The security risk is one of the main features used in access control models [8]. It is the building block of risk-based access control approaches. Using security risks can increase the security to an appropriate level with ensuring flexibility and scalability of dynamic systems and increase opportunities of information sharing between different applications.
Obviously, the significant phase to implement a risk-based model is the risk estimation module. The security risk can be estimated either by qualitative or quantitative approaches [37]. Quantitative risk estimation approach is concerned with attaching specific numerical values to risks. These values are used directly to determine access decisions. Quantitative risk estimation approaches are ideal as it leads to a numeric value for the risk. However, it is difficult to perform without having a proper dataset describing risk likelihood and its impact on a specific application [38].
Qualitative risk estimation approach is used to calculate the risk early in the system. This is effective in categorising which risks should or should not be planned for and what is the appropriate action that should be taken for them. Qualitative risk analysis techniques cannot give the accurate values of the risk. However, they are very powerful when we have little time to evaluate risks before they actually happen [37]. Table 1 presents advantages and disadvantages of quantitative and qualitative risk estimation approaches.
Table 1 Advantages and disadvantages of quantitative and qualitative risk estimation methods Since we want to obtain a numeric value for the risk to determine the access decision, we will discuss only quantitative risk estimation methods that are suggested in related risk-based models.
Fuzzy logic system
A fuzzy logic system is a computational approach which imitates how people think. It describes the world in imprecise terms such as if the temperature is hot, it responds with precise action. Computers can work only on precise evaluations, while the human brain can provide reasoning with uncertainties and judgments [39]. The fuzzy logic system is considered as a try to combine both techniques. Indeed, the fuzzy logic system is a precise problem-solving approach that has the ability to work with numerical data and linguistic knowledge simultaneously. It simplifies the management of complex systems without the need for its mathematical description [40].
Fuzzy logic system has many advantages. It is flexible, robust, and based on natural language which makes it easier to understand. It also tolerant to imprecise date in which it can work even when there is lack of rules. On the other hand, it faces some challenges. For instance, it needs domain experts to create accurate rules. Also, it requires more tests and simulations which take a long time especially with increasing number of rules.
The computation process using the fuzzy logic system consists of three main phases:
-
1.
Fuzzification – The majority of variables are crisp or classical variables. Fuzzification process is used to convert crisp variables of input and output into fuzzy variables to process it and produce the desired output.
-
2.
Fuzzy Inference Process – Describing relationships between different inputs and output to drive the fuzzy output is done through building IF-THEN fuzzy rules. The fuzzy IF-THEN rule uses linguistic variables to describe the relationship between a certain condition and an output. The IF part is mainly used to represent the condition, and the THEN part is used to provide the output in a linguistic form. The IF-THEN rule is commonly used by the fuzzy logic system to represent how the input data matches the condition of a rule [39].
-
3.
Defuzzification – Since the output should be a crisp variable, this phase converts the fuzzy output back to the crisp output [40].
Expert judgment
When there is insufficient practical data to describe probability and impact of a certain incident, an expert judgment can be used to provide a subjective evaluation based on his/her experience through careful interviews.
Expert judgment is commonly utilized to measure uncertain parameters in a probabilistic form and to evaluates different elements of a certain model. Expert judgement can be defined as “the expression of inferential opinions based on knowledge and experience” [41].
Expert judgment is a powerful tool in risk analysis. It provides various solutions and decisions in several domains, such as psychology, criminal justice, financial forecasting, political science, and decision analysis. The use of expert judgement has raised many questions regarding the accuracy of the results; however, there are many circumstances where expert judgement is the only source of good information [41]. Measuring the probability of an incident in a risk analysis with the uncertainty that surrounds it is a difficult task especially for rare and extreme events. This is obviously true when trying to estimate security risks of access control operations [42].
Risk assessment
Risk assessment is used to study potential damages about a certain scenario. Risk assessment can be defined as the process of investigating possible losses using a combination of known information about the situation, and judgment about the information that is not known [43]. The risk assessment is used to identify the risk context and acceptable risk values in each situation. This can be achieved by comparing it to similar risks of similar scenarios. In addition, it aims to provide substitute solutions to reduce the risk and calculate the effectiveness of those solutions [44].
Determining the appropriate type of risk analysis depends on the available data that characterize the risk probability and its impact. An effective risk assessment has many benefits. For example, a well-established risk assessment can support a balanced basis to prevent the risk or at least reduce its impact. However, it is a subjective process that influenced by the experience and it only valid at a certain point in time [44].
Game theory
Game theory is considered as a division of applied mathematics that has been utilized in several areas like evolutionary biology, economics, artificial intelligence, political science, and information security. Game theory is used to describe multi-person decision scenarios in the form of games where each player select appropriate actions that lead to the best possible payoff while expecting reasonable actions from opponent players [45].
Game theory is the main tool for modelling and building automated decision-making operations in interactive environments. This is because it can provide consistent and mathematical platforms. The power of the game theory lies in the methodology it supports for analysing different problems of strategic choice. The process of modelling a condition as a game needs the decision-maker to interact with the players, their strategic decisions, and observe their preferences and responses [46].
A game theory comprises of four components; the players, their strategies, payoffs and the information they have. The players are the essential part of the game, they are the decision makers within the game. While the strategy is the plan that the player uses regarding the movement of opposite player. So, it is critical for the players to select the suitable tactics. The payoff is the rewards of the players in the game. For each player, the payoff is affected by both their own actions and those of the other player [24]. In the game theory, the risk analysis is done by using user benefits rather than the probability. Moreover, game theory is recommended to be used in conditions where no practical data is available [46]. However, game theory is complex especially with more than two players. It also leads to random outcomes when using mixed strategies.
Decision tree
Decision tree is a common methodology for many operations in machine learning. It is used as a decision support instrument to provide decisions depending on a group of rules described as a tree [47]. Building a decision tree model requires dividing the data into training and validation sets. Training data are utilized to extract appropriate rules for the tree. While validating the tree and making required modifications are done using validation data.
Decision tree is represented as a flow diagram where each node, represented by a rectangle, describes the risk probability and its impact. These rectangles are connected by arrows such that each arrow leads to another box representing the percentage probability [47].
Decision tree approaches are easy to comprehend and significant for data classification. They can operate efficiently with inadequate data if experts provide all required rules. They can show all possible alternatives and traces in a single view which provide easier comparison with various alternatives. Whilst the decision tree model provides many advantages, it also has some limitations. For instance, its scalability is questionable such that when the scale of the tree increases, the obtained model will be hard to recognize and needs supplementary data to validate rules. Also, a decision tree model is based on expectations, so it may be impossible to plan for all contingencies that can arise as a result of a decision [48].
A comparison between different risk estimation approaches in terms of usability, time complexity, scalability, flexibility, subjectivity, and computing power requirements is shown in Table 2. It is clear that there is no straightforward approach that can be used without limitations. Also, a risk estimation approach without subjectivity will never exist in a risk estimation process. Scalability seems to be a problem in most approaches. Therefore, choosing the optimal risk estimation approach should depend heavily on the context.
Table 2 Benefits and limitations of risk estimation approaches