inherits several of UML's weaknesses. For example,
Actions and Behaviours become separated, with
neither being a subclass of the other, and they are
also distinct from BehaviouredClassifiers. In
consequence, the relationships between paths and
path elements in UCM/MUCM, misuse cases in
MUC, primitive attacks in AT/AP etc. often become
indirect even when the represented phenomena
appear similar.
Our work on HARM so far has focussed on
capturing technical intrusions. In the future we also
plan to investigate other types of intrusion, such as
physical ones and social engineering attacks.
Generally we will explore further how the HARM
techniques with vulnerability taxonomies can be
used for attack and test generation. Further work is
needed to add detail, e.g., about how previous
attacks are selected and system boundaries defined,
how multiple misuse case maps are distilled into
misuse case diagrams, how requirements can be
derived from attack patterns etc. As a consequence,
it is possible that the detailed five-step method will
be elaborated and reorganised, although the broad
progress of HARM will most likely remain.
ACKNOWLEDGEMENTS
This work was done in the ReqSec project funded
by the Norwegian Research Council.
REFERENCES
Amyot, D., Mussbacher, G. (2000) On the Extension of
UML with Use Case Maps Concepts. Proc. UML
2000, pp 16-31.
Alexander I. (2003) Misuse Cases: Use Cases with
Hostile Intent, IEEE Software, 20(1):58-66.
Barnum, S. (2007) Attack Patterns as a Knowledge
Resource for Building Secure Software, In A. Sethi
(ed.) Cigital: OMG Software Assurance WS
Benyon, D., Skidmore, S. (1987) Towards a Tool Kit For
the Systems Analyst, The Computer Journal 30(1):2-7
Buhr R. J. A. (1996) Use case maps for attributing
behaviour to system architecture, Proc. 4th Int. WS on
Parallel and Distributed Real-Time Systems, p.3
Buhr R.J.A., Casselman R.S. (1995) Use Case Maps for
Object-Oriented Systems, Prentice Hall
Cheung, S., Lindqvist, U., Valdez, R. (2003) Correlated
Attack Modeling (CAM), Final Technical Report by
SRI International, October 2003
Gegick, M., Williams, L., (2005) Matching attack
patterns to security vulnerabilities in software-
intensive system designs, Proc. SESS05 — building
trustworthy applications, pp 1-7
Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2005a),
Web services enterprise security architecture: a case
study. Proc. WS on Secure Web Services (SWS'05) ,
Fairfax, VA, USA.
Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2005b),
Towards a Process for Web Services Security,
Proc.WOSIS'05 at ICEIS'05, Miami, Florida, USA.
Gutierrez, C., Fernandez-Medina, E., Piattini, M. (2006),
PWSSec: Process for Web Services Security, In Proc.
ICWS '06, pp.213-222, 18-22
Karpati P., Sindre G., Opdahl A. L. (2010) Illustrating
Cyber Attacks with Misuse Case Maps, Proc. REFSQ
Maurya, S., Jangam, E., Talukder, M., Pais, A.R. (2009)
Suraksha: A security designers’ workbench. Proc.
Hack.in 2009, pp. 59–66.
Mead, N.R, Stehney, T. (2005) Security Quality
Requirements Engineering (SQUARE) Methodology.
In Proc SESS'05. St. Louis, MO, May 15-16, 2005
Mitnick K. D., Simon W. L. (2006) The Art of Intrusion,
Wiley Publishing Inc.
Neumann, P.G., Porras, P.A.. (1999) Experience with
EMERALD to date. Proc WS on Intrusion Detection
and Network Monitoring, pp:73-80
Ning, P., Cui, Y., Reeves, D.S. (2002) Constructing
attack scenarios through correlation of intrusion
alerts. Proc. 9th ACM conf. on CCS, pp: 245-254
OMG Unified Modeling LanguageTM (OMG UML),
Superstructure Version 2.2, Feb. 2009
Opdahl A. L., Sindre, G. (2009) Experimental
Comparison of Attack Trees and Misuse Cases for
Security Threat Identification, Information and
Software Technology, 51(5):916-932
Schneier, B. (1999) Attack Trees, Dr. Dobb's Journal
Schneier, B. (2000) Secrets and Lies: Digital Security in a
Networked World, Wiley.
Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing,
J.M. (2002) Automated Generation and Analysis of
Attack Graphs, Proc. IEEE Symposium on Security
and Privacy, p.273, May 12-15
Sindre, G. (2007). Mal-Activity Diagrams for Capturing
Attacks on Business Processes. Lecture Notes in
Computer Science, vol. 4542. pp 355-366
Sindre, G., Opdahl A.L. (2005). Eliciting Security
Requirements with Misuse Cases. Requirements
Engineering 10(1): 34-44
Sindre, G., Opdahl, A.L., Brevik, G.F. (2002)
Generalization/Specialization as a Structuring
Mechanism for Misuse Cases. Proc. SREIS'2002.
Steele, P., Zaslavsky, A. (1993) The Role of Metamodels
in Federating System Modelling Techniques, In Proc
ER'93, Dallas, USA, pp 301-12
Templeton, S.J., Levitt, K. (2000) A requires/provides
model for computer attacks, Proc. WS on New
security paradigms, pp.31-38.
The Mitre Corp. (2010): Common Attack Pattern
Enumeration and Classification, capec.mitre.org.
Accessed: 30.3.2010.OMG (2009)
Tøndel, I.A., Jensen, J., Røstad, L. (2010) Combining
misuse cases with attack trees and security activity
models Proc. OSA workshop.
TOWARDS A HACKER ATTACK REPRESENTATION METHOD
101