Improving Security Requirements Adequacy An Interval Type 2 Fuzzy Logic Security Assessment System

نویسندگان

  • Hanan Hibshi
  • Travis D. Breaux
  • Christian Wagner
چکیده

Organizations rely on security experts to improve the security of their systems. These professionals use background knowledge and experience to align known threats and vulnerabilities before selecting mitigation options. The substantial depth of expertise in any one area (e.g., databases, networks, operating systems) precludes the possibility that an expert would have complete knowledge about all threats and vulnerabilities. To begin addressing this problem of fragmented knowledge, we investigate the challenge of developing a security requirements rule base that mimics multi-human expert reasoning to enable new decision-support systems. In this paper, we show how to collect relevant information from cyber security experts to enable the generation of: (1) interval type-2 fuzzy sets that capture intraand inter-expert uncertainty around vulnerability levels; and (2) fuzzy logic rules driving the decision-making process within the requirements analysis. The proposed method relies on comparative ratings of security requirements in the context of concrete vignettes, providing a novel, interdisciplinary approach to knowledge generation for fuzzy logic systems. The paper presents an initial evaluation of the proposed approach through 52 scenarios with 13 experts to compare their assessments to those of the fuzzy logic decision support system. The results show that the system provides reliable assessments to the security analysts, in particular, generating more conservative assessments in 19% of the test scenarios compared to the experts’ ratings. Index Terms —user study; vignettes; scenarios; recommender system; security requirements; fuzzy logic; type-2; uncertainty.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

USING jFUZZY LOGIC FOR ANALYSIS OF POWER SYSTEM BASED ON DYNAMIC SECURITY ASSESSMENT

Power system and its security and analysis have been taken a major concern in day to day life. SECURITY evaluation is an important issue in planning and operation stages of an electric power system. This paper proposes a novel fuzzy logic Controller by using Jfuzzy Logic. A fuzzy logic-based classification method is developed to predict the security index of a given power system operating point...

متن کامل

Interval Type-II Fuzzy H∞ Frequency Control for an Island Microgrid

Frequency control is one of the key parts for the arrangement of the performance of a microgrid (MG) system. Theoretically, model-based controllers may be the ideal control mechanisms; however, they are highly sensitive to model uncertainties and have difficulty with preserving robustness. The presence of serious disturbances, the increasing number of MG, varying voltage supplies of MGs, and bo...

متن کامل

Type-2 fuzzy logic based pitch angle controller for fixed speed wind energy system

In this paper, an interval Type-2 fuzzy logic based pitch angle controller is proposed for fixed speed wind energy system (WES) to maintain the aerodynamic power at its rated value. The pitch angle reference is generated by the proposed controller which can compensate the non-linear characteristics of the pitch angle to the wind speed. The presence of third dimension in the Type-2 fuzzy logic c...

متن کامل

Multiobjective security game with fuzzy payoffs

A multiobjective security game problem with fuzzy payoffs is studied in this paper. The problem is formulated as a bilevel programming problem with fuzzy coefficients. Using the idea of nearest interval approximation of fuzzy numbers, the problem is transformed into a bilevel programming problem with interval coefficients. The Karush-Kuhn-Tucker conditions is applied then to reduce the problem ...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016