An Efficient Method For Dynamic Security Process Using UML Class Diagrams And Baysian Network


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Designing secure systems is a major problem for researchers. Security critical systems must perform at the required security level, make effective use of available resources, and meet end-users expectations. Balancing these needs, and at the same time fulfilling budget and time-to-market constraints, requires developers to design and evaluate alternative security treatment strategies. Incomplete design of security system may cause failure of that system. So here we are presenting a security methodology for developing secure systems. This methodology begins with designers defining system assets, identifying potential attacks against them, and evaluating system risks. When a risk is unacceptable, designers must mitigate the associated threat by incorporating security mechanisms methodically into the system design. Designers next formally evaluate the resulting design to ensure that the threat has been mitigated, while still allowing development to meet other project constraints. Here we are presenting security methodology which involves two steps, 1) Security analysis and 2) trade-off analysis. This eases the trade-off by making it possible to swap treatment strategies. The trade-off analysis is implemented using BBN, and fitness score is computed by estimating a set of variables de-scribing properties of a treatment strategy.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Trade-Off Analysis; Bayesian Belief Network (BBN); Risk-Driven Development (RDD); Man in Middle Attack; Denial Attack

Full Text:

PDF


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize