Skip to main content

User-Centric Security Assessment of Software Configurations: A Case Study

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8364))

Abstract

Software systems are invariably vulnerable to exploits, thus the need to assess their security in order to quantify the associated risk their usage entails. However, existing vulnerability assessment approaches e.g., vulnerability analyzers, have two major constraints: (a) they need the system to be already deployed to perform the analysis and, (b) they do not consider the criticality of the system within the business processes of the organization. As a result, many users, in particular small and medium-sized enterprizes are often unaware about assessing the actual technical and economical impact of vulnerability exploits in their own organizations, before the actual system’s deployment. Drawing upon threat modeling techniques (i.e., attack trees), we propose a user-centric methodology to quantitatively perform a software configuration’s security assessment based on (i) the expected economic impact associated with compromising the system’s security goals and, (ii) a method to rank available configurations with respect to security. This paper demonstrates the feasibility and usefulness of our approach in a real-world case study based on the Amazon EC2 service. Over 2000 publicly available Amazon Machine Images are analyzed and ranked with respect to a specific business profile, before deployment in the Amazon’s Cloud.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. NVD, National Vulnerability Database (2013), http://nvd.nist.gov/

  2. OSVDB, The Open Source Vulnerability Database (2012), http://osvdb.org/

  3. OpenVAS, Open Vulnerability Assessment System (2013), http://www.openvas.org/

  4. Tenable Network Security, Nessus vulnerability scanner (2013), http://www.tenable.com/products/nessus

  5. Fruehwirth, C., et al.: Improving CVSS-based vulnerability prioritization and response with context. In: Proc. of Third International Symposium on Empirical Software Engineering and Measurement (2009)

    Google Scholar 

  6. Ishiguro, M., et al.: The effect of information security incidents on corporate values in the japanese stock market. In: Proc. of International Workshop on the Economics of Securing the Information Infrastructure, WESII (2006)

    Google Scholar 

  7. Telang, R., et al.: An empirical analysis of the impact of software vulnerability announcements on firm stock price. Proc. of IEEE Transactions on Software Engineering (2007)

    Google Scholar 

  8. Lai, Y., et al.: Using the vulnerability information of computer systems to improve the network security. Computer Communications (2007)

    Google Scholar 

  9. Saaty, T.: Book: The Analytic Hierarchy Process. McGraw-Hill, New York (1980)

    Google Scholar 

  10. Triantaphyllou, E.: The impact of aggregating benefit and cost criteria in four mcda methods. IEEE Transactions on Engineering Management (2004)

    Google Scholar 

  11. Balduzzi, M., et al.: A security analysis of Amazon’s Elastic Compute Cloud service. In: Proc. of the Annual ACM Symposium on Applied Computing (2012)

    Google Scholar 

  12. Schneier, B.: Attack trees. Dr Dobb’s 24(12) (1999), http://www.schneier.com/paper-attacktrees-ddj-ft.html

  13. Swiderski, F., Snyder, W.: Book: Threat Modeling. Microsoft Press (2004)

    Google Scholar 

  14. Department of Homeland Security, Attack Patterns (2009), https://buildsecurityin.us-cert.gov/

  15. SHIELDS, EU FP 7 – SHIELDS project: Detecting known security vulnerabilities from within design and development tools (2010), http://www.shields-project.eu/

  16. RPM ORG, The RPM package manager (2007), http://rpm.org/

  17. Ghani, H., et al.: Predictive vulnerability scoring in the context of insufficient information availability. In: Proc. of the Intl. Conference on Risk and Security of Internet and Systems, CRiSIS (2013)

    Google Scholar 

  18. Forum of Incident Response and Security Teams, CVSS – Common Vulnerability Scoring System (2012), http://www.first.org/cvss/

  19. Luna, J., et al.: Privacy-by-design based on quantitative threat modeling. In: Proc. of the Intl. Conference on Risk and Security of Internet and Systems (2012)

    Google Scholar 

  20. Luna, J., et al.: Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees. In: Proc. of the ACM Cloud Computing Security Workshop (2012)

    Google Scholar 

  21. Symantec, Ponemon Institute, Data Breach Calculator (2013), https://databreachcalculator.com

  22. Innerhofer, F., et al.: An empirically derived loss taxonomy based on publicly known security incidents. In: Proc. of Intl. Conf. on Availability, Reliability and Security, ARES (2009)

    Google Scholar 

  23. Van Eeten, M., et al.: Damages from internet security incidents. OPTA Research reports (2009), http://www.opta.nl/nl/actueel/alle-publicaties/publicatie/?id=3083

  24. Ghani, H., et al.: Quantitative assessment of software vulnerabilities based on economic-driven security metrics. In: Proc. of the Intl. Conference on Risk and Security of Internet and Systems, CRiSIS (2013)

    Google Scholar 

  25. Forum of Incident Response and Security Teams, CVSS Adopters (2013), http://www.first.org/cvss/eadopters.html.

  26. Scarfone, K., Mell, P.: An analysis of CVSS version 2 vulnerability scoring. In: Intl. Symposium on Empirical Software Engineering and Measurement, ESEM (2009)

    Google Scholar 

  27. Saaty, T.: Book: Fundamentals of decision making and priority theory with the analytic hierarchy process. RWS Publications, Pittsburgh (1994)

    Google Scholar 

  28. Zeleny, M.: Book: Multiple Criteria Decision Making. McGraw-Hill (1982)

    Google Scholar 

  29. NIST, CPE – Official Common Platform Enumeration Dictionary (2013), http://nvd.nist.gov/cpe.cfm

  30. SANS-Institute, SANS critical vulnerability analysis archive (2007), http://www.sans.org/newsletters/cva/

  31. Johnson, E., et al.: Symantec global internet security threat report (2008), http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xiii_04-2008.en-us.pdf

  32. Microsoft, Microsoft security response center - security bulletin severity rating system (2007), http://www.microsoft.com/technet/security/bulletin/rating.mspx ,

  33. Mell, P., et al.: Common vulnerability scoring system. IEEE Security and Privacy 4, 85–89 (2006)

    Article  Google Scholar 

  34. Rieke, R.: Modelling and analysing network security policies in a given vulnerability setting. Critical Information Infrastructures Security (2006)

    Google Scholar 

  35. Eschelbeck, G.: The laws of vulnerabilities: Which security vulnerabilities really matter. Information Security Technical Report (2005)

    Google Scholar 

  36. Chen, Y.: Stakeholder value driven threat modeling for off the shelf based systems (2007)

    Google Scholar 

  37. Liu, N., et al.: Security assessment for communication networks of power control systems using attack graph and mcdm. IEEE Transactions on Power Delivery (2010)

    Google Scholar 

  38. Ni, M., et al.: Online risk-based security assessment. IEEE Transactions on Power Systems (2003)

    Google Scholar 

  39. Rezmierski, V., et al.: Incident cost analysis and modeling project (i-camp). Technical Report, Higher Education Information Security Council, HEISC (2000)

    Google Scholar 

  40. Allied World Assurance, Tech404 Data Loss Cost Calculator (2013), http://www.tech-404.com/calculator.html

  41. Anderson, R., et al.: Measuring the cost of cybercrime. In: Proc. of Workshop on the Economics of Information Security, WEIS (2012)

    Google Scholar 

  42. Detica and C. Office, The cost of cyber crime: joint government and industry report. In: Detica Report (2012), https://www.gov.uk/government/publications/the-cost-of-cyber-crime-joint-government-and-industry-report

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Ghani, H., Luna Garcia, J., Petkov, I., Suri, N. (2014). User-Centric Security Assessment of Software Configurations: A Case Study. In: Jürjens, J., Piessens, F., Bielova, N. (eds) Engineering Secure Software and Systems. ESSoS 2014. Lecture Notes in Computer Science, vol 8364. Springer, Cham. https://doi.org/10.1007/978-3-319-04897-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04897-0_13

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04896-3

  • Online ISBN: 978-3-319-04897-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics