Automated Classification of Security Requirements

被引:0
|
作者
Jindal, Rajni [1 ]
Malhotra, Ruchika [1 ]
Jain, Abha [1 ]
机构
[1] Delhi Technol Univ, Dept Comp Sci & Engn, Main Bawana Rd, Delhi 110042, India
来源
2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI) | 2016年
关键词
Non-functional requirements; Text mining; Machine learning; Security requirements; Requirement engineering; Requirement elicitation; Receiver Operating Characteristics;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Requirement engineers are not able to elicit and analyze the security requirements clearly, that are essential for the development of secure and reliable software. Proper identification of security requirements present in the Software Requirement Specification (SRS) document has been a problem being faced by the developers. As a result, they are not able to deliver the software free from threats and vulnerabilities. Thus, in this paper, we intend to mine the descriptions of security requirements present in the SRS document and thereafter develop the classification models. The security-based descriptions are analyzed using text mining techniques and are then classified into four types of security requirements viz. authentication-authorization, access control, cryptography-encryption and data integrity using J48 decision tree method. Corresponding to each type of security requirement, a prediction model has been developed. The effectiveness of the prediction models is evaluated against requirement specifications collected from 15 projects which have been developed by MS students at DePaul University. The result analysis indicated that all the four models have performed very well in predicting their respective type of security requirements.
引用
收藏
页码:2027 / 2033
页数:7
相关论文
共 50 条
  • [1] Toward Automated Software Requirements Classification
    Alrumaih, Hala
    Mirza, Abdulrahman
    Alsalamah, Hessah
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [2] Security Requirements Analysis - A Vision for an Automated Toolchain
    Atighetchi, Michael
    Simidchieva, Borislava
    Olejnik, Katarzyna
    2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 97 - 104
  • [3] Automated verification of UMLsec models for security requirements
    Jürjens, J
    Shabalin, P
    UML 2004 - THE UNIFIED MODELING LANGUAGE: MODELING LANGUAGES AND APPLICATIONS, PROCEEDINGS, 2004, 3273 : 365 - 379
  • [4] Requirements and GitHub Issues: An Automated Approach for Quality Requirements Classification
    J. Manuel Pérez-Verdejo
    Á. J. Sánchez-García
    J. O. Ocharán-Hernández
    E. Mezura-Montes
    K. Cortés-Verdín
    Programming and Computer Software, 2021, 47 : 704 - 721
  • [5] Requirements and GitHub Issues: An Automated Approach for Quality Requirements Classification
    Manuel Perez-Verdejo, J.
    Sanchez-Garcia, A. J.
    Ocharan-Hernandez, J. O.
    Mezura-Montes, E.
    Cortes-Verdin, K.
    PROGRAMMING AND COMPUTER SOFTWARE, 2021, 47 (08) : 704 - 721
  • [6] Automated Big Text Security Classification
    Alzhrani, Khudran
    Rudd, Ethan M.
    Boult, Terrance E.
    Chow, C. Edward
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 103 - 108
  • [7] Automated classification of non-functional requirements
    Jane Cleland-Huang
    Raffaella Settimi
    Xuchang Zou
    Peter Solc
    Requirements Engineering, 2007, 12 : 103 - 120
  • [8] Automated classification of non-functional requirements
    Cleland-Huang, Jane
    Settimi, Raffaella
    Zou, Xuchang
    Solc, Peter
    REQUIREMENTS ENGINEERING, 2007, 12 (02) : 103 - 120
  • [9] Ontologies for Security Requirements: A Literature Survey and Classification
    Souag, Amina
    Salinesi, Camille
    Comyn-Wattiau, Isabelle
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, CAISE 2012, 2012, 112 : 61 - 69
  • [10] Classification, formalization and verification of security functional requirements
    Morimoto, Shoichi
    Shigematsu, Shinjiro
    Goto, Yuichi
    Cheng, Jingde
    SOFSEM 2008: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2008, 4910 : 622 - +