THREAT MODELING APPROACHES FOR INTRUSION DETECTION SYSTEMS

Authors

  • Zakhro Barotova Tashkent University of Information Technologies named after Muhammad al-Khwarizmi

Keywords:

threat modeling, IDS, cybersecurity, DREAD, STRIDE

Abstract

The thesis discusses the importance of direct correction in attack control systems (Intrusion Detection Systems), the main methodologies, as well as the advantages and disadvantages of personal analysis. In the modern cybersecurity environment, the specific design algorithms of IDS systems are directly related to their correct modeling and the processes of their development. The work reviews STRIDE, DREAD, MITRE ATT-CK, Attack Trees and other widely used correction modeling, and compares the degree of adaptation to the IDS architecture, the strengths and weaknesses of each methodology, the impact on the real-time attack control process, and scientific control are highlighted. The results show that the integration of correction modeling methods can help to optimize the accuracy and strategies of DS systems.

Downloads

Published

2026-02-14