Using machine learning to assist with the selection of security controls during security assessment

被引:9
作者
Bettaieb, Seifeddine [1 ]
Shin, Seung Yeob [1 ]
Sabetzadeh, Mehrdad [1 ,2 ]
Briand, Lionel C. [1 ,2 ]
Garceau, Michael [3 ]
Meyers, Antoine [3 ]
机构
[1] Univ Luxembourg, SnT Ctr, Luxembourg, Luxembourg
[2] Univ Ottawa, Ottawa, ON, Canada
[3] BGL BNP Paribas, Luxembourg, Luxembourg
关键词
Security requirements engineering; Security assessment; Automated decision support; Machine learning; REQUIREMENTS;
D O I
10.1007/s10664-020-09814-x
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Context In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is in part guided by the controls envisaged by the applicable security standards and best practices. An important difficulty that analysts have to contend with during security requirements elaboration is sifting through a large number of security controls and determining which ones have a bearing on the security requirements for a given system. This challenge is often exacerbated by the scarce security expertise available in most organizations. Objective In this article, we develop automated decision support for the identification of security controls that are relevant to a specific system in a particular context. Method and Results Our approach, which is based on machine learning, leverages historical data from security assessments performed over past systems in order to recommend security controls for a new system. We operationalize and empirically evaluate our approach using real historical data from the banking domain. Our results show that, when one excludes security controls that are rare in the historical data, our approach has an average recall of approximate to 94% and average precision of approximate to 63%. We further examine through a survey the perceptions of security analysts about the usefulness of the classification models derived from historical data. Conclusions The high recall - indicating only a few relevant security controls are missed - combined with the reasonable level of precision - indicating that the effort required to confirm recommendations is not excessive - suggests that our approach is a useful aid to analysts for more efficiently identifying the relevant security controls, and also for decreasing the likelihood that important controls would be overlooked. Further, our survey results suggest that the generated classification models help provide a documented and explicit rationale for choosing the applicable security controls.
引用
收藏
页码:2550 / 2582
页数:33
相关论文
共 55 条
[1]   Decision support for selecting information security controls [J].
Almeida, Luis ;
Respicio, Ana .
JOURNAL OF DECISION SYSTEMS, 2018, 27 :173-180
[2]  
Batista G. E. A. P. A., 2004, ACM SIGKDD Explor Newsl, V6, P20, DOI [10.1145/1007730.1007735, DOI 10.1145/1007730.1007735]
[3]   Decision Support for Security-Control Identification Using Machine Learning [J].
Bettaieb, Seifeddine ;
Shin, Seung Yeob ;
Sabetzadeh, Mehrdad ;
Briand, Lionel ;
Nou, Gregory ;
Garceau, Michael .
REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY (REFSQ 2019), 2019, 11412 :3-20
[4]  
Bishop C. M., 2006, Pattern Recognition and Machine Learning
[5]   Learning multi-label scene classification [J].
Boutell, MR ;
Luo, JB ;
Shen, XP ;
Brown, CM .
PATTERN RECOGNITION, 2004, 37 (09) :1757-1771
[6]  
Breiman L., 1984, Classification and Regression Trees, DOI DOI 10.1201/9781315139470
[7]  
Caralli R., 2007, CMUSEI2007TR012
[8]   Identification of non-functional requirements in textual specifications: A semi-supervised learning approach [J].
Casamayor, Agustin ;
Godoy, Daniela ;
Campo, Marcelo .
INFORMATION AND SOFTWARE TECHNOLOGY, 2010, 52 (04) :436-445
[9]  
*CASES, 2018, METH OPT AN RISKS CA
[10]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)