Quantitative Evaluation of Software Security: An Approach Based on UML/SecAM and Evidence Theory

被引:0
|
作者
Sedaghatbaf, Ali [1 ]
Azgomi, Mohammad Abdollahi [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Tehran, Iran
关键词
Software architecture; Security Evaluation; Uncertainty Quantification; Evidence Theory;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient knowledge. This inaccuracy is ignored in most of the existing evaluation methods. The aim of this paper is to explicitly consider parameter uncertainty in the software security evaluation process. In particular, we use the Dempster-Shafer theory of evidence to formulate the uncertainties in input parameters and determine their effects on output measures. In the proposed method, security attacks are expressed using UML diagrams (i.e., misuse case and mal-activity diagrams) and security parameters are specified using the SecAM profile. UML/SecAM models are then transformed into attack trees, which allow quantifying the probability of security breaches. The applicability of the method is validated by a case study on an online marketing system. (c) 2016 ISC. All rights reserved.
引用
收藏
页码:141 / 153
页数:13
相关论文
共 50 条
  • [41] Performance modeling and analysis of software architectures: An aspect-oriented UML based approach
    Cooper, K
    Dai, LR
    Deng, Y
    SCIENCE OF COMPUTER PROGRAMMING, 2005, 57 (01) : 89 - 108
  • [42] Managing software security knowledge in context: An ontology based approach
    Wen S.-F.
    Katt B.
    Information (Switzerland), 2019, 10 (06)
  • [43] Managing Software Security Knowledge in Context: An Ontology Based Approach
    Wen, Shao-Fang
    Katt, Basel
    INFORMATION, 2019, 10 (06):
  • [44] Toward a Context-Based Approach for Software Security Learning
    Wen, Shao-Fang
    Katt, Basel
    JOURNAL OF APPLIED SECURITY RESEARCH, 2019, 14 (03) : 288 - 307
  • [45] An Approach to Obtain Software Security Vulnerabilities Based on Vertical Search
    Li, Xiaohong
    Hu, Chang
    Feng, Zhiyong
    Du, Hongwei
    Ding, Ganggang
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 3203 - 3206
  • [46] Software-based Security Approach for Networked Embedded Devices
    Ferreira J.
    Oliveira A.
    Souto A.
    Cecílio J.
    Ada User Journal, 2023, 44 (02): : 129 - 132
  • [47] A Scenario-Based Framework for the Security Evaluation of Software Architecture
    Alkussayer, Abdulaziz
    Allen, William H.
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 687 - 695
  • [48] A Formal Evaluation Approach to UML State Model Based on Polychromatic Sets
    Guo Shuhang
    Lan Yuqing
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 7968 - 7971
  • [49] Quantitative Assessment of Software Vulnerabilities Based on Economic-Driven Security Metrics
    Ghani, Hamza
    Luna, Jesus
    Suri, Neeraj
    2013 INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS), 2013,
  • [50] Effectiveness Evaluation of Security System Based on Entropy Theory
    Dai, Jingjing
    Hu, Huimin
    Cai, Qing
    ADVANCES IN SCIENCE AND ENGINEERING, PTS 1 AND 2, 2011, 40-41 : 806 - 811