The Generation of Security Scoring Systems Leveraging Human Expert Opinion

05/28/2021
by   Peter Mell, et al.
0

While the existence of many security elements can be measured (e.g., vulnerabilities, security controls, or privacy controls), it is challenging to measure their relative security impact. In the physical world we can often measure the impact of individual elements to a system. However, in cyber security we often lack ground truth (i.e., the ability to directly measure significance). In this work we propose to solve this by leveraging human expert opinion to provide ground truth. Experts are iteratively asked to compare pairs of security elements to determine their relative significance. On the back end our knowledge encoding tool performs a form of binary insertion sort on a set of security elements using each expert as an oracle for the element comparisons. The tool not only sorts the elements (note that equality may be permitted), but it also records the strength or degree of each relationship. The output is a directed acyclic `constraint' graph that provides a total ordering among the sets of equivalent elements. Multiple constraint graphs are then unified together to form a single graph that is used to generate a scoring or prioritization system. For our empirical study, we apply this domain-agnostic measurement approach to generate scoring/prioritization systems in the areas of vulnerability scoring, privacy control prioritization, and cyber security control evaluation.

READ FULL TEXT
research
08/13/2019

Exploit Prediction Scoring System (EPSS)

Despite the massive investments in information security technologies and...
research
08/20/2023

Unsupervised Opinion Aggregation – A Statistical Perspective

Complex decision-making systems rarely have direct access to the current...
research
02/18/2021

To Improve Cyber Resilience, Measure It

We are not very good at measuring – rigorously and quantitatively – the ...
research
06/14/2022

Snakes and Ladder Logic: PLC-VBS, a PLC Control Logic Vulnerability Discovery Tool

Cyber security risk assessments provide a pivotal starting point towards...
research
10/17/2017

Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks

Phishing is an especially challenging cyber security threat as it does n...
research
11/11/2019

Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers

Many real-world cyber-physical systems (CPS) use proprietary cipher algo...

Please sign up or login with your details

Forgot password? Click here to reset