Paper Title:
A Knowledge Based Threat Analysis in Trustworthy Software Engineering
  Abstract

In recent years, the security of software becomes one significant feature of software. This paper improves trustworthy software engineering through a knowledge based expert system. We propose the knowledge collection and organization method, and threats analyzing algorithm in detail which are the kernel of the expert system. The software threat information is divided into threat state and exploit, and stored in the knowledge database together with the state production and exploit production representing the relationships between threat state and exploit. The threat analysis calculates the threat degree quantitatively of an application based on this knowledge in a formal way and give security advice to mitigate threats. Our method can reduce the work of an experienced security expert which is time consuming and economic costly, therefore popularizes the trustworthy software engineering.

  Info
Periodical
Edited by
Han Zhao
Pages
3177-3180
DOI
10.4028/www.scientific.net/AMM.130-134.3177
Citation
X. H. Li, F. X. Liu, Z. Y. Feng, J. L. Xing, "A Knowledge Based Threat Analysis in Trustworthy Software Engineering", Applied Mechanics and Materials, Vols. 130-134, pp. 3177-3180, 2012
Online since
October 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Jing Jun Zhang, Fei Wei, Hui Li
Abstract:This paper introduces Model Driven Architecture(MDA) and Aspect Oriented Programming(AOP), based on train online ticketing system, it...
1601
Authors: Ling Ling Wei
Abstract:in order to efficient and rapid training student mastery the all aspects application skills of software test, it was adopted project-driven...
1263
Authors: Guo Dong Gao, Wen Xiao Zhang, Gong Zhi Yu, Jiang Hua Sui
Chapter 10: Chemistry Science and Applied Chemistry
Abstract:With the rapid development of computer technology and Internet, all kinds of distant educations based on Internet have been coming out...
2346
Authors: Yin Hua Ma, Xiao Xing Liu, Chang Xia Hu
Chapter 3: Engineering Technology
Abstract:In the process of scientific and technical awarding review each phase involves a lot of sensitive information. In order to embody the...
1682
Authors: Chao Lin Li, Hui Shi
Chapter 10: Information Technology in Management Engineering, Logistics, Economics, Finance, Assessment
Abstract:With the advancement of intelligent management of modern society, all involves mass data controll, implementation and operation for various...
4823