A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems

被引:19
|
作者
Wilhjelm, Carl [1 ]
Younis, Awad A. [2 ]
机构
[1] Georgia State Univ, Atlanta, GA 30303 USA
[2] Northern Kentucky Univ, Highland Hts, KY USA
关键词
Adversarial Machine Learning; Security Requirements Engineering; Requirements Elicitation Using Threat Modeling; STRIDE; Attack Libraries; Model Inference and Perturbation and Evasion Attacks;
D O I
10.1109/QRS-C51114.2020.00078
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Machine learning (ML) models are now a key component for many applications. However, machine learning based systems (MLBSs), those systems that incorporate them, have proven vulnerable to various new attacks as a result. Currently, there exists no systematic process for eliciting security requirements for MLBSs that incorporates the identification of adversarial machine learning (AML) threats with those of a traditional non-MLBS. In this research study, we explore the applicability of traditional threat modeling and existing attack libraries in addressing MLBS security in the requirements phase. Using an example MLBS, we examined the applicability of 1) DFD and STRIDE in enumerating AML threats; 2) Microsoft SDL AI/ML Bug Bar in ranking the impact of the identified threats; and 3) the Microsoft AML attack library in eliciting threat mitigations to MLBSs. Such a method has the potential to assist team members, even with only domain specific knowledge, to collaboratively mitigate MLBS threats.
引用
收藏
页码:426 / 433
页数:8
相关论文
共 50 条
  • [1] Identifying Security Requirements Based on Linguistic Analysis and Machine Learning
    Li, Tong
    2017 24TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2017), 2017, : 388 - 397
  • [2] Towards a Common Security and Privacy Requirements Elicitation Methodology
    Makri, Eleni-Laskarina
    Lambrinoudakis, Costas
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 151 - 159
  • [3] Machine learning in requirements elicitation: a literature review
    Cheligeer, Cheligeer
    Huang, Jingwei
    Wu, Guosong
    Bhuiyan, Nadia
    Xu, Yuan
    Zeng, Yong
    AI EDAM-ARTIFICIAL INTELLIGENCE FOR ENGINEERING DESIGN ANALYSIS AND MANUFACTURING, 2022, 36
  • [4] STORE: Security Threat Oriented Requirements Engineering Methodology
    Ansari, Md Tarique Jamal
    Pandey, Dhirendra
    Alenezi, Mamdouh
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (02) : 191 - 203
  • [5] Network Security Threat Intelligence Prediction in Network Traffic Analysis Based on Machine Learning
    Guan Y.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [6] Hardware Attack and Assurance with Machine Learning: A Security Threat to Circuits and Systems
    Gwee, Bah-Hwee
    APCCAS 2020: PROCEEDINGS OF THE 2020 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2020), 2020, : 1 - 1
  • [7] The Research and Application of Security Requirements Analysis Methodology of Information Systems
    Cui, Jing-Song
    Zhang, Da
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 30 - 36
  • [8] A Combined Process for Elicitation and Analysis of Safety and Security Requirements
    Raspotnig, Christian
    Karpati, Peter
    Katta, Vikash
    ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2012, 2012, 113 : 347 - 361
  • [9] Cyber Security: Threat Detection Model based on Machine learning Algorithm
    Dalal, Kushal Rashmikant
    Rele, Mayur
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 239 - 243
  • [10] A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
    Mina Deng
    Kim Wuyts
    Riccardo Scandariato
    Bart Preneel
    Wouter Joosen
    Requirements Engineering, 2011, 16 : 3 - 32