Proceedings of the 2011 ACM Symposium on Research in Applied Computation
Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model
Security and Communication Networks
ICMPV6 Vulnerability: The Importance of Threat Model and SF-ICMP6
International Journal of Mobile Computing and Multimedia Communications
Hi-index | 0.00 |
Security modeling centers on identifying system behavior, including any security defenses; the system adversary's power; and the properties that constitute system security. Once a security model is clearly defined, security analysis evaluates whether the adversary, interacting with the system, can defeat the desired security properties. Although the authors illustrate security analysis using model checking, analysts can use various methods and tools to evaluate system security, including manual and automated theorem-proving tools that provide assurance about the absence of attacks in a specified threat model. This article describes a uniform approach for evaluating system security and illustrates the approach by summarizing three case studies. Security modeling and analysis also provides a basis for comparative evaluation and some forms of security metrics.