Modeling and Managing Security and Safety Requirements

来源 :中国科学院大学 | 被引量 : 0次 | 上传用户:aswdea
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The research field of information system security has received much attentionin the last few years with extensive number of publications, from differentperspectives ranging from technical to behavioral. However, modeling Informationin such a way that running security risk analysis can be carried out throughout thesystem lifetime has not received so much attention. Also continuously managingsecurity requirements due to uncertain operational environment has not been dealtwith extensively in the literatures. Even if it can be demonstrated that a softwaresystem can meet its security requirements prior to deployment, the ability to verifythe same assumptions at runtime is also inevitable. This is because at runtime,security requirements may be violated as a result of failure to anticipate the behaviorof all the agents (other systems and human users). At the beginning of this research work we adopted use misuse casetechniques as the building block and the explored methodology for securityrequirements engineering. Subsequently all the tasks involved in the research workwere built not in isolation but with respect to this established technique. The Field ofsafety and security has developed differently and largely independently over the pasthalf century and their separate treatment is proving to be inadequate. With the everincreasing exploitation of networking technologies, it is now much more imperativethat both safety and security will be significant for a giving system, giving rise to aneed for both to be considered during system requirement engineering phase of thesystem development. In light of this, we proposed a unified use case model for eliciting both safetyand security requirements during system development. We introduced new conceptslike vulnerable use case and abuse case in order to identify as much potential risks aspossible. We model the interactions between threats, safeguards and assets ondetailed level to allow for a better understanding pertaining to threats analysis andmitigation. We presented both the textual and diagrammatic representation of threatsand system interactions. Risk management provides an effective way to measuring the security throughrisk assessment, risk mitigation and evaluation. We have designed a procedure toanalyze the risk of information systems via misuse cases, and determine the tradeoffbetween risk and cost of countermeasures during system development. Information System (IS) security and safety requirements are seriousrequirements which must be carefully considered not as an isolated aspect, but as anelement considered throughout the software system development lifecycle. In thiswise, reuse is an all important and critical factor to be given attention to in securityrequirements engineering, hence the need for the concepts and relations ofuse-misuse case for the purpose of eliciting safety and security requirement to beformally defined so that they can be shared by the community of system developers.In order to achieve the ultimate goal of this research, that is realizing a kind ofmechanisms that can dynamically monitor information system against threats andapply right countermeasure to right risk , information system components shouldcollaborate and communicate with each other by sharing a common vocabulary,hence the need to build ontology. The proposed model.was developed into ontologyfor modeling safety and security requirements for reuse. The security ontology wasbuilt using use case concepts as the building blocks. OWL protégé3.3.1 editor wasused for the ontology coding. We elaborated the ontology to include risk factors inorder to aid the modeling of a risk based secure information system. Althoughexisting risk management approaches are highly accepted but demand very detailedknowledge (ontology) about the information system security domain and the actualorganization environment. The use case based security ontology provides a solidbase for an applicable and holistic information system security approach, enabling alow cost risk management and threat analysis.  In order to create room for effective threat monitoring at run time we enhancedthe use case techniques with some security policy concepts for deployed informajionsystem security management. Specifically security policies according to PONDERpolicy specification language. Capturing security threats scenario during and afterinformation system (IS) development is a crucial step in building and maintaining aresilient system. In order to cope with these challenge we propose some extensionsand improvements to the popular use case technique so that IS can be developed in away that can facilitate IS security management after the system has been deployed.Our proposed approach incorporate security policy modeling concepts with use casemodeling to aid in identification of threats behaviors with respect to unauthorizedaccess and applies HAZOP inspired guide words to UML use case to facilitatesystematic identification of security violations with respect to authentication. For the purpose of security management at run time, we propose the use ofsoftware agents based architecture tagged Collect-Probe- Analyze-Reason-Reappraise (CPARR) to offer novel solutions to the complexity inherent inmanaging IS security requirements in a cost effective way in order to have tangibleRetum on Security Investment (RoSI). At the centre of this model is the case-basedreasoning system (CBR) that aids the adaptation of security measures in an efficientway. We adopted the Euclidean distance similarity function in determining thenearest neighbor. The modular approach in the design of the agents will facilitatescalability which is very essential in complex and large systems. It also helps toavoid degradation in functionality throughout the system lifetime. Risk can bedynamically generated or predicted, depending on the period of time specified. Inparticular agents are used to collect data in real time. The data will be analyzed withthe assistance of the semantic repository in form of ontology. We explore the theory of long term frequency as probability in determining thelikelihood of threats occurrence and use threshold scale value to convert the result toqualitative value in order to determine the risk level of the considered threats.The proposed CPARR model in this work for IS adaptive security management offerthese type of benefits. First, it provides a mechanism to reveal the risk factors to thesystem administrator who is responsible for securing the system. Second, it providesa practical means to analyze the security risk that IS is prone to at every point in time.This reduces the coarseness that is usually involved in risk analysis. This is achievedby acquiring runtime potential threats frequencies. Thirdly, the model can formallyreason on potential threats and associated risk factor by the inference provided by theontology. Modeling threats this way has a structured approach that is far more costefficient and effective than applying security features in a haphazard manner withoutknowing precisely the type of threats each feature is supposed to address. We liavedeveloped the proposed architecture into a tool and applied the tool to e-bankingsystem. Optimistic results were obtained.
其他文献
随着互联网产业的飞速发展,网络上聚集了海量的数字信息资源,越来越多的研究人员把如何有效处理这些海量数据作为自己的研究课题,同时,企业界也在这一领域做了大量的工作。目
近年来,我国的自然保护区事业有了很大的发展,随着自然保护区信息量的增加,需要对自然保护区数据进行管理和维护。自然保护区在改善环境和保持生态平衡等方面发挥重要作用,是
随着通信业的不断发展,多样的业务纷繁出现,各运营商的用户对于通信所带来的价值要求也不仅仅局限于通话,短信业务早已成为电信收入的重要来源,被用户广泛使用,并且在人们的日常生
近年来,随着虚拟现实技术、计算机网络技术以及计算机图形技术的发展,人们提出了新的军事发展思路——建立虚拟战场来进行军事演练。作为新型的军事演习载体,虚拟战场具有直
近几年,随着Web2.0技术的发展,用户在Web上发布了大量的针对产品及服务的评论。从这些评论中挖掘出有价值的知识将有助于产品生产商提高产品质量,也有助于服务提供者改善服务
随着遥感数据处理技术的发展,该领域的数据处理正越来越多地依赖计算机技术的辅助。在涉及到复杂的流程和海量数据处理时,单个计算机的资源无法满足处理需求,需要使用计算机集群
由于多线程程序线程之间交互的不确定性,并发程序存在难调试、难测试的问题,并发缺陷检测是软件测试领域的难点问题。对多线程程序的测试方法可以分为静态方法和动态方法两种,静
当前,IT服务的基础设施规模日益庞大,服务提供商需要更多的成本来维护和管理系统,以满足大规模用户和企业的复杂化需求。在此背景下,云计算(Cloud Computing)技术应运而生,并在下
当前传统的互联网僵化问题日益严重,覆盖网的提出大大改善了互联网的性能。覆盖网是位于一个或者多个已经存在的网络上的独立的虚拟网络,它根据具体的应用需求在其上发布数据
Tie Strength这一经典的传统社交网络的概念已经成为当前许多在线社交网络分析中衡量好友关系的标准。Tie Strength将好友关系定性的分成Weak Ties和Strong Ties两种,其中,Weak