Quantitative Evaluation of Software Security: An Approach Based on UML/SecAM and Evidence Theory

被引:0
|
作者
Sedaghatbaf, Ali [1 ]
Azgomi, Mohammad Abdollahi [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Tehran, Iran
关键词
Software architecture; Security Evaluation; Uncertainty Quantification; Evidence Theory;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient knowledge. This inaccuracy is ignored in most of the existing evaluation methods. The aim of this paper is to explicitly consider parameter uncertainty in the software security evaluation process. In particular, we use the Dempster-Shafer theory of evidence to formulate the uncertainties in input parameters and determine their effects on output measures. In the proposed method, security attacks are expressed using UML diagrams (i.e., misuse case and mal-activity diagrams) and security parameters are specified using the SecAM profile. UML/SecAM models are then transformed into attack trees, which allow quantifying the probability of security breaches. The applicability of the method is validated by a case study on an online marketing system. (c) 2016 ISC. All rights reserved.
引用
收藏
页码:141 / 153
页数:13
相关论文
共 50 条
  • [1] Towards quantitative evaluation of UML based software architecture
    Li, Jinhua
    Guo, Zhenbo
    Zhao, Yun
    Zhang, Zhenhua
    Pang, Ruijuan
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 663 - +
  • [2] Software Project Management Evaluation Based On Evidence Theory
    Weng, Yuan
    Chen, Junfei
    Zhao, Shihao
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 632 - 635
  • [3] A Quantitative, Evidence-based Approach for Recommending Software Modules
    Burity, Thais
    Elias, Gledson
    30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, 2015, : 1449 - 1456
  • [4] An Evidence-Based Software Engineering Evaluation Approach
    Salehghaffari, Shahabedin
    Reddivari, Sandeep
    PROCEEDINGS OF THE 49TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE (ACMSE '11), 2011, : 300 - 301
  • [5] The Evaluation Model of the Security Classified Protection Based on the Evidence Theory
    Qin, Zhi
    Zhang, Shibin
    PROCEEDINGS OF 2010 ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2010, : 430 - 434
  • [6] A SOFTWARE TESTING APPROACH BASED ON BEHAVIORAL UML MODELS
    Barisas, Dominykas
    Bareisa, Eduardas
    INFORMATION TECHNOLOGY AND CONTROL, 2009, 38 (02): : 119 - 124
  • [7] A novel quantitative evaluation approach based on neutrality theory
    Chen, Dai
    Kang, Ligui
    Cheng, Hang
    Chen, Jianjun
    Shao, Qiang
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND MEDICINE (EMIM 2015), 2015, 8 : 126 - 129
  • [8] Software performance evaluation based on the UML performance profile
    Gu, GP
    Petriu, DC
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XIII, PROCEEDINGS: SYSTEMICS, CYBERNETICS AND INFORMATICS: TECHNOLOGIES AND APPLICATIONS, 2003, : 249 - 254
  • [9] Security Software Formal Modeling and Verification Method Based on UML and Z
    Cao, Kunyu
    Li, Xiaohong
    Xing, Jinliang
    CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 390 - 401
  • [10] Security software formal modeling and verification method based on UML and Z
    Cao, K. (kunyucao@tju.edu.cn), 1600, Springer Verlag (332):