scholarly journals MBSEsec: Model-Based Systems Engineering Method for Creating Secure Systems

2020 ◽  
Vol 10 (7) ◽  
pp. 2574 ◽  
Author(s):  
Donatas Mažeika ◽  
Rimantas Butleris

This paper presents how Model-Based System Engineering (MBSE) could be leveraged in order to mitigate security risks at an early stage of system development. Primarily, MBSE was used to manage complex engineering projects in terms of system requirements, design, analysis, verification, and validation activities, leaving security aspects aside. However, previous research showed that security requirements and risks could be tackled in the MBSE model, and powerful MBSE tools such as simulation, change impact analysis, automated document generation, validation, and verification could be successfully reused in the multidisciplinary field. This article analyzes various security-related techniques and then clarifies how these techniques can be represented in the Systems Modeling Language (SysML) model and then further exploited with MBSE tools. The paper introduces the MBSEsec method, which gives guidelines for the security analysis process, the SysML/UML-based security profile, and recommendations on what security technique is needed at each security process phase. The MBSEsec method was verified by creating an application case study that reflects real-world problems and running an experiment where systems and security engineers evaluated the feasibility of our approach.

Author(s):  
Kassem Saleh ◽  
Ghanem Elshahry

To increase users’ trust in the systems they use, there is a need to develop trustworthy systems. These systems must meet the needs of the system’s stakeholders with respect to security, privacy, reliability, and business integrity (Mundy, deVries, Haynes, & Corwine, 2002). The first major step in achieving trustworthiness is to properly and faithfully capture the stakeholders requirements. A requirement is something that the system must satisfy or a quality that the system must possess. A requirement is normally elicited from the system stakeholders, including its users, developers, and owners. Requirements should be specified before attempting to construct the system. If the correct requirements are not captured properly and faithfully, the correct system cannot be built. Consequently, the system will not be usable by its intended users. The success of any system depends on meeting requirements classified under two complementary types. First, the functional requirements are the system’s operations from the user’s perspective describing the visible and external interactions with the system under consideration. Second, the non-functional requirements (NFRs) are mainly the system’s constraints imposing special conditions and qualities on the system to construct. Consequently, system acceptance testing must be based on both functional and non-functional system’s requirements. Unfortunately, it is reported that about 60% of errors originate from the requirements and analysis activities (Weinberg, 1997). Surveys have shown that large numbers of IT-based systems were implemented starting from their elicited functional requirements without a clear and formal consideration of their non-functional counterparts such as security requirements. Furthermore, system requirements engineers and analysts are not well-trained in capturing security requirements early in the system development process. Security assurances are often based on the traditional and ad hoc approach of conducting penetration tests followed by a patching process. This approach is very costly and endangers the fulfillment of the basic goals of system security, namely confidentiality, integrity, availability, and accountability. Recently, many researchers addressed security requirements engineering as an integral and essential element of systems engineering. Devanbu and Stubblebine (2000) propose a roadmap for software engineering for security, and Henning and Garner (1999) consider life cycle models for survivable and secure systems. Non-functional requirements can be classified under three broad categories (Robertson & Robertson, 1999): system-related, process and project-related and humanrelated requirements. The rest of this article is organized as follows. The next section overviews the security goals and requirements. The third section introduces security requirements modeling using the Goal-Oriented Requirements Language (GRL) (ITU, 2002) and UMLsec, a security extension to the Unified Modeling Language (Jurjens, 2005; Elshahry, 2005), and its modifications. The fourth section provides some examples of using GRL and UMLsec models for requirements specifications. We conclude in the final section and provide items for further investigation.


2011 ◽  
Vol 5 (4) ◽  
pp. 8-30
Author(s):  
O. T. Arogundade ◽  
A. T. Akinwale ◽  
Z. Jin ◽  
X. G. Yang

This paper proposes an enhanced use-misuse case model that allows both safety and security requirements to be captured during requirements elicitation. The proposed model extends the concept of misuse case by incorporating vulnerable use case and abuse case notations and relations that allows understanding and modeling different attackers and abusers behaviors during early stage of system development life cycle and finishes with a practical consistent combined model for engineering safety and security requirements.The model was successfully applied using health care information system gathered through the university of Kansas HISPC project. The authors were able to capture both security and safety requirements necessary for effective functioning of the system. In order to enhance the integration of the proposed model into risk analysis, the authors give both textual and detailed description of the model. The authors compare the proposed approach with other existing methods that identify and analyze safety and security requirements and discovered that it captures more security and safety threats.


Author(s):  
B A Morris ◽  
S C Cook ◽  
S M Cannon

This paper describes a research programme to construct a Model-Based Systems Engineering (MBSE) methodology that supports acquiring organisations in the early stages of Off-the-Shelf (OTS) naval vessel acquisitions. A structured approach to design and requirements definition activities has been incorporated into the methodology to provide an easily implemented, reusable approach that supports defensible acquisition of OTS naval vessels through traceability of decisions. The methodology comprises two main parts. Firstly, a design space is developed from the capability needs using Set-Based Design principles, Model-Based Conceptual Design, and Design Patterns. A key idea is to employ Concept and Requirements Exploration to trim the design space to the region of OTS designs most likely to meet the needs. This region can be used to specify Request for Tender (RFT) requirements. Secondly, the methodology supports trades-off between the OTS design options proposed in the RFT responses using a multi-criteria decision making method. The paper includes an example implementation of the methodology for an indicative Offshore Patrol Vessel capability.


2018 ◽  
Vol Vol 160 (A1) ◽  
Author(s):  
B A Morris ◽  
S C Cook ◽  
S M Cannon

This paper describes a research programme to construct a Model-Based Systems Engineering (MBSE) methodology that supports acquiring organisations in the early stages of Off-the-Shelf (OTS) naval vessel acquisitions. A structured approach to design and requirements definition activities has been incorporated into the methodology to provide an easily implemented, reusable approach that supports defensible acquisition of OTS naval vessels through traceability of decisions. The methodology comprises two main parts. Firstly, a design space is developed from the capability needs using Set-Based Design principles, Model-Based Conceptual Design, and Design Patterns. A key idea is to employ Concept and Requirements Exploration to trim the design space to the region of OTS designs most likely to meet the needs. This region can be used to specify Request for Tender (RFT) requirements. Secondly, the methodology supports trades-off between the OTS design options proposed in the RFT responses using a multi-criteria decision making method. The paper includes an example implementation of the methodology for an indicative Offshore Patrol Vessel capability.


Author(s):  
Armstrong Nhlabatsi ◽  
Arosha Bandara ◽  
Shinpei Hayashi ◽  
Charles Haley ◽  
Jan Jurjens ◽  
...  

Addressing the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security patterns. Security patterns provide encapsulated solutions to specific security problems and can be used to build secure systems by designers with little knowledge of security. Despite this benefit, there is lack of work that focus on evaluating the capabilities of security analysis approaches for their support in incorporating security analysis patterns. This chapter presents evaluation results of a study we conducted to examine the extent to which constructs provided by security requirements engineering approaches can support the use of security patterns as part of the analysis of security problems. To achieve this general objective, the authors used a specific security pattern and examined the challenges of representing this pattern in some security modeling approaches. The authors classify the security modeling approaches into two categories: problem and solution and illustrate their capabilities with a well-known security patterns and some practical security examples. Based on the specific security pattern they have used our evaluation results suggest that current approaches to security engineering are, to a large extent, capable of incorporating security analysis patterns.


Author(s):  
Kazuya Oizumi ◽  
Akio Ito ◽  
Kazuhiro Aoyama

AbstractSystem design at the early stage of design plays an important role in design process. Model based systems engineering is seen as a prominent approach for this challenge. System design can be explored by means of system simulation. However, as the system is a complex system, system model tends to have high level of abstraction. Therefore, the models cannot depict every details of the system, which makes optimization unreasonable.Furthermore, at the early stage of design, there are many uncertainties such as success of technological developments. By properly incorporating uncertain factors in system design, the system can be tolerant. Currently system design is conducted by experienced experts. However, for more complex system, it would be difficult to continue the current practice. Therefore, a method to support design team to make decision in system design is needed.This paper proposes a computational support for the system design. Design constraints, which seems the core information that design team wants at system design, are modeled. By visualizing constraints quantitatively and intuitively, the proposed method can support design team to conduct system design and design study.


Author(s):  
Abdellatif Lasbahani ◽  
Mostafa Chhiba ◽  
Abdelmoumen Tabyaoui

Recently, many research studies have suggested the integration of safety engineering at an early stage of modeling and system development using Model-Driven Architecture (MDA). This concept consists in deploying the UML (Unified Modeling Language) standard as aprincipal metamodel for the abstractions of different systems. To our knowledge, most of this work has focused on integrating security requirements after the implementation phase without taking them into account when designing systems. In this work, we focused our efforts on non-functional aspects such as the business logic layer, data flow monitoring, and high-quality service delivery. Practically, we have proposed a new UML profile for security integration and code generation for the Java platform. Therefore, the security properties will be described by a UML profile and the OCL language to verify the requirements of confidentiality, authorization, availability, data integrity, and data encryption. Finally, the source code such as the application security configuration, the method signatures and their bodies, the persistent entities and the security controllers generated from sequence diagram of system’s internal behavior after its extension with this profile and applying a set of transformations.


Sign in / Sign up

Export Citation Format

Share Document