A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements

被引:1
|
作者
Hibshi, Hanan [1 ,2 ]
Jones, Stephanie T. [3 ]
Breaux, Travis D. [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] King Abdulaziz Univ, Jeddah 21589, Saudi Arabia
[3] Northwestern Univ, Evanston, IL 60208 USA
基金
美国国家科学基金会; 英国工程与自然科学研究理事会;
关键词
Security; Stakeholders; Natural languages; Analytical models; Systematics; Wireless fidelity; Usability; Scenarios; user stories; security requirements; requirements analysis; requirements elicitation; qualitative analysis; natural language text; user study; GENERATION; STRATEGIES;
D O I
10.1109/TDSC.2021.3103109
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security analysts rely on scenarios to assess vulnerabilities, project attacks, and decide on security requirements that mitigate the threat. However, eliciting natural language scenarios from stakeholders can be an ad-hoc process and subject to ambiguity and incompleteness. In this article, we examine systematic scenario elicitation by introducing a method based on user stories that uses a simplified process model of iterative scenario refinement. The process consists of three steps: 1) eliciting an interaction statement that describes a critical action performed by a user or system process; 2) eliciting one or more descriptive statements about a technology that enables the interaction; and 3) refinement of the technology into technical variants that correspond to design alternatives. We empirically evaluated our method by implementing our prototype in a user study that collects 30 security scenarios from participants. Based on our analysis, our proposed method is shown effective. Participants had a 100 percent task completion rate with 57 percent of participants achieving complete task-success, and the remaining 43 percent of participants achieving partial task-success. We also show the effect of security domain knowledge, and the benefit of using structure when collecting security requirements in natural language text. Finally, we present lessons learned and future research directions.
引用
收藏
页码:3579 / 3591
页数:13
相关论文
共 50 条
  • [1] A Collaborative Requirements Elicitation Approach Based on Scenario
    Ge, Chang
    Yu, Suihuai
    Yang, Gangjun
    Wang, Weiwei
    [J]. 2009 IEEE 10TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, VOLS 1-3: E-BUSINESS, CREATIVE DESIGN, MANUFACTURING - CAID&CD'2009, 2009, : 2213 - 2216
  • [2] A Natural Language Programming Approach for Requirements-based Security Testing
    Mai, Phu X.
    Pastore, Fabrizio
    Goknil, Arda
    Briand, Lionel C.
    [J]. 2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2018, : 58 - 69
  • [3] A Security Ontology for Security Requirements Elicitation
    Souag, Amina
    Salinesi, Camille
    Mazo, Raul
    Comyn-Wattiau, Isabelle
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 157 - 175
  • [4] Security Requirements Elicitation and Modeling Authorizations
    Goel, Rajat
    Govil, Mahesh Chandra
    Singh, Girdhari
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 239 - 250
  • [5] AbStFinder, a Prototype Natural Language Text Abstraction Finder for Use in Requirements Elicitation
    Goldin L.
    Berry D.M.
    [J]. Automated Software Engineering, 1997, 4 (4) : 375 - 412
  • [6] Software Requirements Elicitation - A Controlled Experiment to Measure the Impact of a Native Natural Language
    Mahmood, Sajjad
    Ajila, Samuel A.
    [J]. 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 437 - 442
  • [7] Ontology-Driven Requirements Elicitation Based on Scenario
    Fan, Zhijun
    Jiang, Zhaoliang
    [J]. AUTOMATIC MANUFACTURING SYSTEMS II, PTS 1 AND 2, 2012, 542-543 : 1459 - 1462
  • [8] A collaborative approach to requirements elicitation
    Laporti, Viviane
    Borges, Marcos R. S.
    Braganholo, Vanessa P.
    [J]. PROCEEDINGS OF THE 2007 11TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2007, : 734 - +
  • [9] User Requirements Elicitation in Security and Counter-Terrorism: A Human Factors Approach
    Saikayasit, Rose
    Stedmon, Alex W.
    Lawson, Glyn
    [J]. JOURNAL OF POLICE AND CRIMINAL PSYCHOLOGY, 2013, 28 (02) : 162 - 170
  • [10] A NATURAL-LANGUAGE APPROACH FOR REQUIREMENTS ENGINEERING
    ROLLAND, C
    PROIX, C
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 593 : 257 - 277