THREAT MODELING APPROACHES FOR INTRUSION DETECTION SYSTEMS
Keywords:
threat modeling, IDS, cybersecurity, DREAD, STRIDEAbstract
The thesis discusses the importance of direct correction in attack control systems (Intrusion Detection Systems), the main methodologies, as well as the advantages and disadvantages of personal analysis. In the modern cybersecurity environment, the specific design algorithms of IDS systems are directly related to their correct modeling and the processes of their development. The work reviews STRIDE, DREAD, MITRE ATT-CK, Attack Trees and other widely used correction modeling, and compares the degree of adaptation to the IDS architecture, the strengths and weaknesses of each methodology, the impact on the real-time attack control process, and scientific control are highlighted. The results show that the integration of correction modeling methods can help to optimize the accuracy and strategies of DS systems.Downloads
Published
2026-02-14
Issue
Section
Articles
