Fifth International Conference on Information Technology: New Generations (Itng 2008) 2008
DOI: 10.1109/itng.2008.15
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchy-Driven Approach for Attack Patterns in Software Security Education

Abstract: We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software security. This is a fundamental point in computer and software security education because the "patch and pray" mentality of software security is insufficient. The importance and significance of our approach is justified by accentuating the deficiencies in previous ad-hoc approaches to teaching attack patterns. Because of the vast amount … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…At least an annual evaluation of the attack trees is therefore recommended with the aim of implementing new information. Pauli and Engebretson (2008) suggest a hierarchical approach in order to encourage students to learn and better understand the attack patterns. In doing so, vulnerabilities present the highest level of abstraction.…”
Section: Workflows For Attack Modellingmentioning
confidence: 99%
“…At least an annual evaluation of the attack trees is therefore recommended with the aim of implementing new information. Pauli and Engebretson (2008) suggest a hierarchical approach in order to encourage students to learn and better understand the attack patterns. In doing so, vulnerabilities present the highest level of abstraction.…”
Section: Workflows For Attack Modellingmentioning
confidence: 99%
“…Similarly, Hazeyama et al, proposed a learning environment for software security education [10]. Others have sought to develop lab environments [7], simulations [17], analysis frameworks [ 18], [19], and reconfigurable course modules [2], [27] to facilitate technical learning of specific and hands-on cyber security topics. More novel approaches include the use of Second Life [24], hacking competitions [4] and capstone design courses [9].…”
Section: Tier One: Course-based Learningmentioning
confidence: 99%
“…Given the sheer volume of information included in the Release 1 Dictionary, which includes not only the defined 101 attack patterns but their descriptive elements as well, there tends to be considerable confusion and information overload when individuals are first introduced to the concept of attack patterns [3].…”
Section: Related Workmentioning
confidence: 99%
“…Previous research focused on the benefits of building and creating a hierarchy structure from the CAPEC elements [3]. We propose the further refinement of this concept to include both the Parent Threat and Parent Mitigations.…”
Section: Building Graphical Hierarchy Treesmentioning
confidence: 99%
See 1 more Smart Citation