While the existence of many security elements can be measured (e.g., vulnerabilities, security controls, or privacy controls), it is challenging tomeasure their relative security impact. In the physical world we can often measure the impact of individual elements to a system. However, in cyber security we often lack ground truth (i.e., the ability to directly measure significance). In this workwe propose to solve this by leveraging human expert opinion to provide ground truth. Experts are iteratively asked to compare pairs of security elements to determine their relative significance. On the back end our knowledge encoding tool performs a form of binary insertion sort on a set of security elements using each expert as an oracle for the element comparisons. The tool not only sorts the elements (note that equality may be permitted), but it also records the strength or degree of each relationship. The output is a directed acyclic ‘constraint’ graph that provides a total ordering among the sets of equivalent elements. Multiple constraint graphs are then unified together to form a single graph that is used to generate a scoring or prioritization system. For our empirical study, we apply this domain-agnostic measurement approach to generate scoring/prioritization systems in the areas of vulnerability scoring, privacy control prioritization, and cyber security control evaluation.
[1]
Irena Bojanova,et al.
Measurements of the Most Significant Software Security Weaknesses
,
2020,
ACSAC.
[2]
Воробьев Антон Александрович.
Анализ уязвимостей вычислительных систем на основе алгебраических структур и потоков данных National Vulnerability Database
,
2013
.
[3]
Hao Wang,et al.
Security metrics for software systems
,
2009,
ACM-SE 47.
[4]
Kevin M. Stine,et al.
Performance Measurement Guide for Information Security
,
2008
.
[5]
Sergei Vassilvitskii,et al.
Generalized distances between rankings
,
2010,
WWW '10.
[6]
Ling Gao,et al.
An Improved CVSS-based Vulnerability Scoring Mechanism
,
2011,
2011 Third International Conference on Multimedia Information Networking and Security.
[7]
Doina Caragea,et al.
An Empirical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities
,
2011,
DEXA.
[8]
Yuqing Zhang,et al.
Improving VRSS-based vulnerability prioritization using analytic hierarchy process
,
2012,
J. Syst. Softw..
[9]
Yuqing Zhang,et al.
VRSS: A new system for rating and scoring vulnerabilities
,
2011,
Comput. Commun..
[10]
Kaitlin Boeckl,et al.
NIST Privacy Framework: An Overview
,
2020
.