An Analytical Security Model for Existing Software Systems

被引:0
|
作者
Isazadeh, Ayaz [1 ]
Elgedawy, Islam [2 ]
Karimpour, Jaber [1 ]
Izadkhah, Habib [1 ]
机构
[1] Univ Tabriz, Fac Math Sci, Dept Comp Sci, Tabriz, Iran
[2] Middle E Tech Univ, Dept Comp Engn, TR-10 Mersin, Turkey
来源
关键词
Security; Software Architecture; Mozilla Firefox Browser; Markov chains;
D O I
10.12785/amis/080228
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Nowadays, evaluation of software security, as one of the important quality attributes, is of paramount importance. There are many software systems have not considered security in their design; this makes them vulnerable to security risks. Architecture is the most important consideration in software design that affects final quality of software. Quality attributes such as efficiency and reliability have been studied at software architecture level; however, no report has ever been provided about the effect of software architecture on security. The purpose of this paper is to propose a mathematical-based method for evaluating and quantifying software security using the coupling aspects of the software architecture. To achieve this goal, first, we show the relationship between coupling types and vulnerability using an empirical-based software engineering technique that adopts Mozilla Firefox Browser vulnerability data. Then, we propose a mathematical weighted relationship between coupling types and vulnerability, where regression statistical analysis and Mozilla Firefox vulnerability data are used to predicate the relationship coefficients. Finally, we extract software architecture using DAGC tool and then convert the extracted architecture into Discrete Time Markov chains, which are used to predict and compute the system over all vulnerability.
引用
收藏
页码:691 / 702
页数:12
相关论文
共 50 条
  • [1] Model Driven Software Security Architecture of Systems-of-Systems
    El Hachem, Jamal
    Pang, Zi Yang
    Chiprianov, Vanea
    Babar, Ali
    Aniorte, Philippe
    [J]. 2016 23RD ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2016), 2016, : 89 - 96
  • [2] Systems and Software Assurance - A Model Cyber Security Course
    Jovanovic, V.
    Harris, J. K.
    [J]. 2016 39TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2016, : 923 - 927
  • [3] A security based model for mobile agent software systems
    Xu, HP
    Zhang, ZG
    Shatz, SM
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2005, 15 (04) : 719 - 746
  • [4] Security Requirements Verification for Existing Systems with Model Checking Technique and UML
    Matsuura, Saeko
    Ogata, Shinpei
    Aoki, Yoshitaka
    [J]. MODELSWARD: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT, 2017, : 529 - 535
  • [5] A Security Metrics Taxonomization Model for Software-Intensive Systems
    Savola, Reijo M.
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2009, 5 (04): : 197 - 206
  • [6] Verifying the Application of Security Measures in IoT Software Systems with Model Learning
    Salva, Sebastien
    Blot, Elliot
    [J]. ICSOFT: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES, 2020, : 350 - 360
  • [7] Issues of Intruder Analytical Model Applicability for Evaluating an Efficiency of Security Systems
    Bukovetskiy, Anton V.
    Boyko, Vladimir I.
    Kolpakov, Gennady N.
    Poner, Michael V.
    [J]. VIII INTERNATIONAL SCIENTIFIC CONFERENCE - ISSUES OF PHYSICS AND TECHNOLOGY IN SCIENCE, INDUSTRY AND MEDICINE, 2016, 135
  • [8] Natural Science Visualization Using Digital Theater Software Adapting existing planetarium software to model ecological systems
    Luhr, Rachael
    Reimanis, Derek
    Cross, Renee
    Izurieta, Clemente
    Poole, Geoffrey C.
    Helton, Ashley
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA 2013), 2013,
  • [9] Analytical network process for software security: a design perspective
    Rajeev Kumar
    Suhel Ahmad Khan
    Raees Ahmad Khan
    [J]. CSI Transactions on ICT, 2016, 4 (2-4) : 255 - 258
  • [10] Optimizing Information Systems Security Design Based on Existing Security Knowledge
    Schilling, Andreas
    Werners, Brigitte
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, CAISE 2015, 2015, 215 : 447 - 458