Table 4: Risk analysis results.
CI SI MI MRP MPS BOM JOB T
Likelihoods 0.04 0.06 0.04 0.14 0.07 0.08 0.13 0.665
Severity 0.75 0.5 0.25 0.95 0.75 0.75 0.5 0.75
Risk 0.03 0.03 0.01 0.13 0.05 0.06 0.07 0.499
%Risk 7.13 7.39 2.64 34.31 14.51 16.77 17.25
of reaching the terminating point, T with its vulner-
ability and a severity of the overall system. Here we
use, CR, which is a severity category of a majority of
all components. The result in Table 4 shows that the
security risk of overall system is about 50%, which
can be used as a baseline to compare with alterna-
tives. These risks give relative measures for assist-
ing decisionmakings on security options from differ-
ent designs.
5 CONCLUDING REMARKS
This paper attempts to provide a general framework
for security risk analysis of web application software
design. We present a systematic methodology for
automated preliminary risk assessment. Our focus
here is not to estimate precise risk measures but to
provide a quick and early rough estimate of security
risks by means of heuristics based on characteristics
of software design and hardware platforms to help lo-
cate high-riskcomponents for further rigorous testing.
Our risk model is far from complete partly due to in-
herent limitations in the design phase. Although, we
illustrate our approach to web applications, it is gen-
eral to apply to other softwareintensive systems and to
extend the framework and the methodology to include
additional security elements in the model.
The approach has some limitations. Besides ob-
vious requirements on knowledge about system us-
age scenarios and component-based design, the ap-
proach is limited by insufficient data available in the
early phases of software life cycle to provide precise
estimation of the system security. However, the risk
analysis methodology suggested in this paper can be
used to estimate security risks at an early stage, and
in a systematic way. Finally, the approach does not
consider failure (to satisfy security criteria) depen-
dencies between components. Thus, risks of a com-
ponent connected to attacked components are deter-
mined in the same way as those that are not attacked.
We plan to extend this framework to address this is-
sue by providing mechanisms that take user roles, ac-
cess privilegesand vulnerability exploits into account.
Additional future work includes refinement of explicit
severity analysis and incorporationof attack scenarios
in the risk models.
REFERENCES
Barna, P., Frasincar, F., and Houben, G.-J. (2006). A
workflow-driven design of web information systems.
In ICWE ’06: Proceedings of the 6th international
conference on Web engineering, pages 321–328, New
York, NY, USA. ACM Press.
Bugtrag (2006). Retrieved October 11, 2006, from
http://www.securityfocus.com/archive/1.
Cortellessa, V., Appukkutty, K., Guedem, A. R., and Elnag-
gar, R. (2005). Model-based performance risk analy-
sis. IEEE Trans. Softw. Eng., 31(1):3–20.
Ginige, A. and Murugesan, S. (2001). Web engineering: an
introduction. Multimedia, IEEE, 8(1):14–18.
Haimes, Y. Y. (2004). Risk Modeling, Assessment, and
Management. John Wiley & Son, 2nd edition.
ISO (2002). Risk management vocabulary guidelines for
use in standards. ISO Copyright Office, Geneva.
Landoll, D. J., editor (2006). The Security Risk Assessment
Handbook. Auerbach Publications.
Nessus (2006). Nessus vulnerability scanner. Retrieved Oc-
tober 11, 2006, from http://www.nessus.org/.
Pearl, J. (1997). Graphical models for probabilistic and
causal reasoning. In The Computer Science and Engi-
neering Handbook, pages 697–714.
Qiang, L., Khong, T. C., San, W. Y., Jianguo, W., and
Choy, C. (2001). A web-based material requirements
planning integrated application. In EDOC ’01: Pro-
ceedings of the 5th IEEE International Conference on
Enterprise Distributed Object Computing, page 14,
Washington, DC, USA. IEEE Computer Society.
Shahrokhi, M. and Bernard, A. (2004). Risk assess-
ment/prevention in industrial design processes. In
2004 IEEE International Conference on Systems, Man
and Cybernetics, pages 2592–2598.
Stoneburner, G., Goguen, A., and Feringa, A. (2002). Risk
management guide for information technology sys-
tems. Technical Report 800-30, Computer Security
Division, Information Technology Laboratory, NIST.
Verdon, D. and McGraw, G. (2004). Risk analysis in soft-
ware design. IEEE Security and Privacy, 2(4):79–84.
Walt, C. v. d. (2002). Assessing internet security risk,
part four: Custom web applications. Retrieved from
http://www.securitydocs.com/library/729.
Yacoub, S. M., Cukic, B., and Ammar, H. H. (1999).
Scenario-based reliability analysis of component-
based software. In ISSRE ’99: Proceedings of the
10th International Symposium on Software Reliability
Engineering, page 22, Washington, DC, USA. IEEE
Computer Society.
Zhang, Y., Zhu, H., Greenwood, S., and Huo, Q. (2001).
Quality modelling for web-based information sys-
tems. In FTDCS ’01: Proceedings of the 8th IEEE
Workshop on Future Trends of Distributed Computing
Systems, page 41, Washington, DC, USA. IEEE Com-
puter Society.
SECURITY RISK ANALYSIS IN WEB APPLICATION DESIGN
35