loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Loukmen Regainia and Sébastien Salva

Affiliation: Auvergne University, France

Keyword(s): Security Patterns, Classification, CAPEC Attacks, CWE Weaknesses, Attack-Defense Trees.

Abstract: Security at the design stage of the software life cycle can be performed by means of security patterns, which are viable and reusable solutions to regular security problems. Their generic nature and growing number make their choice difficult though, even for experts in system design. To guide them through the appropriate choice of patterns, we present a methodology of security pattern classification and the classification itself, which exposes relationships among attacks, weaknesses and security patterns. Given an attack of the CAPEC (Common Attack Patterns Enumeration and Classification) database , the classification expresses the security pattern combinations that overcome the attack. The methodology, which generates the classification is composed of five steps, which decompose patterns and attacks into sets of more precise sub-properties that are associated. These steps provide the justifications of the classification and can be followed again to upgrade it. From the classificatio n, we also generate Attack-Defense Trees (ADTtrees), which depict an attack, its sub-attacks and the related defenses in the form of security pattern combinations. Without loss of generality, this classification has been established for Web applications and covers 215 attacks, 136 software weaknesses and 26 security patterns. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.117.184.62

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Regainia, L. and Salva, S. (2017). A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-209-7; ISSN 2184-4356, SciTePress, pages 136-146. DOI: 10.5220/0006198301360146

@conference{icissp17,
author={Loukmen Regainia. and Sébastien Salva.},
title={A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP},
year={2017},
pages={136-146},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006198301360146},
isbn={978-989-758-209-7},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP
TI - A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation
SN - 978-989-758-209-7
IS - 2184-4356
AU - Regainia, L.
AU - Salva, S.
PY - 2017
SP - 136
EP - 146
DO - 10.5220/0006198301360146
PB - SciTePress