3 RELATED WORK
Wang and Wulf (1997) describe a general-level
framework for measuring system security based on a
decomposition approach. CVSS (Common
Vulnerability Scoring System) (Schiffman, 2004) is
a global initiative designed to provide an open and
standardized method for rating information
technology vulnerabilities from a practical point of
view. NIST’s Software Assurance Metrics and Tool
Evaluation (SAMATE) project (Black, 2006) seeks
to help answer various questions on software
assurance, tools and metrics. OWASP (2009) (Open
Web Application Security Project) contains an
active discussion and development forum on
security metrics. More security metrics approaches
are surveyed in (Savola, 2007) and (Savola, 2008).
4 CONCLUSIONS
The field of developing security metrics
systematically is young and the current practice of
information security is still a highly diverse field,
and holistic and widely accepted approaches are still
missing.
We have introduced a novel methodology for
security metrics development based on threats,
policies, security requirements and requirement
decomposition. The developed approach enables to
describe and relate different types of security metrics
in a systematic way.
Further work is needed in definition of the
measurement architecture, evidence collection and
selection of measurable components. Methods to
assess the importance, feasibility and complexity of
security metrics are needed. Furthermore, more
detailed metrics to the system under investigation
should be developed and validated in the actual
system. The future work includes more thorough
investigation of suitable generic decomposition
models.
ACKNOWLEDGEMENTS
The work presented in this paper has been carried
out in the GEMOM FP7 research project, partly
funded by the European Commission.
REFERENCES
Abie, H., Dattani, I., Novkovic, M., Bigham, J., Topham,
S. and Savola, R. GEMOM – Significant and
Measurable Progress Beyond the State of the Art. In
ICSNC 2008. Malta, Oct. 26-31, 2008, pp. 191-196.
Bellovin, S. M. On the Brittleness of Software and the
Infeasibility of Security Metrics. In IEEE Security &
Privacy, Jul/Aug. 2006, p. 96.
Black, P. E. SAMATE’s Contribution to Information
Assurance. In IAnewsletter, Vol. 9, No. 2, 2006.
Burris, P. and King, C. A Few Good Security Metrics.
METAGroup, Inc. Oct. 2000.
Howard, M. and LeBlanc, D. Writing Secure Code,
Second Edition, Microsoft Press, 2003.
Jelen, G. SSE-CMM Security Metrics. In NIST and
CSSPAB Workshop, Washington, D.C., 2000.
McHugh, J. Quantitative Measures of Assurance:
Prophecy, Process or Pipedream? In Workshop on
Information Security System Scoring and Ranking,
ACSA and MITRE, Williamsburg, Virginia, May
2001 (2002).
Niemelä, E., Evesti, A. and Savolainen, P. Modeling
Quality Attribute Variability. In 3
rd
Int. Conf. on
Evaluation of Novel Approaches to Software
Engineering. Funchal, Portugal, May 4-7, 2008, pp.
169-176.
OWASP. Open Web Application Security Project.
http://www.owasp.org./, 2009
Payne S. C. A Guide to Security Metrics. SANS Institute
Information Security Reading Room, 2006.
Savola, R. Requirement Centric Security Evaluation of
Software Intensive Systems. In 2
nd
Int. Conf. on
Dependability of Computer Systems DepCOS-
RELCOMEX ’07, Szklarska Poreba, Poland, June 14-
16, 2007, pp. 135-142.
Savola, R. A Novel Security Metrics Taxonomy for R&D
Organisations. In 7
th
Annual Information Security
South Africa (ISSA) Conference, Johannesburg, South
Africa, July 7-9, 2008, pp. 379-390.
Savola, R. and Abie, H. Identification of Basic Measurable
Components for a Distributed Messaging System. In
3
rd
Int. Conf. on Emerging Security Information,
Systems and Technologies (SECURWARE) 2009,
Athens, Greece, June 18-23, 2009.
Schiffman, M., Eschelbeck, G., Ahmad, D., Wright, A.
and Romanosky, S. CVSS: A Common Vulnerability
Scoring System, National Infrastructure Advisory
Council (NIAC), 2004.
Wang, C. and Wulf, W. A. Towards a Framework for
Security Measurement, 20
th
National Information
Systems Security Conference, Baltimore, MD, Oct.
1997, pp. 522-533.
ICSOFT 2009 - 4th International Conference on Software and Data Technologies
174