메뉴 건너뛰기




Volumn 2, Issue , 2010, Pages 92-101

Towards a hacker attack representation method

Author keywords

Attack pattern; Attack tree; Intrusion analysis; Misuse case; Security requirements

Indexed keywords

ATTACK PATTERNS; ATTACK TREE; INTRUSION ANALYSIS; MISUSE CASE; SECURITY REQUIREMENTS;

EID: 78751562996     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (28)
  • 1
    • 84957011826 scopus 로고    scopus 로고
    • On the extension of UML with use case maps concepts
    • Amyot, D., Mussbacher, G. (2000) On the Extension of UML with Use Case Maps Concepts. Proc. UML 2000, pp 16-31.
    • (2000) Proc. UML , vol.2000 , pp. 16-31
    • Amyot, D.1    Mussbacher, G.2
  • 2
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • Alexander I. (2003) Misuse Cases: Use Cases with Hostile Intent, IEEE Software, 20(1):58-66.
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 3
    • 78751516123 scopus 로고    scopus 로고
    • Attack patterns as a knowledge resource for building secure software
    • A. Sethi (ed.)
    • Barnum, S. (2007) Attack Patterns as a Knowledge Resource for Building Secure Software, In A. Sethi (ed.) Cigital: OMG Software Assurance WS
    • (2007) Cigital: OMG Software Assurance WS
    • Barnum, S.1
  • 4
    • 0023287326 scopus 로고
    • Towards a tool kit for the systems analyst
    • Benyon, D., Skidmore, S. (1987) Towards a Tool Kit For the Systems Analyst, The Computer Journal 30(l):2-7
    • (1987) The Computer Journal , vol.30 , Issue.1 , pp. 2-7
    • Benyon, D.1    Skidmore, S.2
  • 8
    • 85085406935 scopus 로고    scopus 로고
    • Matching attack patterns to security vulnerabilities in software- intensive system designs
    • Gegick, M., Williams, L., (2005) Matching attack patterns to security vulnerabilities in software- intensive system designs, Proc. SESS05 - building trustworthy applications, pp 1 -7
    • (2005) Proc. SESS05 - Building Trustworthy Applications , pp. 1-7
    • Gegick, M.1    Williams, L.2
  • 14
    • 85088409477 scopus 로고    scopus 로고
    • Security quality requirements engineering (SQUARE) methodology
    • St. Louis, MO, May 15-16, 2005
    • Mead, N.R, Stehney, T. (2005) Security Quality Requirements Engineering (SQUARE) Methodology. In Proc SESS'05. St. Louis, MO, May 15-16, 2005
    • (2005) Proc SESS'05
    • Mead, N.R.1    Stehney, T.2
  • 17
    • 0038011185 scopus 로고    scopus 로고
    • Constructing attack scenarios through correlation of intrusion alerts
    • Ning, P., Cui, Y., Reeves, D.S. (2002) Constructing attack scenarios through correlation of intrusion alerts. Proc. 9th ACM conf. on CCS, pp: 245-254
    • (2002) Proc. 9th ACM Conf. on CCS , pp. 245-254
    • Ning, P.1    Cui, Y.2    Reeves, D.S.3
  • 19
    • 60949097689 scopus 로고    scopus 로고
    • Experimental comparison of attack trees and misuse cases for security threat identification
    • Opdahl A. L., Sindre, G. (2009) Experimental Comparison of Attack Trees and Misuse Cases for Security Threat Identification, Information and Software Technology, 51(5):916-932
    • (2009) Information and Software Technology , vol.51 , Issue.5 , pp. 916-932
    • Opdahl, A.L.1    Sindre, G.2
  • 22
    • 38149121542 scopus 로고    scopus 로고
    • Mai-activity diagrams for capturing attacks on business processes
    • Sindre, G. (2007). Mai-Activity Diagrams for Capturing Attacks on Business Processes. Lecture Notes in Computer Science, vol. 4542. pp 355-366
    • (2007) Lecture Notes in Computer Science , vol.4542 , pp. 355-366
    • Sindre, G.1
  • 23
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre, G., Opdahl A.L. (2005). Eliciting Security Requirements with Misuse Cases. Requirements Engineering 10(1): 34-44
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 24
    • 13644271504 scopus 로고    scopus 로고
    • Generalization/specialization as a structuring mechanism for misuse cases
    • Sindre, G., Opdahl, A.L., Brevik, G.F. (2002) Generalization/ Specialization as a Structuring Mechanism for Misuse Cases. Proc. SREIS'2002.
    • (2002) Proc. SREIS'2002
    • Sindre, G.1    Opdahl, A.L.2    Brevik, G.F.3
  • 25
    • 84879483035 scopus 로고
    • The role of metamodels in federating system modelling techniques
    • Dallas, USA
    • Steele, P., Zaslavsky, A. (1993) The Role of Metamodels in Federating System Modelling Techniques, In Proc ER'93, Dallas, USA, pp 301-12
    • (1993) Proc ER'93 , pp. 301-312
    • Steele, P.1    Zaslavsky, A.2
  • 28
    • 78751517161 scopus 로고    scopus 로고
    • Combining misuse cases with attack trees and security activity models
    • Tøndel, I.A., Jensen, J., Røstad, L. (2010) Combining misuse cases with attack trees and security activity models Proc. OSA workshop.
    • (2010) Proc. OSA Workshop
    • Tøndel, I.A.1    Jensen, J.2    Røstad, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.