System security assurance: A systematic literature review

被引:19
作者
Shukla, Ankur [1 ]
Katt, Basel [1 ]
Nweke, Livinus Obiora [1 ]
Yeng, Prosper Kandabongee [1 ]
Weldehawaryat, Goitom Kahsay [2 ]
机构
[1] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, Gjovik, Norway
[2] Norwegian Univ Life Sci NMBU, Dept Bldg & Environm Technol, As, Norway
关键词
Security assurance; Security assurance methods; Security requirements; Security metrics; System and environments; COMMON CRITERIA; FRAMEWORK; REQUIREMENTS; MODEL;
D O I
10.1016/j.cosrev.2022.100496
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
System security assurance provides the confidence that security features, practices, procedures, and architecture of software systems mediate and enforce the security policy and are resilient against security failure and attacks. Alongside the significant benefits of security assurance, the evolution of new information and communication technology (ICT) introduces new challenges regarding in-formation protection. Security assurance methods based on the traditional tools, techniques, and procedures may fail to account new challenges due to poor requirement specifications, static nature, and poor development processes. The common criteria (CC) commonly used for security evaluation and certification process also comes with many limitations and challenges. In this paper, extensive efforts have been made to study the state-of-the-art, limitations and future research directions for security assurance of the ICT and cyber-physical systems (CPS) in a wide range of domains. We conducted a systematic review of requirements, processes, and activities involved in system security assurance including security requirements, security metrics, system and environments and assurance methods. We highlighted the challenges and gaps that have been identified by the existing literature related to system security assurance and corresponding solutions. Finally, we discussed the limitations of the present methods and future research directions. (c) 2022 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
引用
收藏
页数:29
相关论文
共 109 条
[1]  
Agrawal A., 2019, J KING SAUD U COMPUT, DOI DOI 10.1016/J.JKSUCI.2019.04.007
[2]   SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment [J].
Akram, Junaid ;
Luo, Ping .
SOFTWARE-PRACTICE & EXPERIENCE, 2021, 51 (02) :294-318
[3]  
Al-Hamdani W.A., 2009, InfoSecCD '09, P84
[4]  
[Anonymous], 2011, 2011 6 INT C RISKS S
[5]  
Ardagna Claudio A, 2018, Internet of Everything: Algorithms, Methodologies, Technologies and Perspectives, P175
[6]   A model-based approach to trust, security and assurance [J].
Baldwin, A. ;
Beres, Y. ;
Shiu, S. ;
Kearney, P. .
BT TECHNOLOGY JOURNAL, 2006, 24 (04) :53-68
[7]   The Dempster-Shafer theory of evidence: an alternative approach to multicriteria decision modelling [J].
Beynon, M ;
Curry, B ;
Morgan, P .
OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE, 2000, 28 (01) :37-50
[8]  
Bialas Andrzej, 2020, Engineering in Dependability of Computer Systems and Networks. Proceedings of the Fourteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX. Advances in Intelligent Systems and Computing (AISC 987), P46, DOI 10.1007/978-3-030-19501-4_5
[9]   A review of attacks and security approaches in open multi-agent systems [J].
Bijani, Shahriar ;
Robertson, David .
ARTIFICIAL INTELLIGENCE REVIEW, 2014, 42 (04) :607-636
[10]   Vulnerability Prediction From Source Code Using Machine Learning [J].
Bilgin, Zeki ;
Ersoy, Mehmet Akif ;
Soykan, Elif Ustundag ;
Tomur, Emrah ;
Comak, Pinar ;
Karacay, Leyli .
IEEE ACCESS, 2020, 8 :150672-150684