<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>International Journal of
Management Science and Engineering Management</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1109/ISGTEurope.2017.8260283</article-id>
      <title-group>
        <article-title>Method and STRIDE Model for Learning Management Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Taras Lechachenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tomasz Gancarczyk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Taras Lobur</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Postoliuk</string-name>
          <email>mrapostoliuk@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ternopil Ivan Pulyuj National Technical University</institution>
          ,
          <addr-line>Ruska, 56, Ternopil, 46001</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Bielsko-Biala</institution>
          ,
          <addr-line>Willowa St. 2, Bielsko-Biala, 43-300</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2017</year>
      </pub-date>
      <volume>2762</volume>
      <fpage>41</fpage>
      <lpage>53</lpage>
      <abstract>
        <p>The algorithm of cybersecurity assessments for learning management systems (LMS) based on the STRIDE and a multi-criteria decision support TODIM study. Fuzzy sets were used in the proposed algorithm to formalize the values of TODIM criteria. Numerical result of the algorithm application for evaluating cyber threats for LMS was presented.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In the context of hybrid warfare and mass digitalization of society in Industry 4.0, protecting
against cyber attacks has become an increasingly pressing challenge. In the era of Industry 4.0, cyber
attacks pose a significant threat to critical sectors of the economy and can disrupt their stable
functioning. Ensuring secure operation of information systems in cyberspace is a complex task, as the
multi-vector nature of cyber threats and the wide range of software vulnerabilities associated with
specific cyber attacks make it difficult to ensure the security of these systems.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature Review</title>
      <p>
        In the scientific discourse, studies have been presented that address the issue of analyzing the
security of learning management systems (LMS). In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], a security profile for administering online
exams in LMS Moodle is presented. It is noted that Moodle can be effectively utilized for knowledge
assessment, provided that the system
is properly configured and
deployed
within a secure
infrastructure. In the research conducted in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], an analysis of vulnerabilities in 15 distance learning
      </p>
      <p>
        2023 Copyright for this paper by its authors.
platforms is performed using Netsparker and Acunetix scanners. A total of approximately 12
vulnerabilities are identified in this study, with the highest proportion consisting of HTTP
authentication and XSS vulnerabilities. It is worth noting that this research employed automated
vulnerability detection tools, which should also be critically interpreted by experts. In the study [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ],
vulnerabilities and protection of M-learning platforms in cloud environments are examined. The
authors provide examples of cyber-attacks on cloud services, including DDOS, malware injection
attacks, side channel attacks, authentication and MITM attacks, and virtual machine escape. It should
be noted that the study focuses on attacks and vulnerabilities primarily related to the deployment
infrastructure of M-learning. In the study [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], an analysis of 11 web threats related to LMS is
conducted, along with proposed measures for their mitigation. It should be noted that the study has, in
particular, an overview character. In the work [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], the authors propose a functional model of
information system security, which is based on decomposing the system into individual functions and
identifying stakeholders interacting with the system. An example of applying the developed model is
provided in the work, focusing on the registration functionality of the learning management system
and associated vulnerabilities and potential cyber-attacks. The study presents numerical results
obtained from applying the model.
      </p>
      <p>Analyzing the cited studies, it should be noted that the problem of quantitative risk assessment of
cyber-attacks and vulnerabilities in learning management systems (LMS) is insufficiently addressed
in the scientific discourse. In particular, there is a lack of research on comprehensive expert
assessment of cyber risks in LMS, considering the comparative evaluation of alternative systems
during their implementation, i.e., ranking alternatives based on criteria. This study proposes an
algorithm for assessing cyber threat risks in LMS using multi-criteria analysis of alternatives based on
selected criteria.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Models and methods</title>
      <p>
        Among the risk assessment models, it is worth noting the PASTA model [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], which consists of
seven steps: goal definition, technical environment identification, decomposition and analysis
application, threat analysis, weakness and vulnerability analysis, attack simulation and modeling, risk
analysis and management. Another risk analysis model is LINDUNN [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], which consists of the
following steps: constructing a data flow diagram, identifying security threats to the elements of the
data flow diagram, defining negative scenarios, prioritizing risks, defining security requirements, and
selecting security improvement solutions. The Fault Tree Analysis method [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], is based on
decomposing an undesired event into possible components that led to its occurrence. The research [9]
describes the OCTAVE threat assessment method, which consists of the following phases:
constructing a threat profile based on assets, identifying infrastructure vulnerabilities, and developing
security strategies and plans. Each phase, in turn, encompasses specific processes.
      </p>
      <p>This study utilizes the STRIDE cyber threat risk analysis model [10], which assesses the following
security threats: Spoofing: Masquerading of a legitimate user, processor system element. Tampering:
Modification/editing of legitimate information. Repudiation: Denying or disowning a certain action
executed in the system. Information disclosure: Data breach or unauthorized access to confidential
information. Denial of Service (DoS): Disruption of service for legitimate users. Elevation of
privilege: Getting higher privilege access to a system element by a user with restricted authority. The
selection of the STRIDE risk assessment model is associated with criteria describing fundamental and
core cybersecurity threats, which are critical to the operation of learning management systems. It
should be noted that the threats in the STRIDE model, due to their foundational nature, are
comprehensive and encompass various subtypes and methods that implement each threat. The
algorithm for assessing the security of learning management systems (LMS) against cyber threats
based on the STRIDE model will consist of the following steps:
1. Formation of the evaluation criteria set based on STRIDE.
2. Selection of experts for assessment.
3. Assignment of linguistic evaluations by the experts for each evaluation criterion.
4. Translation of linguistic variables into numbers of fuzzy sets.
5. Aggregation of fuzzy evaluations.
6. Determination of the comparative security assessment of LMS using Multiple Criteria
Decision Making (MCDM) with the representation of alternative rankings.</p>
      <p>In this study, the TODIM [11] method of Multiple Criteria Decision Making (MCMD), belonging
to the family of decision support methods, is chosen to be used. The MCMD methods are based on the
comparative analysis of alternatives by finding the distances of criterion evaluations from absolute
minimum and maximum values or by assessing the dominance of alternatives among each other. The
motivation for using the TODIM method in this study is its ability to consider the decision maker's
attitude towards losses when ranking alternatives. The TODIM method incorporates a coefficient that
mitigates the effect of losses based on prospect theory. This characteristic of the TODIM method is an
important factor in assessing the risks of cyber threats, as cybersecurity threats are complex and may
involve various tools for their realization using different types of vulnerabilities, requiring critical
prioritization.</p>
      <p>Let's present the algorithm of the TODIM [12] method. Let a1 ,a2 ,...am be a set of alternatives,
c1 ,c2 ,...cnbe a set of criteria with their corresponding w1 ,w2 ,...cn weights satisfying the
n
condition wi 0,1 and  wi  1 . We construct a matrix a  dij mn , dij where represents the
i1
evaluation of alternative ai ( i  1,2,...m ) based on criterion c j ( j  1,2,...n ) . Let's assume that
wjk  wj / wk
wk  max( wj )
are the relative weights for each criterion c j ,
k , j  1,2...,n . The TODIM method consists of the following steps:
ct where
1. Normalization a  dij mx into a  dij mx .
2. Calculation of alternative ai dominance over at alternative based on criterion c j . In this case,
consider the factor  as a mitigating factor for loss effects. Thus, the calculation is as follows:</p>
      <p>if dij  dtj  0
n
 ( ai ,at )   j ( ai ,at )( i,t  1,2...,m )
j1




 j ( a i ,at )  0

 1</p>
      <p>To evaluate the alternatives, it has been decided to use intuitionistic fuzzy sets [13] and the
corresponding scale of linguistic variables as in the work [14]:
Where  j ( ai ,at )( dij  dtj  0 ) represents advantage and  j ( ai ,at )( dij  dtj  0 ) represents loss.
3. Calculation of the overall evaluation according to the formula:
 ( ai ) 
m  m 
 ( ai ,at )  min  ( ai ,at )
t1  1 
 m   m 
max  ( ai ,at )  min  ( ai ,at )</p>
      <p> 1   1 
dij  IFWAr ( rij( 1 ) ,ri(j 2 ) ,....,ri(j k ) )  1ri(j 1 ) ,2ri(j 2 ) ,...,k ri(j k )</p>
      <p> k k k k
 1  ( 1  ilj )l ,( i(jl ) )l ,( 1   ilj )l  ( i(jl ) )l  .</p>
      <p> l1 l1 l1 l1 </p>
      <p>Where rij( k ) represents the і- assessment of k-expert on j criterion, k - represents the weight of
the expert, and ilj , i(jl ) are fuzzy intuitionistic numbers.</p>
      <p>The distance between intuitionistic numbers A and B are calculated using the distance [16]:
1
dH ( A, B )  2n in1   A( xi )   B ( xi )   A( xi )  B( xi )   A( xi )  B( xi )  (4)
To ensure accurate representation of calculations involving fuzzy intuitionistic numbers, we
modify the conditions for determining distances in the TODIM method as follows:




 j ( a i ,at )  0

 1
Where  j ( ai ,at )( dij  dtj ) represents advantage and  j ( ai ,at )( dij  dtj ) represents loss.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Results</title>
      <p>The assessment of LMS vulnerabilities to STRIDE cyber threats is conducted using the most
popular learning management systems within both international and domestic educational
environments, including Moodle, Atutor, and Ilias,. Three experts have been selected to evaluate the
degree of security of the LMS. The educational background of the experts aligns with the field of
cybersecurity, and they have a minimum of 3 years of experience in this domain.</p>
      <p>The results of the learning management systems assessment using linguistic variables by experts
are presented in Table 2.
(3)
(5)</p>
      <p>The aggregated assessments of experts in intuitionistic fuzzy numbers are presented in Table 4.</p>
      <p>According to the obtained results presented in Table 6, the best alternatives among those studied,
according to the experts, are Moodle in second place, Atutor, and Ilias in last place. It should be noted
that assessing the security of learning management systems is a complex and challenging task.
Experts used both automated software tools and expert evaluation of the system components security,
conducting a comprehensive interpretation of the identified vulnerabilities.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>According to the obtained results, it can be asserted that significant threats to the security of
learning management systems are cyber risks associated with Spoofing, Tampering, and Elevation of
privilege. It is worth noting that some of the analyzed learning management systems require
differentiation of system access for teachers and students, as well as the implementation of dual
verification during system login.</p>
      <p>The prospect for further research lies in the development of a multi-criteria decision support
method to assess risks in order to prevent them, in particular for cyber-physical biosensor systems
[17-19], taking into account their security issues [20, 21].</p>
    </sec>
    <sec id="sec-6">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Ally</surname>
            ,
            <given-names>Said.</given-names>
          </string-name>
          <article-title>"Review of Online Examination Security for the Moodle Learning Management System."</article-title>
          <source>International Journal of Education and Development using Information and Communication Technology 18.1</source>
          (
          <year>2022</year>
          ):
          <fpage>107</fpage>
          -
          <lpage>124</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bhatia</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. K.</given-names>
            <surname>Maitra</surname>
          </string-name>
          ,
          <article-title>"E-learning Platforms Security Issues</article-title>
          and
          <string-name>
            <given-names>Vulnerability</given-names>
            <surname>Analysis</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>2018 International Conference on Computational and Characterization Techniques in Engineering &amp; Sciences (CCTES)</source>
          , Lucknow, India,
          <year>2018</year>
          , pp.
          <fpage>276</fpage>
          -
          <lpage>285</lpage>
          , doi: 10.1109/CCTES.
          <year>2018</year>
          .
          <volume>8674115</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Adejo</surname>
            ,
            <given-names>Olugbenga W.</given-names>
          </string-name>
          , et al.
          <article-title>"E-learning to m-learning: Framework for data protection and security in cloud infrastructure."</article-title>
          <source>International Journal of Information Technology and Computer Science (IJITCS) 10.4</source>
          (
          <year>2018</year>
          ):
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          , doi: 10.5815/ijitcs.
          <year>2018</year>
          .
          <volume>04</volume>
          .01
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>H.</given-names>
            <surname>Ibrahim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Karabatak</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Abdullahi</surname>
          </string-name>
          ,
          <article-title>"A Study on Cybersecurity Challenges in Elearning and Database Management System," 2020 8th International Symposium on Digital Forensics and Security (ISDFS), Beirut</article-title>
          , Lebanon,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/ISDFS49300.
          <year>2020</year>
          .
          <volume>9116415</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>N.</given-names>
            <surname>Rjaibi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.B.A.</given-names>
            <surname>Rabai</surname>
          </string-name>
          .
          <article-title>Functional Specification to Support Security Risk Assessment of Large Systems</article-title>
          ,
          <source>in: Software Engineering and Algorithms in Intelligent Systems: Proceedings of 7th Computer Science On-line Conference 2018, Volume 1 7</source>
          , Springer International Publishing, pp.
          <fpage>84</fpage>
          -
          <lpage>89</lpage>
          .,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G.</given-names>
            <surname>Kaur</surname>
          </string-name>
          , ZH. Lashkari, AH. Lashkari . Understanding Cybersecurity Management in FinTech. Springer International Publishing,
          <year>2021</year>
          . doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -79915-1
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K.</given-names>
            <surname>Wuyts</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Scandariato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Joosen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Deng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Preneel</surname>
          </string-name>
          ,:
          <article-title>LINDDUN: a privacy threat analysis framework,</article-title>
          .
          <source>DistriNet</source>
          ,
          <year>2019</year>
          . pp.
          <fpage>1</fpage>
          -
          <lpage>23URL</lpage>
          : https://people.cs.kuleuven.be/~kim.wuyts/LINDDUN/LINDDUN.pdf
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D.</given-names>
            <surname>Ionita</surname>
          </string-name>
          .
          <article-title>Current established risk assessment methodologies and tools</article-title>
          .
          <source>MS thesis</source>
          . University of Twente, Netherlands,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>