Improving security requirements adequacy: an interval type 2 fuzzy logic security assessment system

Hibshi, Hanan and Breaux, Travis D. and Wagner, Christian (2016) Improving security requirements adequacy: an interval type 2 fuzzy logic security assessment system. In: IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2016), 6-9 December 2016, Athens, Greece.

[img]
Preview
PDF - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
Download (669kB) | Preview

Abstract

Organizations rely on security experts to improve the security of their systems. These professionals use background knowledge and experience to align known threats and vulnerabilities before selecting mitigation options. The substantial depth of expertise in any one area (e.g., databases, networks, operating systems) precludes the possibility that an expert would have complete knowledge about all threats and vulnerabilities. To begin addressing this problem of fragmented knowledge, we investigate the challenge of developing a security requirements rule base that mimics multi-human expert reasoning to enable new decision-support systems. In this paper, we show how to collect relevant information from cyber security experts to enable the generation of: (1) interval type-2 fuzzy sets that capture intra- and inter-expert uncertainty around vulnerability levels; and (2) fuzzy logic rules driving the decision-making process within the requirements analysis. The proposed method relies on comparative ratings of security requirements in the context of concrete vignettes, providing a novel, interdisciplinary approach to knowledge generation for fuzzy logic systems. The paper presents an initial evaluation of the proposed approach through 52 scenarios with 13 experts to compare their assessments to those of the fuzzy logic decision support system. The results show that the system provides reliable assessments to the security analysts, in particular, generating more conservative assessments in 19% of the test scenarios compared to the experts’ ratings.

Item Type: Conference or Workshop Item (Paper)
Additional Information: © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Proceedings 2016 IEEE Symposium Series on Computational Intelligence SSCI 2016, 6-9 December 2016, Athens, Greece
Keywords: user study; vignettes; scenarios; recommender system; security requirements; fuzzy logic; type-2; uncertainty
Schools/Departments: University of Nottingham, UK > Faculty of Science > School of Computer Science
Related URLs:
URLURL Type
http://ssci2016.cs.surrey.ac.uk/UNSPECIFIED
http://ieeexplore.ieee.org/Xplore/guesthome.jspUNSPECIFIED
Depositing User: Eprints, Support
Date Deposited: 10 Nov 2016 15:32
Last Modified: 10 Dec 2016 18:13
URI: http://eprints.nottingham.ac.uk/id/eprint/38651

Actions (Archive Staff Only)

Edit View Edit View