2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS) 2016
DOI: 10.1109/rcis.2016.7549303
|View full text |Cite
|
Sign up to set email alerts
|

Security attack analysis using attack patterns

Abstract: Abstract-Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will determine essential security requirements. The prevalence of Socio-Technical Systems (STSs) makes attack analysis particularly challenging. These systems are composed of people and organizations, their software systems, as well as physical infrastructures. As such, a thorough attack analysis needs to consider strategic (social and organizational) aspects of the involved people a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…Software security vulnerabilities and observed analysis of attacks are categorized into various aspects. The proposed software security framework requires different analyses to be performed due to the expansion aspects of system security [18], [19]. The security system has been strengthened by prioritizing issues derived from monitoring results.…”
Section: Software Security Requirementsmentioning
confidence: 99%
“…Software security vulnerabilities and observed analysis of attacks are categorized into various aspects. The proposed software security framework requires different analyses to be performed due to the expansion aspects of system security [18], [19]. The security system has been strengthened by prioritizing issues derived from monitoring results.…”
Section: Software Security Requirementsmentioning
confidence: 99%
“…Other researchers [8] have analyzed attacks using attack patterns in a comprehensive attack knowledge repository. Bozic and Wotawa [1] have proposed a formalization of attack patterns from which test cases can be generated and executed automatically to conduct security testing.…”
Section: Related Workmentioning
confidence: 99%
“…Such an approach is more perpendicular, as it enables an in-depth analysis of a particular threat and provides guidance in choosing how to protect against that threat. Related to that, there are systematic approaches, such as Li et al [19], that leverage attack pattern repositories such as CAPEC to identify attacks.…”
Section: Related Workmentioning
confidence: 99%