Skip to main content

Quantifying Security in Web ETL Processes

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9572))

Abstract

Nowadays, security represents the new attention of current world. It is the key issue for assuring the quality of software development. Since, security is one of the non-functional requirements; it is recurrently ignored in the requirements phase. And within limited financial statement, security managers have to patch up the increasing number of WeBhouse vulnerabilities. It is possible to reduce software development cost and time to identify user security requirement in the early stage of the software development process.

To develop a secure system, security managers need to assess vulnerabilities in order to prioritize them. In this paper, we discuss security in the WEB ETL processes taking into account business needs and vulnerabilities assessments. To this end, our work evaluates vulnerabilities according to two metrics: severity impact and remediation cost. We adopt the Common Vulnerability Scoring System (CVSS) to quantify the severity impact and extend the Cosmic used for security measuring purposes to estimate the effort needed for remediation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Talib, M.A., Abran, A., Buglione, L.: Scenario based black-box testing in COSMIC-FFP: a case study. ASQ Softw. Qual. Prof. J. 8(3), 23–33 (2006)

    Google Scholar 

  2. Cheng, P., Wang, L., Jajodia, S., Singhal, A.: Aggregating CVSS base scores for semantics rich network security metrics. In: SRDS, pp. 31–40 (2012)

    Google Scholar 

  3. Dammak, S., Ghozzi Jedidi, F., Gargouri, F.: Security measures for Web ETL processes. In: IEEE/ACIS 14th ICIS (2015, to appear)

    Google Scholar 

  4. Frühwirth, C., Mannisto, T.: Improving CVSS-based vulnerability prioritization and response with context information. In: Proceedings of the 3rd International Symposium on Empirical Software Engineering and Measurement, ESEM 2009 Proceeding, pp. 535–544 (2009)

    Google Scholar 

  5. Ghani, H., Luna, J., Suri, N.,: Quantitative assessment of software vulnerabilities based on economic-driven security metrics. In: CRiSIS 2013, pp. 1–8 (2013)

    Google Scholar 

  6. ISO/IEC19761: Software Engineering – COSMIC: A Functional Size Measurement Method. International Organization for Standardization (ISO), Geneva (2011)

    Google Scholar 

  7. Joh, H., Malaiya, Y.K.: Defining and assessing quantitative security risk measures using vulnerability lifecycle and CVSS metrics. In: SAM 2011, International Conference on Security and Management, pp. 10–16 (2011)

    Google Scholar 

  8. Kassab, M., Daneva, M., Ormandjieva, O.: Early quantitative assessment of non-functional requirements. Technical report TR-CTIT-07-35, Centre for Telematics and Information Technology, University of Twente, Enschede (2006). ISSN 1381-3625

    Google Scholar 

  9. Kimbal, R., Merz, R.: Le DATA WEBHOUSE: Analyser les comportements client sur le Web. Eyrolles Edition, Paris (2000)

    Google Scholar 

  10. Kiran, P., Kumar, S.S., Kavya, N.P.: Modelling extraction transformation load embedding privacy preservation using UML. Int. J. Comput. Appl. (2012)

    Google Scholar 

  11. Muralini, M., Kumar, T.V.S.; Kanth, K.R.: Simulating secure data extraction in extraction transformation loading (ETL) processes. In: Third UKSim European Symposium on Computer Modeling and Simulation, pp. 142–147 (2009)

    Google Scholar 

  12. Muralini, M., Kumar, T.V.S.; Kanth, K.R.: Secure ETL process model: an assessmentof security in different phases of ETL. In: Software Engineering Competence Center (2013)

    Google Scholar 

  13. National Institute of Standards and Technology Special Publication 800-30: Risk Management Guide for Information Technology Systems, June 2001

    Google Scholar 

  14. National Institute of Standards and Technology Special Publication 800-53: Recommended Security Controls for Federal Information Systems, December 2007

    Google Scholar 

  15. National Institute of Standards and Technology Special Publication 800-55: Performance Measurement Guide for Information Security, July 2008

    Google Scholar 

  16. Leon, P.G., Saxena, A.: An approach to quantitatively measure information security. In: Proceedings of the 3rd India Software Engineering Conference, ISEC 2010

    Google Scholar 

  17. Pengsu, C., Lingyu, W., Sushil, J., Anoop, S.: Aggregating CVSS base scores for semantics-rich network security metrics. In: SRDS, pp. 31–40. IEEE (2012)

    Google Scholar 

  18. Houmb, S.H., Franqueira, V.N., Engum, E.A.: Quantifying security risk level from CVSS estimates of frequency and impact. J. Syst. Softw. 83(9), 1622–1634 (2010). ISSN 0164-1212

    Article  Google Scholar 

  19. Thompson, W.: Electrical units of measurement. Popular Lect. Addresses 1, 73–136 (1889). Lecture at the Institution of Civil Engineers, London, 3 May 1883

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Salma Dammak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Dammak, S., Ghozzi Jedidi, F., Gargouri, F. (2016). Quantifying Security in Web ETL Processes. In: Lambrinoudakis, C., Gabillon, A. (eds) Risks and Security of Internet and Systems. CRiSIS 2015. Lecture Notes in Computer Science(), vol 9572. Springer, Cham. https://doi.org/10.1007/978-3-319-31811-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31811-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31810-3

  • Online ISBN: 978-3-319-31811-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics