Authors:
Peter Karpati
1
;
Guttorm Sindre
1
and
Andreas L. Opdahl
2
Affiliations:
1
Norwegian University of Science and Technology, Norway
;
2
University of Bergen, Norway
Keyword(s):
Intrusion analysis, Security requirements, Misuse case, Attack tree, Attack pattern.
Related
Ontology
Subjects/Areas/Topics:
Cross-Feeding between Data and Software Engineering
;
Model-Driven Engineering
;
Requirements Elicitation and Specification
;
Software Engineering
;
Software Engineering Methods and Techniques
;
Software Testing and Maintenance
Abstract:
Security must be addressed at an early stage of information systems development, and one must learn from previous hacker attacks to avoid similar exploits in the future. Many security threats are hard to understand for stakeholders with a less technical background. To address this issue, we present a five-step method that represents hacker intrusions diagrammatically. It lifts specific intrusions to a more general level of modelling and distils them into threats that should be avoided by a new or modified IS design. It allows involving different stakeholder groups in the process, including non-technical people who prefer simple, informal representations. For this purpose, the method combines five different representation techniques that together provide an integrated view of security attacks and system architecture. The method is illustrated with a real intrusion from the literature, and its representation techniques are tied together as a set of extensions of the UML metamodel.