首页> 外文会议>2019 IEEE/ACM International Conference on Technical Debt >Leveraging SecDevOps to Tackle the Technical Debt Associated with Cybersecurity Attack Tactics
【24h】

Leveraging SecDevOps to Tackle the Technical Debt Associated with Cybersecurity Attack Tactics

机译:利用SecDevOps解决与网络安全攻击策略相关的技术债务

获取原文
获取原文并翻译 | 示例

摘要

Context: Managing technical debt (TD) associated with external cybersecurity attacks on an organization can significantly improve decisions made when prioritizing which security weaknesses require attention. Whilst source code vulnerabilities can be found using static analysis techniques, malicious external attacks expose the vulnerabilities of a system at runtime and can sometimes remain hidden for long periods of time. By mapping malicious attack tactics to the consequences of weaknesses (i.e. exploitable source code vulnerabilities) we can begin to understand and prioritize the refactoring of the source code vulnerabilities that cause the greatest amount of technical debt on a system. Goal: To establish an approach that maps common external attack tactics to system weaknesses. The consequences of a weakness associated with a specific attack technique can then be used to determine the technical debt principal of said violation; which can be measured in terms of loss of business rather than source code maintenance. Method: We present a position study that uses Jaccard similarity scoring to examine how 11 malicious attack tactics can relate to Common Weakness Enumerations (CWEs). Results: We conduct a study to simulate attacks, and generate dependency graphs between external attacks and the technical consequences associated with CWEs. Conclusion: The mapping of cyber security attacks to weaknesses allows operational staff (SecDevOps) to focus on deploying appropriate countermeasures and allows developers to focus on refactoring the vulnerabilities with the greatest potential for technical debt.
机译:背景:管理与组织的外部网络安全攻击相关的技术债务(TD)可以显着改善在确定哪些安全弱点需要引起关注时做出的决策。尽管可以使用静态分析技术找到源代码漏洞,但恶意的外部攻击会在运行时暴露系统的漏洞,有时可能会长时间隐藏。通过将恶意攻击策略映射到弱点(即可利用的源代码漏洞)的后果,我们可以开始理解并优先考虑对导致系统上最大数量技术债务的源代码漏洞的重构。目标:建立一种将常见的外部攻击策略映射到系统弱点的方法。然后,可以将与特定攻击技术相关的弱点的后果用于确定所述违规的技术债务本金;可以根据业务损失而不是源代码维护来衡量。方法:我们提供了一个位置研究,该研究使用Jaccard相似度评分来检查11种恶意攻击策略如何与“普通弱点枚举”(CWE)相关。结果:我们进行了一项研究,以模拟攻击,并生成外部攻击与CWE相关的技术后果之间的依赖关系图。结论:将网络安全攻击映射到弱点可以使操作人员(SecDevOps)专注于部署适当的对策,并允许开发人员专注于重构具有最大技术债务潜力的漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号