Date of Award

Spring 2019

Document Type

Thesis

Department

Mathematics, Engineering & Computer Science

First Advisor

Ted Wendt

Second Advisor

Jodi Fasteen

Third Advisor

Clemente Izurieta

Abstract

With Advanced Persistent Threats (APTs) becoming a larger threat among the cyber world, it is important that software is designed with security in mind. In order to aide this process, software developers can use security design patterns when creating systems. This helps to ensure that all aspects of a system’s design are concerned with security, because any one point of weakness can still lead to the compromise of the entire system. We propose a method of determining if a system contains a specific security pattern, and we suggest several security patterns which might be helpful in deterring a specific APT. We utilize an algorithm based on graph homomorphism theory that gives a metric for how close a Unified Modeling Language (UML) model is to being a realization of a security pattern, from which it may be verified that a system is indeed a realization of the Role Based Modeling Language (RBML) model of the pattern. We find that our distance metric gives the desired result for several example applications.

Share

COinS