학술논문

Towards a Bayesian Approach in Modeling the Disclosure of Unique Security Faults in Open Source Projects
Document Type
Conference
Source
2010 IEEE 21st International Symposium on Software Reliability Engineering Software Reliability Engineering (ISSRE), 2010 IEEE 21st International Symposium on. :101-110 Nov, 2010
Subject
Computing and Processing
Communication, Networking and Broadcast Technologies
Power, Energy and Industry Applications
Security
Software
Maintenance engineering
Adaptation model
Fires
Bayesian methods
Context modeling
security
open-source
software reliability
Language
ISSN
1071-9458
2332-6549
Abstract
Software security has both an objective and a subjective component. A lot of the information available about that today is focused on the security vulnerabilities and their disclosure. It is less frequent that security breaches and failures rates are reported, even in open source projects. Disclosure of security problems can take several forms. A disclosure can be accompanied by a release of the fix for the problem, or not. The latter category can be further divided into ”voluntary” and ”involuntary” security issues. In widely used software there is also considerable variability in the operational profile under which the software is used. This profile is further modified by attacks on the software that may be triggered by security disclosures. Therefore a comprehensive model of software security qualities of a product needs to incorporate both objective measures, such as security problem disclosure, repair and, failure rates, as well as less objective metrics such as implied variability in the operational profile, influence of attacks, and subjective impressions of exposure and severity of the problems, etc. We show how a classical Bayesian model can be adapted for use in the security context. The model is discussed and assessed using data from three open source software projects. Our results show that the model is suitable for use with a certain subset of disclosed security faults, but that additional work will be needed to identify appropriate shape and scaling functions that would accurately reflect end-user perceptions associated with security problems.