Abstract
Security is an aspect which contains varied classification and dimensions. One such classification of security is software security and it’s facet is metrics. Software security metrics provides an estimation of how secure a software could be and indicates that where the loophole might occur while it is being developed. The realization of security implementation should occur during the initiation of software development, i.e. the requirements elicitation phase among the software development team. Misuse Case Oriented Quality Requirements (MCOQR) Metrics framework provides an easy and comprehensive way of identifying security loopholes in software much before it is developed. It provides 6 dimensional security indicators and estimators so that security team can have an insight into areas which needs further improvement and for proper drafting of security requirements. This research paper takes into account influence of threat predicted using the misuse case modeling for estimating the security aspect of software much before it is developed and implemented practically. In this paper an empirical study is provided that shows how security team may identify core areas where security could be enhanced further. The research work proves that if MCOQR metrics framework is applied during software development the outcome is more secure software.
Keywords
Introduction
Security is an intangible entity and cannot be measured directly through any means [11]. It requires an amalgamation of technical expertise and managerial insight for its proper measurement and subsequent prediction [14]. In Computer Science field, security may have varied classification like data security, network security, computer security, hardware security, information security, cyber security, web security, application security, and software security to name a few. All the mentioned classification may have some overlapping aspects and some unique aspect associated with the concerned security type [9].
Software security is core to all other types of security because everything is centered around it and operated, managed and controlled by it [24]. Researchers have advocated that if security could be built in and around the software during its initial development phase then a more comprehensive and secured software could be imagined. It increases the extent and dimension of security of that software when put to practical use. Incidents of exploitation of the software could be minimized if not 100% guaranteed [15, 7].
A good number of guidelines, standards, and protocols have been laid out by national and international agencies from time to time [17]. Some methods, tools, and techniques have also been proposed by the research organization and industry personnel’s [2]. Still, considering the facts, the vulnerable side of software is getting exposed and is increasing in magnitude day by day. This is due to the fact that software development teams pay less attention to the security aspect of software during its development due to the time and cost constraint [12, 13]. Another important factor is that the available guidelines, standards, and protocols are too broad in nature to be implemented and the methods, tools, and techniques available are too technical in nature and also lack a lay man’s approach [17].
Metrics is a potential aspect of security which can provide measurement in form of indicators and estimators using which the security team can analyse those areas of an entity which can be further improved to strengthen the security. In software development, security is in the form of non-functional aspect and indicates an indirect measure [4]. Metrics can be used to quantify the security attribute of software while it is in the development phase and the indicators and estimators thus obtained may be used by the security analysis team to specify security requirements [18].
Researchers have suggested that security should be implemented ‘right from the beginning’ during the software development process i.e., the requirements engineering phase so that it propagates further into the design phase and subsequent phases and adopts a comprehensive approach [3]. There are many techniques which could be used during the requirements engineering phase but considering the lay man’s approach of security implementation, use cases and misuse cases which are object oriented (OO) concept are a potential contender in this case [23, 25].
Using this OO concept, Misuse Case Oriented Quality Requirements (MCOQR) Metrics Framework has been proposed which may be used by the security team involved in the software development process to quantify security during the requirements elicitation phase. The outcome of MCOQR metrics framework is in the form of 6 indicators and estimators which could be further analysed to improve the misuse case modeling so that pragmatic security requirements could be specified based on it resulting in more secured software [5].
In this research paper, one of the 6 indicators and estimators, i.e. the influence of threat aspect has been taken which if implemented and anlaysed properly may help the security team of software development process to estimate the influence of threat of the proposed software during the requirements elicitation phase. Using this estimation, the areas which could be improved further are taken into consideration and a ranking of the software in terms of security could be done much before it is developed. It also contributes to the specification of security requirements of the said software.
Apart from the introduction section, the rest of the paper is organized as follows: Section 2 showcases the related work in this area, Section 3 highlights a brief of the Misuse Case Oriented Quality Requirements (MCOQR) Metrics framework, Section 4 presents the proposed MCOQR metrics for estimation of influence of threat of the software in development process, whereas results and discussions are covered in Section 5, and further conclusion and future work are given in Section 6.


Herrmann and Paech proposed Misuse-Oriented Quality Requirements Engineering (MOQARE) which explores the quality requirements and provides a general conceptual model. The relationships among the requirements are modeled using a Misuse Tree. It is a four step process, i.e. firstly, quality goals are identified based on business goals, business damages, and quality deficiencies, secondly, misuse case are described which includes threat, misuser, vulnerabilities, and their consequences, thirdly, countermeasures are defined, lastly, using the countermeasures, step 2 is repeated in a cyclic manner [10].
Chung and do Prado Leite in their research work provided a review of Non Functional requirements (NRF) and provided a classification in form of six areas viz., software variability, requirements analysis, requirements elicitation, requirements reusability, requirements traceability and aspect-oriented development. The researchers also suggested future prospects and emphasized on the empirical research on the use of NRFs during requirements engineering [8]. Okubo et al. proposed an extension of misuse case for eliciting security requirements. The researchers divided the process into two sub process, i.e. the business requirements elicitation and system requirements elicitation each consisting of 5 sub process respectively [16].
Santhosh Babu et al. proposed a security designers benchmark entitled ‘Surksha’ to facilitate designer to build security right from the requirements analysis phase. The proposed work is a eight step process which is well synchronized with STRIDE and DREAD. The STRIDE is used to identify threats and DREAD is used to calculate the risk of the threat. Using the DREAD process, the threats are categorized as considered or neglected. The proposed work was applied to an e-commerce application and the results were discussed [22].
Raspotnig et al. proposed a combined process for elicitation and analysis of safety and security requirements. In the research work, eleven risk identification techniques were used, of which, five were used for the safety field and six were used for the security field. These eleven techniques were assessed for each criteria identified. The researchers in their work created artefacts Failure Sequence Diagrams (FSD), Combined Harm Assessment for Safety and Security of Information Systems (CHASSIS) and the Security Conceptual Model (SeCM) to compare the safety and security techniques for achieving the objectives. The evaluation of the proposed process was done on Air Traffic Management domain [20].
Salini and Kanmani proposed Model Oriented Security Requirements Engineering (MOSRE) framework for web applications. The researchers applied this framework on an E-Voting system to capture the security requirements and domain knowledge after identifying assets, threats, and vulnerabilities. The proposed framework is a sixteen step process for identifying security requirements. The researchers advocated that the proposed system is better than the traditional approach [21].
Yahya et al. proposed Essential Use Cases (EUC) for capturing and specifying the security requirements. The researchers further developed Security Essential Use Cases (Se-cEUC), Security Essential Interactions (SecEI), and Security Control Patterns (SecCtrl) library which assisted in capturing the security requirements. The researchers also developed a prototype tool called SecMEReq which is an extended version of MEReq for the automation of the proposed process [25].
Abdulrazeg et al. proposed a secure V model which integrates the security requirements engineering activities with requirements engineering activities of V model to for specifying security requirements for a web application. The proposed model is a nine step process. The researchers also highlighted the importance of SCRUM into V model for execution in an iterative manner [1].
The limitations of the study carried out so far in this field is that the framework or model proposed by researchers does have any synchronization and coordination with industry accepted standards like CVSS and CVE. The research work though helps in specifying the security requirements but lacks quantitative approach and hence the security of the software cannot be measured. Further, the study also lacks empirical study on large base of data and varied software applications.
Misuse Case Oriented Quality Requirements (MCOQR) metrics framework – an overview
In the implementation of the proposed Misuse Case Oriented Quality Requirements (MCOQR) Framework, first of all, the vulnerability is identified and associated misuse case classification takes place as show in Fig. 1. The process is synchronized with Common Vulnerability Enumeration (CVE) and Common Vulnerability Scoring System (CVSS) which are industry accepted standards. There are two major outcome of the process, i.e. first the classification of misuse cases based on the type of vulnerability and second the databases consisting of information related to misuse cases, CVE, and CVSS document [5].
MCOQR metrics representation.
Figure 2 demonstrates the workflow of proposed Misuse Case Oriented Quality Requirements (MCOQR) Metrics framework and the outcome of the framework when implemented during the requirements elicitation phase of software development is in the form of 6 indicators and estimators, viz., dominant vulnerability type, level of countermeasure, influence of threat, level of security estimated, collateral damage estimation in terms of security threat and potential economic loss [5].
This paper highlights the research work carried out for the estimation of influence of threat which is one of the 6 indicators and estimators predicted before the software is developed. It showcases the proposed metrics for the estimation purpose and subsequent results and discussions are carried out to prove the importance and viability of the proposed work. The dataset created for the analysis purpose has been taken from CVE repository consisting of vulnerability reporting and their exploit since 1999 to till date software product wise.
The proposed Misuse Case Oriented Quality Requirements Metrics (MCOQR) representation is given in Fig. 3.
The base metrics equation for the estimation of influence of threat during the requirements elicitation phase of software development process by the security team is show as follows:
Where ‘
Following metrics may be used by the security team of software development process to estimate the influence of threat during the requirements elicitation phase:
From Eq. (1) following can be derived
where ‘
From Eq. (1) following can be derived
where ‘
From Eqs (2) and (3) following can be derived
where ‘
From Eq. (1) following can be derived
where ‘
From Eq. (1) following can be derived
where ‘
From Eqs (5) and (6) following can be derived
where ‘
Using the process specified in Misuse Case Oriented Quality Requirements (MCOQR) Metrics framework synchronized with CVSS 3.0 document which contains the base metrics, temporal metrics and environmental metrics and data from CVE repository the information was collected in various tables of database. The data collected and analysed was using Microsoft 2008 Server and Linux Kernel for the year 2008 to year 2017. During the collection and analysis process, two vulnerabilities were taken viz., Denial of Service (DoS) and Execution Code (Exec Code). It was assumed that the vulnerability reported during an individual period (year) was well predicted be the security team during the requirements elicitation phase of the software development process. Hence, the vulnerabilities identified during 2008 were assumed to be predicted well in advance during the development of the said software and so on.
The entire process of collection and analysis of the vulnerabilities of the three said software is beyond the scope of this research paper, hence, this research paper is restricted only to demonstrate the intrusive and non-intrusive nature and the analysis of software during the individual years of the said software development process. It shows the vulnerable side of the software in development in terms of intrusive and non-intrusive nature and also highlights areas where improvisation is required or necessary to secure the software from within so that a comprehensive security requirement can be drafted. Of course, 100% security and future vulnerabilities introduced due to new technology and environment cannot be predicted well in advance, hence, this framework advocates for a cyclic process in which the various breaches and their associated vulnerabilities of the said software after implementation should be updated on a regular basis.
MCOQR Metrics Framework is suggested to be used by the software development industry for three main significant reasons. Firstly, it induces a sense of responsibility among the organization from security implementation point of view thereby advocating a separate security team. As per the statistics available, the academicians, researchers, as well as industry do advocate for a separate security team but very few, almost negligible portion of the industry have it and properly implements it during the software development process specially during the requirements engineering phase.
The reason being the cost factor which adds towards the selling cost of the software and the technical and operational infeasibility in terms of security team and security framework which as per the statistics available worldwide is a misconception and underweights the two factor cost aspect after the software is implemented. One, being the cost which is incurred to make the software secure after its implementation, and second, being the cost in terms of asset and reputational loss incurred during the breach and attack on the software.
Secondly, it is applicable for any kind of software and hence it is software neutral security framework and also it is irrespective of the type of vulnerabilities and the software development team can customize it as per their own classification of vulnerabilities (which could be ‘n’ in nos.) but driven by the foundational laws of CVSS and CVE. Lastly, it not only motivates the software firms to have their own set of vulnerability databases but also supports the importance of CVSS and CVE implementation and whenever a new vulnerability is identified which has no inclusion in CVSS or CVE, the when identified using the process of proposed framework can be reported back to the concerned agencies. Based on the information from the vulnerability database of the three individual software mentioned above (which is collected from the data available in
Influence of threat dataset created using MCOQR metrics framework
Influence of threat dataset created using MCOQR metrics framework
Showing the trend of predicted intrusive and non-intrusive vulnerabilities as influence of threat (Microsoft 2008 Server, Year 2008–2017).
Showing the trend of predicted intrusive and non-intrusive vulnerabilities as influence of threat (Linux Kernel 2.6 & 3.2 sub versions, Year 2008–2017).
Influence of threat (Denial of Service [DoS]).
Influence of threat (Exec Code).
(A) Windows 2008 Server (DoS) Year 2008–2017 Consolidated; (B) Windows 2008 Server (Exec Code) Year 2008–2017 Consolidated.
(A) Linux Kernel 2.6 & 3.2 subversion (DoS) Year 2008–2017 Consolidated; (B) Linux Kernel 2.6 & 3.2 subversion (Exec Code) Year 2008–2017 Consolidated.
As per the dataset created and the analysis done using Fig. 4 as well as Fig. 5, it is shown that in the year 2008 for Microsoft 2008 Server software the count of pure Denial of Service (DoS) vulnerability was ‘2’ with a scoring of ‘14.2’ and a cumulative rating of ‘7.1’. No reporting of non-intrusive vulnerability was made. For Linux Kernel 2.6 ad 3.2 subversions, the count of pure Denial of Service (DoS) vulnerability was ‘8’ with a scoring of ‘61’ and a cumulative rating of ‘7.62’. No reporting of non-intrusive vulnerability was made for Microsoft 2008 server but for Linux Kernel 2.6 ad 3.2 subversions, the count of pure Denial of Service (DoS) vulnerability was ‘20’ with a scoring of ’89.9’ and a cumulative rating of ‘4.49’.
Here, the cumulative rating of ‘7.1’ for Microsoft 2008 Server and ‘7.62’ for Linux Kernel 2.6 & 3.2 subversions are on the higher side and needs further treatment to improvise the security aspect of the software for the specific vulnerability. The cumulating rating of non-intrusive vulnerability for Microsoft 2008 Server is ‘Nil’ and for Linux Kernel 2.6 & 3.2 subversions it is ‘4.49’ which is well within the acceptable limits as 100% security cannot be implemented and guaranteed.
For the year 2008 for Microsoft 2008 Server software the count of pure Exec Code vulnerability was ‘3’ with a scoring of ‘26.3’ and a cumulative rating of ‘8.77’. No reporting of non-intrusive vulnerability was made. For Linux Kernel 2.6 ad 3.2 subversions, the count of pure Exec Code vulnerability was ‘1’ with a scoring of ‘6.9’ and a cumulative rating of ‘6.9’. No reporting of non-intrusive vulnerability was made for Microsoft 2008 Server as well as for Linux Kernel 2.6 ad 3.2 subversions.
Here, the cumulative rating of ‘8.77’ for Microsoft 2008 Server and ‘6.9’ for Linux Kernel 2.6 & 3.2 subversions are on the higher side and needs further treatment to improvise the security aspect of the software for the specific vulnerability. The cumulating rating of non-intrusive vulnerability for Microsoft 2008 Server and Linux Kernel 2.6 & 3.2 subversions is ‘Nil’.
Still, for improvement, the security team involved in the analysis can further get an insight in to the level of mitigation/countermeasure applicable, i.e. whether it is mitigated or unmitigated, if it is mitigated whether it has an official fix, temporary fix, or work around solution. Thereafter, the team may have an understanding what is the potential source of threat, i.e. whether the vulnerability may be exploited internally or has more scope for external exploitation. The collateral damage estimated can also be examined to see the potential economic loss if the vulnerability is exploited and which assets may be harmed.
The above mentioned factors could be worked upon and corrected to bring down the level of vulnerability rating so that the software could be directed towards more security. Similar analysis could be done on the data collected for the year 2009 till 2017 and the same process can be applied for other type of vulnerabilities.
Figures 6 and 7 highlight the comparison of Influence of Threat in terms of vulnerability types for the year 2008 till 2017 for both Microsoft 2008 Server and Linux 2.6 & 3.2 subversions. It highlights which software is more intrusive in nature with the associated rating. It also showcases the non-intrusive side of the vulnerability for both the software.
Figures 8 and 9 show the consolidated influence of threat in terms of vulnerability type for Microsoft 2008 Server and Linux Kernel 2.6 & 3.2 subversions. It highlights the intrusive and non-intrusive nature of vulnerability types in percentage with cumulative rating of the said software over a period of time.
As per the statistics shown, Windows 2008 Server exposes less vulnerable nature with 64% intrusive cases with a rating of 6.02 reported as compared to 62% intrusive cases with a rating of 7.45 reported for Linux Kernel 2.6 & 3.2 subversion, from year 2008 till 2017 for the vulnerability Denial of Service (DoS). For the vulnerability Exec Code, Microsoft 2008 Server has 100% intrusive nature with a rating of 9.11 as compared to Linux Kernel 2.6 & 3.2 subversion which has equally 100% intrusive nature with a rating of 4.19 which is comparatively on lower side.
So the conclusion is that for Denial of Service (DoS) vulnerability, Linux Kernel 2.6 & 3.2 subversion has to be worked upon more than Microsoft 2008 Server and the reverse applies for Exec Code vulnerability.
The research work carried out shows that the security team may very well apply the Misuse Case Oriented Quality Requirements (MCOQR) metrics framework to estimate the influence of threat. For comparison purpose, two different types of operating system were chosen and the data was collected as per the proposed process specified in Vulnerability Identification and Misuse Case Framework.
Further as per the work flow of proposed MCOQR metrics framework, the data was gathered from the various tables creating and populated during the proposed process specified in Vulnerability Identification and Misuse Case Framework. The analysis was shown in a graphical form and the explanation and discussion was carried out to justify the purpose and objective of the proposed MCOQR Metrics framework, from influence of threat point of view which is one among the six parameters defined.
Future work may include collecting and testing data for more types of vulnerabilities. Another future works includes testing the influence of threat factor on a large sample of dataset. Another future work may include empirical testing on varieties of software applications to justify the claim of the proposed MCOQR metrics framework. For a comprehensive view of proposed MCOQR metrics framework, all the six parameters identified and defined needs to be dealt with at the same time, which is beyond the scope of this research paper. Further discussion shall be carried out in subsequent research papers.
Footnotes
Acknowledgments
First of all we would like to thank almighty GOD for everything we have and are today. We would like to thank Dr. Tarun Kumar Sharma, Amity University Rajasthan, India & Dr. Ajeet S Poonia, Cyber Security Expert, GCET, Bikaner, India for his positive approach towards the problems and their constructive suggestions. Special thanks to the experts from industry and academics for their contribution & approval about the concept and implementation of the proposed work. Last but not the least, we would like to thanks our parents and our children for their support and patience.
