A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems

被引:19
|
作者
Wilhjelm, Carl [1 ]
Younis, Awad A. [2 ]
机构
[1] Georgia State Univ, Atlanta, GA 30303 USA
[2] Northern Kentucky Univ, Highland Hts, KY USA
关键词
Adversarial Machine Learning; Security Requirements Engineering; Requirements Elicitation Using Threat Modeling; STRIDE; Attack Libraries; Model Inference and Perturbation and Evasion Attacks;
D O I
10.1109/QRS-C51114.2020.00078
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Machine learning (ML) models are now a key component for many applications. However, machine learning based systems (MLBSs), those systems that incorporate them, have proven vulnerable to various new attacks as a result. Currently, there exists no systematic process for eliciting security requirements for MLBSs that incorporates the identification of adversarial machine learning (AML) threats with those of a traditional non-MLBS. In this research study, we explore the applicability of traditional threat modeling and existing attack libraries in addressing MLBS security in the requirements phase. Using an example MLBS, we examined the applicability of 1) DFD and STRIDE in enumerating AML threats; 2) Microsoft SDL AI/ML Bug Bar in ranking the impact of the identified threats; and 3) the Microsoft AML attack library in eliciting threat mitigations to MLBSs. Such a method has the potential to assist team members, even with only domain specific knowledge, to collaboratively mitigate MLBS threats.
引用
收藏
页码:426 / 433
页数:8
相关论文
共 50 条
  • [31] Identification of Security Requirements in Systems of Systems by Functional Security Analysis
    Fuchs, Andreas
    Rieke, Roland
    ARCHITECTING DEPENDABLE SYSTEMS VII, 2010, 6420 : 74 - 96
  • [32] Formal analysis of safety and security requirements of critical systems supported by an extended STPA methodology
    Howard, Giles
    Butler, Michael
    Colley, John
    Sassone, Vladimiro
    2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, : 174 - 180
  • [33] Literature Review of Machine Learning and Threat Intelligence in Cloud Security
    Thaqi, Rrezearta
    Krasniqi, Bujar
    Mazrekaj, Artan
    Rexha, Blerim
    IEEE ACCESS, 2025, 13 : 11663 - 11678
  • [34] Literature Review of Machine Learning and Threat Intelligence in Cloud Security
    Thaqi, Rrezearta
    Krasniqi, Bujar
    Mazrekaj, Artan
    Rexha, Blerim
    IEEE ACCESS, 2025, 13 : 11663 - 11678
  • [35] Security Requirements Prioritization Based on Threat Modeling and Valuation Graph
    Park, Keun-Young
    Yoo, Sang-Guun
    Kim, Juho
    CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2011, 206 : 142 - 152
  • [36] An Experience Report in Requirements Elicitation for Accessible E-Learning Systems
    Power, Chritopher
    Petrie, Helen
    2010 15TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2010), 2010, : 259 - 261
  • [37] Requirements Elicitation for Game-based Language Learning Application
    Ishaq, Kashif
    Rosdi, Fadhilah
    Zin, Nor Azan Mat
    Abid, Adnan
    4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 86 - 94
  • [38] IoT Security: A Comparative Analysis of Intrusion Detection Systems Based on Machine Learning, Deep Learning and Transfer Learning Techniques
    Mahjoubi, Hayat
    Aissaoui, Karima
    ADVANCES IN SMART MEDICAL, IOT & ARTIFICIAL INTELLIGENCE, VOL 2, ICSMAI 2024, 2024, 12 : 35 - 48
  • [39] Landscape of Requirements Engineering for Machine Learning-based AI Systems
    Yoshioka, Nobukazu
    Husen, Jati H.
    Tun, Hnin Thandar
    Chen, Zhenxiang
    Washizaki, Hironori
    Fukazawa, Yoshiaki
    2021 28TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE WORKSHOPS (APSECW 2021), 2021, : 5 - 8
  • [40] A taxonomy for scenario use in requirements elicitation and analysis of software systems
    Chance, BD
    Melhart, BE
    ECBS '99, IEEE CONFERENCE AND WORKSHOP ON ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 1999, : 232 - 238