Skip to main content
Erschienen in:
Buchtitelbild

2019 | OriginalPaper | Buchkapitel

Decision Support for Security-Control Identification Using Machine Learning

verfasst von : Seifeddine Bettaieb, Seung Yeob Shin, Mehrdad Sabetzadeh, Lionel Briand, Grégory Nou, Michael Garceau

Erschienen in: Requirements Engineering: Foundation for Software Quality

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

[Context & Motivation] In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is in part guided by the controls envisaged by the applicable security standards and best practices. [Problem] An important difficulty that analysts have to contend with during security requirements elaboration is sifting through a large number of security controls and determining which ones have a bearing on the security requirements for a given system. This challenge is often exacerbated by the scarce security expertise available in most organizations. [Principal ideas/results] In this paper, we develop automated decision support for the identification of security controls that are relevant to a specific system in a particular context. Our approach, which is based on machine learning, leverages historical data from security assessments performed over past systems in order to recommend security controls for a new system. We operationalize and empirically evaluate our approach using real historical data from the banking domain. Our results show that, when one excludes security controls that are rare in the historical data, our approach has an average recall of \(\approx \)95% and average precision of \(\approx \)67%. [Contribution] The high recall – indicating only a few relevant security controls are missed – combined with the reasonable level of precision – indicating that the effort required to confirm recommendations is not excessive – suggests that our approach is a useful aid to analysts for more efficiently identifying the relevant security controls, and also for decreasing the likelihood that important controls would be overlooked.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Batista, G.E., et al.: A study of the behavior of several methods for balancingmachine learning training data. ACM SIGKDD Explor. Newslett. 6, 20–29 (2004) Batista, G.E., et al.: A study of the behavior of several methods for balancingmachine learning training data. ACM SIGKDD Explor. Newslett. 6, 20–29 (2004)
2.
Zurück zum Zitat Breiman, L., et al.: Classification and Regression Trees. Wadsworth International Group, Belmont (1984)MATH Breiman, L., et al.: Classification and Regression Trees. Wadsworth International Group, Belmont (1984)MATH
3.
Zurück zum Zitat Casamayor, A., et al.: Identification of non-functional requirements in textual specifications: a semi-supervised learning approach. IST 52(4), 436–445 (2010) Casamayor, A., et al.: Identification of non-functional requirements in textual specifications: a semi-supervised learning approach. IST 52(4), 436–445 (2010)
4.
Zurück zum Zitat Chawla, N.V., et al.: SMOTE: synthetic minority over-sampling technique. JAIR 16, 321–357 (2002)MATH Chawla, N.V., et al.: SMOTE: synthetic minority over-sampling technique. JAIR 16, 321–357 (2002)MATH
5.
Zurück zum Zitat Cohen, W.W.: Fast effective rule induction. In: ICML 1995 (1995) Cohen, W.W.: Fast effective rule induction. In: ICML 1995 (1995)
6.
Zurück zum Zitat Dalpiaz, F., Paja, E., Giorgini, P.: Security Requirements Engineering: Designing Secure Socio-Technical Systems. MIT Press, Cambridge (2016) Dalpiaz, F., Paja, E., Giorgini, P.: Security Requirements Engineering: Designing Secure Socio-Technical Systems. MIT Press, Cambridge (2016)
7.
Zurück zum Zitat Dowd, M., et al.: The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Pearson Education, London (2006) Dowd, M., et al.: The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Pearson Education, London (2006)
8.
Zurück zum Zitat Elkan, C.: The foundations of cost-sensitive learning. In: IJCAI 2001 (2001) Elkan, C.: The foundations of cost-sensitive learning. In: IJCAI 2001 (2001)
9.
Zurück zum Zitat Frank, E., Witten, I.H.: Generating accurate rule sets without global optimization. In: ICML 1998 (1998) Frank, E., Witten, I.H.: Generating accurate rule sets without global optimization. In: ICML 1998 (1998)
10.
Zurück zum Zitat Furnell, S.: End-user security culture: a lesson that will never be learnt? Comput. Fraud Secur. 2008, 6–9 (2008) Furnell, S.: End-user security culture: a lesson that will never be learnt? Comput. Fraud Secur. 2008, 6–9 (2008)
11.
Zurück zum Zitat Hall, M., et al.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newslett. 11, 10–18 (2009) Hall, M., et al.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newslett. 11, 10–18 (2009)
12.
Zurück zum Zitat Ionita, D., Wieringa, R.: Web-based collaborative security requirements elicitation. In: REFSQ Workshops (2016) Ionita, D., Wieringa, R.: Web-based collaborative security requirements elicitation. In: REFSQ Workshops (2016)
13.
Zurück zum Zitat ISO/IEC 27002:2005 Code of Practice for Information Security Controls. ISO Standard (2005) ISO/IEC 27002:2005 Code of Practice for Information Security Controls. ISO Standard (2005)
14.
Zurück zum Zitat ISO/IEC 27000:2018 Information Security Management Systems. ISO Standard (2018) ISO/IEC 27000:2018 Information Security Management Systems. ISO Standard (2018)
15.
Zurück zum Zitat John, G.H., Langley, P.: Estimating continuous distributions in Bayesian classifiers. In: UAI 1995 (1995) John, G.H., Langley, P.: Estimating continuous distributions in Bayesian classifiers. In: UAI 1995 (1995)
16.
Zurück zum Zitat Jufri, M.T., et al.: Risk-assessment based academic information system security policy using octave allegro and ISO 27002. In: ICIC 2017 (2017) Jufri, M.T., et al.: Risk-assessment based academic information system security policy using octave allegro and ISO 27002. In: ICIC 2017 (2017)
17.
Zurück zum Zitat Kurtanović, Z., Maalej, W.: Mining user rationale from software reviews. In: RE 2017 (2017) Kurtanović, Z., Maalej, W.: Mining user rationale from software reviews. In: RE 2017 (2017)
18.
Zurück zum Zitat le Cessie, S., van Houwelingen, J.C.: Ridge estimators in logistic regression. Appl. Stat. 41(1), 191–201 (1992)MATH le Cessie, S., van Houwelingen, J.C.: Ridge estimators in logistic regression. Appl. Stat. 41(1), 191–201 (1992)MATH
19.
Zurück zum Zitat Li, T.: Identifying security requirements based on linguistic analysis and machine learning. In: APSEC 2017 (2017) Li, T.: Identifying security requirements based on linguistic analysis and machine learning. In: APSEC 2017 (2017)
20.
Zurück zum Zitat Meier, J.D., et al.: Improving web application security: threats and countermeasures. Technical report, Microsoft (2012) Meier, J.D., et al.: Improving web application security: threats and countermeasures. Technical report, Microsoft (2012)
21.
Zurück zum Zitat Mitchell, T.M.: Machine learning and data mining. Commun. ACM 42(11), 30 (1999) Mitchell, T.M.: Machine learning and data mining. Commun. ACM 42(11), 30 (1999)
22.
Zurück zum Zitat Myagmar, S., et al.: Threat modeling as a basis for security requirements. In: SREIS 2005 (2005) Myagmar, S., et al.: Threat modeling as a basis for security requirements. In: SREIS 2005 (2005)
23.
Zurück zum Zitat Nasrabadi, N.M.: Pattern recognition and machine learning. J. Electron. Imaging 16(4), 049901 (2007)MathSciNet Nasrabadi, N.M.: Pattern recognition and machine learning. J. Electron. Imaging 16(4), 049901 (2007)MathSciNet
24.
Zurück zum Zitat NIST Special Publication 800–30: Guide for Conducting Risk Assessments. NIST Standard (2012) NIST Special Publication 800–30: Guide for Conducting Risk Assessments. NIST Standard (2012)
26.
Zurück zum Zitat Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81–106 (1986) Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81–106 (1986)
27.
Zurück zum Zitat Quinlan, R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, Burlington (1993) Quinlan, R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, Burlington (1993)
28.
Zurück zum Zitat Rodeghero, P., et al.: Detecting user story information in developer-client conversations to generate extractive summaries. In: ICSE 2017 (2017) Rodeghero, P., et al.: Detecting user story information in developer-client conversations to generate extractive summaries. In: ICSE 2017 (2017)
29.
Zurück zum Zitat Schmitt, C., Liggesmeyer, P.: A model for structuring and reusing security requirements sources and security requirements. In: REFSQ Workshops (2015) Schmitt, C., Liggesmeyer, P.: A model for structuring and reusing security requirements sources and security requirements. In: REFSQ Workshops (2015)
30.
Zurück zum Zitat Sihwi, S.W., et al.: An expert system for risk assessment of information system security based on ISO 27002. In: ICKEA 2016 (2016) Sihwi, S.W., et al.: An expert system for risk assessment of information system security based on ISO 27002. In: ICKEA 2016 (2016)
31.
Zurück zum Zitat Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. REJ 10, 34–44 (2005) Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. REJ 10, 34–44 (2005)
32.
Zurück zum Zitat Türpe, S.: The trouble with security requirements. In: RE 2017 (2017) Türpe, S.: The trouble with security requirements. In: RE 2017 (2017)
Metadaten
Titel
Decision Support for Security-Control Identification Using Machine Learning
verfasst von
Seifeddine Bettaieb
Seung Yeob Shin
Mehrdad Sabetzadeh
Lionel Briand
Grégory Nou
Michael Garceau
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-15538-4_1