A fuzzy framework for prioritization and partial selection of security requirements in software projects

被引:6
作者
Mougouei, Davoud [1 ]
Powers, David M. W. [2 ]
Mougouei, Elahe [3 ]
机构
[1] Monash Univ, Fac IT, Melbourne, Vic, Australia
[2] Flinders Univ S Australia, Coll Sci & Engn, Adelaide, SA, Australia
[3] Islamic Azad Univ, Fac Comp Engn, Esfahan, Iran
关键词
Security; Requirements; Partial Selection; Fuzzy; INFERENCE; MAMDANI; MODEL; SYSTEMS;
D O I
10.3233/JIFS-182907
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Resource limitations in software projects rarely allow for the security requirements to be fully realized. As such, Prioritization and Selection (PAS) techniques are used to find an optimal subset of the requirements. Consequently, some of the security requirements will be ignored. But ignoring security requirements may (a) leave some of the security threats unattended and (b) negatively impact the effectiveness of the selected requirements. To mitigate this, we have proposed a fuzzy framework, referred to as Prioritization And Partial Selection (PAPS), that reduces the number of ignored security requirements by allowing for partial satisfaction of those requirements. We achieve this by relaxing the satisfaction conditions of security requirements, when tolerated, based on their priorities specified by a fuzzy inference system. Taking into account the partiality of security in PAPS mitigates the adverse impact of ignoring security requirements and enhances the accuracy of prioritization and selection. Our proposed framework is scalable to a large number of requirements.
引用
收藏
页码:2671 / 2686
页数:16
相关论文
共 57 条
  • [1] A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis
    Abdo, H.
    Kaouk, M.
    Flaus, J. -M.
    Masse, F.
    [J]. COMPUTERS & SECURITY, 2018, 72 : 175 - 195
  • [2] Achimugu P, 2014, LECT NOTES COMPUT SC, V8733, P444, DOI 10.1007/978-3-319-11289-3_45
  • [3] A systematic literature review of software requirements prioritization research
    Achimugu, Philip
    Selamat, Ali
    Ibrahim, Roliana
    Mahrin, Mohd Naz'ri
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2014, 56 (06) : 568 - 585
  • [4] Users are not the enemy
    Adams, A
    Sasse, MA
    [J]. COMMUNICATIONS OF THE ACM, 1999, 42 (12) : 41 - 46
  • [5] Improving risk assessment model of cyber security using fuzzy logic inference system
    Alali, Mansour
    Almogren, Ahmad
    Hassan, Mohammad Mehedi
    Rassan, Iehab A. L.
    Bhuiyan, Md Zakirul Alam
    [J]. COMPUTERS & SECURITY, 2018, 74 : 323 - 339
  • [6] Alkubaisy D, 2017, INT CONF RES CHAL, P427, DOI 10.1109/RCIS.2017.7956571
  • [7] Assal H, 2018, PROCEEDINGS OF THE FOURTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY, P281
  • [8] A novel electric load consumption prediction and feature selection model based on modified clonal selection algorithm
    Avatefipour, Omid
    Nafisian, Amir
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (04) : 2261 - 2272
  • [9] Facing scalability issues in requirements prioritization with machine learning techniques
    Avesani, P
    Bazzanella, C
    Perini, A
    Susi, A
    [J]. 13th IEEE International Conference on Requirements Engineering, Proceedings, 2005, : 297 - 305
  • [10] Bachy Y., 2018, J COMPUTER VIROLOGY, P1