SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 4, Issue 4 (Sep-Oct. 2012), PP 01-05
www.iosrjournals.org
www.iosrjournals.org 1 | Page
Designing Secure Systems Using AORDD Methodologies in UML
System Models
1
Ushasree R, 2
P. Raja Rajeswari, 3
Dr. D. vasumathi
Abstract: We propose a AORDD methodology, based on Aspect-Oriented Modeling (AOM), for incorporating
security mechanisms in an application. The functionality of the application is described using the primary model
and the attacks are specified using aspects. The security mechanism, modeled as security aspect, is composed
with the primary model to obtain the security treated model. We illustrate how this can be done and show how
the resulting system can be evaluated to give assurance that it is resilient to the given attack. In this paper we
describe an aspect-oriented modeling (AOM) approach that eases the task of exploring alternative ways of
addressing concerns during software modeling.
Keywords: Alloy, Aspect-oriented modeling, secure systems design, Security analysis
I. Introduction
In the commercial world, designing secure applications is impacted by various parameters, such as
time-to-market, cost and effort involved. We propose a risk driven development approach for designing such
applications.
For example, a Role Based Access Control (RBAC) model can be used to describe a solution to the
banking system’s access control concern. A decision to address a concern in a particular manner can give rise to
other concerns. For example, the RBAC solution to the access control problem gives rise to new concerns
pertaining to the management of roles and permissions. In risk-driven development (RDD) security risks are
identified, evaluated, and treated as an integrated part of the development.
II. Background
2.1 ALLOY
we show how to formally verify that a security mechanism incorporated into a system is effective in
protecting against a given security breach. we show how a system modeled using UML is converted to a form
that can be automatically verified using the Alloy Analyzer.The Alloy analyzer translates a model into Boolean
expression and analyses it using SAT-SOLVERS meta model element .
An Alloy model consists of a number of signature and relation declarations. The Alloy Analyzer
translates a model into a Boolean expression and analyzes it using embedded SAT-solvers. The user needs to
specify a scope to the tool.
2.2 ASPECT ORIENTED MODELING
An aspect oriented modeling approach of the following artifacts
1. A primary model that describes the business logic of the application.
2. A set of generic aspect models, where each model is a generic description of a crosscutting feature.
3. A set of bindings that determine where in the primary model the aspect models are to be composed.4. A set of
composition directives that influence how Aspect models are composed with the primary model.
2.3 SECURE SYSTEM DESIGNS
We also include the project-specific consequence of incorporating a security mechanism to prevent the
attack, in the form of variables related to the development effort in terms of cost and time. First, we perform a
formal security analysis to give assurance that the system, created by integrating a security mechanism model, is
indeed resilient to the targeted attack. We transform a UML misuse model into Alloy and use the Alloy
Analyzer to reason about its security properties.
The results of the analysis either give assurance that the security properties exist, Alloy is a fully
declarative first-order logic language designed for modeling and analyzing complex systems.
2.4 SECURITY ANALYSIS
In security assessment and management several techniques for identifying and assessing security
problems in an information system are combined into a process that ensures that there is continuous review and
update of its security controls.
Designing Secure Systems Using AORDD Methodologies In UML System Models
www.iosrjournals.org 2 | Page
• Eavesdropping. The attacker may observe the communications channel.
• Replay. The attacker records messages she has observed and re-sends them at a later time.
• Man-in-the-middle. The attacker intercepts the messages sent between the parties C and S and replaces these
with her own messages.
III. CASE STUDY
EXAMPLE E-COMMERCE SYSTEM
Our example is an e-commerce platform called ACTIVE. ACTIVE provides services for electronic
purchasing of goods over the Internet. The project identified several security risks, including attacks against user
authentication in the login service. Here we defines two models are primary model and context-model primary
model that describes a user management system in which TheUserMgmt class defines operations for adding a
user to the repository (addUser) and for deleting a user from the repository (deleteUser).
the diagrams of primary and context model.
Figure 1: Man-In-Middle-Attack
misuse model of original
(a) ACTIVE login sequence and MIM attack, created by primary login sequence model with context-specific
MIM passive attacks models. The communication between ACTIVE CLIENT and
(b) LOGIN MANAGER through ATTACKER.The attack is successful is ©ATTACKER obtains home page, or
username,password.
3.1. THE MAN-IN-THE-MIDDLE ATTACK
In this section, we show how to represent the man-in-the-middle attack as a generic aspect. Messages
between a requestor and authenticator are intercepted by an attacker. authenticator. The risk assessments
performed as part of the CORAS project identified the login process as being vulnerable to man-in-the-middle
attacks. During this kind of attack, user information can be obtained directly, or an attacker can intercept user
names and passwords, to be used at later times to impersonate a valid user. The sequence diagram shows all
messages between the |Requestor and Authenticator passing through the |Attacker. Secret information can be
changed by the|Attacker as shown by the |checkSecretInfo message from the |Requestor to the |Attacker, and the
|checkSecretInfoAt message passed on to the Authenticator. This generic aspect must be instantiated to create a
context-specific aspect that can then be composed with the primary model to create a misuse model.
3.2. SECURITY MECHANISMS To COUNTER MAN-IN-THE-MIDDLE ATTACKS
System designers must identify security properties relevant to mitigating a risk to system assets. We
identify properties according to the ISO/IEC TR 13335:2001 Information Technology—Guidelines for
Management of IT Security [9]. The UML2Alloy tool to transform a UML model into Alloy. Its input consists
of a UML class diagram in XML Metadata Interchange (XML) format , and an accompanying OCL
specification of behavior. We therefore begin with the Abstract & Transform activity as the first activity in
AORDD analysis. The next activity, Create Alloy Model using UML2Alloy, applies UML2Alloy to the XMI
representation. UML2Alloy implements transformation rules to create an Alloy model. This model is input to
the next activity Analyze with Alloy Analyzer.There are a number of OCL constraints that cannot be directly
expressed in Alloy and are thus not supported by UML2Alloy (for example, the OCL “iterate” construct).
Another issue is that OCL lacks inherent support to capture temporal properties. As a result, different methods
have been proposed to extend OCL with the ability to express temporal constraints . It is, however, possible to
Designing Secure Systems Using AORDD Methodologies In UML System Models
www.iosrjournals.org 3 | Page
depict simple but crucial constraints related to time if a designer models time explicitly and uses conventional
OCL to express constraints. Details on exactly which OCL statements are supported by UML2Alloy.
3.3. MISUSE MODEL OF SECURITY-TREATED PRIMARY MODEL
The SRP security-treated misuse model . However, the active attack differs in three ways:
1) Attacker substitutes its own expression and name in the startComm message (aExpr and a name)
2) Attacker generates its own key and token (key and aTok)
3) Attacker substitutes its token for the ActiveClient in the verify message (aTok).
Figure-2: Portion of SRP security-treated misuse model including active MiM attack.
Misuse model of original ACTIVE login sequence and MiM attack, created by composing primary
login sequence model with context specific MiM passive attack models. All communication between
ActiveClient and LoginManager goes through Attacker. The attack is successful if Attacker obtains homePage,
or uname and pword.If the profile does not exist or the user cannot be authenticated, a visitorPage is returned
that does not contain any user-specific information.
IV. Implementation Environment
A constraint is a requirement which leaves no design option. e.g the developers could use any language
they like then say so. Otherwise describe just the constraint.When referring to system interfaces, legacy systems
anddatabases refer to the design documentation for these. Add important diagrams to Appendix A and refer to
them in the text. If there is insufficient information about these external systems then mention that this
information will need to be completed for the purposes of the development of this system.
Context ActiveClient /*attacker protocol successful*/
ActiveClient.allInstance ( )->
forAll(ac:ActiveClient |
ac.loginAborted=ResultType::r_false implies
(ac.at.key < > keyType : : Symmkey and
ac.at.im.key=KeyType : : symmkey and
ac.key =keyType ::Symmkey))
In the above the OCL assertion that Attacker has not generated the same key a Activeclient and LoginManager
if the SRP protocol is successful.
Assert ok{all ac:ActiveClient | /*same key could not be generated by attacker*/
Ac.loginAborted = r_false =>
{ac.at.Key != symmKey && ac. at.Im.Key=symmKey
&& ac.key = symmkey}}
Alloy translation of OCL assertion as shown in the above algorithm .If the protocol does not abort, the Attacker
has not generated the same key as that generated by Active client and login manager.
Scope Time required
10 2 seconds
Designing Secure Systems Using AORDD Methodologies In UML System Models
www.iosrjournals.org 4 | Page
14 5seconds
20 27seconds
UML Alloy tool is used to create an Alloy model from the class diagram and associated OCL
specification. The OCL specification defines system behavior, and users must create an XMI format of the class
diagram and OCL specification, using a UML design tool.
V. Results And Discussions
Solutions to design concerns (e.g., security and fault tolerance concerns) may crosscut many modules
of a design model. The cross-cutting nature of these solutions can make understanding, analyzing and changing
the solutions difficult. This complexity can be addressed through the use of aspect-oriented modeling (AOM)
techniques,where the design of a cross-cutting solution is undertaken in an independent fashion,and the resulting
aspect models are composed with primary models of core functionality to create a complete system design.
Composition is necessary to identify conflicts across aspect and primary models, and to identify undesirable
emergent properties in composed models.
Figure 3: MODELS
Example 1. Consider the example in Figure . In the context specific aspect model, the UserMgmt class contains
a operation called getRepositorySize() that retrieves the size of SystemMgmtAuthRepository. a different
operation. To resolve this conflict, the rename directive can rename one or both operations, and the replace
References directive can update any references to the old Name. The following composition directives are
applied:
(1) rename aspect::UserMgmt::getRepositorySize() to aspect::UserMgmt::getAuthRepositorySize()
(2)replaceReferencesaspect::UserMgmt::getRepositorySize()with aspect::UserMgmt::getAuthRepositorySize()
(3)renameprimary::UserMgmt::getRepositorySize() primary::UserMgmt::getUserRepositorySize()
(4) replaceReferencesprimary::UserMgmt::getRepositorySize
After Application and note the changes
Figure 4: Node results
Designing Secure Systems Using AORDD Methodologies In UML System Models
www.iosrjournals.org 5 | Page
The result of applying the directives is shown in Figure 3. Where applicable, the effects of the
composition directives are denoted in the composed model using the corresponding numbers. The names of
getRepositorySize() in aspect and primary are changed to getAuthRepositorySize() and getUserRepositorySize(),
respectively. The references to the operation names are changed throughout each model to reflect the name
change, and to avoid reference conflicts.
VI. Conclusion And Future Work
In this paper, we propose a methodology for developing secure systems that are resilient to given
attacks. We first perform risk assessments to identify the types of attacks that are typical for such applications.
We show how to evaluate the application against such attacks. If the results of this evaluation indicate that the
assets may be compromised, then some security mechanism must be incorporated into the application. The
resulting system is then formally analyzed to ensure that it is indeed resilient to the given attack. We validated
our approach on a real-world e-commerce application. Our approach does not detect new vulnerabilities but it
can be used for assessing whether a given vulnerability poses sufficient risk that necessitates its mitigation. The
main benefit of our approach is that it simplifies the design of complex systems. The primary models and the
aspects can be analyzed in isolation to ensure that individually they satisfy the functional and security properties
respectively. The models can be composed and the analysis of the composed model will give assurance that the
resulting system also satisfies the properties. Another benefit of our approach is that it allows one to experiment
with various security mechanisms to see which one is most suitable for preventing a given attack on the
application. When a system is required to enforce different security properties, multiple aspects must be
integrated with the application. This will allow one to study and formalize the interaction between aspects.
Our on-going and future work concentrates efforts in three areas. We are in the process of developing detailed
algorithms to support the abstraction of complex UML diagrams and their conversion to OCL specifications, so
that the approach can be automated. This ability will aid developers using the approach by reducing the chances
that simplifying abstractions made by the developer leave out crucial items for the analysis. We are also
investigating the broader applicability of the approach to other security mechanisms that are more appropriately
specified by UML diagrams other than sequence diagrams. Finally, we are also investigating application of the
approach to other stages in the development lifecycle of complex software systems, especially to the
requirements phase.
References
[1] ISO 14508, Common Criteria for Information Technology Security Evaluation, in Version 3.1, Revision 2, 2007.
[2] S.H. Houmb, “Decision Support for Choice of Security Solution:The Aspect-Oriented Risk Driven Development (AORDD)
Framework,”Dept. of Math. Sciences, Norwegian Univ. of Science and Technology, 2007.
[3] S.H. Houmb et al., “Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development,” Proc. IEEE
Int’lConf. Eng. Complex Computer Systems, pp. 195-204, 2005.
[4] S.H. Houmb et al., “An Integrated Security Verification and Security Solution Design Trade-Off Analysis Approach,” Integrating
Security and Software Eng.: Advances and Future Vision,H. Mouratidis and P. Giorgini, eds., IGI Global, 2007
[5] R. France et al., “A UML-Based Pattern Specification Technique,”IEEE Trans.Software Eng., vol. 30, no. 3, pp. 193-206, Mar.
2004.
[6] R. France et al., “Aspect-Oriented Approach to Design Modeling,” IEE Proc. Software, vol. 151, no. 4, pp. 173-186, 2004.
[7] G. Georg, J. Bieman, and R. France, “Using Alloy and UML/OCL to Specify Run-Time Configuration Management: A
Case Study,” Proc. Workshop pUML-Group Held Together with the UML, A. Evanset al., eds., pp. 128-141, 2001.
[8] G. Georg et al., “An Aspect-Oriented Methodology for Designing Secure Applications,” Information and Software Technology,
vol. 51, no. 5, pp. 846-864, 2009.
[9] Straw et al., “Model Composition Directives,” The Unified Modelling Language: Modelling Languages and Applications (UML),
T. Baar et al., eds., pp. 84-97, Springer, 2004.
[10] P. Ziemann and M. Gogolla, “An Extension of OCL with Temporal Logic,” Proc. Workshop Critical Systems Development
with UML, J. Ju¨ rjens, ed., pp. 53-62, 2002.
[11] T. Wu, “The Secure Remote Password Protocol,” Proc Internet Soc.Network and Distributed System Security Symp., pp. 97-111,
1998.GEORG ET AL.: verification and trade-off analysis of security properties in uml system models 355
Ushasree R.

More Related Content

What's hot

A Platform for Application Risk Intelligence
A Platform for Application Risk IntelligenceA Platform for Application Risk Intelligence
A Platform for Application Risk IntelligenceCheckmarx
 
DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM
DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORMDMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM
DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORMcsandit
 
Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerceijceronline
 
Study of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their CountermeasuresStudy of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their Countermeasuresidescitation
 
EARLY DETECTION OF SQL INJECTION ATTACKS
EARLY DETECTION OF SQL INJECTION ATTACKSEARLY DETECTION OF SQL INJECTION ATTACKS
EARLY DETECTION OF SQL INJECTION ATTACKSIJNSA Journal
 
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsPassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsKamal Spring
 
Crosscutting Specification Interference Detection at Aspect Oriented UML-Base...
Crosscutting Specification Interference Detection at Aspect Oriented UML-Base...Crosscutting Specification Interference Detection at Aspect Oriented UML-Base...
Crosscutting Specification Interference Detection at Aspect Oriented UML-Base...IJERA Editor
 
Prevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML DatabasePrevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML DatabaseIOSR Journals
 
A Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection AttackA Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection AttackIRJET Journal
 
Software Design Level Vulnerability Classification Model
Software Design Level Vulnerability Classification ModelSoftware Design Level Vulnerability Classification Model
Software Design Level Vulnerability Classification ModelCSCJournals
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System AuthenticationIJERA Editor
 
Securedsms a protocol for sms security
Securedsms a protocol for sms securitySecuredsms a protocol for sms security
Securedsms a protocol for sms securityIAEME Publication
 
Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android ReportVinoth Kanna
 

What's hot (16)

A Platform for Application Risk Intelligence
A Platform for Application Risk IntelligenceA Platform for Application Risk Intelligence
A Platform for Application Risk Intelligence
 
DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM
DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORMDMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM
DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM
 
Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerce
 
Study of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their CountermeasuresStudy of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their Countermeasures
 
EARLY DETECTION OF SQL INJECTION ATTACKS
EARLY DETECTION OF SQL INJECTION ATTACKSEARLY DETECTION OF SQL INJECTION ATTACKS
EARLY DETECTION OF SQL INJECTION ATTACKS
 
Web application security
Web application securityWeb application security
Web application security
 
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical PasswordsPassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
 
Crosscutting Specification Interference Detection at Aspect Oriented UML-Base...
Crosscutting Specification Interference Detection at Aspect Oriented UML-Base...Crosscutting Specification Interference Detection at Aspect Oriented UML-Base...
Crosscutting Specification Interference Detection at Aspect Oriented UML-Base...
 
Prevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML DatabasePrevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML Database
 
Cv32608610
Cv32608610Cv32608610
Cv32608610
 
Ijcet 06 10_005
Ijcet 06 10_005Ijcet 06 10_005
Ijcet 06 10_005
 
A Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection AttackA Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection Attack
 
Software Design Level Vulnerability Classification Model
Software Design Level Vulnerability Classification ModelSoftware Design Level Vulnerability Classification Model
Software Design Level Vulnerability Classification Model
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System Authentication
 
Securedsms a protocol for sms security
Securedsms a protocol for sms securitySecuredsms a protocol for sms security
Securedsms a protocol for sms security
 
Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android Report
 

Viewers also liked

Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...IOSR Journals
 
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...IOSR Journals
 
Design of Uhf Band Microstrip-Fed Antenna for Rfid Applications
Design of Uhf Band Microstrip-Fed Antenna for Rfid ApplicationsDesign of Uhf Band Microstrip-Fed Antenna for Rfid Applications
Design of Uhf Band Microstrip-Fed Antenna for Rfid ApplicationsIOSR Journals
 
Performance Comparison of K-means Codebook Optimization using different Clust...
Performance Comparison of K-means Codebook Optimization using different Clust...Performance Comparison of K-means Codebook Optimization using different Clust...
Performance Comparison of K-means Codebook Optimization using different Clust...IOSR Journals
 
Use of Storage Water in a Hydroelectric System
Use of Storage Water in a Hydroelectric SystemUse of Storage Water in a Hydroelectric System
Use of Storage Water in a Hydroelectric SystemIOSR Journals
 
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...IOSR Journals
 
SM 435: MGoPro Combine
SM 435: MGoPro CombineSM 435: MGoPro Combine
SM 435: MGoPro CombineKeely Galgano
 
A Test presentation for slide share
A Test presentation for slide shareA Test presentation for slide share
A Test presentation for slide shareMichael Espinoza
 
An Adaptive Masker for the Differential Evolution Algorithm
An Adaptive Masker for the Differential Evolution AlgorithmAn Adaptive Masker for the Differential Evolution Algorithm
An Adaptive Masker for the Differential Evolution AlgorithmIOSR Journals
 
International Medical Careers Forum 2016 (complete)
International Medical Careers Forum 2016 (complete)International Medical Careers Forum 2016 (complete)
International Medical Careers Forum 2016 (complete)Odyssey Recruitment
 
Studying the Impact of the Solar Activity on the Maximum Usable Frequency Pa...
Studying the Impact of the Solar Activity on the Maximum  Usable Frequency Pa...Studying the Impact of the Solar Activity on the Maximum  Usable Frequency Pa...
Studying the Impact of the Solar Activity on the Maximum Usable Frequency Pa...IOSR Journals
 
Pensamiento Complejo
Pensamiento Complejo Pensamiento Complejo
Pensamiento Complejo Luis Zurita
 
Performance Analysis of New Light Weight Cryptographic Algorithms
Performance Analysis of New Light Weight Cryptographic  AlgorithmsPerformance Analysis of New Light Weight Cryptographic  Algorithms
Performance Analysis of New Light Weight Cryptographic AlgorithmsIOSR Journals
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
 
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...IOSR Journals
 
Herramientas para estimular la creatividad y la innovación
Herramientas para estimular la creatividad y la innovaciónHerramientas para estimular la creatividad y la innovación
Herramientas para estimular la creatividad y la innovaciónGustavo Martin
 

Viewers also liked (20)

Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
 
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
 
Design of Uhf Band Microstrip-Fed Antenna for Rfid Applications
Design of Uhf Band Microstrip-Fed Antenna for Rfid ApplicationsDesign of Uhf Band Microstrip-Fed Antenna for Rfid Applications
Design of Uhf Band Microstrip-Fed Antenna for Rfid Applications
 
Performance Comparison of K-means Codebook Optimization using different Clust...
Performance Comparison of K-means Codebook Optimization using different Clust...Performance Comparison of K-means Codebook Optimization using different Clust...
Performance Comparison of K-means Codebook Optimization using different Clust...
 
Use of Storage Water in a Hydroelectric System
Use of Storage Water in a Hydroelectric SystemUse of Storage Water in a Hydroelectric System
Use of Storage Water in a Hydroelectric System
 
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
 
Crypt Sequence DNA
Crypt Sequence DNACrypt Sequence DNA
Crypt Sequence DNA
 
SM 435: MGoPro Combine
SM 435: MGoPro CombineSM 435: MGoPro Combine
SM 435: MGoPro Combine
 
A Test presentation for slide share
A Test presentation for slide shareA Test presentation for slide share
A Test presentation for slide share
 
C0151216
C0151216C0151216
C0151216
 
An Adaptive Masker for the Differential Evolution Algorithm
An Adaptive Masker for the Differential Evolution AlgorithmAn Adaptive Masker for the Differential Evolution Algorithm
An Adaptive Masker for the Differential Evolution Algorithm
 
International Medical Careers Forum 2016 (complete)
International Medical Careers Forum 2016 (complete)International Medical Careers Forum 2016 (complete)
International Medical Careers Forum 2016 (complete)
 
Studying the Impact of the Solar Activity on the Maximum Usable Frequency Pa...
Studying the Impact of the Solar Activity on the Maximum  Usable Frequency Pa...Studying the Impact of the Solar Activity on the Maximum  Usable Frequency Pa...
Studying the Impact of the Solar Activity on the Maximum Usable Frequency Pa...
 
Pensamiento Complejo
Pensamiento Complejo Pensamiento Complejo
Pensamiento Complejo
 
Performance Analysis of New Light Weight Cryptographic Algorithms
Performance Analysis of New Light Weight Cryptographic  AlgorithmsPerformance Analysis of New Light Weight Cryptographic  Algorithms
Performance Analysis of New Light Weight Cryptographic Algorithms
 
Chapter 1 biostat
Chapter 1 biostatChapter 1 biostat
Chapter 1 biostat
 
N0567379
N0567379N0567379
N0567379
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...
 
Herramientas para estimular la creatividad y la innovación
Herramientas para estimular la creatividad y la innovaciónHerramientas para estimular la creatividad y la innovación
Herramientas para estimular la creatividad y la innovación
 

Similar to Designing Secure Systems Using AORDD Methodologies in UML System Models

Attack scripts generation for security validation fr
Attack scripts generation for security validation frAttack scripts generation for security validation fr
Attack scripts generation for security validation frra992634
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...ijcnes
 
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...ijccmsjournal
 
Montrieux
MontrieuxMontrieux
Montrieuxanesah
 
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud ComputingCloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computingijtsrd
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecturebdemchak
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...IRJET Journal
 
Security Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesSecurity Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesMatteo Leonetti
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...CSCJournals
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
Session2-Application Threat Modeling
Session2-Application Threat ModelingSession2-Application Threat Modeling
Session2-Application Threat Modelingzakieh alizadeh
 
Flowsinmule 160517130818
Flowsinmule 160517130818Flowsinmule 160517130818
Flowsinmule 160517130818ppts123456
 
Flows in mule
Flows in muleFlows in mule
Flows in muleSindhu VL
 
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning AttacksAlgorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacksiosrjce
 
A new approach for formal behavioral
A new approach for formal behavioralA new approach for formal behavioral
A new approach for formal behavioralijfcstjournal
 

Similar to Designing Secure Systems Using AORDD Methodologies in UML System Models (20)

Methodology for Deriving and Integrating Countermeasures Design Models for El...
Methodology for Deriving and Integrating Countermeasures Design Models for El...Methodology for Deriving and Integrating Countermeasures Design Models for El...
Methodology for Deriving and Integrating Countermeasures Design Models for El...
 
Attack scripts generation for security validation fr
Attack scripts generation for security validation frAttack scripts generation for security validation fr
Attack scripts generation for security validation fr
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...
 
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
 
Montrieux
MontrieuxMontrieux
Montrieux
 
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud ComputingCloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecture
 
F0341026029
F0341026029F0341026029
F0341026029
 
Paper4
Paper4Paper4
Paper4
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
 
Flows in mule
Flows in muleFlows in mule
Flows in mule
 
Security Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesSecurity Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing Services
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Session2-Application Threat Modeling
Session2-Application Threat ModelingSession2-Application Threat Modeling
Session2-Application Threat Modeling
 
Flowsinmule 160517130818
Flowsinmule 160517130818Flowsinmule 160517130818
Flowsinmule 160517130818
 
Flows in mule
Flows in muleFlows in mule
Flows in mule
 
F017353539
F017353539F017353539
F017353539
 
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning AttacksAlgorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
 
A new approach for formal behavioral
A new approach for formal behavioralA new approach for formal behavioral
A new approach for formal behavioral
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Designing Secure Systems Using AORDD Methodologies in UML System Models

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 4 (Sep-Oct. 2012), PP 01-05 www.iosrjournals.org www.iosrjournals.org 1 | Page Designing Secure Systems Using AORDD Methodologies in UML System Models 1 Ushasree R, 2 P. Raja Rajeswari, 3 Dr. D. vasumathi Abstract: We propose a AORDD methodology, based on Aspect-Oriented Modeling (AOM), for incorporating security mechanisms in an application. The functionality of the application is described using the primary model and the attacks are specified using aspects. The security mechanism, modeled as security aspect, is composed with the primary model to obtain the security treated model. We illustrate how this can be done and show how the resulting system can be evaluated to give assurance that it is resilient to the given attack. In this paper we describe an aspect-oriented modeling (AOM) approach that eases the task of exploring alternative ways of addressing concerns during software modeling. Keywords: Alloy, Aspect-oriented modeling, secure systems design, Security analysis I. Introduction In the commercial world, designing secure applications is impacted by various parameters, such as time-to-market, cost and effort involved. We propose a risk driven development approach for designing such applications. For example, a Role Based Access Control (RBAC) model can be used to describe a solution to the banking system’s access control concern. A decision to address a concern in a particular manner can give rise to other concerns. For example, the RBAC solution to the access control problem gives rise to new concerns pertaining to the management of roles and permissions. In risk-driven development (RDD) security risks are identified, evaluated, and treated as an integrated part of the development. II. Background 2.1 ALLOY we show how to formally verify that a security mechanism incorporated into a system is effective in protecting against a given security breach. we show how a system modeled using UML is converted to a form that can be automatically verified using the Alloy Analyzer.The Alloy analyzer translates a model into Boolean expression and analyses it using SAT-SOLVERS meta model element . An Alloy model consists of a number of signature and relation declarations. The Alloy Analyzer translates a model into a Boolean expression and analyzes it using embedded SAT-solvers. The user needs to specify a scope to the tool. 2.2 ASPECT ORIENTED MODELING An aspect oriented modeling approach of the following artifacts 1. A primary model that describes the business logic of the application. 2. A set of generic aspect models, where each model is a generic description of a crosscutting feature. 3. A set of bindings that determine where in the primary model the aspect models are to be composed.4. A set of composition directives that influence how Aspect models are composed with the primary model. 2.3 SECURE SYSTEM DESIGNS We also include the project-specific consequence of incorporating a security mechanism to prevent the attack, in the form of variables related to the development effort in terms of cost and time. First, we perform a formal security analysis to give assurance that the system, created by integrating a security mechanism model, is indeed resilient to the targeted attack. We transform a UML misuse model into Alloy and use the Alloy Analyzer to reason about its security properties. The results of the analysis either give assurance that the security properties exist, Alloy is a fully declarative first-order logic language designed for modeling and analyzing complex systems. 2.4 SECURITY ANALYSIS In security assessment and management several techniques for identifying and assessing security problems in an information system are combined into a process that ensures that there is continuous review and update of its security controls.
  • 2. Designing Secure Systems Using AORDD Methodologies In UML System Models www.iosrjournals.org 2 | Page • Eavesdropping. The attacker may observe the communications channel. • Replay. The attacker records messages she has observed and re-sends them at a later time. • Man-in-the-middle. The attacker intercepts the messages sent between the parties C and S and replaces these with her own messages. III. CASE STUDY EXAMPLE E-COMMERCE SYSTEM Our example is an e-commerce platform called ACTIVE. ACTIVE provides services for electronic purchasing of goods over the Internet. The project identified several security risks, including attacks against user authentication in the login service. Here we defines two models are primary model and context-model primary model that describes a user management system in which TheUserMgmt class defines operations for adding a user to the repository (addUser) and for deleting a user from the repository (deleteUser). the diagrams of primary and context model. Figure 1: Man-In-Middle-Attack misuse model of original (a) ACTIVE login sequence and MIM attack, created by primary login sequence model with context-specific MIM passive attacks models. The communication between ACTIVE CLIENT and (b) LOGIN MANAGER through ATTACKER.The attack is successful is ©ATTACKER obtains home page, or username,password. 3.1. THE MAN-IN-THE-MIDDLE ATTACK In this section, we show how to represent the man-in-the-middle attack as a generic aspect. Messages between a requestor and authenticator are intercepted by an attacker. authenticator. The risk assessments performed as part of the CORAS project identified the login process as being vulnerable to man-in-the-middle attacks. During this kind of attack, user information can be obtained directly, or an attacker can intercept user names and passwords, to be used at later times to impersonate a valid user. The sequence diagram shows all messages between the |Requestor and Authenticator passing through the |Attacker. Secret information can be changed by the|Attacker as shown by the |checkSecretInfo message from the |Requestor to the |Attacker, and the |checkSecretInfoAt message passed on to the Authenticator. This generic aspect must be instantiated to create a context-specific aspect that can then be composed with the primary model to create a misuse model. 3.2. SECURITY MECHANISMS To COUNTER MAN-IN-THE-MIDDLE ATTACKS System designers must identify security properties relevant to mitigating a risk to system assets. We identify properties according to the ISO/IEC TR 13335:2001 Information Technology—Guidelines for Management of IT Security [9]. The UML2Alloy tool to transform a UML model into Alloy. Its input consists of a UML class diagram in XML Metadata Interchange (XML) format , and an accompanying OCL specification of behavior. We therefore begin with the Abstract & Transform activity as the first activity in AORDD analysis. The next activity, Create Alloy Model using UML2Alloy, applies UML2Alloy to the XMI representation. UML2Alloy implements transformation rules to create an Alloy model. This model is input to the next activity Analyze with Alloy Analyzer.There are a number of OCL constraints that cannot be directly expressed in Alloy and are thus not supported by UML2Alloy (for example, the OCL “iterate” construct). Another issue is that OCL lacks inherent support to capture temporal properties. As a result, different methods have been proposed to extend OCL with the ability to express temporal constraints . It is, however, possible to
  • 3. Designing Secure Systems Using AORDD Methodologies In UML System Models www.iosrjournals.org 3 | Page depict simple but crucial constraints related to time if a designer models time explicitly and uses conventional OCL to express constraints. Details on exactly which OCL statements are supported by UML2Alloy. 3.3. MISUSE MODEL OF SECURITY-TREATED PRIMARY MODEL The SRP security-treated misuse model . However, the active attack differs in three ways: 1) Attacker substitutes its own expression and name in the startComm message (aExpr and a name) 2) Attacker generates its own key and token (key and aTok) 3) Attacker substitutes its token for the ActiveClient in the verify message (aTok). Figure-2: Portion of SRP security-treated misuse model including active MiM attack. Misuse model of original ACTIVE login sequence and MiM attack, created by composing primary login sequence model with context specific MiM passive attack models. All communication between ActiveClient and LoginManager goes through Attacker. The attack is successful if Attacker obtains homePage, or uname and pword.If the profile does not exist or the user cannot be authenticated, a visitorPage is returned that does not contain any user-specific information. IV. Implementation Environment A constraint is a requirement which leaves no design option. e.g the developers could use any language they like then say so. Otherwise describe just the constraint.When referring to system interfaces, legacy systems anddatabases refer to the design documentation for these. Add important diagrams to Appendix A and refer to them in the text. If there is insufficient information about these external systems then mention that this information will need to be completed for the purposes of the development of this system. Context ActiveClient /*attacker protocol successful*/ ActiveClient.allInstance ( )-> forAll(ac:ActiveClient | ac.loginAborted=ResultType::r_false implies (ac.at.key < > keyType : : Symmkey and ac.at.im.key=KeyType : : symmkey and ac.key =keyType ::Symmkey)) In the above the OCL assertion that Attacker has not generated the same key a Activeclient and LoginManager if the SRP protocol is successful. Assert ok{all ac:ActiveClient | /*same key could not be generated by attacker*/ Ac.loginAborted = r_false => {ac.at.Key != symmKey && ac. at.Im.Key=symmKey && ac.key = symmkey}} Alloy translation of OCL assertion as shown in the above algorithm .If the protocol does not abort, the Attacker has not generated the same key as that generated by Active client and login manager. Scope Time required 10 2 seconds
  • 4. Designing Secure Systems Using AORDD Methodologies In UML System Models www.iosrjournals.org 4 | Page 14 5seconds 20 27seconds UML Alloy tool is used to create an Alloy model from the class diagram and associated OCL specification. The OCL specification defines system behavior, and users must create an XMI format of the class diagram and OCL specification, using a UML design tool. V. Results And Discussions Solutions to design concerns (e.g., security and fault tolerance concerns) may crosscut many modules of a design model. The cross-cutting nature of these solutions can make understanding, analyzing and changing the solutions difficult. This complexity can be addressed through the use of aspect-oriented modeling (AOM) techniques,where the design of a cross-cutting solution is undertaken in an independent fashion,and the resulting aspect models are composed with primary models of core functionality to create a complete system design. Composition is necessary to identify conflicts across aspect and primary models, and to identify undesirable emergent properties in composed models. Figure 3: MODELS Example 1. Consider the example in Figure . In the context specific aspect model, the UserMgmt class contains a operation called getRepositorySize() that retrieves the size of SystemMgmtAuthRepository. a different operation. To resolve this conflict, the rename directive can rename one or both operations, and the replace References directive can update any references to the old Name. The following composition directives are applied: (1) rename aspect::UserMgmt::getRepositorySize() to aspect::UserMgmt::getAuthRepositorySize() (2)replaceReferencesaspect::UserMgmt::getRepositorySize()with aspect::UserMgmt::getAuthRepositorySize() (3)renameprimary::UserMgmt::getRepositorySize() primary::UserMgmt::getUserRepositorySize() (4) replaceReferencesprimary::UserMgmt::getRepositorySize After Application and note the changes Figure 4: Node results
  • 5. Designing Secure Systems Using AORDD Methodologies In UML System Models www.iosrjournals.org 5 | Page The result of applying the directives is shown in Figure 3. Where applicable, the effects of the composition directives are denoted in the composed model using the corresponding numbers. The names of getRepositorySize() in aspect and primary are changed to getAuthRepositorySize() and getUserRepositorySize(), respectively. The references to the operation names are changed throughout each model to reflect the name change, and to avoid reference conflicts. VI. Conclusion And Future Work In this paper, we propose a methodology for developing secure systems that are resilient to given attacks. We first perform risk assessments to identify the types of attacks that are typical for such applications. We show how to evaluate the application against such attacks. If the results of this evaluation indicate that the assets may be compromised, then some security mechanism must be incorporated into the application. The resulting system is then formally analyzed to ensure that it is indeed resilient to the given attack. We validated our approach on a real-world e-commerce application. Our approach does not detect new vulnerabilities but it can be used for assessing whether a given vulnerability poses sufficient risk that necessitates its mitigation. The main benefit of our approach is that it simplifies the design of complex systems. The primary models and the aspects can be analyzed in isolation to ensure that individually they satisfy the functional and security properties respectively. The models can be composed and the analysis of the composed model will give assurance that the resulting system also satisfies the properties. Another benefit of our approach is that it allows one to experiment with various security mechanisms to see which one is most suitable for preventing a given attack on the application. When a system is required to enforce different security properties, multiple aspects must be integrated with the application. This will allow one to study and formalize the interaction between aspects. Our on-going and future work concentrates efforts in three areas. We are in the process of developing detailed algorithms to support the abstraction of complex UML diagrams and their conversion to OCL specifications, so that the approach can be automated. This ability will aid developers using the approach by reducing the chances that simplifying abstractions made by the developer leave out crucial items for the analysis. We are also investigating the broader applicability of the approach to other security mechanisms that are more appropriately specified by UML diagrams other than sequence diagrams. Finally, we are also investigating application of the approach to other stages in the development lifecycle of complex software systems, especially to the requirements phase. References [1] ISO 14508, Common Criteria for Information Technology Security Evaluation, in Version 3.1, Revision 2, 2007. [2] S.H. Houmb, “Decision Support for Choice of Security Solution:The Aspect-Oriented Risk Driven Development (AORDD) Framework,”Dept. of Math. Sciences, Norwegian Univ. of Science and Technology, 2007. [3] S.H. Houmb et al., “Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development,” Proc. IEEE Int’lConf. Eng. Complex Computer Systems, pp. 195-204, 2005. [4] S.H. Houmb et al., “An Integrated Security Verification and Security Solution Design Trade-Off Analysis Approach,” Integrating Security and Software Eng.: Advances and Future Vision,H. Mouratidis and P. Giorgini, eds., IGI Global, 2007 [5] R. France et al., “A UML-Based Pattern Specification Technique,”IEEE Trans.Software Eng., vol. 30, no. 3, pp. 193-206, Mar. 2004. [6] R. France et al., “Aspect-Oriented Approach to Design Modeling,” IEE Proc. Software, vol. 151, no. 4, pp. 173-186, 2004. [7] G. Georg, J. Bieman, and R. France, “Using Alloy and UML/OCL to Specify Run-Time Configuration Management: A Case Study,” Proc. Workshop pUML-Group Held Together with the UML, A. Evanset al., eds., pp. 128-141, 2001. [8] G. Georg et al., “An Aspect-Oriented Methodology for Designing Secure Applications,” Information and Software Technology, vol. 51, no. 5, pp. 846-864, 2009. [9] Straw et al., “Model Composition Directives,” The Unified Modelling Language: Modelling Languages and Applications (UML), T. Baar et al., eds., pp. 84-97, Springer, 2004. [10] P. Ziemann and M. Gogolla, “An Extension of OCL with Temporal Logic,” Proc. Workshop Critical Systems Development with UML, J. Ju¨ rjens, ed., pp. 53-62, 2002. [11] T. Wu, “The Secure Remote Password Protocol,” Proc Internet Soc.Network and Distributed System Security Symp., pp. 97-111, 1998.GEORG ET AL.: verification and trade-off analysis of security properties in uml system models 355 Ushasree R.