Owasp
Owasp
ir
https://www.tarjomano.com https://www.tarjomano.com
A R T I C L E I N F O A B S T R A C T
Keywords: In today’s digital world, web applications are popular tools used by businesses. As more and more applications
Web application security are deployed on the web, they are seen as increasingly attractive targets by malicious actors eager to exploit any
Security evaluation security gaps present. Organizations are always at risk for potential vulnerabilities in their web-based software
Quantitative approach
systems, which can lead to data loss, service interruption, and lack of trust. Therefore, organizations need to have
Security analysis
an effective and efficient method for assessing and analyzing the security of acquired web-based software to
ensure adequate confidence in its use. Quantitative security evaluation employs mathematical and computational
techniques to express the security level that a system reaches. This research focuses on improving the quanti
tative analysis of web application security evaluation. We strive to unite the Open Web Application Security
Project’s (OWASP) Application Security Verification Standard (ASVS) into a structural and analyzable model,
which aims to efficiently evaluate web application security levels while providing meaningful insights into their
strengths and weaknesses.
* Corresponding author.
E-mail address: [email protected] (S.-F. Wen).
https://doi.org/10.1016/j.cose.2023.103532
Received 12 April 2023; Received in revised form 1 September 2023; Accepted 5 October 2023
Available online 8 October 2023
0167-4048/© 2023 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
Downloaded from https://iranpaper.ir
https://www.tarjomano.com https://www.tarjomano.com
S.-F. Wen and B. Katt Computers & Security 135 (2023) 103532
2
Downloaded from https://iranpaper.ir
https://www.tarjomano.com https://www.tarjomano.com
S.-F. Wen and B. Katt Computers & Security 135 (2023) 103532
3
Downloaded from https://iranpaper.ir
https://www.tarjomano.com https://www.tarjomano.com
S.-F. Wen and B. Katt Computers & Security 135 (2023) 103532
organization.
Although various research studies have been conducted on web
application security evaluation, few attempts have been made to
establish a generic approach that quantifies the results systematically.
Below are several papers that discuss this research area. The authors in
(Hai and Nga, 2018) presented a security evaluation framework for
web-portal security assessment, which integrates ISO/IEC 15,408
(ISO/IEC 2023) and OWASP evaluation model Common Criteria Web
Application Security Scoring (CCWAPSS) (Charpentier, 2023). This
framework facilitates numerical rankings via the use of a scoring system
to assess the significance of each factor within the criteria. By doing so, it
provides practical security evaluations that web portal developers can
quickly understand and implement. Okamura et al. (Okamura et al.,
2013) discussed a quantitative security evaluation approach for soft
ware systems from the vendor’s viewpoint, centering on the analysis of
collectible vulnerability data. They apply a stochastic model using a
non-homogeneous Poisson process to explain this data, and then use Fig. 2. The system boundary of software systems.
numerical examples to evaluate the security measures relative to the
content management system of an open-source project. Yautsiukhin
et al. (Yautsiukhin et al., 2008) introduced a method of computing the
security qualities of software architectures with the adoption of security
patterns. The core metric used in this evaluation was threat coverage,
and an algorithm was proposed to aggregate low-level measures asso
ciated with these patterns into a single high-level indicator. Lastly,
Banaei and Khorsandi (Banaei and Khorsandi, 2012) presented a hier
archical structure for web service security, complete with a model that
evaluates various aspects of security from an analytical perspective.
They use the Analytical Hierarchy Process (AHP) theory to prioritize
weighted averaging of critical security properties, such as authorization,
confidentiality, and availability — all to provide greater levels of cus
tomization in terms of provider/consumer needs.
Furthermore, alternative methods for quantitative security assurance
of IT systems have been proposed by some researchers. These concepts
could be applied in software systems/web applications. For instance, Fig. 3. The system boundary of the system of interest.
Katt and Prasher (Weldehawaryat and Katt, 2018) outlined a quantifi
cation method to evaluate the security assurance of systems. This reasonably draw a boundary (i.e., the system boundary), as depicted in
framework measures two parts: (1) the confidence that existing mech Fig. 2. The software structure is the core subset of the software system,
anisms are sufficient to meet security requirements; and (2) which po meaning any source code or object code made to perform a specific task
tential security threats might leave a system vulnerable. The framework (s). An environment is a set of factors (e.g., facilities, operating condi
has been validated through case studies on public REST APIs. Ouedraogo tions, or influences) that are available to a software component when it
et al. (Ouedraogo et al., 2009) utilized quantitative risk measurement is being installed, executed, or operated. It is useful to think of an
techniques to create indicators that can be used to assess IT infrastruc environment as being made up of things that are not part of the software
ture security, alongside aggregation procedures. The primary algorithms component but can affect the software system’s behavior.
used to perform operational aggregation are the recursive minimum, From the perspective of a security evaluation, the system boundary
maximum, and weighted sum algorithms. Each of these tools has been defines what should be analyzed within the System-of-Interest (SOI), and
designed to take into consideration a wide range of datasets when thus distinguishes it from the external environment. Our security eval
consolidating information. Pham and Riguidel (Pham and Riguidel, uation model divides this external environment into two categories:
2007) introduced an aggregational method that can be applied in the software environment and operational environment. This classification
calculation of the security assurance value of the whole system when is made by distinguishing a line that serves as a conceptual boundary
combining several entities, which have been evaluated independently. between them. The scope of SOI is comprised of the software environ
The effects of the emergent relations are taken into account in the ment and the system structure, whereas the operational environment is
calculation of the security assurance value of an attribute in the context external to the system (depicted in Fig. 3). In our definition, a software
of a system. environment refers to the complete set of hardware and software (tools,
resources, systems, and services) that are the necessities to secure build,
4. Model from the boundary of software system maintain, and scale the software components. Simple examples of soft
ware environments are a hardware environment, a software-based
As a web-based application can incorporate various resources and execution environment, or some combination of these. On the other
multiple environmental elements, it is crucial to take a wide-ranging hand, the operational environment contains elements and further sys
approach to view the system, which is often not clear. In this section, tems that interact in some way with the software system, for example, a
we will first provide an overview of the idea of system boundaries for user, a system administrator, an organization, a LAN, or a general office
available software systems. This will supply a groundwork that can be environment. The operational environment might also be incorrectly
utilized for our proposed model, and also show its pertinence to the field implemented and managed and consequently contain errors that would
of security evaluation. result in flaws, however, following the definition of the system bound
In general, a software system is comprised of elements that have been ary, no assessment is made regarding the correctness of the operational
purposefully incorporated into the environment. These include the environment. In terms of a security evaluation, it is assumed that the
software structure and environmental factors around which we can operational environment is absolutely precise and will aid the software
4
Downloaded from https://iranpaper.ir
https://www.tarjomano.com https://www.tarjomano.com
S.-F. Wen and B. Katt Computers & Security 135 (2023) 103532
Fig. 4. The conceptual framework of the modeling approach for security evaluation.
Fig. 5. Illustration of the layers that make up the hierarchical approach for the security-strength evaluation.
system in delivering its features accurately and securely. interest, how the security mechanisms can be represented structurally,
and how the weakside of system security can be derived from ASVS.
5. Creating a structured and analyzable model
For a more complete security evaluation and analysis, it is essential 5.1. Security strength evaluation model
to take into account both the advantages and disadvantages of the sys
tem’s security. Our strategy is to make ASVS quantifiable by breaking it The security strength of a system is defined as its security state,
down into two core components: security strength evaluation and se which reflects its readiness for security measures to defend against po
curity vulnerability evaluation. The aim is to gain measurable insights tential threats (Schechter, 2004). As shown in Fig. 5, we evaluate system
that will aid in deepening our comprehension of the ASVS verification security strength through a structural hierarchy of five levels to gain
result. As shown in Fig. 4, our modeling approach is built upon the ASVS insight into its security capability. We begin by categorizing the strength
framework. The security strength evaluation measures system security assessment into three aspects: structure, environment, and process. Each
by analyzing and gaging relevant security requirements. Additionally, evaluation aspect includes a two-level categorization method to classify
the assessment of security weaknesses brings understanding to the the security mechanisms connected with the ASVS requirements.
overall system’s risk posture—including how any uncovered weaknesses The process of "evaluation" utilizes mathematical algorithms to
(i.e., CWE) impact the elements’ security characteristics and their po assign numeric values to each component (i.e., evaluation components).
tential interactions with threats. At the simplest level, the security- In our approach, the scores of evaluation components are computed
strengths model can provide a measure of assurance that the system using a bottom-up approach, which involves the estimation of the lowest
will be able to withstand attack, while the weaknesses model can possible level in the model. Each ASVS requirement is assigned a nu
identify the potential consequences when the security mechanisms are merical score and the scores are aggregated to create an overall score.
not properly implemented. In the following sections, we describe our Score aggregation is beneficial as it reduces the subjective bias in eval
approach to modeling the evaluation component of the system of uating claims and provides a more objective method for determining the
accuracy of claims (Andrews et al., 2006). The evaluation task begins by
5
Downloaded from https://iranpaper.ir
https://www.tarjomano.com https://www.tarjomano.com
S.-F. Wen and B. Katt Computers & Security 135 (2023) 103532
6
Downloaded from https://iranpaper.ir
https://www.tarjomano.com https://www.tarjomano.com
S.-F. Wen and B. Katt Computers & Security 135 (2023) 103532
7
Downloaded from https://iranpaper.ir
https://www.tarjomano.com https://www.tarjomano.com
S.-F. Wen and B. Katt Computers & Security 135 (2023) 103532
where:
∑
C(ImpacScopei ) = {S(CWE j) → ImpacScorei } S(TechnicalImpcti ) = C(TechnicalImpacti ) (11)
where:
5.2.3. Evaluation of technical impact
Technical Impact is the potential result that can be produced by the C(TechnicalImpacti ) = {S(CWE j) → TechnicalImpacti }
weakness, assuming that the weakness can be successfully reached and
exploited. This is expressed in terms that are more fine-grained than 5.2.4. Evaluation of threat
confidentiality, integrity, and availability. The technical impact is an To have a clear picture of the dangers, it is important to formulate an
important criterion that can be useful to any organization that needs assessment of the threats to the SOI. Threat assessment is often per
reasonable security assurance for their software-based solutions. The formed on a higher level, especially addressing legal or business-related
CWE ‘Common Consequence’ also describes the Technical Impact that issues. In our test-based approach, threats are identified and evaluated
arises if an adversary succeeds in exploiting this weakness. Security based on the catalogs of known CWEs, deriving from the relevant veri
weaknesses can cause a lot of damage if they are successfully exploited. fication results of ASVS. CWE with its Common Consequences provides a
This information then evaluates the different types of damage that can point where we could start. In terms of threat categories, we use the
be caused, and how severe the damage can be. Examples of technical STRIDE framework (Shostack, 2014), which is a mature and optimal
impact are: Modify Data, Read Data, Unreliable Execution, Resource approach, to classify threats in areas where mistakes are often made. The
Consumption and Execute unauthorised Commands. acronym “STRIDE” stands for the threat categories of Spoofing,
Similar to “Impact Scope”, the “Technical Impact” score is yielded by Tampering, Repudiation, Information Disclosure, Denial of Service, and
summing the results of the relevant CWEs using Eq. (11). Elevation of Privilege.
8
Downloaded from https://iranpaper.ir
https://www.tarjomano.com https://www.tarjomano.com
S.-F. Wen and B. Katt Computers & Security 135 (2023) 103532
Table 8
Data factors of “Broken Access Control” in OWASP Top 10.
Max Incidence Rate Avg Incidence Rate Avg Weighted Exploit Avg Weighted Impact Max Coverage Avg Coverage Total Occurrences
9
Downloaded from https://iranpaper.ir
https://www.tarjomano.com https://www.tarjomano.com
S.-F. Wen and B. Katt Computers & Security 135 (2023) 103532
10
Downloaded from https://iranpaper.ir
https://www.tarjomano.com https://www.tarjomano.com
S.-F. Wen and B. Katt Computers & Security 135 (2023) 103532
quirements were marked as "Not Applicable." Examples of non- Spoofing 12 Gain Privileges or Assume Identity 12
applicable ASVS requirements in this case study are listed in Table 9. Tampering 15 Modify Application Data 7
Modify Memory 0
In summary, there are 261 out of 286 ASVS requirements have been
Modify Files or Directories 4
determined to be "applicable" to the security verification. Unexpected State 3
Alter Execution Logic 1
Repudiation 4 Hide Activities 4
6.1. Analysis results using the model Information 17 Read Application Data 12
Disclosure Read Memory 0
In this section, we describe analysis which is used mainly to support Read Files or Directories 5
security analysts in formulating analytics for discovering, interpreting, Denial of Service 7 DoS: Instability 0
DoS: Resource Consumption (CPU) 3
and communicating significant patterns in data. We begin by calculating DoS: Resource Consumption (Memory) 1
the security strength using the evaluation model and aggregating the DoS: Crash, Exit, or Restart 1
verification findings of ASVS. Table 10 presents the summary of the SOI DoS: Resource Consumption (Other) 2
and evaluation-aspect scores. The SOI score is 7.721, which indicates Elevation of Privilege 11 Execute unauthorised Code or 1
Command
that the SOI has a “Good Security” rating. The weight factors for the
Bypass Protection Mechanism 10
three evaluation aspects are given using a subjective weighting
approach. In this case, the stakeholders rated the higher weight on
“Software Structure” among the three aspects. functioning properly. Fig. 9 illustrates the drill-down scenarios in the
Fig. 8 depicts an example of the "next-level" security strength anal security strength analysis. For instance, it is discovered that the security
ysis, concentrating on the aspect of the software structure, in which the mechanism is deficient in "Notification Functionality of Credential Up
evaluation criterion scores are shown alongside the distribution of date" after looking into the low-scoring "Credential Update” (score =
verification-case fulfillment. Among the 11 evaluation criteria, “Files 0.25). Additionally, the evaluation’s findings indicate that the "Pass
and Resource Security” has the highest score (1.00) while “Intrusion word Input Functionality" (score = 0) doesn’t seem to be prepared for
Detection and Prevention” is the lowest (0.438). “Authentication” has "Password Security." Furthermore, in the criteria of “Privacy and Data
the greatest number of verification cases and gains a moderate score of Protection”, "Cache Data Protection" is the only one of the five crucial
0.708. security mechanisms in "Sever-Side Data Protection" that does not meet
The built-in hierarchical structure in the security strength model the requirements.
allows for a very thorough breakdown and makes it simple to determine An analysis of the effect of the found CWE on the security properties
whether the necessary security mechanisms are implemented and
11
Downloaded from https://iranpaper.ir
https://www.tarjomano.com https://www.tarjomano.com
S.-F. Wen and B. Katt Computers & Security 135 (2023) 103532
12
Downloaded from https://iranpaper.ir
https://www.tarjomano.com https://www.tarjomano.com
S.-F. Wen and B. Katt Computers & Security 135 (2023) 103532
Hai, H.D., Nga, P.T., 2018. Evaluating the security levels of the Web-Portals based on the Sabatier, P.A., 1986. Top-down and bottom-up approaches to implementation research: a
standard ISO/IEC 15408. In: in Proceedings of the 9th International Symposium on critical analysis and suggested synthesis. J. Public Policy 6 (1), 21–48 pages.
Information and Communication Technology. Schechter, S.E., 2004. Computer Security Strength and risk: a Quantitative Approach.
Harrison, S., et al. 2016. "A security evaluation framework for UK e-goverment services Harvard University.
agile software development". arXiv preprint. Shostack, A., 2014. Threat modeling: Designing for Security. John Wiley & Sons.
Herrmann, D.S., 2002. Using the Common Criteria For IT Security Evaluation. CRC Press Shukla, A., et al. 2021. "System Security Assurance: A Systematic Literature Review".
volume. arXiv preprint.
ISO/IEC, "Information security, cybersecurity and privacy protection — Evaluation Sönmez, F.Ö., 2019. Security qualitative metrics for open web application security
criteria for IT security — Part 1: Introduction and general model"; Available from: project compliance. Proced. Comp. Sci. 151, 998–1003 issue, pages.
https://www.iso.org/standard/72891.html. (Accessed on Jan. 21, 2023). Vache, G., 2009. Vulnerability analysis for a quantitative security evaluation. In: 2009
Kim, D., Solomon, M.G., 2010. Fundamentals of Information Systems Security. Jones & 3rd International Symposium on Empirical Software Engineering and Measurement.
Bartlett Publishers volume. IEEE.
LeMay, E., et al., 2011. Model-based security metrics using adversary view security W3C, "RDF 1.1 XML Syntax"; Available from: https://www.w3.org/TR/rdf-syntax
evaluation (advise). In: 2011 Eighth International Conference on Quantitative -grammar/. (Accessed on Jan. 26, 2022).
Evaluation of SysTems. IEEE. Weldehawaryat, G.K., Katt, B., 2018. Towards a quantitative approach for security
McGraw, G., Chess, B., Migues, S., 2009. Building security in maturity model. Fortify & assurance metrics. In: The 12th International Conference on Emerging Security
Cigital. Information.
MITRE, "Common Weakness Enumeration (CWE) "; Available from: https://cwe.mitre. Wen, S.F., Shukla, A., Katt, B., 2022. Developing Security Assurance Metrics to Support
org/index.html. (Accessed on Feb. 3, 2023). Quantitative Security Assurance Evaluation. J. Cybersecur. Priv. 2 (3), 587–605
Okamura, H., M. Tokuzane, and T. Dohi. 2013. “Quantitative security evaluation for pages.
software system from vulnerability database”. Yautsiukhin, A., et al., 2008. Towards a quantitative assessment of security in software
Ouedraogo, M., et al., 2009. Security assurance metrics and aggregation techniques for it architectures. Nordic Workshop on Secure IT Systems (NordSec), Date: 2008/10/01-
systems. In: 2009 Fourth International Conference on Internet Monitoring and 2008/10/01. Copenhagen, Denmark, Location.
Protection. IEEE. Zhou, C., Ramacciotti, S., 2011. Common criteria: Its limitations and advice on
OWASP, "OWASP Proactive Controls"; Available from: https://owasp.org/www-project- improvement. Inform. Syst. Secur. Assoc. ISSA J. 24–28 pages.
proactive-controls/. (Accessed on Feb. 3, 2023).
OWASP, "OWASP Top10 Introduction"; Available from: https://owasp.org/Top10/A00
Shao-Fang Wen (Ph.D.) is currently working as a post-doctoral research fellow in in
_2021_Introduction/. (Accessed on Apr. 27, 2022).
Norwegian University of Science and Technology. The areas of his research include
OWASP, "Software Assurance Maturity Model v2.0″; Available from: https://www.open
● Socio-technical security analysis
samm.org/. (Accessed on Apr. 30, 2022).
● Security education and learning
OWASP, "Application Security Verification Standard (ASVS)"; Available from: http
● Software security and secure programming
s://owasp.org/www-project-application-security-verification-standard/. (Accessed
● Security assurance and security testing
on Jun. 3, 2022).
● Knowledge management and ontology
Pham, N., Riguidel, M., 2007. Security assurance aggregation for it infrastructures. In:
2007 Second International Conference on Systems and Networks Communications
(ICSNC 2007). IEEE. Basel Katt is currently working as a Professor in Norwegian University of Science and
Pröllochs, N., Feuerriegel, S., 2020. Business analytics for strategic management: Technology. The areas of his research are:
Identifying and assessing corporate challenges via topic modeling. Inform. Manage. ● Software security and vulnerability analysis
57 (1), 103070 pages. ● Security assurance and security testing
Reddy, N. “An Excellent Compilation of Software Testing Concepts (Manual Testing)”. ● Model driven software development and model driven security
Ruan, Y.L., Yan, X.Q., 2018. Research on key technology of web application security test ● Access control, usage control and privacy protection
platform. In: Proceedings of International Conference on Education, Management ● Security monitoring, policies, languages, models and enforcement
and Social Science (EMSS 2018 (2018).
13