EMPIRICALLY ANALYZING AND EVALUATING SECURITY FEATURES IN SOFTWARE REQUIREMENTS

被引:2
|
作者
Hayrapetian, Allenoush [1 ]
Raje, Rajeev [1 ]
机构
[1] Indiana Univ Purdue Univ, Dept Comp & Informat Sci, Indianapolis, IN 46202 USA
关键词
Security; Software Requirements; Machine Learning; Neural Networks;
D O I
10.1145/3172871.3172879
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software requirements, for complex projects, often contain specifications of non-functional attributes (e.g., security-related features). The process of analyzing such requirements for compliance is laborious and error prone. Due to the inherent free-flowing nature of software requirements, it is appealing to apply Natural Language Processing (NLP) and Machine Learning (ML)-based techniques for analyzing these documents. In this paper, we propose a semi-automatic methodology that assesses the security requirements of software systems with respect to completeness and ambiguity, creating a bridge between the requirements documents and being in compliance with standards Security standards, such as ISO and OWASP, are compared against software project documents for textual entailment relationships. These entailment results along with the document annotations are used to train a Neural Network model to predict whether a given statement in the document is found within the security standard or not. Hence, this approach aims to identify the appropriate structures that underlie software requirements documents. Once such structures are formalized and empirically validated, they will provide guidelines to software organizations for generating comprehensive and unambiguous requirements specification documents as related to security-oriented features.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Measuring, analyzing and predicting security vulnerabilities in software systems
    Alhazmi, O. H.
    Malaiya, Y. K.
    Ray, I.
    [J]. COMPUTERS & SECURITY, 2007, 26 (03) : 219 - 228
  • [32] Unified threat model for analyzing and evaluating software threats
    Li, XiaoHong
    He, Ke
    Feng, Zhiyong
    Xu, Guangquan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1454 - 1466
  • [33] CORRESPONDENCE VISUALIZATION TECHNIQUES FOR ANALYZING AND EVALUATING SOFTWARE MEASURES
    EBERT, C
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1992, 18 (11) : 1029 - 1034
  • [34] Essential Requirements for Data Security in the Context of Software Metrics
    Sastry, B. R.
    Saradhi, M. V. Vijaya
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (01): : 19 - 23
  • [35] Analyzing Quality of Software Requirements; A Comparison Study on NLP Tools
    Naeem, Afrah
    Aslam, Zeeshan
    Shah, Munam Ali
    [J]. 2019 25TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2019, : 257 - 262
  • [36] Security and design requirements for software-defined VANETs
    Ben Jaballah, Wafa
    Conti, Mauro
    Lal, Chhagan
    [J]. COMPUTER NETWORKS, 2020, 169 (169)
  • [37] Security requirements engineering framework for software product lines
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2010, 52 (10) : 1094 - 1117
  • [38] Special checklist for security requirements in software development site
    Hwang, Sun-myung
    [J]. MUE: 2007 International Conference on Multimedia and Ubiquitous Engineering, Proceedings, 2007, : 1172 - 1176
  • [39] An approach to analyze software security requirements in ABAC model
    Thanh-Nhan Luong
    Dinh-Hieu Vo
    Ninh-Thuan Truong
    [J]. PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2019, : 184 - 189
  • [40] Security Requirements Management in Software Product Line Engineering
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 250 - +