[PDF] A Software Fault Tree Approach to Requirements Analysis of an ...
faculty.ist.psu.edu › SFTA-TD
Our approach begins with an analysis of intrusions to support a theoretical model of intrusion detection that answers questions about which intrusions are ...
This paper describes the use of software fault trees for requirements identification and analysis in an IDS.
The software fault tree approach supports requirements evolution as new intrusions are identied as well as prioritized, incremental development of the ...
In the work described here, we use SFTA to assist in determining and verifying the requirements for an intrusion detection system. The root node of the top- ...
The use of software fault trees for requirements identification and analysis in an Intrusion Detection System (IDS) is described.
Software fault trees support intrusion detection system development and maintenance activities. Prioritisation of Requirements. The addition of historical ...
This paper describes the use of software fault trees for requirements identification and analysis in an IDS and found this approach was found to support ...
People also ask
What is software fault tree analysis?
What are the three components of an intrusion detection system?
What is an intrusion detection system IDS a device or software application that monitors network or system activities for?
What is the primary purpose of testing an intrusion detection system?
Dive into the research topics of 'A software fault tree approach to requirements analysis of an intrusion detection system'. Together they form a unique ...
This paper illustrates how similar techniques can be applied to the design and analysis of security-critical systems.
The software fault tree approach supports requirements evolution as new intrusions are identied as well as prioritized, incremental development of the ...