%0 Conference Proceedings %T Analyzing Attack Strategies Through Anti-goal Refinement %+ Università degli Studi di Trento = University of Trento (UNITN) %+ City University London %+ Technische Universität Munchen - Technical University Munich - Université Technique de Munich (TUM) %A Li, Tong %A Horkoffi, Jennifer %A Pajai, Elda %A Beckers, Kristian %A Mylopoulos, John %Z Part 3: Securing Enterprises %< avec comité de lecture %( Lecture Notes in Business Information Processing %B 8th Practice of Enterprise Modelling (P0EM) %C Valencia, Spain %Y Jolita Ralyté %Y Sergio España %Y Óscar Pastor %I Springer %3 The Practice of Enterprise Modeling %V LNBIP-235 %P 75-90 %8 2015-11-10 %D 2015 %R 10.1007/978-3-319-25897-3_6 %Z Computer Science [cs]Conference papers %X Analyzing security from an attacker’s perspective has been accepted as an effective approach for dealing with security requirements for complex systems. However, there is no systematic approach for constructing attack scenarios. As a result, the completeness of the derived attack scenarios is subject to the expertise of analysts. In this paper, we propose a systematic process for identifying attack scenarios to support security analysis, founded on anti-goal refinement. In particular, we examine three real attack scenarios in order to understand attack strategies that have been applied in reality. Based on our examination, we propose a comprehensive anti-goal refinement framework, which consists of five anti-goal refinement patterns and an analysis process for using the patterns as part of security design. Finally, we evaluate the proposed anti-goal refinement framework by applying it to a credit card theft scenario. %G English %Z TC 8 %Z WG 8.1 %2 https://inria.hal.science/hal-01442299/document %2 https://inria.hal.science/hal-01442299/file/978-3-319-25897-3_6_Chapter.pdf %L hal-01442299 %U https://inria.hal.science/hal-01442299 %~ IFIP %~ IFIP-TC %~ IFIP-LNBIP %~ IFIP-WG %~ IFIP-TC8 %~ IFIP-WG8-1 %~ IFIP-LNBIP-235