Quantitative Evaluation of Software Security: An Approach Based on UML/SecAM and Evidence Theory

被引:0
|
作者
Sedaghatbaf, Ali [1 ]
Azgomi, Mohammad Abdollahi [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Tehran, Iran
关键词
Software architecture; Security Evaluation; Uncertainty Quantification; Evidence Theory;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient knowledge. This inaccuracy is ignored in most of the existing evaluation methods. The aim of this paper is to explicitly consider parameter uncertainty in the software security evaluation process. In particular, we use the Dempster-Shafer theory of evidence to formulate the uncertainties in input parameters and determine their effects on output measures. In the proposed method, security attacks are expressed using UML diagrams (i.e., misuse case and mal-activity diagrams) and security parameters are specified using the SecAM profile. UML/SecAM models are then transformed into attack trees, which allow quantifying the probability of security breaches. The applicability of the method is validated by a case study on an online marketing system. (c) 2016 ISC. All rights reserved.
引用
收藏
页码:141 / 153
页数:13
相关论文
共 50 条
  • [21] A UML-based approach for problem frame oriented software development
    Choppy, C
    Reggio, G
    INFORMATION AND SOFTWARE TECHNOLOGY, 2005, 47 (14) : 929 - 954
  • [22] Quantitative Evaluation of Software Component Behavior Discovery Approach
    Liu, Cong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2021, E104D (01) : 117 - 120
  • [23] Evaluation of a UML-Based Versus an IEC 61131-3-Based Software Engineering Approach for Teaching PLC Programming
    Vogel-Heuser, Birgit
    Obermeier, Martin
    Braun, Steven
    Sommer, Kerstin
    Jobst, Fabian
    Schweizer, Karin
    IEEE TRANSACTIONS ON EDUCATION, 2013, 56 (03) : 329 - 335
  • [24] Vector: A Quantitative Security Requirements Evaluation Approach based on Assets, Vulnerabilities and Trustworthiness of Environment
    Long, Teng
    Liu, Lin
    Yu, Yijun
    Jin, Zhi
    PROCEEDINGS OF THE 2009 17TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, 2009, : 377 - +
  • [25] Network Security Situation Evaluation Based on Modified D-S Evidence Theory
    WANG Chundong
    ZHANG YuKey
    Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 409 - 416
  • [26] A Graph-Based Approach for Analysis of Software Security
    Lunkeit, Armin
    RISK ASSESSMENT AND RISK-DRIVEN TESTING, RISK 2013, 2014, 8418 : 68 - 79
  • [27] Modeling and analysis of performance aspects for software architecture: A UML-based approach
    Dai, Lirong
    Cooper, Kendra
    Wong, W. Eric
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2006, 16 (03) : 347 - 378
  • [28] An information theory-based approach for quantitative evaluation of user interface complexity
    Kang, HG
    Seong, PH
    IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 1998, 45 (06) : 3165 - 3174
  • [29] A Threatened-based Software Security Evaluation Method
    Razian, Mohammad Reza
    Sangchi, Hasan Mokhtari
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 120 - 125
  • [30] Modeling business within a UML-based rigorous software development approach
    Astesiano, Egidio
    Reggio, Gianna
    Ricca, Filippo
    CONCURRENCY, GRAPHS AND MODELS: ESSAYS DEDICATED TO UGO MONTANARI ON THE OCCASION OF HIS 65TH BIRTHDAY, 2008, 5065 : 261 - +