A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities

被引:0
|
作者
Golnaz Elahi
Eric Yu
Nicola Zannone
机构
[1] University of Toronto,
来源
Requirements Engineering | 2010年 / 15卷
关键词
Security requirements engineering; Risk analysis; Agent-oriented software engineering; Empirical security knowledge;
D O I
暂无
中图分类号
学科分类号
摘要
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements elicitation and analysis centered on vulnerabilities. The framework offers modeling and analysis facilities to assist system designers in analyzing vulnerabilities and their effects on the system; identifying potential attackers and analyzing their behavior for compromising the system; and identifying and analyzing the countermeasures to protect the system. The framework proposes a qualitative goal model evaluation analysis for assessing the risks of vulnerabilities exploitation and analyzing the impact of countermeasures on such risks.
引用
收藏
页码:41 / 62
页数:21
相关论文
共 13 条
  • [1] A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
    Elahi, Golnaz
    Yu, Eric
    Zannone, Nicola
    REQUIREMENTS ENGINEERING, 2010, 15 (01) : 41 - 62
  • [2] Performance Analysis of Security Requirements Engineering Framework by Measuring the Vulnerabilities
    Prabhakaran, Salini
    Selvadurai, Kanmani
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (03) : 435 - 444
  • [3] A Novel Method: Ontology-based Security Requirements Engineering Framework
    Salini, P.
    Kanmani, S.
    FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [4] Security requirements engineering framework for software product lines
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    INFORMATION AND SOFTWARE TECHNOLOGY, 2010, 52 (10) : 1094 - 1117
  • [5] Modelling Reusable Security Requirements based on an Ontology Framework
    Lasheras, Joaquin
    Valencia-Garcia, Rafael
    Tomas Fernandez-Breis, Jesualdo
    Toval, Ambrosio
    JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2009, 41 (02): : 119 - 133
  • [6] An Effective Security Requirements Engineering Framework for Cyber-Physical Systems
    Rehman, Shafiq Ur
    Gruhn, Volker
    TECHNOLOGIES, 2018, 6 (03):
  • [7] Which Security Requirements Engineering Methodology Should I Choose? Towards a Requirements Engineering-based Evaluation Approach
    Bulusu, Sravani Teja
    Laborde, Romain
    Wazan, Ahmad Samer
    Barrere, Francois
    Benzekri, Abdelmalek
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [8] Applying a Requirement Engineering Based Approach to Evaluate the Security Requirements Engineering Methodologies
    Bulusu, Sravani Teja
    Laborde, Romain
    Wazan, Ahmad Samer
    Barrere, Francois
    Benzekri, Abdelmalek
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1316 - 1318
  • [9] Secure Information Systems development -: Based on a security requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 467 - +
  • [10] Security Requirements Engineering (SRE) Framework for Cyber-Physical Systems (CPS): SRE for CPS
    ur Rehman, Shafiq
    Gruhn, Volker
    NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2017, 297 : 153 - 163