首页> 外文会议>Huntsville Simulation Conference >Applying DODAF 2.0 Modeling Techniques to a Real-Time Security Analyzer
【24h】

Applying DODAF 2.0 Modeling Techniques to a Real-Time Security Analyzer

机译:将Dodaf 2.0建模技术应用于实时安全分析仪

获取原文

摘要

The survivability of a node is dependent upon detecting threats that aim to reduce the capability of the node or the underlying software components. Any node is made up a myriad of software components, where each can potentially cripple the operations of the node. To address the security of the node, it is then crucial to determine the susceptibility of the underlying software components. Traditional protection systems like firewalls and intrusion detection systems (IDS), focus on high-level abstractions of the system. They fail to address the concerns of specific targeted attacks on the underlying software components. For this reason, we are developing a security system that profiles the individual software components, and monitors for threats specific to the vulnerabilities present in those components. This paper presents the research that has been conducted towards the creation of a unified analysis framework. We then determine the methodology of the approaches and identify the characteristics adopt. Furthermore, we then identify the areas that are not addressed already, and incorporate them into the unified analysis framework. We present our analysis framework as a software architecture model using the latest version of the Department of Defense Architecture Framework (DODAF), version 2.0.
机译:节点的生存能力取决于检测旨在降低节点或底层软件组件的能力的威胁。任何节点都是组成的无数软件组件,其中每个组件可能会涉及节点的操作。为了解决节点的安全性,它对确定底层软件组件的易感性至关重要。传统保护系统,如防火墙和入侵检测系统(IDS),专注于系统的高级抽象。他们未能解决对底层软件组件对特定目标攻击的关切。因此,我们正在开发一种安全系统,该系统配置了个人软件组件,并监视特定于这些组件中存在的漏洞的威胁。本文介绍了对创建统一分析框架进行的研究。然后,我们确定方法的方法,并确定特征采用。此外,我们然后识别已经解决的区域,并将它们纳入统一分析框架。我们将我们的分析框架作为软件架构模型,使用最新版本的防御架构框架(Dodaf),版本2.0。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号