Next Article in Journal
Evaluating the Overall Accuracy of Additional Learning and Automatic Classification System for CT Images
Next Article in Special Issue
A Data-Driven Game Theoretic Strategy for Developers in Software Crowdsourcing: A Case Study
Previous Article in Journal
Thermodynamic Performance Analyses and Optimization of Dual-Loop Organic Rankine Cycles for Internal Combustion Engine Waste Heat Recovery
Previous Article in Special Issue
Effect of Fiber Weave Structure in Printed Circuit Boards on Signal Transmission Characteristics
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Defining the Minimum Security Baseline in a Multiple Security Standards Environment by Graph Theory Techniques

Vilnius Gediminas Technical University, Saulėtekio al. 11, Vilnius LT-10223, Lithuania
*
Author to whom correspondence should be addressed.
Appl. Sci. 2019, 9(4), 681; https://doi.org/10.3390/app9040681
Submission received: 20 December 2018 / Revised: 4 February 2019 / Accepted: 13 February 2019 / Published: 17 February 2019
(This article belongs to the Special Issue Applied Sciences Based on and Related to Computer and Control)

Abstract

:
One of the best ways to protect an organization’s assets is to implement security requirements defined by different standards or best practices. However, such an approach is complicated and requires specific skills and knowledge. In case an organization applies multiple security standards, several problems can arise related to overlapping or conflicting security requirements, increased expenses on security requirement implementation, and convenience of security requirement monitoring. To solve these issues, we propose using graph theory techniques. Graphs allow the presentation of security requirements of a standard as graph vertexes and edges between vertexes, and would show the relations between different requirements. A vertex cover algorithm is proposed for minimum security requirement identification, while graph isomorphism is proposed for comparing existing organization controls against a set of minimum requirements identified in the previous step.

Graphical Abstract

1. Introduction

In response to the increasing amount of cyberattacks, government regulatory authorities’ pressure is increasing since they are concerned in the current situation with information and personal data protection. As an example of increasing regulatory pressure, the European Union General Data Protection Regulation (GDPR) [1] can be mentioned, which came into power on May 2018 and is applicable for all organizations.
Trying to protect their most valuable assets, organizations deploys controls that reduce existing risks. One of the best approaches for the organization would be the implementation of all applicable security standard controls. The main issue in such a case is related to the fact that applied controls have different effectiveness and cost, and from an organization’s point of view it is critical to ensure that enforced security controls are cost-effective and guarantee the needed level of protection. This task can be solved by implementing only mandatory requirements, which would be part of the minimum security baseline of a security standard or set of standards.
Another problem, which is becoming more and more important nowadays, is related to the fact that in order to achieve a competitive advantage, an organization has to be aligned with more than one security standard. For example, financial organizations could be required to be compliant with the Payment Card Industry Data Security Standard (PCI DSS) [2] requirements (in case they process cardholder data) and the Sarbanes–Oxley (SOX) Act [3], which is applicable for all organization that provide financial services in the USA. The fact that SOX controls can be covered by implementing different frameworks, such as Control Objectives for Information and Related Technologies COBIT [4] or Committee of Sponsoring Organizations of the Treadway Commission COSO [5], complicates the situation even more. In such a case it is necessary to ensure that redundant controls are not implemented and there are no overlapping or conflicting controls. However, when an organization is fulfilling requirements from a set of standards, it is difficult to ensure effective cost management of security control implementation. The main issues are related to the fact that different standards define requirements with a different level of detail. This can lead to a situation where different technical solutions might cover the same requirement coming from different standards in the same organization. The most common solutions currently used are different harmonization techniques that visualize possible results. There exist a few different methods on how different standards can be linked. These techniques can be grouped into four main areas: semantic compatibility, mapping, adaptive mapping, and integration. Furthermore, 2.5D [6], 3D [7], or chord diagrams [8] can be used for harmonization results visualization. These techniques for harmonization and visualization allow us to understand links of different standards. However, identification of mandatory requirements still requires manual review of mapped information.
In order to solve this problem, we propose linking different standards with the help of graphs, where security requirements are presented as a graph’s vertexes. It allows us to use graph theory methods and especially graph optimization algorithms, such as vertex cover and graph isomorphism properties, for identifying overlapping and redundant controls. In our case, we propose the usage of a vertex cover algorithm for identification of the minimum set of security requirements in instances where an organization has to be aligned with multiple security standards. When a set of minimum security requirements is identified, graph isomorphism algorithms are applied for automatic verification of similarities between controls already implemented by the organization and the minimum security set determined by the vertex cover algorithm.
In the review part of this article, a brief summary of information on existing methods of various security standard harmonization, minimum security baseline definition, vertex cover, and graph isomorphism verification algorithms will be provided. Then, the proposed methods on security standards representation in the form of a graph, graph-based mapping of multiple security standards, and extraction of minimum security baseline by means of a vertex cover algorithm are described and tested. The method for collating the received minimum security baseline with currently implemented controls is proposed and verified. Finally, the conclusions are provided, and topics for further research are discussed.

2. Prior and Related Work

From the security point of view, an organization has to implement controls that would let an organization protect its most valuable assets, which can be achieved using different methods and techniques. One of the ways would be to apply a multi-criteria model for management decision making oriented to cost-effective management [9]. Another approach is the implementation of requirements defined by information security standards or best practices. In such a case, an organization would be able to prove that it ensures “due diligence” and “due care” principles. Organizations that are planning to implement information security standards or best practices have to verify the organization’s components to be protected and the applicable requirements for protection. While some regulations and standards are mandatory (e.g., GDPR [1], PCI DSS [2], and Health Insurance Portability and Accountability Act (HIPAA) [10]), others are not, however, making it important to ensure that an organization’s environment and information are protected adequately.
Problems arise from the fact that organizations are required to be aligned with more than one security standard or other regulating documents. A most famous example would be requirements for financial organizations to be aligned with Payment Card Industry Data Security Standard [2] (PCI DSS) requirements and the Sarbanes–Oxley Act [3], or requirement to be alignment with ISO 27001/ISO27002 [11] and PCI DSS. To solve this issue, scientists and researchers are using harmonization techniques [12,13]. The most popular technique is mapping when two different documents or framework requirements are linked to one another [14]. We have proposed the use of adaptive mapping through security ontology [15], which would allow the linking of different standards and identification of the level of coverage between different standards. Another method of analysis of information security standard requirements and their interlinks would be the usage of data mining and knowledge discovery techniques [16].
In many cases, organizations decide to implement only mandatory security standard requirements that are named as a minimum security baseline (MSB). MSB is a set of primary security objectives that must be met by any given service or system [17]. In other words, the MSB would be a subset of an information security standard and could be represented as a subpart of it. The standard approach for minimum security baseline identification is the use of expert knowledge [18]. Information security specialists review the standard or framework and identify which requirements are mandatory and are a part of the MSB. Some researchers propose the use of Delphi method research for IT governance MSB identification [19]. The main disadvantages of these methods are related to the fact that they are based on expert knowledge, could be influenced by subjective opinion, are not affordable for small and medium-sized enterprises (SMEs), and cannot be easily adapted for dynamic changes in the information security area.
The previously proposed adaptive mapping method [15] was useful for an understanding of the overall security requirements and visualization of their connections but could not be used for MSB identification. It was proved in articles [20,21], that where security requirement implementation cost evaluation through control-based method were proposed, security controls and security standard requirement presentation as nodes and their connections as a link between nodes, was effective.
For MSB identification, we propose to present information security standards as undirected graphs, where the graph is defined as a pair of sets (V, E), where V is the set of vertices and E is the set of edges formed by pairs of vertices [22]. In our case, security requirements are graph nodes, and edges between graph nodes show the links between these requirements. When two or more information security standards have to be mapped, a new graph is created by establishing relationships between the corresponding requirements of these standards. Previously created graphs of information security standards will be the subgraphs of a newly created graph. For simplicity purposes, we state that if requirements of different standards are linked, i.e., have edges between vertexes, then they define the same requirement and duplicate each other, although in reality requirements cannot be entirely identical and could define security requirement with different levels of detail. For MSB identification duplication, requirements will be removed from the new graph by applying vertex cover algorithms.
Vertex cover is one of the graph related problems, where the primary objective is to extract a set of vertices of a specific graph, which cover all graph edges. A vertex cover in an undirected graph G = (V, E) is the subset of vertices S ⊆ V where every edge (u, v) in the graph G is connected to at least one vertex of S; in other words, if edge (u, v) is an edge of G, then either u is in V or v is in S or both. The size of a vertex cover is the number of vertices it contains [23]. A minimum vertex cover is a vertex cover having the smallest possible number of vertices for a given graph [24]. Vertex cover and Minimum vertex cover examples presented on Figure 1. There also exist minimum weighted vertex cover algorithms with a weight function R associated with each vertex [25].
Vertex cover problems are widely used in the information technology area, for example in solving network base routing delays [26] or network traffic measurements [27]. They are also used in biology for analysis of population-based evolutionary research [28] and many other areas. Vertex cover is an NP-complete problem. This statement was proved by Karp [29] in 1972. Chataval [30] has proposed the use of the approximation algorithm “maximum degree greedy”, Clarkson has modified this approach and offered to perform a selection based on the degree [31], and Balaji, Swaminathan, and Kannan [32] have proposed a method based on new criteria, which was named support of vertex. There exist other vertex cover algorithms, such as nearly optimal vertex cover NOVAC-1 [33], advanced vertex support algorithm AVSA [34] and modified vertex support algorithm MVSA [35], and heuristic algorithms ListLeft and ListRight [36]. Some studies performed comparisons [37] of existing minimum vertex cover algorithms. Pseudo code for minimum vertex cover algorithms can be found in the article [38].
After identification of MSB, we can compare how controls implemented by an organization are aligned with it. Controls implemented by an organization can also be presented as a graph. This graph can be compared with a received MSB graph to verify their alignment. We propose the use of a subgraph isomorphism algorithm for this purpose. Graphs G and G′ are said to be isomorphic [39] if there exists a pair of functions f: V → V′ and g: E → E′ such that f associates each element in V with precisely one element in V′ and vice versa; g associates each element in E with just one element in E′ and vice versa; and for each v ∈ V and each e ∈ E, if v is an endpoint of the edge e, then f(v) is an endpoint of the edge g(e). Subgraph isomorphism from H to G is a function f: VH → V such that if (u, v) ∈ EH, then (f(u), f(v)) ∈ E. Furthermore, f is an induced subgraph isomorphism if in addition (u, v) ∉ EH, then (f(u), f(v)) ∉ E. In other words graph isomorphism helps in verifying exact structural matching between 2 different graphs, even if they are represented in different ways. Graph matching is the process of comparing two graphs to find an appropriate correspondence between their vertexes and edges. It refers to finding mapping solution S from the nodes of one graph G to the nodes of other graph G’ that satisfies predefined criteria and ensure that the structure of one graph is similar to substructures of another graph. Subgraph isomorphism example presented on Figure 2. Subgraph isomorphism helps to verify structural matching between the graph and part of another graph.
This property is widely used to analyze information and search similar patterns in different structures, which are presented as graphs, e.g., image processing [40,41], where graph isomorphism is used to match two different images or social networks [42,43], where it is used for patterns analysis. However, the main area of isomorphism applicability is biology and chemistry, where subgraph isomorphism is used for chemical bond structure [44] and protein structure analysis [45]. It is necessary to mention that this problem could be solved in polynomial time. However, it was not proved that this problem is NP-complete and different researchers have proposed two main ways to do subgraph isomorphism problem solving: try to identify exact subgraph matching identification or use approximate subgraph matching.
A generic subgraph isomorphism identification algorithm is presented in the article [46]. Other examples of exact matching algorithms are GraphGrep [47] and FG-Index [48]. These algorithms use indexes, which allow one to reduce the number of candidates for a potential solution and later perform verification of chosen candidates. Other algorithms, like Ullmann [49], VF2 [50], QuickSI [51], and SPath [52] find all embedding for the given query and original graph. Approximate algorithms, such as SIGMA [53] and Ness [54], are finding approximate embedding and verify isomorphism through similarity measures.

3. The Proposed Method for MSB Identification and Verification Against Deployed Controls

Identification of a minimum set of security requirements, i.e., of only mandatory security standard requirements, is a challenging task. The scope of the MSB depends on the needs of the organization [55]. The objectives are chosen to be pragmatic and complete and do not impose technical means. Since MSB is a set of compulsory requirements for all systems [17] and presents a subset of information security standard requirements, formation of such a set of sets in cases of multiple security standards becomes even more complicated. Currently, organizations are solving this issue by applying risk analysis and risk management techniques, which allow them to evaluate business demands and existing environments, and to summarize the list of security requirements applicable to the organization. Unfortunately, such an approach is based on subjective factors, such as security expert knowledge, skills, and experience. Well known vendors, such as Microsoft [56] and Cisco [57], are publishing recommendations related to the configuration of their products. International associations, such as the Center of Internet Security [58], are publishing recommendations with a list of the most effective risk mitigation controls. However, such approaches are ad hoc-based and are not directly linked with existing security standards. MSB verification could be implemented in different ways, starting from the expert review [18], including information security consultant analysis. Authors of [18] conducted an explorative expert study to derive a set of COBIT 5 processes that could serve as a basis for an enterprise governance of IT implementation and discussed how this approach could contribute to complexity reduction. This research was based on an earlier [19] study, which was focused on identifying which practices (structures, processes, and relational mechanisms) an organization could leverage to ensure that IT governance becomes a reality in the organization. However, it is also necessary to state that both [18] and [19] concentrated on general IT management processes, rather than security MSB. Some other approaches utilize penetration testing or use of specific tools, such as vulnerability scanners, for potential security gap identification [59]. However, the use of tools will not link the identified gaps with applicable security standards.
In this article, we are presenting a holistic method for solving two different problems: MSB identification and its verification against controls implemented by the organization. The method is based on graph theory and graph optimization algorithms (vertex cover and subgraph isomorphism).
For MSB identification the use of a vertex cover algorithm is proposed. It is used for amending the created mapping graph, by removing from it specific vertexes. However, we have to ensure that only duplicated requirements will be removed. To achieve that we have two options:
  • to apply minimum weighted vertex cover algorithms in order to ensure those critical requirements having a lower value will be presented in a newly generated graph;
  • to apply the selected minimum vertex cover algorithm with additional rules to ensure that higher level security requirements will not be overwritten by lower level requirements, and requirements without direct connections with another standard will not be removed.
The second option was selected for implementation for simplicity reasons. The following rules were specified to ensure prioritization of specific requirements:
  • Restriction to remove requirements, with a connection to parent vertex but no links to other standards. To achieve that, additional null vertex to such vertex will be added.
  • Additional evaluation of removed vertexes in order to ensure that vertexes without a direct connection to other standards are not removed from the graph. If such vertex were removed, we would restore them manually.
The method is formed of 4 main steps (schematic method representation is provided on Figure 3):
  • represent information security standards’ requirements to be mapped as separate graphs;
  • generate a new graph by linking requirements of N subgraphs (representing different information security standards);
  • add a vertex to the vertexes with a single edge;
  • apply minimum vertex cover algorithm.
After the vertex cover algorithm is applied, we have to ensure that vertexes without a direct connection to other standards that were removed from the graph are restored. The outcome of this process will be the MSB graph.
The formal MSB identification method described with the help of a Business Process Model and Notation (BPMN) diagram is presented in Figure 4.
In Table 1 a detailed description of actions defined in Figure 4 is provided.
When the MSB graph is identified in the next step, we perform its verification against controls already deployed by the organization. As stated earlier, subgraph isomorphism algorithms are used for that task. In our case, it is not significantly important which subgraph isomorphism algorithm will be used, since our primary goal is to perform a feasibility study of such an approach and its practical applicability.
In this step, controls implemented by the organization are presented as a deployed control graph (DCG), which is compared to the received MSB graph to verify their alignment.
It is important to mention that the DCG graph may have stand-alone vertexes, i.e., not connected with any other vertexes, which is usually caused by inconsistency while developing the information security management system (ISMS). As such, it is necessary to ensure that all controls (even stand-alone) are verified, which is achieved by introducing two additional conditions.
For simplicity reasons, while implementing the subgraph isomorphism algorithm, any other vertex verification properties (e.g., name matching or properties matching) will not be used. Usage of additional verification properties potentially could make the approach more effective. However, it is not so important at this stage when just method feasibility is evaluated.
Because of the fact that the DCG graph could have stand-alone vertexes or small subgraphs as separate parts of the DCG graph, we have to ensure that all of them are compared against the MSB graph.
The formal MSB verification against deployed controls method description with the help of the BPMN diagram is presented in Figure 5.
In Table 2 a detailed description of actions defined in Figure 5 is provided.
The method concept was tested experimentally in order to prove its feasibility for real-life applications. The test results are presented and discussed in the “Experimental Method Verification Results and Discussion” section.

4. Experimental Method Verification Results and Discussion

Three regulating documents were selected for mapping: ISO27002, PCI DSS, and a newly introduced GDPR. Mapping (see Figure 6) was based on the HITRUST CSF 9.1 framework [60], which provides a table-based mapping of the majority of modern information security standards and other regulating documents.
Each of the standards (ISO27002, PCI DSS, GDPR) was presented as a graph (sample presented in Figure 7). Cytoscape 3.6.1 application [61] was used for graph visualization.
Later, mapping of separately generated graphs from HITRUST CSF 9.1 framework was performed, although other mapping methods, like the expert-based approach, can be applied. The resulting graph (Figure 8) had 1267 vertexes (150 related to ISO27002 standard, 264 vertexes associated with PCI DSS standard, and 853 to GDPR) and 2512 edges.
Null vertexes were added in order to ensure that vertexes that do not have direct connections with other standards were not removed. Addition of null vertexes increased the size of the mapping graph by 463 vertexes.
The mapping graph was converted to the adjacency matrix by Cytoscape plug-in “Adj Exporter”. The resulting matrix (Figure 9) was saved in *.adj file.
In Figure 9, part A presents a small part of the generated adjacency matrix and part B provides a presentation of the whole matrix. Black dots on the screen provide information on graph components and connections between them. Part B view was created by an open source TreeView 3.0 Java application [62].
After the adjacency matrix was created, the vertex cover algorithm was applied. For our experiment, a C++ application developed by Dharwadker [63] implementing his proposed polynomial time, vertex cover algorithm was used. The application requires one to specify the desired size k of the resulting vertex cover. In our case, k was defined as equal to 2 in order to find all possible vertex covers. The result of vertex cover search was provided in a *.txt file and includes information on the minimum amount of vertexes and provides the list of all vertexes involved in a found vertex cover (Figure 10).
Since all obtained vertex covers with a minimum number of vertexes were equivalent, any of them could be selected for further processing. Based on the chosen vertex cover, unnecessary vertexes were removed from the mapping graph with the help of the Cytoscape application. As it can be seen, the number of vertexes was reduced significantly (from 1267 vertexes in the initial graph to 322 vertexes). The resulting MSB graph is presented in Figure 11.
For MSB verification against controls already deployed by the organization a hypothetical organization, ACME Corporation was used. It was assumed that it has already implemented logging and monitoring and backup requirements. The DCG graph for ACME Corporation was created in Cytoscape tool (Figure 12).
For identifying subgraph isomorphism between the received MSB graph and the created DCG graph for ACME Corporation, the Cytoscape plug-in “CyIsomorphism” was used [64]. The DCG graph was evaluated against the MSB graph to identify pattern similarity. In our experiment, only information about vertexes and their connections was used. Because of that more than one potential alignment was recognized by the Cytoscape tool. In order to solve this issue, additional criteria should be used in future. Manual review of alignments was performed during our experiment. The final result of DCG verification against MSB is provided on Figure 13.
The controls already deployed by ACME Corporation are shown on MSB in a yellow colour. As can be seen, the presentation of MSB in the form of the graph provides a valuable tool for a security officer for evaluating the current state of ISMS.
The performed experiment has proved the concept that vector cover and subgraph isomorphism can be used for optimizing the process of standards mapping, removing duplicated requirements, and evaluating the current state of security controls against the desired MSB level.

5. Conclusions and Future Work

The analysis performed has shown that companies are facing the steadily increasing regulating pressure in the sphere of information security. It can lead to a situation where the same requirements coming from different standards in the same organization might be covered by different technical solutions, thus increasing the company’s expenses. The problem can be solved by the consequent mapping of compulsory standards and further determination of MSB. Unfortunately, currently available methods for MSB identification are mainly expert-based, which are not affordable for SMEs and can be subjective.
A method for solving two different problems—MSB identification and its verification against controls already implemented by the organization—was proposed. The method is based on graph theory and graph optimization algorithms: minimum vertex cover and subgraph isomorphism, respectively. The method was formally described and later experimentally verified.
For proof of method feasibility, three regulating documents (ISO27002, PCI DSS, and GDPR) were presented as graphs and later mapped, forming an initial graph with 1276 vertexes. The initial graph was amended according to the method restrictions, and a new polynomial time, vertex cover algorithm was applied. The resulting MSB graph of 322 vertexes was compared against the graph, representing controls deployed by a fictional ACME Corporation, and coinciding controls were identified. The experimental test has shown the following:
  • Application of graph theory and graph optimization algorithms, such as minimum vertex cover algorithms, to the standards mapping graph can be effectively used for removing duplicating requirements and ensuring spending minimization on information security;
  • The method is capable of processing original graphs with relatively high numbers of vertexes, and the optimization rate of removed duplicated vertexes has reached 74.5% in the case of our experiment and can be even higher if a more significant number of regulating documents have to be applied;
  • Application of isomorphism features provides a user-friendly way of evaluating the current state of controls deployed by the organization against the desired MSB state.
Further research on the topic should be concentrated on minimum vertex cover algorithm and subgraph isomorphism algorithm selection and optimization for better performance, automation of actions that currently are made manually, and integration of the proposed method with our previously proposed approaches based on security ontology fostering symbiosis of these two approaches.

Author Contributions

All authors contributed to designing and performing measurements, data analysis, scientific discussions, and writing the article.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. General Data Protection Regulation. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation). Available online: http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG (accessed on 20 January 2019).
  2. PCI DSS: 2016. Payment Card Industry Data Security Standard; International Information Security Standard; PCI Security Standards Council: Wakefield, MA, USA, 2016.
  3. Sarbanes-Oxley Act of 2002. US Mandatory Regulatory Requirements; US EPA: Washington, DC, USA, 2002.
  4. ISACA. COBIT 5: A Business Framework for the Governance and Management of Enterprise IT; ISACA: Schaumburg, IL, USA, 2018. [Google Scholar]
  5. Internal Control–Integrated Framework; Developed by Committee of Sponsoring Organizations of the Treadway Commission (COSO); COSO: USA, 2013.
  6. Fung, D.C.Y.; Hong, S.H.; Koschutzki, D.; Schreiber, F.; Xu, K. 2.5D Visualisation of overlapping biological networks. J. Integr. Bioinf. 2008, 5, 90. [Google Scholar] [CrossRef]
  7. Dudas, P.M.; de Jongh, M.; Brusilovsky, P. A semi-supervised approach to visualizing and manipulating overlapping communities. In Proceedings of the 17th International Conference on Information Visualisation, London, UK, 16–18 July 2013. [Google Scholar]
  8. Telea, A.; Ersoy, O. Image-based edge bundles: Simplified visualization of large graphs. In Proceedings of the Eurographics/IEEE-VGTC Symposium on Visualization, Bordeaux, France, 9–11 June 2010; p. 29. [Google Scholar]
  9. Zavadskas, E.K.; Turskis, Z.; Vilutiene, T. Integrated group fuzzy multi-criteria model: Case of facilities management strategy selection. Expert Syst. Appl. 2017. [Google Scholar] [CrossRef]
  10. Health Insurance Portability and Accountability Act. US Mandatory Regulatory Requirements for Health Insurance Sector; HIPAA; United States Congress: Washington, DC, USA, 1996.
  11. ISO/IEC 27001 Family–Information Security Management Systems. International Organization for Standardization. Available online: https://www.iso.org/isoiec-27001-information-security.html (accessed on 5 November 2018).
  12. Souag, A.; Salinesi, C.; Comyn-Wattiau, I. Ontologies for security requirements: A literature survey and classification. In Advanced Information Systems Engineering Workshops Lecture Notes in Business Information Processing; Springer: Berlin, Germany, 2012; Volume 112, pp. 61–69. [Google Scholar]
  13. Pardo, C.; Pino, F.J.; Garcia, F.; Piattini, M.; Baldassarre, M.T. An ontology for the harmonization of multiple standards and models. Comput. Stand. Interfaces 2012, 34, 48–59. [Google Scholar] [CrossRef]
  14. Ahuja, S. Integration of COBIT, Balanced Scorecard and SSE-CMM as a Strategic Information Security Management (ISM) Framework. [Online]. 2009. Available online: https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2009-21.pdf (accessed on 11 November 2018).
  15. Ramanauskaite, S.; Olifer, D.; Goranin, N.; Cenys, A. Security ontology for adaptive mapping of security standards. Int. J. Comput. Commun. Control 2013, 8, 813–825. [Google Scholar] [CrossRef]
  16. Peng, Y.; Kou, G.; Shi, Y.; Chen, Z.X. A descriptive framework for the field of data mining and knowledge discovery. Int. J. Inf. Technol. Decis. Mak. 2008, 7, 639–682. [Google Scholar] [CrossRef]
  17. Mandatory Security Baseline Definition. CERN Computer Security. Available online: https://security.web.cern.ch/security/rules/en/baselines.shtml (accessed on 13 November 2018).
  18. Bartens, T.; de Haes, S.; Lamoen, Y.; Schulte, F.; Voss, S. On the Way to a Minimum Baseline in IT Governance: Using Expert Views for Selective Implementation of COBIT 5. In Proceedings of the 2015 48th Hawaii International Conference on System Sciences (HICSS), Kauai, HI, USA, 5–8 January 2015. [Google Scholar] [CrossRef]
  19. De Haes, S.; Van Grembergen, W. An Exploratory Study into the Design of an IT Governance Minimum Baseline through Delphi Research. Commun. Assoc. Inf. Syst. 2008, 22, 24. Available online: http://aisel.aisnet.org/cais/vol22/iss1/24 (accessed on 21 November 2018). [CrossRef]
  20. Olifer, D.; Goranin, N.; Kaceniauskas, A.; Cenys, A. Controls-based approach for evaluation of information security standards implementation costs. Technol. Econ. Dev. 2017, 23, 196–219. [Google Scholar] [CrossRef]
  21. Olifer, D.; Goranin, N.; Janulevicius, J.; Kaceniauskas, A.; Cenys, A. Integration of Controls-Based Method for Evaluation of Security Requirements Implementation Cost with BPMN and EPC Business Process Modelling Techniques (SPBP 2017); SPBP: Barcelona, Spain, 2017; pp. 698–711. [Google Scholar]
  22. Ruohonen, K. Graph Theory. 2012. Available online: http://math.tut.fi/~ruohonen/GT_English.pdf (accessed on 24 November 2018).
  23. Eshtay, M.; Sliet, A.; Sharieh, A. NMVSA Greedy Solution for Vertex Cover Problem. (IJACSA) Int. J. Adv. Comput. Sci. Appl. 2016, 7. [Google Scholar] [CrossRef] [Green Version]
  24. Minimum Vertex Cover Definition. Available on Wolfram MathWorld Portal. Available online: http://mathworld.wolfram.com/MinimumVertexCover.html (accessed on 21 November 2018).
  25. Cai, S.; Su, K.; Luo, C.; Sattar, A. NuMVC: An efficient local search algorithm for minimum vertex cover. J. Artif. Intell. Res. 2013, 46, 687–716. [Google Scholar] [CrossRef]
  26. Ding, L.; Gu, B.; Hong, X.; Dixon, B. Articulation node based routing in delay tolerant networks. In Proceedings of the IEEE International Conference, Galveston, TX, USA, 9–13 March 2009; pp. 1–6. [Google Scholar]
  27. Zeng, Y.; Wang, D.; Liu, W.; Xiong, A. An approximation algorithm for weak vertex cover problem in IP network traffic measurement. In Proceedings of the 2009 IEEE International Conference on Network Infrastructure and Digital Content, Beijing, China, 6–8 November 2009; pp. 182–186. [Google Scholar]
  28. Oliveto, P.S.; Yao, X.; He, J. Analysis of Population-based Evolutionary Algorithms for the Vertex Cover Problem. In Proceedings of the 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence), Hong Kong, China, 1–6 June 2008; pp. 1563–1570. [Google Scholar]
  29. Karp, R. Reducibility among Combinatorial Problems; Plenum Press: New York, NY, USA, 1972. [Google Scholar]
  30. Chvatal, V. A Greedy Heuristic for the Set-Covering Problem. Math. Oper. Res. 1979, 4, 233–235. [Google Scholar] [CrossRef]
  31. Clarkson, K. A modification to the greedy algorithm for vertex cover problem. Inf. Process. Lett. 1983, 16, 23–25. [Google Scholar] [CrossRef]
  32. Balaji, S.; Swaminathan, V.; Kannan, K. Optimization of Un-weighted Minimum Vertex Cover. World Acad. Sci. Eng. Technol. 2010, 67, 214–219. [Google Scholar]
  33. Gajurel, S.; Bielefeld, R. A Simple NOVCA: Near Optimal Vertex Cover Algorithm. Procedia Comput. Sci. 2012, 9, 747–753. [Google Scholar] [CrossRef] [Green Version]
  34. Khan, I.; Ahmad, I.; Khan, M. AVSA, Modified Vertex Support Algorithm for Approximation of MVC. Int. J. Adv. Sci. Technol. 2014, 67, 71–78. [Google Scholar] [CrossRef]
  35. Khan, I.; Kha, H.N. Modified Vertex Support Algorithm: A New approach for approximation of Minimum vertex cover. Res. J. Comput. Inf. Technol. Sci. 2013, 1, 7–11. [Google Scholar]
  36. Delbot, F.; Laforest, C. A better list heuristic for vertex covers. Inf. Process. Lett. 2008, 107, 125–127. [Google Scholar] [CrossRef]
  37. Khan, I.; Khan, H. Experimental Comparison of Five Approximation Algorithms for Minimum Vertex Cover. Int. J. u- e-Serv. Sci. Technol. 2014, 7, 69–84. [Google Scholar] [CrossRef]
  38. Warnow, T. Approximation Algorithms. 21 February 2005. Available online: http://tandy.cs.illinois.edu/dartmouth-cs-approx.pdf (accessed on 20 October 2018).
  39. Williams, V. Algorithms for Fixed Subgraph Isomorphism. 28 September 2016. Available online: http://theory.stanford.edu/virgi/cs267/lecture1.pdf (accessed on 21 October 2018).
  40. Sanfeliua, A.; Alquézarb, R.; Andradea, J.; Climentc, J.; Serratosad, F.; Vergésa, J. Graph-based representations and techniques for image processing and image analysis. Pattern Recognit. 2002, 35, 639–650. [Google Scholar] [CrossRef] [Green Version]
  41. Conte, D. Graph matching applications in pattern recognition and image processing. In Proceedings of the International Conference on IEEE Image Processing Proceeding, Barcelona, Spain, 14–17 September 2003. [Google Scholar]
  42. Fan, W. Graph Pattern Matching Revised for Social Network Analysis. In Proceedings of the 15th International Conference on Database Theory ICDT, Berlin, Germany, 26–29 March 2012. [Google Scholar]
  43. Raymond, J.W.; Willett, P. Maximum Common Subgraph Isomorphism Algorithms for the Matching of Chemical Structures. J. Comput.-Aided Mol. Des. 2002, 16, 521–533. [Google Scholar] [CrossRef]
  44. Balaban, A.T. Applications of Graph Theory in Chemistry. J. Chem. Inf. Comput. Sci. 1985, 25, 334–343. [Google Scholar] [CrossRef]
  45. Elmsallati, A.; Clark, C.; Kalita, J. Global Alignment of Protein-Protein Interaction Networks: A Survey. IEEE/ACM Trans. Comput. Biol. Bioinf. 2007, 6, 689–705. [Google Scholar] [CrossRef] [PubMed]
  46. Lee, J.; Kasperovics, R.; Han, W.; Lee, J. An In-depth Comparison of Subgraph Isomorphism Algorithms in Graph Databases. In Proceedings of the 39th International Conference on Very Large Data Bases, Proceedings of the VLDB Endowment, Riva del Garda, Trento, Italy, 26–30 August 2013; Volume 6, p. 2. [Google Scholar]
  47. Shasha, D.; Wang, J.T.L.; Giugno, R. Algorithmics and applications of tree and graph searching. In Proceedings of the Twenty-First ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems PODS, Madison, WI, USA, 3–5 June 2002; pp. 39–52. [Google Scholar]
  48. Cheng, J.; Ke, Y.; Ng, W.; Lu, A. Fg-index: Towards verification-free query processing on graph databases. In Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, SIGMOD, Beijing, China, 11–14 June 2007; pp. 857–872. [Google Scholar]
  49. Ullmann, J.R. An algorithm for subgraph isomorphism. J. ACM 1976, 23, 31–42. [Google Scholar] [CrossRef]
  50. Cordella, L.P.; Foggia, P.; Sansone, C.; Vento, M. A (sub)graph isomorphism algorithm for matching large graphs. IEEE Trans. Pattern Anal. Mach. Intell. 2004, 26, 1367–1372. [Google Scholar] [CrossRef] [PubMed]
  51. Shang, H.; Zhang, Y.; Lin, X.; Yu, J.X. Taming verification hardness: An efficient algorithm for testing subgraph isomorphism. Proc. VLDB Endow. 2008, 1, 364–375. [Google Scholar] [CrossRef]
  52. Zhao, P.; Han, J. On graph query optimization in large networks. Proc. VLDB Endow. 2010, 3, 340–351. [Google Scholar] [CrossRef] [Green Version]
  53. Mongiovi, M.; Natale, R.D.; Giugno, R.; Pulvirenti, A.; Ferro, A.; Sharan, R. Sigma: A set-cover-based inexact graph matching algorithm. J. Bioinf. Comput. Biol. 2010, 8, 199–218. [Google Scholar] [CrossRef]
  54. Khan, A.; Li, N.; Yan, X.; Guan, Z.; Chakraborty, S.; Tao, S. Neighborhood based fast graph search in large networks. In Proceedings of the SIGMOD, Athens, Greece, 12–16 June 2011; pp. 901–912. [Google Scholar]
  55. Minimum Baseline Standart Explanation Developed by Information Systems Security Association (New York Metro Chapter). Available online: https://www.nymissa.org/wp-content/uploads/2016/01/Minimum-Baseline-Standards-Presentation_02-21-2016.pdf (accessed on 24 November 2018).
  56. Microsoft Security Recommendations. Available online: https://blogs.technet.microsoft.com/secguide/ (accessed on 25 January 2019).
  57. Cisco Network Security Baseline. Available online: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/Baseline_Security/securebasebook.html (accessed on 25 January 2019).
  58. Cybersecurity Best Practices Developed by Center for Internet Security. Available online: https://www.cisecurity.org/cybersecurity-best-practices/ (accessed on 25 January 2019).
  59. Vulnerability Scanning Tools for Potential Security Gaps Identification. Available online: https://www.tenable.com/products/tenable-io (accessed on 25 January 2019).
  60. HITRUST Cyber Security Framework v9.1. 2018. Available online: https://hitrustalliance.net/ (accessed on 15 October 2018).
  61. Cytoscape Is an Open Source Software Platform for Visualizing Complex Networks and Integrating These with any Type of Attribute Data–Cytoscape 3.6.1. Available online: http://www.cytoscape.org (accessed on 15 October 2018).
  62. Open-Source Java App for Visualizing Large Data Matrices–TreeView 3.0. Available online: https://bitbucket.org/TreeView3Dev/treeview3/ (accessed on 15 October 2018).
  63. Dharwadker, A. The Vertex Cover Algorithm. 10 October 2011. Available online: http://www.dharwadker.org/vertex_cover/ (accessed on 20 October 2018).
  64. CyIsomorphism Is a Cytoscape App that Provides All the Matchings from a Subgraph of Network 1 to Network 2 Satisfying the Isomorphism Property. Available online: http://apps.cytoscape.org/apps/cyisomorphism (accessed on 25 October 2018).
Figure 1. Vertex cover schema.
Figure 1. Vertex cover schema.
Applsci 09 00681 g001
Figure 2. Graph isomorphism and subgraph isomorphism.
Figure 2. Graph isomorphism and subgraph isomorphism.
Applsci 09 00681 g002
Figure 3. Schematic MSB identification method representation. PCI DSS is payment card industry data security standard.
Figure 3. Schematic MSB identification method representation. PCI DSS is payment card industry data security standard.
Applsci 09 00681 g003
Figure 4. Minimum security baseline identification method.
Figure 4. Minimum security baseline identification method.
Applsci 09 00681 g004
Figure 5. Method of MSB verification against deployed controls.
Figure 5. Method of MSB verification against deployed controls.
Applsci 09 00681 g005
Figure 6. GDPR–ISO27002–PCI DSS mapping (partial view).
Figure 6. GDPR–ISO27002–PCI DSS mapping (partial view).
Applsci 09 00681 g006
Figure 7. Security standard graph (partial view).
Figure 7. Security standard graph (partial view).
Applsci 09 00681 g007
Figure 8. ISO27002–PCI DSS–GDPR mapping graph (Partial view).
Figure 8. ISO27002–PCI DSS–GDPR mapping graph (Partial view).
Applsci 09 00681 g008
Figure 9. Adjacency matrix for the mapping graph ((a) Matrix view, (b) Heat view).
Figure 9. Adjacency matrix for the mapping graph ((a) Matrix view, (b) Heat view).
Applsci 09 00681 g009
Figure 10. List of potential vertex cover (Partial view).
Figure 10. List of potential vertex cover (Partial view).
Applsci 09 00681 g010
Figure 11. Minimum security baseline graph.
Figure 11. Minimum security baseline graph.
Applsci 09 00681 g011
Figure 12. DCG for ACME Corporation.
Figure 12. DCG for ACME Corporation.
Applsci 09 00681 g012
Figure 13. Identified isomorphic parts of MSB and DCG.
Figure 13. Identified isomorphic parts of MSB and DCG.
Applsci 09 00681 g013
Table 1. Minimum security baseline (MSB) identification method action description.
Table 1. Minimum security baseline (MSB) identification method action description.
Action No.Description
IStandards’ requirements are presented hierarchically.
If vertexes have edges between them that means that requirements are identical.
Differentiation by coverage level is out of scope for this method feasibility verification.
In case our task link directions are not important.
IIGenerated graph is reviewed, and temporary vertexes are added.
Additional vertexes are added to the graph in order to ensure that the minimum vertex cover algorithm will not remove existing vertexes that do not have direct connections with other standards.
IIIThe mapping graph is represented as an adjacency matrix for technical processing by a vertex cover algorithm.
IVVertex cover algorithm is applied. The result is presented in the form of rows.
Since we assume that duplicated vertexes are identical, and the removal of any vertex would provide a suitable result, this leads to the situation when several similar solutions (several rows) can be generated.
To present it as a graph, we extract identified vertexes and edges from the initial mapping graph.
VVertexes without a direct connection to other standards that were removed from the mapping graph are restored (the process is currently manual).
Due to different levels of detail in various standards, the future approach could make use of additional criteria, which would allow removing vertexes, with a specified level of detail.
Table 2. The formal MSB verification against deployed controls method actions description.
Table 2. The formal MSB verification against deployed controls method actions description.
Action No.Description
IThis action includes two main activities:
Information gathering about controls deployed;
Presentation of information gathered in the form of a graph.
Information gathering could be done manually or by automation tools that can process Business Process Model and Notation (BPMN) or Event-Driven Process Chain (EPC) diagrams.
The generated graph may have stand-alone vertexes, i.e., not connected with any other vertexes.
The process of identification of links between controls in the organization is a complicated task and could be accelerated if it is known if the organization is compliant with one or another security standard.
IIMSB and deployed control graphs (DCGs) (or their representation form, like adjacency matrix, table) are imported to the graph processing tool, and the subgraph isomorphism algorithm is executed.
If DCG graph has stand-alone vertexes or small subgraphs, then the subgraph isomorphism algorithm is executed for each of them separately.
IIISince a stand-alone vertex is isomorphic to any vertex of MSB, additional verification based on a specified criterion (e.g., semantic similarity) should be used.
Error verification can be done automatically, by applying addition verification criteria and re-executing the subgraph isomorphism algorithm against subgraph or manually by a security specialist.
IVControls required by MSB but are not present in DCG are identified.

Share and Cite

MDPI and ACS Style

Olifer, D.; Goranin, N.; Cenys, A.; Kaceniauskas, A.; Janulevicius, J. Defining the Minimum Security Baseline in a Multiple Security Standards Environment by Graph Theory Techniques. Appl. Sci. 2019, 9, 681. https://doi.org/10.3390/app9040681

AMA Style

Olifer D, Goranin N, Cenys A, Kaceniauskas A, Janulevicius J. Defining the Minimum Security Baseline in a Multiple Security Standards Environment by Graph Theory Techniques. Applied Sciences. 2019; 9(4):681. https://doi.org/10.3390/app9040681

Chicago/Turabian Style

Olifer, Dmitrij, Nikolaj Goranin, Antanas Cenys, Arnas Kaceniauskas, and Justinas Janulevicius. 2019. "Defining the Minimum Security Baseline in a Multiple Security Standards Environment by Graph Theory Techniques" Applied Sciences 9, no. 4: 681. https://doi.org/10.3390/app9040681

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop