A rationale for security (mis)use cases

Slides:



Advertisements
Similar presentations
Security Design Patterns – Overview –Software Development Lifecycle –Enterprise Software Design Process and Artifacts –Pattern Format –Aspect Oriented.
Advertisements

Intrusion Detection and Containment in Database Systems Abhijit Bhosale M.Tech (IT) School of Information Technology, IIT Kharagpur.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Requirements Analysis CS 414 – Software Engineering I Donald J. Bagert Rose-Hulman Institute of Technology January 7, 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
SE 555 Software Requirements & Specification 1 Misuse Cases.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Shell Based Intrusion Detection System Amit Mathur Section 2.
Software Requirements and the Requirements Engineering Process Chapters 5 and 6.
Use Case Development Scott Shorter, Electrosoft Services January/February 2013.
Architecting secure software systems
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
SANE: A Protection Architecture for Enterprise Networks
CSC8320. Outline Content from the book Recent Work Future Work.
Sam Supakkul Lawrence Chung The University of Texas at Dallas
Doc.: IEEE /528r1 Submission May 2004 Conner (Intel Corp.) Slide 1 Defining Usage Models for s ESS Mesh W. Steven Conner Intel Corp. Contributions.
Comparing two techniques for intrusion visualization Vikash Katta 1,3, Peter Karpati 1, Andreas L. Opdahl 2, Christian Raspotnig 2,3 & Guttorm Sindre 1.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
UML - Development Process 1 Software Development Process Using UML.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 1 Slide 1 6/6/2016 1/25 IT076IU Software Engineering Project Review 2.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Network Management Unit 4 Course Name – IT Network Management Instructor – Jan McDanolds, MS,
Doc.: IEEE /1115r2 Submission J Chhabra, A. R. Prasad, J. Walker, H. AokiSlide s Security concepts Jasmeet Chhabra, Intel
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
1 Week 3 Software Engineering Spring Term 2016 Marymount University School of Business Administration Professor Suydam.
Requirements Introduction Emerson Murphy-Hill. Scope of Software Project Failures WHY PROJECTS FAIL % 1. Incomplete Requirements Lack of user involvement12.4.
Presented by Edith Ngai MPhil Term 3 Presentation
Manuel Brugnoli, Elisa Heymann UAB
Software Requirements and the Requirements Engineering Process
Requirements Engineering Process
Group Y Presenters: (indicate roles)
CSCE 548 Secure Software Development Use Cases Misuse Cases
Packet Leashes: Defense Against Wormhole Attacks
Giannis F. Marias, Vassileios Tsetsos,
Evaluating a Real-time Anomaly-based IDS
SEC 572 Competitive Success/snaptutorial.com
SEC 572 Enthusiastic Studysnaptutorial.com
SEC 572 Education for Service-- snaptutorial.com.
SEC 572 Teaching Effectively-- snaptutorial.com
What Makes a Network Vulnerable?
IS4680 Security Auditing for Compliance
Requirements Analysis
A rationale for security (mis)use cases
Defining Usage Models for ESS Mesh
ITIS 6010/8010 Wireless Network Security
A Novel Latin Square-based Secret Sharing for M2M Communications
Extensible Security and Routing Proposal
Detect and Prevent Rogue Traffic in Mobile Ad Hoc Networks
ECE 544 Project3 Team member.
Mesh Security Recommendation
Suggested Clarification of s ESS Mesh Terminology
Chapter 22 Object-Oriented Systems Analysis and Design and UML
Proposed Extensible Approach for WLAN Mesh Standardization
Engineering Secure Software
Applying Policy-Based Intrusion Detection to SCADA Networks
Autonomous Network Alerting Systems and Programmable Networks
Security in SDR & cognitive radio
Authenticated Validity for M2M devices
An Overview of Security Issues in Sensor Network
Suggested Major Functional Components for s
Chapter 5 SNMP Management
Chapter 5 SNMP Management
Software Development Process Using UML Recap
Review of n A-MPDU DoS Issues – Progress and Status
Chapter 6 IP Security.
Presentation transcript:

A rationale for security (mis)use cases May 11, 2004 Jasmeet Chhabra Key contributors: Jesse Walker W Steven Conner

Outline Use and (Mis)use cases Why Security (mis)use cases? Example case for the mesh Single illustrative case A possible way to capture the example case Conclusion and Next steps Backup has a few more use cases for offline perusal

Detect and Reject Forged packets Use and (Mis)use cases System Function Threat Forge Routing Packets User Routing Detect and Reject Forged packets Use Case: Send data across mesh Mesh Mitigates Use cases view system from user’s viewpoint Misuse cases view system from misuser/attacker’s viewpoint MisUser

Why Security (Mis)use Cases? view scenarios from point of view of the user We need to view software from the point of view of the attacker / misuser / malicious user Use to capture / generate a threat model Know what it means to be “secure” Build security into the design

(Mis)use case: Forge routing packet System Function Threat User Routing Forge Routing Packets Detect and Reject Forged packets Use Case: Send data across mesh Mesh New System Functions/Requirements Mitigates MisUser

Threat and requirements generated The misuser generates and sends a forged routing packet to cause misrouting Requirements The mesh shall identify the forged routing packet as invalid The mesh does not use the forged routing packet to generate/update routes The mesh shall have prevented the misuser from misrouting using forged packets

Illustrative (Mis)use case: Case1 Path1 (A possible way to capture) System function / Use Case: Routing Use Case Path: Forge Routing packet Security Threat: The misuser generates and sends a forged routing packet to cause misrouting Preconditions: 1) The misuser can generate and send a forged routing packet with wrong information Misuser / attacker interactions System Requirements System Interactions System Actions  The misuser generates and senda a forged routing packet with wrong information The mesh shall identify the forged routing packet as invalid The mesh does not use the forged routing packets to generate/update routes Postconditions: 1) The mesh shall have prevented the misuser from misrouting using forged packets

Proposed process for Security functional component Security (Mis)use cases Threats and requirements Prioritize threats Shall handle / Will not handle Evaluation Criteria

Conclusion and Next steps Security (mis)use cases look at system from attacker’s point of view Use cases look from user’s point of view Document security (mis)use cases Capture/Prioritize threats and requirements Propose: Form a sub-team to Generate security threats/requirements Feed into evaluation criteria Know what it means to be “secure”

More/Backup More cases for offline viewing References

Terminology Used Terminology: Misuser: Attacker or malicious user Discovery Packets: Packets used to discover neighbors in order to create a mesh connectivity topology

A proposal to capture security (Mis)use cases Now: No architectural assumptions Capture any assumptions/threats Driven by misuser/ attacker Generate threat model and requirements for evaluation criteria Later: after some architecture is in place More detailed threat model Generate test criteria for implementation/ design

Example (Mis)use case: Case1 Path2 Use Case: Routing Use Case Path: Replay Security Threat: The misuser replays routing packets to cause packets to misroute Preconditions: 1) The misuser can overhear routing packets and replay them Misuser interactions System Requirements System Interactions System Actions  The misuser attempts to misroute packets by replaying routing packets The mesh shall identify the replayed routing packets as duplicates The mesh does not use the replayed routing packets to generate/update routes Postconditions: 1) The mesh shall have prevented the misuser from misrouting using replayed packets 2) The mesh shall have logged the attempt to replay routing packets

Example (Mis)use case: Case1 Path3 Use Case: Routing Use Case Path: Selective forwarding Security Threat: The misuser uses selected forwarding of packets to break system routing functions Preconditions: 1) The misuser has an AP/routing node authenticated in the mesh network Misuser interactions System Requirements System Interactions System Actions The misuser attempts to selectively forward packets and break routing functions The mesh shall identify the selective forwarding behavior of the misuser The mesh shall un-authenticate the node using selective forwarding to break mesh routing functions and deny future access Postconditions: 1) The mesh shall have prevented the misuser from using selective forwarding to break mesh routing functions 2) The mesh shall log the attempt to circumvent the routing functions.

Other possible categories Discovery Routing – many more Access Policy Data Security Denial of Service (Mis)use cases generated from use cases More…

References Misuse and Abuse Cases: Getting Past the Positive, Paco Hope, Annie I. Antón and Gary McGraw. IEEE Security & Privacy, February 2004. Donald G. Firesmith, “Engineering Security Requirements,” Journal of Object Technology (JOT), 2(1), Swiss Federal Institute of Technology (ETH), Zurich, Switzerland, p. 53-68, January/February 2003. Donald G. Firesmith, “Security Use Cases,” Journal of Object Technology (JOT), 2(3), Swiss Federal Institute of Technology (ETH), Zurich, Switzerland, p. 53-64, May/June 2003. [Sindre and Opdahl 2001] Guttorm Sindre and Andreas Opdahl: Templates for Misuse Case Description, 2001, R. Crook, D. Ince, L. Lin, and B. Nuseibeh, "Security Requirements Engineering: When Anti-Requirements Hit the Fan", Proceedings of IEEE International Requirements Engineering Conference (RE'02), Essen, Germany, September 2002. Guttorm Sindre, Andreas L. Opdahl: "Capturing Security Requirements by Misuse Cases", In Proc. 14th Norwegian Informatics Conference (NIK'2001), Tromsø, Norway, 26-28 Nov 2001. [Alexander2003] Ian Alexander: Misuse Case Help To Elicit Nonfunctional Requirements, IEE CCEJ, 2001