kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Automating security processing of Integration flows: Automating input processing for Attack Simulations using Meta Attack Language and Common Vulnerability and Exposures
KTH, School of Electrical Engineering and Computer Science (EECS).
KTH, School of Electrical Engineering and Computer Science (EECS).
2022 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

In our ever evolving society security becomes more and more important as a lot of our lives move online. Performing security analysis of IT-systems is a cumbersome process requiring extensive domain knowledge and tailored analysis per system. Research shows that manual tasks are error prone. In this thesis we have implemented an automation of performing security analysis of integration flows, building on an earlier project between KTH and SAP. To perform the analysis Common Vulnerability and Exposure-records containing information about vulnerabilities are connected to relevant parts of the system utilizing Meta Attack Language. The vulnerabilities are weighted according to their impact and then attack simulations are performed in the program SecuriCAD. Automating the input for the attack simulations removes an earlier manual task. Utilizing coreLang which is an implementation of MAL that is generally applicable means that the automated process can be used to perform analysis on integration flows in general. Domain knowledge is still needed to configure the automated process. More work can be done in the future to continue automating further tasks in the process. More work can also be done on visualizing security analysis to make the results more available to a general audience

Abstract [sv]

I dagens ständigt expanderande värld som snabbt utvecklas blir säkerhet allt viktigare allteftersom mer av våra liv flyttar in på Internet. Att utföra säkerhetsanalyser av IT-system är en omständlig process som kräver extensiv kunskap om domänen och ofta skräddarsydda lösningar per system. Forskning visar att manuella arbetsuppgifter leder till fler fel än automatiserade processer. I det här examensarbetet har vi implementerat automatisering av säkerhetsanalyser baserade på integrationsflöden. Examensarbetet bygger vidare på ett tidigare projekt mellan KTH och SAP. För att utföra analysen används sårbarheter dokumenterade genom Common Vulnerability and Exposure. Dessa sårbarheter kopplas till relevanta delar av systemet genom användning av Meta Attack Language. Sårbarheterna är viktade i relation till deras påverkan och attacksimuleringar utförs sedan i verktyget SecuriCAD. Automatiseringen av indata i denna process eliminerar en tidigare manuell arbetsuppgift. Användandet av coreLang vilket är en generellt applicerbar implementation av MAL betyder att den automatiserade processen kan appliceras på generalistiska integrationsflöden. Kunskap om domänden behövs fortfarande för att konfigurera den automatiserade processen. I framtiden kan processen utvecklas genom att automatisera andra delar i processen av en säkerhetsanalys. Mer jobb kan även göras för att utveckla visualiseringen av analyserna för att tillgängliggöra resultaten för en bredare publik.

Place, publisher, year, edition, pages
2022. , p. 48
Series
TRITA-EECS-EX ; 2022:243
Keywords [en]
Attack Simulations, Integration Flows, Meta Attack Language, securiCAD.
Keywords [sv]
Attack Simulations, Integration Flows, Meta Attack Language, securiCAD.
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:kth:diva-318938OAI: oai:DiVA.org:kth-318938DiVA, id: diva2:1698435
External cooperation
SAP
Supervisors
Examiners
Available from: 2022-09-26 Created: 2022-09-23 Last updated: 2022-12-20Bibliographically approved

Open Access in DiVA

fulltext(825 kB)265 downloads
File information
File name FULLTEXT01.pdfFile size 825 kBChecksum SHA-512
17311dabd074a992ce1d2db02d04654ee551516873319306bed0a022033fd23faa956f2736f8e8121479e72ceb4bcd10513596158ebfb95a1570afb556284b35
Type fulltextMimetype application/pdf

By organisation
School of Electrical Engineering and Computer Science (EECS)
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 265 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 385 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf