CFP last date
20 May 2024
Reseach Article

Secure System of Attack Patterns towards Application Security Metric Derivation

by K. Raja Sekhar, L. S. S. Reddy, U. J. Kameswari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 53 - Number 1
Year of Publication: 2012
Authors: K. Raja Sekhar, L. S. S. Reddy, U. J. Kameswari
10.5120/8384-1987

K. Raja Sekhar, L. S. S. Reddy, U. J. Kameswari . Secure System of Attack Patterns towards Application Security Metric Derivation. International Journal of Computer Applications. 53, 1 ( September 2012), 11-18. DOI=10.5120/8384-1987

@article{ 10.5120/8384-1987,
author = { K. Raja Sekhar, L. S. S. Reddy, U. J. Kameswari },
title = { Secure System of Attack Patterns towards Application Security Metric Derivation },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 53 },
number = { 1 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 11-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume53/number1/8384-1987/ },
doi = { 10.5120/8384-1987 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:53:29.849148+05:30
%A K. Raja Sekhar
%A L. S. S. Reddy
%A U. J. Kameswari
%T Secure System of Attack Patterns towards Application Security Metric Derivation
%J International Journal of Computer Applications
%@ 0975-8887
%V 53
%N 1
%P 11-18
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Attack pattern system exhibits a unique property of pattern sequential cascading nature which can be identified during the design phase of an application system implementing security scenarios. In this paper a mathematical framework of secure system of attack patterns is presented to verify the stated design specification property along with theoretical back ground work. The framework defines 12 definitions of secure system of attack patterns, propositional transition system, computable functions and other supported elements. The frame work establishes 15 specifications with associated lemmas and theorems to construct and build the background towards verification of proposed system. Finally the proposed attack pattern system is assessed against the number of patterns, resources and other pattern properties with the help of simple security scenario.

References
  1. W Thomas, "Automata theory and Infinite Transition Systems", Lecture notes, University of Liege, DAAD Procope Project, May 2006, pp 1-12
  2. E M Clarke, O Grumbreg, "Research on Automatic Verification of Finite-State Concurrent Systems", Annual Revue Computing Science, vol. 2, 1987, pp 269–290
  3. E A Emerson, "Temporal and Modal Logic", Formal Models and Semantics, Hand-book of Theoretical Computer Science, Jan van Leeuwen Editor, Elsevier Publications, 1990, pp 995– 1072
  4. D Bert, F Cave, "Construction of Finite Labeled Transition systems from Abstract systems", Research Project, VERDON, 1998, pp 1-10
  5. D Dams, "Abstract Interpretation and Partition Refinement for Model Checking", PhD thesis, Technical University of Eindhoven, Netherlands, 1996
  6. K Raja Sekhar, Dr LSS Reddy, UJ Kameswari, "A Prototype Model to Generate Application Security Metric using Attack Patterns", Proceedings of IEEE Conference IACC'09, March 2009, Patiala, pp 143-147
  7. K Raja Sekhar, Dr LSS Reddy, UJ Kameswari, "Templates to derive Security Metrics based on Attack Patterns", Proceedings of 3rd International Conference on Software engineering", Indore, September 2012
Index Terms

Computer Science
Information Sciences

Keywords

Secure system of attack patterns Computable functions Configuration mapping Points cascadability of patterns