EMPIRICALLY ANALYZING AND EVALUATING SECURITY FEATURES IN SOFTWARE REQUIREMENTS

被引:2
|
作者
Hayrapetian, Allenoush [1 ]
Raje, Rajeev [1 ]
机构
[1] Indiana Univ Purdue Univ, Dept Comp & Informat Sci, Indianapolis, IN 46202 USA
关键词
Security; Software Requirements; Machine Learning; Neural Networks;
D O I
10.1145/3172871.3172879
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software requirements, for complex projects, often contain specifications of non-functional attributes (e.g., security-related features). The process of analyzing such requirements for compliance is laborious and error prone. Due to the inherent free-flowing nature of software requirements, it is appealing to apply Natural Language Processing (NLP) and Machine Learning (ML)-based techniques for analyzing these documents. In this paper, we propose a semi-automatic methodology that assesses the security requirements of software systems with respect to completeness and ambiguity, creating a bridge between the requirements documents and being in compliance with standards Security standards, such as ISO and OWASP, are compared against software project documents for textual entailment relationships. These entailment results along with the document annotations are used to train a Neural Network model to predict whether a given statement in the document is found within the security standard or not. Hence, this approach aims to identify the appropriate structures that underlie software requirements documents. Once such structures are formalized and empirically validated, they will provide guidelines to software organizations for generating comprehensive and unambiguous requirements specification documents as related to security-oriented features.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Analyzing and Evaluating Security Features in Software Requirements
    Malhotra, Ruchika
    Chug, Anuradha
    Hayrapetian, Allenoush
    Raje, Rajeev
    [J]. 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 26 - 30
  • [2] Analyzing time pressure for software economics Empirically evaluating team factors as the strategic criteria
    Razzaq, Seher
    Huang, Jianglin
    Sun, Hongyi
    Xie, Min
    [J]. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2019, 32 (05) : 758 - 777
  • [3] Empirically analyzing object-oriented software evolution
    Li, W
    Talburt, J
    [J]. JOURNAL OF OBJECT-ORIENTED PROGRAMMING, 1998, 11 (05): : 15 - 19
  • [4] Analyzing evolution of variability in a software product line: From contexts and requirements to features
    Peng, Xin
    Yu, Yijun
    Zhao, Wenyun
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2011, 53 (07) : 707 - 721
  • [5] Security requirements for software development
    Kim, TH
    Shin, MC
    Kim, SH
    Cha, JS
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2004, 3215 : 116 - 122
  • [6] Empirically evaluating the effect of security precautions on cyber incidents
    Gandal, Neil
    Moore, Tyler
    Riordan, Michael
    Barnir, Noa
    [J]. COMPUTERS & SECURITY, 2023, 133
  • [7] Identifying requirements for network security software
    White, DA
    Alijani, GS
    [J]. SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 539 - 543
  • [8] Software Security Requirements Gathering Instrument
    Jain, Smriti
    Ingle, Maya
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (07) : 116 - 121
  • [9] Security requirements in software product lines
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 442 - +
  • [10] Capturing security requirements for software systems
    El-Hadary, Hassan
    El-Kassas, Sherif
    [J]. JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) : 463 - 472