EMPIRICALLY ANALYZING AND EVALUATING SECURITY FEATURES IN SOFTWARE REQUIREMENTS

被引:2
|
作者
Hayrapetian, Allenoush [1 ]
Raje, Rajeev [1 ]
机构
[1] Indiana Univ Purdue Univ, Dept Comp & Informat Sci, Indianapolis, IN 46202 USA
关键词
Security; Software Requirements; Machine Learning; Neural Networks;
D O I
10.1145/3172871.3172879
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software requirements, for complex projects, often contain specifications of non-functional attributes (e.g., security-related features). The process of analyzing such requirements for compliance is laborious and error prone. Due to the inherent free-flowing nature of software requirements, it is appealing to apply Natural Language Processing (NLP) and Machine Learning (ML)-based techniques for analyzing these documents. In this paper, we propose a semi-automatic methodology that assesses the security requirements of software systems with respect to completeness and ambiguity, creating a bridge between the requirements documents and being in compliance with standards Security standards, such as ISO and OWASP, are compared against software project documents for textual entailment relationships. These entailment results along with the document annotations are used to train a Neural Network model to predict whether a given statement in the document is found within the security standard or not. Hence, this approach aims to identify the appropriate structures that underlie software requirements documents. Once such structures are formalized and empirically validated, they will provide guidelines to software organizations for generating comprehensive and unambiguous requirements specification documents as related to security-oriented features.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Software Security Requirements Engineering: State of the Art
    Ramachandran, Muthu
    [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 313 - 322
  • [22] Security requirements variability for software product lines
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1413 - +
  • [23] The security requirements behavior model for trustworthy software
    Saleh, Kassem
    Habil, Maryam
    [J]. 2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 235 - +
  • [24] Requirements for Security Enhancements to Legacy Software with RUP
    Mocanu, Virgil
    [J]. INFORMATION SECURITY JOURNAL, 2010, 19 (04): : 226 - 236
  • [25] Evaluating Cryptographic Security Requirements in IoT Gateways
    Felix, Eduardo F.
    Lins, Fernando A. A.
    Gomes, Diego R.
    Nobrega, Obionor O.
    Jesus, Bruno A.
    Vieira, Marco
    [J]. 2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [26] Modeling and Evaluating Personas with Software Explainability Requirements
    Ramos, Henrique
    Fonseca, Mateus
    Ponciano, Lesandro
    [J]. HUMAN-COMPUTER INTERACTION, HCI-COLLAB, 2021, 1478 : 136 - 149
  • [27] Towards security requirements management for software product lines:: A security domain requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. COMPUTER STANDARDS & INTERFACES, 2008, 30 (06) : 361 - 371
  • [28] Analyzing the Requirements for a Robust Security Criteria and Management of Multi Level Security in the Clouds
    Farroha, Bassam S.
    Farroha, Deborah L.
    [J]. DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2011, 2011, 8062
  • [29] Analyzing and Evaluating Critical Cyber Security Challenges Faced by Vendor Organizations in Software Development: SLR Based Approach
    Khan, Abdul Wahid
    Zaib, Shah
    Khan, Faheem
    Tarimer, Ilhan
    Seo, Jung Taek
    Shin, Jiho
    [J]. IEEE ACCESS, 2022, 10 : 65044 - 65054
  • [30] A Neural Network Based Security Tool for Analyzing Software
    Adebiyi, Adetunji
    Arreymbi, Johnnes
    Imafidon, Chris
    [J]. TECHNOLOGICAL INNOVATION FOR THE INTERNET OF THINGS, 2013, 394 : 80 - 87