Pub Date : 2019-07-01DOI: 10.4018/ijsssp.2019070101
M. Abdelkader
Process model matching is a key activity in many business process management tasks. It is an activity that consists of detecting an alignment between process models by finding similar activities in two process models. This article proposes a method based on WordNet glosses to improve the effectiveness of process model matchers. The proposed method is composed of three steps. In the first step, all activities of the two BPs are extracted. Second, activity labels are expanded using word glosses and finally, similar activities are detected using the cosine similarity metric. Two experiments were conducted on well-known datasets to validate the effectiveness of the proposed approach. In the first one, an alignment is computed using the cosine similarity metric only and without a process of expansion. While, in the second experiment, the cosine similarity metric is applied to the expanded activities using glosses. The results of the experiments were promising and show that expanding activities using WordNet glosses improves the effectiveness of process model matchers.
{"title":"Improving Effectiveness of Process Model Matchers Using Wordnet Glosses","authors":"M. Abdelkader","doi":"10.4018/ijsssp.2019070101","DOIUrl":"https://doi.org/10.4018/ijsssp.2019070101","url":null,"abstract":"Process model matching is a key activity in many business process management tasks. It is an activity that consists of detecting an alignment between process models by finding similar activities in two process models. This article proposes a method based on WordNet glosses to improve the effectiveness of process model matchers. The proposed method is composed of three steps. In the first step, all activities of the two BPs are extracted. Second, activity labels are expanded using word glosses and finally, similar activities are detected using the cosine similarity metric. Two experiments were conducted on well-known datasets to validate the effectiveness of the proposed approach. In the first one, an alignment is computed using the cosine similarity metric only and without a process of expansion. While, in the second experiment, the cosine similarity metric is applied to the expanded activities using glosses. The results of the experiments were promising and show that expanding activities using WordNet glosses improves the effectiveness of process model matchers.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134323349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.4018/ijsssp.2019010101
George Yee
This article begins with an introduction to security metrics, describing the need for security metrics, followed by a discussion of the nature of security metrics, including the challenges found with some security metrics used in the past. The article then discusses what makes a sound security metric and proposes a rigorous step-by-step method that can be applied to design sound security metrics, and to test existing security metrics to see if they are sound metrics. This is followed by a discussion of the feasibility of having scientifically-based security metrics and whether or not such metrics are sound. Application examples are included to illustrate the design and testing of sound security metrics.
{"title":"Designing Sound Security Metrics","authors":"George Yee","doi":"10.4018/ijsssp.2019010101","DOIUrl":"https://doi.org/10.4018/ijsssp.2019010101","url":null,"abstract":"This article begins with an introduction to security metrics, describing the need for security metrics, followed by a discussion of the nature of security metrics, including the challenges found with some security metrics used in the past. The article then discusses what makes a sound security metric and proposes a rigorous step-by-step method that can be applied to design sound security metrics, and to test existing security metrics to see if they are sound metrics. This is followed by a discussion of the feasibility of having scientifically-based security metrics and whether or not such metrics are sound. Application examples are included to illustrate the design and testing of sound security metrics.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126546284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.4018/ijsssp.2019010102
Shen Fu, Mathew L. Wymore, Ting-Wei Chang, D. Qiao
The restriction of access to software systems is more important than ever. Yet, most primary authentication methods are still largely based on passwords, which are vulnerable to various attacks such as phishing scams and keyloggers. Advanced methods of behavior-based authentication exist, but most are platform-specific and are not generally applicable. In this article, the authors propose a generic continuous authentication scheme for software systems, which supplements existing authentication schemes and works as an auxiliary layer to provide additional protection against impostors. The kernel of their scheme is a novel monitoring engine that detects impostors in real-time based on behavior and context information. The authors evaluate their scheme on a dataset consisting of real users' historical records provided by their industrial partner, and the results demonstrate that the approach achieves a high classification accuracy with only a short delay in detection, allowing for real-time, continuous authentication.
{"title":"A Novel Software System Protection Scheme Based on Behavior and Context Monitoring","authors":"Shen Fu, Mathew L. Wymore, Ting-Wei Chang, D. Qiao","doi":"10.4018/ijsssp.2019010102","DOIUrl":"https://doi.org/10.4018/ijsssp.2019010102","url":null,"abstract":"The restriction of access to software systems is more important than ever. Yet, most primary authentication methods are still largely based on passwords, which are vulnerable to various attacks such as phishing scams and keyloggers. Advanced methods of behavior-based authentication exist, but most are platform-specific and are not generally applicable. In this article, the authors propose a generic continuous authentication scheme for software systems, which supplements existing authentication schemes and works as an auxiliary layer to provide additional protection against impostors. The kernel of their scheme is a novel monitoring engine that detects impostors in real-time based on behavior and context information. The authors evaluate their scheme on a dataset consisting of real users' historical records provided by their industrial partner, and the results demonstrate that the approach achieves a high classification accuracy with only a short delay in detection, allowing for real-time, continuous authentication.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122209960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.4018/ijsssp.2019010103
Sint Sint Aung
Online user reviews are increasingly becoming important for measuring the quality of different products and services. Sentiment classification or opinion mining involves studying and building a system that collects data from online and examines the opinions. Sentiment classification is also defined as opinion extraction as the computational research area of subjective information towards different products. Opinion mining or sentiment classification has attracted in many research areas because of its usefulness in natural language processing and other area of applications. Extracting opinion words and product features are also important tasks in opinion mining. In this work an unsupervised approach was proposed to extract opinions and product features without training examples. To obtain the dependency relation between the product aspects and opinions, this work used StanfordCoreNLP dependency parser. From these relations, rules are predified to extract product and opinions. The main advantage of this approach is that there is no need for training data and it has domain independence. Acoording to the experimental results, the modified algorithm gets better results than the double propagation algorithm.
{"title":"Analysis on Opinion Words Extraction in Electronic Product Reviews","authors":"Sint Sint Aung","doi":"10.4018/ijsssp.2019010103","DOIUrl":"https://doi.org/10.4018/ijsssp.2019010103","url":null,"abstract":"Online user reviews are increasingly becoming important for measuring the quality of different products and services. Sentiment classification or opinion mining involves studying and building a system that collects data from online and examines the opinions. Sentiment classification is also defined as opinion extraction as the computational research area of subjective information towards different products. Opinion mining or sentiment classification has attracted in many research areas because of its usefulness in natural language processing and other area of applications. Extracting opinion words and product features are also important tasks in opinion mining. In this work an unsupervised approach was proposed to extract opinions and product features without training examples. To obtain the dependency relation between the product aspects and opinions, this work used StanfordCoreNLP dependency parser. From these relations, rules are predified to extract product and opinions. The main advantage of this approach is that there is no need for training data and it has domain independence. Acoording to the experimental results, the modified algorithm gets better results than the double propagation algorithm.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123995311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.4018/IJSSSP.2018100102
M. Jaatun, Åsmund Ahlmann Nyre, Inger Anne Tøndel
Emergency and rescue operations are often carried out in areas where the network infrastructure cannot be relied on for message exchange between first responders. Since a fundamental feature of a Mobile Ad Hoc Network is the ability to operate independently of existing infrastructure, it is deemed a well-suited solution to first responders scenarios. In this article, the authors describe a security extension to the OLSR routing protocol specifically designed for first responder scenarios. The proposed protocol provides node authentication and access control using asymmetric encryption and digital certificates, and also offers a secure group communication scheme. A link encryption scheme is devised to allow for efficient encryption of data even in broadcast mode, without the need for a network-wide shared key. By utilising pairwise symmetric keys for link confidentiality, the authors' solution is both efficient and scalable.
{"title":"A Secure MANET Routing Protocol for Crisis Situations","authors":"M. Jaatun, Åsmund Ahlmann Nyre, Inger Anne Tøndel","doi":"10.4018/IJSSSP.2018100102","DOIUrl":"https://doi.org/10.4018/IJSSSP.2018100102","url":null,"abstract":"Emergency and rescue operations are often carried out in areas where the network infrastructure cannot be relied on for message exchange between first responders. Since a fundamental feature of a Mobile Ad Hoc Network is the ability to operate independently of existing infrastructure, it is deemed a well-suited solution to first responders scenarios. In this article, the authors describe a security extension to the OLSR routing protocol specifically designed for first responder scenarios. The proposed protocol provides node authentication and access control using asymmetric encryption and digital certificates, and also offers a secure group communication scheme. A link encryption scheme is devised to allow for efficient encryption of data even in broadcast mode, without the need for a network-wide shared key. By utilising pairwise symmetric keys for link confidentiality, the authors' solution is both efficient and scalable.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133791619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.4018/IJSSSP.2018100103
E. Fernández, H. Washizaki, Nobukazu Yoshioka
The authors describe continuing work on the use of patterns in the development of secure systems. This work started as collaboration among five research centers on three continents and continues with a reduced number of involved researchers. Patterns are applied to all aspects of development, from domain analysis and attack modeling to basic design, and to all aspects of the systems under development, from the database and infrastructure to policies, monitoring, and forensics. The article provides an overview of a method of development involving the full range of patterns and describes recent contributions from some of the research threads being pursued within the collaboration.
{"title":"Using Security Patterns to Develop Secure Systems - Ten Years Later","authors":"E. Fernández, H. Washizaki, Nobukazu Yoshioka","doi":"10.4018/IJSSSP.2018100103","DOIUrl":"https://doi.org/10.4018/IJSSSP.2018100103","url":null,"abstract":"The authors describe continuing work on the use of patterns in the development of secure systems. This work started as collaboration among five research centers on three continents and continues with a reduced number of involved researchers. Patterns are applied to all aspects of development, from domain analysis and attack modeling to basic design, and to all aspects of the systems under development, from the database and infrastructure to policies, monitoring, and forensics. The article provides an overview of a method of development involving the full range of patterns and describes recent contributions from some of the research threads being pursued within the collaboration.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.4018/IJSSSP.2018100101
Muhammad Rana, Q. Mamun
To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication with a robust pervasive communication mechanism. However, due to the resource constraints and heterogeneous characteristics of the sensor devices, traditional authentication and key management schemes are not effective for such applications. Here, we propose a pervasive lightweight authentication and keying mechanism for WSNs in distributed IoT applications in which the sensor nodes can establish secure links with peer sensor nodes and end-users. The established authentication scheme is based on implicit certificates, and it provides application-level end-to-end security. A comprehensive description of the scenario based behaviour of the protocol is presented. With the performance evaluation and the security analysis, it is justified that the proposed scheme is viable to deploy in the resource constrained WSNs.
{"title":"A Robust and Lightweight Key Management Protocol for WSNs in Distributed IoT Applications","authors":"Muhammad Rana, Q. Mamun","doi":"10.4018/IJSSSP.2018100101","DOIUrl":"https://doi.org/10.4018/IJSSSP.2018100101","url":null,"abstract":"To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication with a robust pervasive communication mechanism. However, due to the resource constraints and heterogeneous characteristics of the sensor devices, traditional authentication and key management schemes are not effective for such applications. Here, we propose a pervasive lightweight authentication and keying mechanism for WSNs in distributed IoT applications in which the sensor nodes can establish secure links with peer sensor nodes and end-users. The established authentication scheme is based on implicit certificates, and it provides application-level end-to-end security. A comprehensive description of the scenario based behaviour of the protocol is presented. With the performance evaluation and the security analysis, it is justified that the proposed scheme is viable to deploy in the resource constrained WSNs.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"38 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131500788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.4018/IJSSSP.2018070103
J. Osis, Erika Nazaruka
Some experts opine that software is built in a primitive way. The role of modeling as a treatment for the weakness of software engineering became more important when the principles of Model Driven Architecture (MDA) appeared. Its main advantage is architectural separation of concerns. It showed the necessity of modeling and opened the way for software development to become an engineering discipline. However, this principle does not demonstrate its whole potential power in practice because of lack of mathematical accuracy in the very initial steps of software development. The sufficiency of modeling in software development is still disputable. The authors believe that software development in general (and modeling in particular) based on mathematical formalism in all of its stages and together with the implemented principle of architectural separation of concerns can become an important part of software engineering in its real sense. They propose the formalism by topological modeling of system functioning as the first step towards engineering.
{"title":"Theory Driven Modeling as the Core of Software Development","authors":"J. Osis, Erika Nazaruka","doi":"10.4018/IJSSSP.2018070103","DOIUrl":"https://doi.org/10.4018/IJSSSP.2018070103","url":null,"abstract":"Some experts opine that software is built in a primitive way. The role of modeling as a treatment for the weakness of software engineering became more important when the principles of Model Driven Architecture (MDA) appeared. Its main advantage is architectural separation of concerns. It showed the necessity of modeling and opened the way for software development to become an engineering discipline. However, this principle does not demonstrate its whole potential power in practice because of lack of mathematical accuracy in the very initial steps of software development. The sufficiency of modeling in software development is still disputable. The authors believe that software development in general (and modeling in particular) based on mathematical formalism in all of its stages and together with the implemented principle of architectural separation of concerns can become an important part of software engineering in its real sense. They propose the formalism by topological modeling of system functioning as the first step towards engineering.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"165 S348","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120851023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.4018/IJSSSP.2018070102
Michael Lescisin, Q. Mahmoud
This article discusses the development of secure software by means of dynamic analysis tools. A secure software-based system should have security checks and balances integrated throughout its entire development lifecycle, including its deployment phase. Therefore, this article covers both using software security tools for testing code in development as well as monitoring code in deployment to ensure that it is operating securely. The security issues discussed in this article will be split into two categories – memory safety issues and input validation issues. Memory safety issues concern problems of unauthorized memory access such as buffer overflows, stack overflows, use-after-free, double-free, memory leaks, etc. Although not strictly a memory safety issue, concurrency issues, such as data races, will be considered as memory safety issues in this article. Input validation issues concern problems where untrusted input is directly passed to handlers which are designed to handle both data and commands. Examples of this include path traversal, SQL injection, command injection, JavaScript/HTML injection, etc. As a result of this significant difference between these two types of security vulnerabilities, two sets of tools are evaluated with one set focusing on memory safety issues and the other on input validation issues. This article explores the benefits and limitations of current software dynamic analysis tools by evaluating them against both the authors test cases as well as the OWASP Benchmark for Security Automation and proposes solutions for implementing secure software applications.
{"title":"Evaluation of Dynamic Analysis Tools for Software Security","authors":"Michael Lescisin, Q. Mahmoud","doi":"10.4018/IJSSSP.2018070102","DOIUrl":"https://doi.org/10.4018/IJSSSP.2018070102","url":null,"abstract":"This article discusses the development of secure software by means of dynamic analysis tools. A secure software-based system should have security checks and balances integrated throughout its entire development lifecycle, including its deployment phase. Therefore, this article covers both using software security tools for testing code in development as well as monitoring code in deployment to ensure that it is operating securely. The security issues discussed in this article will be split into two categories – memory safety issues and input validation issues. Memory safety issues concern problems of unauthorized memory access such as buffer overflows, stack overflows, use-after-free, double-free, memory leaks, etc. Although not strictly a memory safety issue, concurrency issues, such as data races, will be considered as memory safety issues in this article. Input validation issues concern problems where untrusted input is directly passed to handlers which are designed to handle both data and commands. Examples of this include path traversal, SQL injection, command injection, JavaScript/HTML injection, etc. As a result of this significant difference between these two types of security vulnerabilities, two sets of tools are evaluated with one set focusing on memory safety issues and the other on input validation issues. This article explores the benefits and limitations of current software dynamic analysis tools by evaluating them against both the authors test cases as well as the OWASP Benchmark for Security Automation and proposes solutions for implementing secure software applications.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123509045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-04-01DOI: 10.4018/IJSSSP.2018040102
B. Cohen, M. Albert, E. McDaniel
Higher education curricula, specialized degrees, and certificate programs related to cybersecurity are proliferating in response to student demand; faculty interest and expertise; employer demand; government and industry standards and funding; and the expectations of specialized, state, or regional accrediting agencies. These expanding academic programs, however, do not adequately address supply chain threats that affect national security. The authors assert that cyber supply chain risk management (C-SCRM), with a focus on hardware assurance, should be considered a critical aspect of cybersecurity and be included in higher education curricula to prepare the future cyber workforce to face challenges related to supply chain security and hardware assurance.
{"title":"The Need for Higher Education in Cyber Supply Chain Security and Hardware Assurance","authors":"B. Cohen, M. Albert, E. McDaniel","doi":"10.4018/IJSSSP.2018040102","DOIUrl":"https://doi.org/10.4018/IJSSSP.2018040102","url":null,"abstract":"Higher education curricula, specialized degrees, and certificate programs related to cybersecurity are proliferating in response to student demand; faculty interest and expertise; employer demand; government and industry standards and funding; and the expectations of specialized, state, or regional accrediting agencies. These expanding academic programs, however, do not adequately address supply chain threats that affect national security. The authors assert that cyber supply chain risk management (C-SCRM), with a focus on hardware assurance, should be considered a critical aspect of cybersecurity and be included in higher education curricula to prepare the future cyber workforce to face challenges related to supply chain security and hardware assurance.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122110947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}