Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Use case diagram detection method based on attack mode

A detection method and a technology of use case diagrams, which are applied in the directions of instruments, electrical digital data processing, platform integrity maintenance, etc., can solve problems such as potential safety hazards, and achieve the effects of reducing development costs, improving credibility and development efficiency

Active Publication Date: 2010-11-03
江苏永达电力电信安装工程有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In other words, for a certain use case, its specific functional requirements will naturally lead to possible security risks, that is, misuse cases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Use case diagram detection method based on attack mode
  • Use case diagram detection method based on attack mode
  • Use case diagram detection method based on attack mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] What the present invention needs to do is to classify existing common use cases, misuse cases, attack modes and mitigation schemes, and establish corresponding associations among them. On this basis, a method is proposed to obtain the implicit misuse cases and attack modes in the software system by analyzing the use case diagram, and further proposes an optional mitigation scheme to improve the software design.

[0020] Specifically, it includes the following aspects:

[0021] 1. Build an effective attack pattern library: the library briefly lists the names, descriptions, corresponding misuse cases, and optional mitigation solutions of existing attack patterns. More importantly, include the necessary mappings.

[0022] 2. Asset information extraction: extract relevant asset information from the use case diagram provided by the user (software designer, especially the requirement analyst). The selection of the extraction target should match the name and summary descript...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for detecting a use case diagram based on an attracting mode which belongs to the safety technique field. The method includes steps as follows: constructing an efficient attracting mode storeroom; enumerating name, summary description, corresponding misuse example, selected relax scheme information of prior attract mode, and establishing a mapping relationship among the use case, misuse example, attracting mode and selected relax scheme; (2) reading the use case diagram waited detected; extracting corresponding asset information matched with the name and summary description of the prior attracting mode in the attracting mode storeroom in the use case diagram; processing compare and matching for asset information extracted from the use case diagram and corresponding content in the attracting mode storeroom, processing detection example aiming at each example one by one. The method is benefit for reducing developing cost, increasing reliability and developing efficiency of software.

Description

technical field [0001] The invention takes the development process of trusted software as the main object, is dedicated to improving the ability of software to avoid potential safety hazards and the development efficiency of trusted software, and belongs to the technical field of software safety. Background technique [0002] With the popularity of computers and the Internet, software has become an important carrier for resource acquisition and utilization in the information age. In this situation, software security has become an important guarantee for the normal and efficient operation of various tasks. From the perspective of the software development cycle, the earlier the flaws and loopholes in the software design are discovered, the lower the cost of modification and repair, and the more effective the avoidance of attacks will be. How to effectively confirm, analyze, and further solve potential safety hazards in software design in the requirements analysis stage is of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/22G06F21/56
Inventor 李晓红王翔宇许光全李旭雷亮
Owner 江苏永达电力电信安装工程有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products