6 EXPECTED OUTCOME
The work on the quantitative vulnerability
assessment is a part in the development of an
adaptive quantitative security management model.
The thesis in which this work is incorporated is
entitles “Adaptive Security Models for Information
and Communication Systems”. The expected
outcome of this thesis is to shed light on the
quantitative and adaptive security models, identify
the main reasons why they are not widely used in IT
as opposed to other fields (industrial and financial
for example). Once these reasons identified, a model
that can be used in an enterprise environment will be
developed. This model should avoid complexity and
should allow security analysts to accurately measure
their security indicators for risk management and to
be able to have a security environment that is
adaptive to all sorts of changes in its scope.
A mathematical model based on quantitative
metric that translate the changes in an IT
environment will first be developed and then
integrated in a risk management process.
Adaptability will then be the core feature of
operational security.
ACKNOWLEDGEMENT
This research project has been carried out within a
MOBIDOC thesis financed by the European Union
through the PASRI program.
REFERENCES
Abie, H. and Balasingham, I. (2012), “Risk-Based
Adaptive Security for Smart IoT in eHealth”,
Proceedings of the 7th International Conference on
Body Area Networks, Oslo, Norway, pp. 269-275.
Bier ,V.M. and Azaiez, M.N (2008), “Game Theoretic
Risk Analysis of Security Threats”, Springer,
International Series in Operations Research &
Management Science, Vol. 128.
Blasi, L., Savola, R., Abie, H. and Rotondi, D. (2010),
“Applicability of Security Metrics for Adaptive
Security Management in a Universal Banking Hub
System”, European Conference on Software
Architecture (ECSA) Companion, Copenhagen,
Denmark, August 2010, Vol.2010, pp. 197-204.
Computer Security Institute CSI (2010), 2010 / 2011 CSI
Computer Crime and Security Survey, New York.
Cox, L.A. (2012) “Game Theory and Risk Analysis”, Risk
Analysis, Vol 29 Issue 8, pp. 1062-1068.
Evesti, A. and Ovaska, E. (2010), “Ontology-based
Security Adaptation at Run- time”, Fourth IEEE
International Conference on Self-Adaptive and
Self-Organizing Systems, Budapest, Hungary, pp. 204-212.
Felani, I. and Dwiputra, A. (2012), “Developing
Objective-Quantitative Risk Management Information
System”, Proceedings of the World Congress on
Engineering 2012, London, UK, 2012, Vol I, pp.481-
484.
Haddad, S., Dubus, S., Hecker, A., Kanstrn, T., Marquet,
B. and Savola, R.(2011), “Operational Security
Assurance Evaluation in Open Infrastructures,” 6th
International Conference on Risks and Security of
Internet and Systems (CRiSIS), Romania, pp. 100-105.
Hamdi, M. and Abie, H. (2013), “Game-Based Adaptive
Security in the Internet of Things for eHealth”, ACM
Computing Surveys (CSUR), ACM NY, New-York,
USA, Vol 45, Issue 3, Acticle No. 25.
Hamdi, M., Krichene, J., Tounsi, M. and Boudriga, N.
(2003), “NetRAM: A Framework for Information
Security Risk Management,” Nordic Workshop on
Secure IT Systems, Gjovik, Norway.
Manshaei, M.H., Zhu, Q., Alpcan, T., Basar, T. and
Hubaux, J.P. (2013), “Game Theory Meets Network
Security and Privacy”, ACM Computing Surveys
(CSUR), ACM NY, New-York, USA, Vol 45, Issue 3,
Acticle No. 25.
The Mitre Corporation (2012), “Vulnerability
Management”, available at: http://measurable
security.mitre.org/directory/areas/vulnerabilitymanage
ment.html (accessed 16 April 2013).
Moussa, O., Savola, R.M., Mouraditis, H., Preston, D.,
Khadhraoui, D. and Dubois, E. (2013) “Taxonomy of
quality metrics for assessing assurance of security
correctness,” Software Quality Journal, Vol.21, issue
1, pp. 67-97.
Open Source Vulnerability Data Base (2013),
“Vulnerability Entry Standards”, http://www.osvdb.
org/vuln standards (accessed 16 April 2013).
Sahinoglu, M. (2005), “Security Meter: A Practical
Decision-Tree Model to Quantify Risk”, IEEE
Security Privacy
, Vol. 3, No. 3, pp. 18-24.
Sahinoglu, M. (2008), “An InputOutput Measurable
Design for the Security Meter Model to Quantify and
Manage Software Security Risk”, IEEE transactions
on Instrumentation and Measurement, vol. 57, No. 6,
pp. 1251-1260.
Savola, R. M., Abie, H.,Bigham, J. and Rotondi, D.(2010),
“Innovations and Advances in Adaptive Secure
Message Oriented Middleware the GEMOM Project”,
IEEE 30th International Conference on Distributed
Computing Systems Workshops, Genova, Italy, June
2010, pp. 288-289.
Young, C.S. (2010), “Metrics and Methods for Security
Risk Management”, SYNGRESS, USA.
ICETE2014-DoctoralConsortium
38