Comparing two techniques for intrusion visualization Vikash Katta 1,3, Peter Karpati 1, Andreas L. Opdahl 2, Christian Raspotnig 2,3 & Guttorm Sindre 1.

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 17 – Risk Management
Advertisements

Ulrich Frank, Stefan Strecker Information Systems and Enterprise Modelling research group ICB Institute for Computer Science and Business Information Systems.
Module 1 Evaluation Overview © Crown Copyright (2000)
Security Design Patterns – Overview –Software Development Lifecycle –Enterprise Software Design Process and Artifacts –Pattern Format –Aspect Oriented.
2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
An Integrated Approach to Enterprise Architecture LIACS, Martijn Wiering 23 juni ‘04.
Project Change Management
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Security Management Practices Keith A. Watson, CISSP CERIAS.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
Shell Based Intrusion Detection System Amit Mathur Section 2.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Risk Assessment Frameworks
Company LOGO Business Process Monitoring and Alignment An Approach Based on the User Requirements Notation and Business Intelligence Tools Pengfei Chen.
Application Threat Modeling Workshop
Experiences from establishing a national Centre for Information Security in Norway TERENA Networking Conference 2003 Maria Bartnes Dahl &
1 Security Risk Analysis of Computer Networks: Techniques and Challenges Anoop Singhal Computer Security Division National Institute of Standards and Technology.
SEC835 Database and Web application security Information Security Architecture.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
ICT 1 Towards an Integrated Approach to Access Control to Health Information Presented by: Inger Anne Tøndel SINTEF Co-authors: Per Håkon Meland SINTEF.
TESTING.
1 An Analytical Evaluation of BPMN Using a Semiotic Quality Framework Terje Wahl & Guttorm Sindre NTNU, Norway Terje Wahl, 14. June 2005.
RISK MANAGEMENT PRESENTATION ASQ- GREATER HOUSTON SECTION 1405 Lila Carden, Ph.D., MBA, PMP University of Houston Instructional Associate Professor
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
1 Oppliger: Ch. 15 Risk Management. 2 Outline Introduction Formal risk analysis Alternative risk analysis approaches/technologies –Security scanning –Intrusion.
Assurance Case Approach TECNALIA Inspiring Business Novara November, 2013 TRIAL WS.
CSCE 548 Secure Software Development Test 1 Review.
Integrating Security Design Into The Software Development Process For E-Commerce Systems By: M.T. Chan, L.F. Kwok (City University of Hong Kong)
Applying a Goal-Oriented Method for Hazard Analysis: A Case Study Sam Supakkul The University of Texas at Dallas Lawrence Chung The.
1 Sundar Gopalakrishnan, Guttorm Sindre, and John Krogstie: Adapting UML activity diagrams for mobile work process modelling: Experimental comparison of.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Dependability in FP 6 Brian Randell Pisa Workshop, November 2002.
Requirements Analysis Visual Modeling] Lab 02 Visual Modeling (from Visual Modeling with Rational Rose and UML) A way of thinking about problems using.
Quality Evaluation methodologies for e-Learning systems (in the frame of the EC Project UNITE) Tatiana Rikure Researcher, Riga Technical University (RTU),
Presenter’s Name June 17, Directions for this Template  Use the Slide Master to make universal changes to the presentation, including inserting.
Adviser: Frank, Yeong-Sung Lin Presenter: Yi-Cin Lin.
Information Security What is Information Security?
Organizational Risk and the Costs and Benefits of Biometrics Presentation to the European Union Biometrics Group May 14, 2004 Virginia Franke Kleist, Ph.D.
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 What is Solution Assessment & Validation?
Author: Tadeusz Sawik Decision Support Systems Volume 55, Issue 1, April 2013, Pages 156–164 Adviser: Frank, Yeong-Sung Lin Presenter: Yi-Cin Lin.
Software Engineering 2004 Jyrki Nummenmaa 1 BACKGROUND There is no way to generally test programs exhaustively (that is, going through all execution.
Opportunities in Horizon 2020 Ben Williams EU Team, Funding Development, RIS.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Risk and Safety in the Transport Sector (RISIT) - a research programme covering road-, sea-, air- and the railway sector Finn H. Amundsen, Head of programme.
Section Copyright © 2014, 2012, 2010 Pearson Education, Inc. Lecture Slides Elementary Statistics Twelfth Edition and the Triola Statistics Series.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
RC ICT Conference 17 May 2004 Research Councils ICT Conference The UK e-Science Programme David Wallace, Chair, e-Science Steering Committee.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Template for CORAS Risk Analysis. The eight steps of a CORAS risk analysis.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
ISSeG Integrated Site Security for Grids WP2 - Methodology
Chris Lintern Co-operative Financial Services
An assessment framework for Intrusion Prevention System (IPS)
A rationale for security (mis)use cases
Security Engineering.
Evaluating a Real-time Anomaly-based IDS
Gregory Morton COSC380 February 16, 2011
Chapter 19: Building Systems with Assurance
A rationale for security (mis)use cases
Albeado - Enabling Smart Energy
Chapter 1 Key Security Terms.
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

Comparing two techniques for intrusion visualization Vikash Katta 1,3, Peter Karpati 1, Andreas L. Opdahl 2, Christian Raspotnig 2,3 & Guttorm Sindre 1 1) Norwegian University of Science and Technology, Trondheim 2) University of Bergen, Norway 3) Institute for Energy Technology, Halden, Norway

The ReqSec Project Method and tool support for security requirements engineering: involve non-experts lightweight integrated, add-on industrially evaluated Funded by the Norwegian Research Council (NFR), Many techniques proposed, e.g., anti-behaviours...

Perspective System security models: black-box models of monolothic systems single systems security analysis and specification Security architecture models: high-level organisational views enterprise architecture for security Need for intermediate solutions: security modelling for SOA white-box models of service collaborations bordering organisation and technology

Misuse Case Maps (MUCM) Inspired by Use Case Maps (R.J.A. Buhr, D. Aymot...)

Misuse Case Maps (MUCM) Use case maps: components, scenario paths, responsibilities Misuse case maps: vulnerabilities, exploit paths, vulnerable responsibility Preliminary evaluations: good for architectural overviews need better visualisation of attack step sequences

Misuse Sequence Diagrams (MUSD)

Sequence diagrams: actor, object/component, action, event/message Misuse sequence diagrams: attacker, vulnerability, exploit action and event/message Initial evaluation: can MUSD complement MUCM? how do the two techniques compare wrt. understanding performance perception

Comparison Controlled experiment with 42 subjects Latin squares organisation, random assignment Treatment (independent variables): technique: MUCM, MUSD task: bank intrusion (BAN), penetration test (PEN) Measures (dependent variables): understanding (UND) performance (VULN, MITIG, VUMI) perception (PER) Control (control variables): background (KNOW, STUDY, JOB)

Hypotheses H1 1 : MUCM better on architectural questions H2 1 : MUSD better for temporal sequence questions H3 1 : Either technique better on the neutral questions H4 1 : Either technique better overall H5 1 : Different numbers of vulnerabilities identified H6 1 : Different numbers of mitigations identified H7 1 : Different total numbers of vulnerabilities and mitigations identified H8 1 : Usefulness perceived differently H9 1 : Ease of use perceived differently H10 1 : Intentions to use perceived differently H11 1 : MUCM and MUSD perceived differently

Procedure 4 groups of nd year computer science students 10 steps: Filling in the pre-experiment questionnaire (2 min) Reading a short introduction to the experiment (1 min) First technique on first task:  introduction to the technique (9 min)  read about task, looking at diagrams (12 min)  20 true/false questions about the case (8 min)  finding vulnerabilities and mitigations (11 min)  post-experiment questionnaire (4 min) Easy physical exercise (2 min) Repeat for second technique and task (44 min)

Results Backgrounds: No sig. differences between groups:  Kruskal-Wallis H test – 2-4 semesters of ICT studies – 2.07 months of job experience (three outliers) Sig. knowledge differences across groups: – Wilcoxon signed-rank tests – KNOW_MOD > KNOW_SEC, p =.000 – KNOW_SD > KNOW_UCM, p =.003 – KNOW_MUSD ≈ KNOW_MUCM

Understanding Wilcoxon signed-rank tests H1 & H2 accepted, H3 & H4 rejected Medium effect size (Cohen) No impact of technique or task order

Performance Two blank outliers removed (from 11-student groups) H5, H6 & H7 rejected No impact of technique order More identifications for bank task

Perception H8, H9, H10 & H11 accepted Medium to large effect sizes (Cohen) Only one insig. statement (“would be useless”) More positive perception of first technique used

Conclusion The techniques are complementary They facilitate understanding better for their “intended use”: – MUCM best for architectural issues – MUSD best for temporal sequences They are equal in performance – the bank task was more productive MUSDs were perceived more positively – the first technique was perceived more positively Further work: simpler MUCMs, qualitative analysis, more techniques, industrial subjects, notation and method integration, industrial case studies and action research...

Central concepts RFC 2828: vulnerability: a weakness in a system... that can be exploited to violate its security policy threat: a potential for violation of security... that could cause harm countermeasure: something that reduces a threat or attack by eliminating... preventing... minimizing the harm... or by reporting it to enable corrective action