Quantitative Evaluation of Software Security: An Approach Based on UML/SecAM and Evidence Theory

被引:0
|
作者
Sedaghatbaf, Ali [1 ]
Azgomi, Mohammad Abdollahi [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Tehran, Iran
关键词
Software architecture; Security Evaluation; Uncertainty Quantification; Evidence Theory;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient knowledge. This inaccuracy is ignored in most of the existing evaluation methods. The aim of this paper is to explicitly consider parameter uncertainty in the software security evaluation process. In particular, we use the Dempster-Shafer theory of evidence to formulate the uncertainties in input parameters and determine their effects on output measures. In the proposed method, security attacks are expressed using UML diagrams (i.e., misuse case and mal-activity diagrams) and security parameters are specified using the SecAM profile. UML/SecAM models are then transformed into attack trees, which allow quantifying the probability of security breaches. The applicability of the method is validated by a case study on an online marketing system. (c) 2016 ISC. All rights reserved.
引用
收藏
页码:141 / 153
页数:13
相关论文
共 50 条
  • [11] An approach of feature space evaluation based on evidence theory
    Yang Yi
    Han Deqiang
    Han Chongzhao
    2013 32ND CHINESE CONTROL CONFERENCE (CCC), 2013, : 3992 - 3996
  • [12] Formal approach to software testing process based on UML models
    Barisas, Dominykas
    Bareisa, Eduardas
    INFORMATION TECHNOLOGIES' 2008, PROCEEDINGS, 2008, : 195 - 199
  • [13] Approach to the Search for Similar Software Projects Based on the UML Ontology
    Guskov, Gleb
    Namestnikov, Alexey
    Yarushkina, Nadezda
    PROCEEDINGS OF THE SECOND INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'17), VOL 2, 2018, 680 : 3 - 10
  • [14] An UML-based approach for validation of software architecture descriptions
    Kacem, Mohamed Hadj
    Jmaiel, Iohamed
    Kacem, Ahmed Hadj
    Drira, Khalil
    TRENDS IN ENTERPRISE APPLICATION ARCHITECTURE, 2007, 4473 : 158 - +
  • [15] A metamodel approach to software process Modeling based on UML extension
    Wu, Minghui
    Li, Gang
    Ying, Jing
    Yan, Hui
    2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, : 4508 - +
  • [16] Approach to security evaluation based on rough set theory for host computer
    Chen, Xiuzhen
    Zheng, Qinghua
    Guan, Xiaohong
    Lin, Chenguang
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2004, 38 (12): : 1228 - 1231
  • [17] A software evaluation approach based on Vergnaud's conceptual fields theory
    de Souza, MDFC
    Pequeno, MC
    Fiho, JAC
    de Souza, CT
    5TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED LEARNING TECHNOLOGIES, PROCEEDINGS, 2005, : 75 - 77
  • [18] Model-based software component testing: A UML-based approach
    Zheng, Weiqun
    Bundell, Gary
    6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 891 - +
  • [19] Domain Specific Software Cloning Approach Based on Tokenization of UML Artifacts
    Amandeep
    Kaur, Akwinder
    Kaur, Arvinder
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 739 - 745
  • [20] An UML Based Approach to Find out Software Reliability Prediction Metrics
    Gupta, Anshul
    Sehgal, Rajni
    Nagpal, Renuka
    Nandana, G. M.
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 227 - 232