order By: Relevance
“…The prediction rate of proposed system results are compared against security ontology [12] and tabulated in the Table 1. From the Table 1 it is clear that the proposed system predict more attacks with the help of the inference process than the existing system.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The prediction rate of proposed system results are compared against security ontology [12] and tabulated in the Table 1. From the Table 1 it is clear that the proposed system predict more attacks with the help of the inference process than the existing system.…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, the dependency on security experts to check the web application security can also be minimized. Security ontology [12] which exists provides taxonomy for threats, vulnerabilities and attacks but lacks to infer the knowledge to predict the attacks and does not classify attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Elahi et al [16] compared three existing techniques to model vulnerabilities, e.g., i*, misuse modeling and CORAS, and tried to identify common concepts of vulnerabilities in order to develop an ontology or a set of vocabularies in a security domain. The obtained concepts and their relationships can be a meta model of vulnerability models for integrating different security requirements analysis methods, and the aim of this research is different from ours.…”
Section: Related Workmentioning
confidence: 99%
“…Elahi et al [3] represented the conceptual framework with ontology as the metadata model. They compared multiple conceptual frameworks including the i* framework, which can model malicious behavior and vulnerabilities with ontology.…”
Section: Related Workmentioning
confidence: 99%
“…Though there is much work to provide techniques for attack modeling, for example, identifying various attack routes with visualization and calculating the most plausible attack route by using the stochastic method in each route, the conceptual framework to elicit common concepts has not been yet identified in this area. [3] Thus, it is essential to research and study framework that can create requirements based on common and generalized concepts, because it still needs to progress under a complex security environment. In this paper, we have conducted research on understanding the problem domain using defined relationships between concepts and extended relationships based on the security conceptual framework, and creating security requirements.…”
Section: Introductionmentioning
confidence: 99%